Analysis
-
max time kernel
898s -
max time network
460s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/01/2025, 06:47
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
bc1d1f704a0f37aaa31d8da25618926d
-
SHA1
f4660775a087c298f06ea418ed31d678eea08922
-
SHA256
d235809f999353ba99369eb3f2df5a32c400954bbd852f6842edf8cd5ad1a8d6
-
SHA512
84316eab0534d14ab956f52117a156071c7a930a670a5a77c109b7bb09df08b6d1b9871e97e4b4e844dcc9211f8883af9ed87ae96fa422082ecf0a7f99defee1
-
SSDEEP
49152:KvmI22SsaNYfdPBldt698dBcjHvVRJ61bR3LoGdZxTHHB72eh2NT:Kvr22SsaNYfdPBldt6+dBcjHvVRJ6H
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.77:4782
a45d6a9d-6557-4b6f-b798-0ec5ffcaa226
-
encryption_key
312B6A0B5118D6087CCF93301A6FDB0B736544CA
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/4744-1-0x0000000000F30000-0x0000000001254000-memory.dmp family_quasar behavioral1/files/0x001a00000002abc0-6.dat family_quasar -
Executes dropped EXE 64 IoCs
pid Process 4104 Client.exe 1128 Client.exe 2264 Client.exe 1964 Client.exe 424 Client.exe 3360 Client.exe 852 Client.exe 2408 Client.exe 4656 Client.exe 3740 Client.exe 3392 Client.exe 2328 Client.exe 4144 Client.exe 1560 Client.exe 2032 Client.exe 776 Client.exe 3216 Client.exe 2548 Client.exe 3276 Client.exe 1428 Client.exe 4604 Client.exe 3256 Client.exe 1656 Client.exe 2220 Client.exe 4360 Client.exe 2816 Client.exe 4828 Client.exe 2056 Client.exe 4436 Client.exe 1148 Client.exe 1632 Client.exe 3848 Client.exe 4296 Client.exe 912 Client.exe 4856 Client.exe 336 Client.exe 608 Client.exe 2344 Client.exe 3128 Client.exe 1168 Client.exe 2824 Client.exe 4556 Client.exe 2156 Client.exe 1508 Client.exe 1528 Client.exe 864 Client.exe 1420 Client.exe 4828 Client.exe 2056 Client.exe 1172 Client.exe 968 Client.exe 4356 Client.exe 956 Client.exe 4296 Client.exe 4376 Client.exe 3548 Client.exe 2988 Client.exe 4248 Client.exe 4504 Client.exe 4164 Client.exe 4144 Client.exe 2228 Client.exe 4604 Client.exe 2584 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 228 PING.EXE 4372 PING.EXE 2500 PING.EXE 2076 PING.EXE 3472 PING.EXE 4092 PING.EXE 4164 PING.EXE 1560 PING.EXE 1844 PING.EXE 1468 PING.EXE 2720 PING.EXE 3680 PING.EXE 1652 PING.EXE 3576 PING.EXE 3536 PING.EXE 2512 PING.EXE 2684 PING.EXE 4208 PING.EXE 1112 PING.EXE 4752 PING.EXE 4424 PING.EXE 5028 PING.EXE 4016 PING.EXE 3940 PING.EXE 1160 PING.EXE 1892 PING.EXE 396 PING.EXE 2296 PING.EXE 2152 PING.EXE 4992 PING.EXE 1272 PING.EXE 4912 PING.EXE 3400 PING.EXE 2236 PING.EXE 4104 PING.EXE 4124 PING.EXE 1216 PING.EXE 1300 PING.EXE 1232 PING.EXE 2348 PING.EXE 1936 PING.EXE 4904 PING.EXE 1908 PING.EXE 3416 PING.EXE 3248 PING.EXE 2424 PING.EXE 2488 PING.EXE 4256 PING.EXE 3116 PING.EXE 4540 PING.EXE 2392 PING.EXE 608 PING.EXE 896 PING.EXE 1396 PING.EXE 764 PING.EXE 4824 PING.EXE 2268 PING.EXE 4896 PING.EXE 1764 PING.EXE 1920 PING.EXE 2616 PING.EXE 1856 PING.EXE 4632 PING.EXE 2480 PING.EXE -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 1396 PING.EXE 1468 PING.EXE 4824 PING.EXE 1272 PING.EXE 1764 PING.EXE 1300 PING.EXE 2392 PING.EXE 3248 PING.EXE 3296 PING.EXE 3472 PING.EXE 5084 PING.EXE 1732 PING.EXE 2640 PING.EXE 1436 PING.EXE 1968 PING.EXE 4124 PING.EXE 3400 PING.EXE 3124 PING.EXE 4752 PING.EXE 1856 PING.EXE 4164 PING.EXE 2076 PING.EXE 2348 PING.EXE 896 PING.EXE 1652 PING.EXE 1036 PING.EXE 3576 PING.EXE 2500 PING.EXE 3116 PING.EXE 1908 PING.EXE 1216 PING.EXE 2196 PING.EXE 2336 PING.EXE 4992 PING.EXE 972 PING.EXE 4424 PING.EXE 2616 PING.EXE 4904 PING.EXE 3680 PING.EXE 608 PING.EXE 5028 PING.EXE 1920 PING.EXE 2720 PING.EXE 396 PING.EXE 4092 PING.EXE 4104 PING.EXE 1232 PING.EXE 2424 PING.EXE 4256 PING.EXE 4632 PING.EXE 4196 PING.EXE 2720 PING.EXE 3536 PING.EXE 2684 PING.EXE 2624 PING.EXE 1112 PING.EXE 2480 PING.EXE 764 PING.EXE 1696 PING.EXE 2172 PING.EXE 2152 PING.EXE 4016 PING.EXE 3416 PING.EXE 2144 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4424 schtasks.exe 4656 schtasks.exe 4916 schtasks.exe 2684 schtasks.exe 5000 schtasks.exe 4848 schtasks.exe 968 schtasks.exe 1400 schtasks.exe 2692 schtasks.exe 1368 schtasks.exe 4392 schtasks.exe 1184 schtasks.exe 1748 schtasks.exe 2268 schtasks.exe 432 schtasks.exe 4540 schtasks.exe 3448 schtasks.exe 1760 schtasks.exe 2564 schtasks.exe 1812 schtasks.exe 3320 schtasks.exe 1084 schtasks.exe 4988 schtasks.exe 2924 schtasks.exe 4628 schtasks.exe 3140 schtasks.exe 3244 schtasks.exe 1588 schtasks.exe 1640 schtasks.exe 972 schtasks.exe 3720 schtasks.exe 380 schtasks.exe 2148 schtasks.exe 4104 schtasks.exe 3584 schtasks.exe 3308 schtasks.exe 4912 schtasks.exe 988 schtasks.exe 3492 schtasks.exe 1168 schtasks.exe 4636 schtasks.exe 2220 schtasks.exe 1928 schtasks.exe 3400 schtasks.exe 4604 schtasks.exe 2852 schtasks.exe 4720 schtasks.exe 2072 schtasks.exe 2956 schtasks.exe 1556 schtasks.exe 4756 schtasks.exe 3740 schtasks.exe 988 schtasks.exe 1496 schtasks.exe 2548 schtasks.exe 4952 schtasks.exe 