Analysis
-
max time kernel
119s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 02:26
Static task
static1
Behavioral task
behavioral1
Sample
31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe
Resource
win10v2004-20240226-en
General
-
Target
31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe
-
Size
6.4MB
-
MD5
eb0beafcb365cd20eb00ff9e19b73232
-
SHA1
1a4470109418e1110588d52851e320ecefcba7de
-
SHA256
31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99
-
SHA512
8dff151e81b5ce3c4f51b1f24a6e7654c3008d81b6652e6d2f7fabc42d341e9db703b12f83ccf9471514498af3c1763ef97f132ad36302de8ccd984fbf52d52f
-
SSDEEP
98304:DpgFmZKkYcZ4YSQrKF78eHm8Xdt6Zz55JJ9enfr:uFmZOcZtrKFFHm8t0NJJo
Malware Config
Extracted
quasar
1.4.1
Office04
185.196.10.233:4782
b0fcdfbd-bdd4-4a5d-8ab1-7217539d4db6
-
encryption_key
0EC03133971030F6D05E6D59F71626F6543BBE65
-
install_name
gfdgfdg.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
fgfdhdgg
-
subdirectory
gfgfgf
Signatures
-
Quasar payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2740-17-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2740-18-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2596-36-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2596-38-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2596-40-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99 = "\"C:\\Users\\Admin\\31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe\"" 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exedescription pid process target process PID 2060 set thread context of 2596 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe wmplayer.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b2be11b896da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000c07f42919c7dd56f198117f8b3e76ff48f2b59585522643b557758804d6edff9000000000e80000000020000200000006e4783ec2992c1d5b6db756175e1921a10903f2b6716cef1105c5ea88ba5c34220000000212a0f82492530d17d69c51a425b8b0ffb894b9cf31cbf5c0c9fe790d74fd768400000003266cbfe3c68fae441c35eff1e147e2abb6f1baabbdc9f6ebffeb9d4ddedaf0411b7015db66d9e147e6cdace5e08c4cffd245c0cfff7a4703fbd0f9899299612 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420173859" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{39E4BDD1-02AB-11EF-9CEF-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Runs regedit.exe 1 IoCs
Processes:
regedit.exepid process 2680 regedit.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1684 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1684 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2496 iexplore.exe 2496 iexplore.exe 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exewmplayer.exeiexplore.exedescription pid process target process PID 2060 wrote to memory of 1684 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe powershell.exe PID 2060 wrote to memory of 1684 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe powershell.exe PID 2060 wrote to memory of 1684 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe powershell.exe PID 2060 wrote to memory of 2580 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe ilasm.exe PID 2060 wrote to memory of 2580 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe ilasm.exe PID 2060 wrote to memory of 2580 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe ilasm.exe PID 2060 wrote to memory of 2580 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe ilasm.exe PID 2060 wrote to memory of 2740 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe cmd.exe PID 2060 wrote to memory of 2740 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe cmd.exe PID 2060 wrote to memory of 2740 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe cmd.exe PID 2060 wrote to memory of 2740 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe cmd.exe PID 2060 wrote to memory of 2740 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe cmd.exe PID 2060 wrote to memory of 2740 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe cmd.exe PID 2060 wrote to memory of 2740 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe cmd.exe PID 2060 wrote to memory of 2588 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe wab.exe PID 2060 wrote to memory of 2588 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe wab.exe PID 2060 wrote to memory of 2588 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe wab.exe PID 2060 wrote to memory of 2588 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe wab.exe PID 2060 wrote to memory of 2440 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe svchost.exe PID 2060 wrote to memory of 2440 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe svchost.exe PID 2060 wrote to memory of 2440 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe svchost.exe PID 2060 wrote to memory of 2440 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe svchost.exe PID 2060 wrote to memory of 2440 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe svchost.exe PID 2060 wrote to memory of 2440 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe svchost.exe PID 2060 wrote to memory of 2440 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe svchost.exe PID 2060 wrote to memory of 2680 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe regedit.exe PID 2060 wrote to memory of 2680 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe regedit.exe PID 2060 wrote to memory of 2680 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe regedit.exe PID 2060 wrote to memory of 2680 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe regedit.exe PID 2060 wrote to memory of 2680 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe regedit.exe PID 2060 wrote to memory of 2680 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe regedit.exe PID 2060 wrote to memory of 2680 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe regedit.exe PID 2060 wrote to memory of 2612 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe vbc.exe PID 2060 wrote to memory of 2612 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe vbc.exe PID 2060 wrote to memory of 2612 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe vbc.exe PID 2060 wrote to memory of 2612 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe vbc.exe PID 2060 wrote to memory of 2460 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe notepad.exe PID 2060 wrote to memory of 2460 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe notepad.exe PID 2060 wrote to memory of 2460 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe notepad.exe PID 2060 wrote to memory of 2460 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe notepad.exe PID 2060 wrote to memory of 2460 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe notepad.exe PID 2060 wrote to memory of 2460 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe notepad.exe PID 2060 wrote to memory of 2460 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe notepad.exe PID 2060 wrote to memory of 2596 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe wmplayer.exe PID 2060 wrote to memory of 2596 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe wmplayer.exe PID 2060 wrote to memory of 2596 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe wmplayer.exe PID 2060 wrote to memory of 2596 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe wmplayer.exe PID 2060 wrote to memory of 2596 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe wmplayer.exe PID 2060 wrote to memory of 2596 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe wmplayer.exe PID 2060 wrote to memory of 2596 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe wmplayer.exe PID 2060 wrote to memory of 2596 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe wmplayer.exe PID 2060 wrote to memory of 2596 2060 31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe wmplayer.exe PID 2596 wrote to memory of 2496 2596 wmplayer.exe iexplore.exe PID 2596 wrote to memory of 2496 2596 wmplayer.exe iexplore.exe PID 2596 wrote to memory of 2496 2596 wmplayer.exe iexplore.exe PID 2596 wrote to memory of 2496 2596 wmplayer.exe iexplore.exe PID 2496 wrote to memory of 1956 2496 iexplore.exe IEXPLORE.EXE PID 2496 wrote to memory of 1956 2496 iexplore.exe IEXPLORE.EXE PID 2496 wrote to memory of 1956 2496 iexplore.exe IEXPLORE.EXE PID 2496 wrote to memory of 1956 2496 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe"C:\Users\Admin\AppData\Local\Temp\31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"2⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵
-
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe"2⤵
-
C:\Windows\System32\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe"2⤵
- Runs regedit.exe
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe"2⤵
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=wmplayer.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2CFilesize