3216 schtasks.exe 1936 schtasks.exe 4192 schtasks.exe 4176 schtasks.exe 2316 schtasks.exe 2404 schtasks.exe 1616 schtasks.exe 3484 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4744 Client-built.exe Token: SeDebugPrivilege 4104 Client.exe Token: SeDebugPrivilege 1128 Client.exe Token: SeDebugPrivilege 2264 Client.exe Token: SeDebugPrivilege 1964 Client.exe Token: SeDebugPrivilege 424 Client.exe Token: SeDebugPrivilege 3360 Client.exe Token: SeDebugPrivilege 852 Client.exe Token: SeDebugPrivilege 2408 Client.exe Token: SeDebugPrivilege 4656 Client.exe Token: SeDebugPrivilege 3740 Client.exe Token: SeDebugPrivilege 3392 Client.exe Token: SeDebugPrivilege 2328 Client.exe Token: SeDebugPrivilege 4144 Client.exe Token: SeDebugPrivilege 1560 Client.exe Token: SeDebugPrivilege 2032 Client.exe Token: SeDebugPrivilege 776 Client.exe Token: SeDebugPrivilege 3216 Client.exe Token: SeDebugPrivilege 2548 Client.exe Token: SeDebugPrivilege 3276 Client.exe Token: SeDebugPrivilege 1428 Client.exe Token: SeDebugPrivilege 4604 Client.exe Token: SeDebugPrivilege 3256 Client.exe Token: SeDebugPrivilege 1656 Client.exe Token: SeDebugPrivilege 2220 Client.exe Token: SeDebugPrivilege 4360 Client.exe Token: SeDebugPrivilege 2816 Client.exe Token: SeDebugPrivilege 4828 Client.exe Token: SeDebugPrivilege 2056 Client.exe Token: SeDebugPrivilege 4436 Client.exe Token: SeDebugPrivilege 1148 Client.exe Token: SeDebugPrivilege 1632 Client.exe Token: SeDebugPrivilege 3848 Client.exe Token: SeDebugPrivilege 4296 Client.exe Token: SeDebugPrivilege 912 Client.exe Token: SeDebugPrivilege 4856 Client.exe Token: SeDebugPrivilege 336 Client.exe Token: SeDebugPrivilege 608 Client.exe Token: SeDebugPrivilege 2344 Client.exe Token: SeDebugPrivilege 3128 Client.exe Token: SeDebugPrivilege 1168 Client.exe Token: SeDebugPrivilege 2824 Client.exe Token: SeDebugPrivilege 4556 Client.exe Token: SeDebugPrivilege 2156 Client.exe Token: SeDebugPrivilege 1508 Client.exe Token: SeDebugPrivilege 1528 Client.exe Token: SeDebugPrivilege 864 Client.exe Token: SeDebugPrivilege 1420 Client.exe Token: SeDebugPrivilege 4828 Client.exe Token: SeDebugPrivilege 2056 Client.exe Token: SeDebugPrivilege 1172 Client.exe Token: SeDebugPrivilege 968 Client.exe Token: SeDebugPrivilege 4356 Client.exe Token: SeDebugPrivilege 956 Client.exe Token: SeDebugPrivilege 4296 Client.exe Token: SeDebugPrivilege 4376 Client.exe Token: SeDebugPrivilege 3548 Client.exe Token: SeDebugPrivilege 2988 Client.exe Token: SeDebugPrivilege 4248 Client.exe Token: SeDebugPrivilege 4504 Client.exe Token: SeDebugPrivilege 4164 Client.exe Token: SeDebugPrivilege 4144 Client.exe Token: SeDebugPrivilege 2228 Client.exe Token: SeDebugPrivilege 4604 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4744 wrote to memory of 4916 4744 Client-built.exe 77 PID 4744 wrote to memory of 4916 4744 Client-built.exe 77 PID 4744 wrote to memory of 4104 4744 Client-built.exe 79 PID 4744 wrote to memory of 4104 4744 Client-built.exe 79 PID 4104 wrote to memory of 3492 4104 Client.exe 80 PID 4104 wrote to memory of 3492 4104 Client.exe 80 PID 4104 wrote to memory of 1080 4104 Client.exe 82 PID 4104 wrote to memory of 1080 4104 Client.exe 82 PID 1080 wrote to memory of 4008 1080 cmd.exe 84 PID 1080 wrote to memory of 4008 1080 cmd.exe 84 PID 1080 wrote to memory of 4164 1080 cmd.exe 85 PID 1080 wrote to memory of 4164 1080 cmd.exe 85 PID 1080 wrote to memory of 1128 1080 cmd.exe 86 PID 1080 wrote to memory of 1128 1080 cmd.exe 86 PID 1128 wrote to memory of 3484 1128 Client.exe 87 PID 1128 wrote to memory of 3484 1128 Client.exe 87 PID 1128 wrote to memory of 1148 1128 Client.exe 89 PID 1128 wrote to memory of 1148 1128 Client.exe 89 PID 1148 wrote to memory of 5104 1148 cmd.exe 91 PID 1148 wrote to memory of 5104 1148 cmd.exe 91 PID 1148 wrote to memory of 1232 1148 cmd.exe 92 PID 1148 wrote to memory of 1232 1148 cmd.exe 92 PID 1148 wrote to memory of 2264 1148 cmd.exe 93 PID 1148 wrote to memory of 2264 1148 cmd.exe 93 PID 2264 wrote to memory of 2328 2264 Client.exe 94 PID 2264 wrote to memory of 2328 2264 Client.exe 94 PID 2264 wrote to memory of 3744 2264 Client.exe 96 PID 2264 wrote to memory of 3744 2264 Client.exe 96 PID 3744 wrote to memory of 3304 3744 cmd.exe 98 PID 3744 wrote to memory of 3304 3744 cmd.exe 98 PID 3744 wrote to memory of 2512 3744 cmd.exe 99 PID 3744 wrote to memory of 2512 3744 cmd.exe 99 PID 3744 wrote to memory of 1964 3744 cmd.exe 100 PID 3744 wrote to memory of 1964 3744 cmd.exe 100 PID 1964 wrote to memory of 2692 1964 Client.exe 101 PID 1964 wrote to memory of 2692 1964 Client.exe 101 PID 1964 wrote to memory of 4832 1964 Client.exe 103 PID 1964 wrote to memory of 4832 1964 Client.exe 103 PID 4832 wrote to memory of 3568 4832 cmd.exe 105 PID 4832 wrote to memory of 3568 4832 cmd.exe 105 PID 4832 wrote to memory of 2076 4832 cmd.exe 106 PID 4832 wrote to memory of 