579B
MD5f55da450a5fb287e1e0f0dcc965756ca
SHA17e04de896a3e666d00e687d33ffad93be83d349e
SHA25631ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0
SHA51219bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2CFilesize
252B
MD5518c68b2c49c9cfefa18da9fdf7d8f3e
SHA15c6aa1f85fa9687497eb50b301ff2a225b68677d
SHA25692f3686cb682d3fcff018b9832204a95aac7a60bdb0f82137b2dc6eda1300702
SHA5129da4309ad868222b6f67427fcf4cde86748f2db5d19e38fe48a970cc308830002c7bb820f992c6c2c90c42d95cca2c9c3a3d41c6dcc0d2bdf5cf010c7ecacdf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a980e605d43be5771b0d66527e4c6885
SHA10d001cb1365d528be0d26a87e006107d17ac4772
SHA25658819035f3113fd90544b1a4c322d0eeae17365433ee9018752ed8f8e3e9c8e9
SHA512f24e4765c7da0f250f7edaa962bea75673c1fa29f4f74accb37b37f153c40457383ba3dd04fa36dc1bd9fa2e1f9757ebb7ed4aad90745749e0a96d8d25af6d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5af9dac1da27ac41106dabc2781e8fc19
SHA196fff0788a7402ed1a823251b5a03d70a9d34b8b
SHA256a9ef95fde2cdd609dacefe2c720a5549ae44bce3960b55d820b6901c4347ad43
SHA512ffbbcd176c7cccac203fe6054e5d92ed8772022cc0cacb9cc067d3b4ee93d1f0a040239a594880225df1c3877d8c5093a660c13bcef1ba91fb56727fcb282574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e76602d5c63d09823fb2d0eecf1b793e
SHA12d3863a3d719058fe55b681f1af9f980783edc61
SHA25659da2f36b55d68e07727293642440af5d32bb5e6d7849b6ed545f3a8de2cd9a9
SHA512e4529ff38a3fdea2addf0588a7f013ddb150e732a14fc0f68fe3050c2bc80fdca533d56b8028f6dfd52b0718634e47d16f38fc32a6b1adb306c98e1bd1abdc8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD556d0ab78c1958a0c82c3a2c4955f7012
SHA16676bd6da093f7e7c9012c78678ed41014f55993
SHA2567027508c3349e63d85ed092f4987a636796f70c51f84fcb1dc935d0a801e70b8
SHA5129d0b5b50f2a884220c4accadebb89915ba6a50e635d046679566d7565a475247f559535be6ff3fb03eceea880c323167f08ae7ee9cf8e5a6879761d0dbee453a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54764f35e17c1a5faffe28831ff9c907c
SHA1bf831b130120c38b67cf7702ddcb0a4aadb03eeb
SHA256cdc77b0fa37aa2485583d64930c06ca4adc339c88a49a067d8cb0f9f13a06b63
SHA512810d8b608d09c9e4b4486ba6799a9dcaab71981fa7e35337998f58ae6c2045b18bb4accd3b36bbda404e06b2b60e8206b410dda625257913f3c75aac31623d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ca2f280f97505cfe6cc50d8a2e715905
SHA19e97a2f2fd46c9b55710e333b8aeafc849453cf4
SHA2567688bb6517d8380dc1b5f043cf41cead214d2781d10825167ddd69b4208e8598
SHA5121316d4e7b16b8861734e5082878fea6684f6e1e45fff7efe3e83d1d1b144e7164ffb890a121ffc142f2da7e011e0657e8f84c92f180184bea62a573eb25fd01b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58da8934759cd6001487575af5751dd98
SHA13523c412b15ed67686a429d2d68dae09cf810164
SHA256ec230719959a62011fc2f4fcfd5c4251ba29c0765664eb398be07808b3033203
SHA51230522726d4846d9c12fcbd96ea142c01d30dabc45de01df7f4871e9a5813824c49444f7bbe7cdad24111a9ca8b87e170b1a009a070b3b9b2b02b1788dfcc202b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50725dc467b9f7e72abac5488b9f875e1
SHA143c98e80369a639c52d16289f2ac5b26351d4096
SHA25650f381318dcdb3b43852345e8b11b485c3ee485aca8299bf11158b3c1c58dd9d
SHA5124c1a3c4835ccafa3178b48ef15bd6c886913ebfc32100ea22d517545cf1afdeafcdbaef165baed6bae560d7dec6b2f2bc619483b85f08f62c5b27b323e6adeef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d9109ebd7961a2035559949f737f55fb
SHA108ad56c20111c25babdc196cba396b7d9501aa13
SHA256187ced8c77d2926577f7030daba204595d02d8382189381282009286f7281408
SHA51217726deede363c7739a37ce6f3dbbc7c4652815212acc2493afcbbbed6841e70c5d032bc32c89d9028f6559531eb6b73b8cc5ad7073b45db7f7a2f746e913cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54e01b67c7d42a88b1fb4028aea1f47ec
SHA18c28af0bf0f1138011fe6a373c18114bff6162ac
SHA2562340dabbd2dcf8e772fab142ac2c297178bd37dc3df821895537e7cda88a2675
SHA51222330ab070b77648406859c4d50820941bc5e5f1a51a7065568a321e2632801333c05909b58b8377d0057e4298b5803087c1e9380eeaf43d6c3ac5ad05c4866f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b1acecfafa284e1512cf2dfffba29413
SHA1a156c009906d2109681921037c998402f8e78f15
SHA256987e3fe0db39eeac4eb65d60f0dea8b9461d389f375833306b0a6f8bd637f3ae
SHA5125156b76724b8e651d2998efd29e9df1db63cbe8eb7d2c80d6910bb8d5b3be3f9a43894311f6ce15c69b37df3fa6abfad91298fc9c4f88cccb1ccee0dac49b45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD590ba8644c3c9d13d60de8ac2ded73d4f
SHA192b649948ea3f0d5a5b8c0a05722d676f9e6d0cd
SHA2567233082ea863bdaf82727459db09f43ea6f138e5e3dac642115d7cf7488c269b