2076 4832 cmd.exe 106 PID 4832 wrote to memory of 424 4832 cmd.exe 107 PID 4832 wrote to memory of 424 4832 cmd.exe 107 PID 424 wrote to memory of 2684 424 Client.exe 108 PID 424 wrote to memory of 2684 424 Client.exe 108 PID 424 wrote to memory of 3852 424 Client.exe 110 PID 424 wrote to memory of 3852 424 Client.exe 110 PID 3852 wrote to memory of 2656 3852 cmd.exe 112 PID 3852 wrote to memory of 2656 3852 cmd.exe 112 PID 3852 wrote to memory of 1560 3852 cmd.exe 113 PID 3852 wrote to memory of 1560 3852 cmd.exe 113 PID 3852 wrote to memory of 3360 3852 cmd.exe 114 PID 3852 wrote to memory of 3360 3852 cmd.exe 114 PID 3360 wrote to memory of 1948 3360 Client.exe 115 PID 3360 wrote to memory of 1948 3360 Client.exe 115 PID 3360 wrote to memory of 4000 3360 Client.exe 117 PID 3360 wrote to memory of 4000 3360 Client.exe 117 PID 4000 wrote to memory of 1184 4000 cmd.exe 119 PID 4000 wrote to memory of 1184 4000 cmd.exe 119 PID 4000 wrote to memory of 1968 4000 cmd.exe 120 PID 4000 wrote to memory of 1968 4000 cmd.exe 120 PID 4000 wrote to memory of 852 4000 cmd.exe 121 PID 4000 wrote to memory of 852 4000 cmd.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:4916
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\d7YhbKASz19Q.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:4008
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4164
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7dqpSz4jLqCj.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:5104
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1232
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵PID:2328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6OEdasb1aU3d.bat" "7⤵
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:3304
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2512
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:2692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SexQE0hhaVE9.bat" "9⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\system32\chcp.comchcp 6500110⤵PID:3568
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2076
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:2684
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dDSpgO4jp521.bat" "11⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\system32\chcp.comchcp 6500112⤵PID:2656
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1560
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵PID:1948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3PnEFhpEllTQ.bat" "13⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\system32\chcp.comchcp 6500114⤵PID:1184
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
PID:1968
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:852 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:3400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Jr3ColEIaU7l.bat" "15⤵PID:4428
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:4272
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵PID:4996
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2408 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:3216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gs5MbUdMmwjb.bat" "17⤵PID:5028
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:3428
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4912
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4656 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6ms3PryM5NCY.bat" "19⤵PID:4744
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:5036
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4016
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3740 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:4104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4mJFuXf2LwoL.bat" "21⤵PID:1020
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:3876
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:764
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3392 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:1748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wRa8YHHBXqR8.bat" "23⤵PID:2432
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:4356
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵PID:2860
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2328 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:1368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E527SZwGKZGr.bat" "25⤵PID:4168
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:568
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3116
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4144 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵PID:956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Xcxq8wqaBiNu.bat" "27⤵PID:2076
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:4268
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
PID:1696
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1560 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Scheduled Task/Job: Scheduled Task
PID:3244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uMGQHSaC8FDC.bat" "29⤵PID:2756
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:2160
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4124
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Scheduled Task/Job: Scheduled Task
PID:2564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GmXLtwuJ14k2.bat" "31⤵PID:2924
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:2648
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2348
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:776 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f33⤵PID:4228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\detpjePYOAX6.bat" "33⤵PID:2780
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:4428
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1936
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3216 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f35⤵
- Scheduled Task/Job: Scheduled Task
PID:4392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Is0Xx4mehK2h.bat" "35⤵PID:5112
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:4824
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1844
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2548 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f37⤵
- Scheduled Task/Job: Scheduled Task
PID:3320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iGK07MhtZEIV.bat" "37⤵PID:4924
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:4016
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵PID:3720
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3276 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f39⤵
- Scheduled Task/Job: Scheduled Task
PID:3584
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VWf9gUds4GgD.bat" "39⤵PID:3740
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:1464
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵PID:1168
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1428 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f41⤵
- Scheduled Task/Job: Scheduled Task
PID:5000
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SP39gc3b7xgd.bat" "41⤵PID:1084
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:4184
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵
- Runs ping.exe
PID:4196
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4604 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f43⤵
- Scheduled Task/Job: Scheduled Task
PID:3308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\e7VPVNB85xrU.bat" "43⤵PID:568
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:200
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4904
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3256 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f45⤵PID:1040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\G6ylAHOFuWkM.bat" "45⤵PID:2276
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:2496
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost46⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2684
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1656 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f47⤵
- Scheduled Task/Job: Scheduled Task
PID:1588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\m9CPCGAk7iHa.bat" "47⤵PID:4968
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:2404
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1468
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2220 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f49⤵
- Scheduled Task/Job: Scheduled Task
PID:1184
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A114auVi9UsQ.bat" "49⤵PID:2008
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:3324
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
PID:3124
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4360 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f51⤵PID:3492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tZL0qxG3BXmS.bat" "51⤵PID:2636
-
C:\Windows\system32\chcp.comchcp 6500152⤵PID:3064
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost52⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3400
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2816 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f53⤵
- Scheduled Task/Job: Scheduled Task
PID:2268
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rJgUkrph8n6k.bat" "53⤵PID:3428
-
C:\Windows\system32\chcp.comchcp 6500154⤵PID:2212
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost54⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3472
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4828 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f55⤵
- Scheduled Task/Job: Scheduled Task
PID:4848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2QQN3grsLq8Q.bat" "55⤵PID:4692
-
C:\Windows\system32\chcp.comchcp 6500156⤵PID:2344
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost56⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1908
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2056 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f57⤵PID:4380
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tqRYZnq7zfXn.bat" "57⤵PID:3956
-
C:\Windows\system32\chcp.comchcp 6500158⤵PID:1592
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost58⤵
- Runs ping.exe
PID:2172
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4436 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f59⤵PID:1680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Z78AGDDkSzvt.bat" "59⤵PID:2984
-
C:\Windows\system32\chcp.comchcp 6500160⤵PID:2676
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost60⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2720
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1148 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f61⤵
- Scheduled Task/Job: Scheduled Task
PID:968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HThoAjWnRS4v.bat" "61⤵PID:1156
-
C:\Windows\system32\chcp.comchcp 6500162⤵PID:2656
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost62⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3940
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1632 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f63⤵
- Scheduled Task/Job: Scheduled Task
PID:1084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WogJdl4MwAfL.bat" "63⤵PID:5100
-
C:\Windows\system32\chcp.comchcp 6500164⤵PID:3432
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost64⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4540
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3848 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f65⤵PID:4808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oqaQtbu0R5X4.bat" "65⤵PID:1040
-
C:\Windows\system32\chcp.comchcp 6500166⤵PID:3256
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost66⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1160
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"66⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4296 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f67⤵
- Scheduled Task/Job: Scheduled Task
PID:432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4cFP8McDPixk.bat" "67⤵PID:1008
-
C:\Windows\system32\chcp.comchcp 6500168⤵PID:3104
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost68⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2392
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"68⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:912 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f69⤵
- Scheduled Task/Job: Scheduled Task
PID:1496
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\S6lV5UAEi3R9.bat" "69⤵PID:1564
-
C:\Windows\system32\chcp.comchcp 6500170⤵PID:3156
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost70⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3680
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"70⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4856 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f71⤵PID:4572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rP15vOawZ3C3.bat" "71⤵PID:3064
-
C:\Windows\system32\chcp.comchcp 6500172⤵PID:864
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost72⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3416
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"72⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:336 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f73⤵
- Scheduled Task/Job: Scheduled Task
PID:1936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0Z0ZvJfhZgC6.bat" "73⤵PID:112
-
C:\Windows\system32\chcp.comchcp 6500174⤵PID:1300
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost74⤵
- Runs ping.exe
PID:5084
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"74⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:608 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f75⤵
- Scheduled Task/Job: Scheduled Task
PID:4912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qb2V6JrRoBe2.bat" "75⤵PID:3060
-
C:\Windows\system32\chcp.comchcp 6500176⤵PID:1480
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost76⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4824
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"76⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2344 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f77⤵PID:5088
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\M8nJsej6PQQr.bat" "77⤵PID:3000
-
C:\Windows\system32\chcp.comchcp 6500178⤵PID:8
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost78⤵
- Runs ping.exe
PID:2144
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"78⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3128 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f79⤵PID:1932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ev6Tq4q6iHpE.bat" "79⤵PID:1652
-
C:\Windows\system32\chcp.comchcp 6500180⤵PID:3276
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost80⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4208
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"80⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1168 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f81⤵PID:1748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3HFBzRs66PMu.bat" "81⤵PID:2384
-
C:\Windows\system32\chcp.comchcp 6500182⤵PID:4408
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost82⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3248
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"82⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2824 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f83⤵
- Scheduled Task/Job: Scheduled Task
PID:1640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0iftW5J1iifL.bat" "83⤵PID:4812
-
C:\Windows\system32\chcp.comchcp 6500184⤵PID:4920
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost84⤵
- Runs ping.exe
PID:1732
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"84⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4556 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f85⤵
- Scheduled Task/Job: Scheduled Task
PID:4540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xatU07CAnGCd.bat" "85⤵PID:1244
-
C:\Windows\system32\chcp.comchcp 6500186⤵PID:3116
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost86⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2296
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"86⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2156 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f87⤵
- Scheduled Task/Job: Scheduled Task
PID:1812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\h4cRdaSNfLq3.bat" "87⤵PID:564
-
C:\Windows\system32\chcp.comchcp 6500188⤵PID:2256
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost88⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1112
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"88⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1508 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f89⤵
- Scheduled Task/Job: Scheduled Task
PID:972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Mq5scTvcJNkq.bat" "89⤵PID:2076
-
C:\Windows\system32\chcp.comchcp 6500190⤵PID:2616
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost90⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1892
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"90⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f91⤵
- Scheduled Task/Job: Scheduled Task
PID:1400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XjHJ0SCGv8Z9.bat" "91⤵PID:2768
-
C:\Windows\system32\chcp.comchcp 6500192⤵PID:1524
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost92⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1216
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"92⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:864 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f93⤵PID:2876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lezSdfIscHBu.bat" "93⤵PID:2780
-
C:\Windows\system32\chcp.comchcp 6500194⤵PID:3028
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost94⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4752
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"94⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1420 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f95⤵
- Scheduled Task/Job: Scheduled Task
PID:2956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\G3yNajPMaBIk.bat" "95⤵PID:4912
-
C:\Windows\system32\chcp.comchcp 6500196⤵PID:3556
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost96⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:608
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"96⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4828 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f97⤵PID:4896
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QQj3XRo13Xgf.bat" "97⤵PID:2100
-
C:\Windows\system32\chcp.comchcp 6500198⤵PID:4784
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost98⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:896
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"98⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2056 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f99⤵
- Scheduled Task/Job: Scheduled Task
PID:3720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1xZBSCqmcXvW.bat" "99⤵PID:2928
-
C:\Windows\system32\chcp.comchcp 65001100⤵PID:3540
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost100⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2424
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"100⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1172 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f101⤵PID:1124
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZFJbclVlWByd.bat" "101⤵PID:2036
-
C:\Windows\system32\chcp.comchcp 65001102⤵PID:3504
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost102⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2152
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"102⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:968 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f103⤵
- Scheduled Task/Job: Scheduled Task
PID:1168
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nC8FEGaPMPh2.bat" "103⤵PID:332
-
C:\Windows\system32\chcp.comchcp 65001104⤵PID:3308
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost104⤵
- Runs ping.exe
PID:2640
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"104⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4356 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f105⤵
- Scheduled Task/Job: Scheduled Task
PID:4604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YMYnRVq5iWra.bat" "105⤵PID:2192
-
C:\Windows\system32\chcp.comchcp 65001106⤵PID:1984
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost106⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:228
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"106⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:956 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f107⤵
- Scheduled Task/Job: Scheduled Task
PID:2852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\M2gj2iOFeUHJ.bat" "107⤵PID:4024
-
C:\Windows\system32\chcp.comchcp 65001108⤵PID:1040
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost108⤵PID:2292
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"108⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4296 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f109⤵
- Scheduled Task/Job: Scheduled Task
PID:2404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AkBIonzttidc.bat" "109⤵PID:4708
-
C:\Windows\system32\chcp.comchcp 65001110⤵PID:3444
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost110⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2236
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"110⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4376 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f111⤵PID:3124
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FbKVibCC6JAc.bat" "111⤵PID:1396
-
C:\Windows\system32\chcp.comchcp 65001112⤵PID:1260
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost112⤵
- Runs ping.exe
PID:2336
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"112⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3548 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f113⤵PID:2924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\N331yb2tYfLO.bat" "113⤵PID:2700
-
C:\Windows\system32\chcp.comchcp 65001114⤵PID:1416
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost114⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2268
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"114⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2988 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f115⤵PID:3288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OvquOKSk8A37.bat" "115⤵PID:2780
-
C:\Windows\system32\chcp.comchcp 65001116⤵PID:1100
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost116⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2488
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"116⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4248 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f117⤵
- Scheduled Task/Job: Scheduled Task
PID:4192
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WbhlL4CrFfGN.bat" "117⤵PID:3300
-
C:\Windows\system32\chcp.comchcp 65001118⤵PID:1844
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost118⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4896
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"118⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4504 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f119⤵
- Scheduled Task/Job: Scheduled Task
PID:988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8TE2xcCO6buG.bat" "119⤵PID:3480
-
C:\Windows\system32\chcp.comchcp 65001120⤵PID:2356
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost120⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4992
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"120⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4164 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f121⤵
- Scheduled Task/Job: Scheduled Task
PID:4720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LIqdJZz2QMT7.bat" "121⤵PID:2704
-
C:\Windows\system32\chcp.comchcp 65001122⤵PID:2720
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-