SHA512fcee68d1e208a60a93e67147d71320a9061b6924bffab5ac6bae06b2f65264822d789e3ce5899f0b3d54511f8581e3bf22d4b79cd2a23370d03885df1eafb0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e011543426e117020ecdad0c4a6027ad
SHA17601f02a7c1cbbc5c0950b1ec758290f73f82150
SHA25662b19831e5c5cba3485de2d5ee82f15c0f34902bf0aa46349e0ba5df15328e60
SHA512abcab51a5616085efeaefb034f247c5f3d3f84c369587881f77278caea7c44e1f543adc893c218937d22c934c879b37c93483d8c14bd9d968020dfe7e8c58f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD556efd91958eab52d0d3486532030c813
SHA188c74a8f23f387e605987f3388a66c07de52e221
SHA25671be484fe1e4d9ec253489e5df5b8217407dec11ab736868f6f32adccb4971eb
SHA512dfd69ae6e09ccc065bc8b1b20804d86fe9680bdc483e65be7b398ada73c9e086e1c55db8c8155fe4386a9ca295c917fb492d20a836eae0303eb08d05c0b0bfff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD509d6ea3c5a5f5aa218505be93f811916
SHA151fd4dd554d11fae4a6d8926e42beb95306bfd22
SHA2560967060fe28c082be30c65ae37c53352b0268b149df0ed8a8a991797dd9aec51
SHA5121b322c98bea59fa53679d5bdd989dbd75bcafd27123890f06041e96cce2f380b3a693e82c08bb2182155dddd23f37ba9e5fe6e9f1123b00932d42853feb7f20c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a5283d794aff7071af72d29a02a720cb
SHA15a156ba47f9529c96170b238beb192d9ba8b817c
SHA256b4f2ed94ab8d20c500d26b5f1500d43a3ab40205badcacd7e060ea243682ea8a
SHA5125db2f6b68604aedeea2b33ff87f632734ae472c032bc94c70fe6a92f9dcc2ce376b9746cac16972b2ec11725cce9ace1c0bd6d5510cbac7de5606fe00fd29349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5adfa993057283f35676e6d927f38324b
SHA1d9461e1c7c87818f84585226ed3dfc7a63c6f911
SHA256dd118dbf51516500f2a91cce4efa11510459e8b19b5dae33e5f878493d7e5935
SHA5125e221976ec32dfdaa0afab094585d489340a1cb2395b3a1519996e11bcf189f2438e09de4e6ca240b09fc3c38c2c0f3433072ade47823af821d4c3802d571fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD518fa06199b1ae0dc808e43782362cc34
SHA1e0cfe1d945e0933acb8c9ee827c5e35d71f07ee4
SHA256f2f81ec8b65fc6f0a02099d5d57a5189a9c0e96864a979c5489aebb6a96b02ce
SHA5124b1420c7e031b7d0337fff36cc6e570d2683e576604217805e5bd66d99eb7ffa6e24775d6c059c8f82825c66e9a90613b00ce5518799f9e6b950dc65061dfcde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD533115fed9ffcfaaaa85f1a9086b99336
SHA17a4538d3304d6b809aa04f2234f71e4e5d44cfdd
SHA256c9eba0f138bb9fcff2b50ef3a37a1b627d0205e40d2ee1da153d10499d4483f8
SHA512cf256f7fc5b35853cd7e282e31ca39177e2e722bd7dd2ff7cba461a8d074d6ee17a36ceebd4684f0eaa184faacfa8c9564d41f5153408c0206c0124eb888533e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59f6932ad35b0f6c494e9c1702f63b281
SHA142059439dc5bf03cad03e36019104974f99ff3bb
SHA25685ec7394c06bd8994e0b5ae52871f65698a41da29092393edc0d1dccf7b27be3
SHA51244e5dacf53acd40ce7f0e13299d018fe03e4ed93fad8444150805a51207c3150329882eef113b2093f6010deffa60fc51a560ebe4a9d69bc175332cf527e95f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5da1b26a2e1ae8e8420177c17566f0211
SHA1b55080b9d0b89a5344a8f1829aee8f8c8ad44d26
SHA2566ea8a49f7d2365c0ce07072d4dfc36868de82b526e097dc6a337e693f607103e
SHA512f5161c254e2e39384d035bfd6b13f1ac386268d1e2d62aaae2b21e26f2cfc4d50dd45ef51ccce73add01420e96168fc1e95d8f9abbf28b0d1b46dfb79a57403b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ae2882817a0d31f0b29326be0f158820
SHA136921e7e0c2e84882e172ae21e16242be2aacd5e
SHA2565717a2bf17285c056b21d50a5bd6d0a84926e3ca17d7d5990b82ae307b53855e
SHA51236293f434039a758dfec803b160f967be1f7ad811aea905dc4b480a1ef1ea02ae4defa08809178f6acfdca82407d76bfcead980e10d33937af7098ad2dc91454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5db7801c2dfb53c2a300bb0a9949ceec9
SHA1de19dda3bfd3b9d9cda9e5704178eb2889c56b2e
SHA256e07ceeafe284d1cee9597e273dd16a172e5f72efe5982a1041bdfbc40c4e1d5c
SHA512564a28a1795d13520e863c7e2ec945802dbcb4984ebd8964a53eb5651f28386a03cfb20c0a2c9f840312add2bc3b624ad704bc2b0efd75725ea9e591784b505e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD548b03cb73c6f931cbe98e2905c0ad129
SHA1708235086d46f292619bb4f3bea868580f2c3251
SHA256408ee118fedfb7d129c11d9245327e58e7730bee7b1d79663cc654095bb37e94
SHA512048ef098e99c32f5a89dddf8af034619b44d87d72bdca8bb21151ee7ea83a239d07807f6200dd4751b831c4884cdf0bc478e560447db0d126087e83f63a49977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD500aaad6bfab9542cabbf9394ae58a410
SHA104d6e2b5511c635fcc150f98231819425dfec202
SHA2568981be0879086d412e3aed8b388694cf015a67cda243182f6778009b170880cb
SHA512f8e05f6c74f413f735715513c37bcea36dea0b001acd500001992ea38767f93b711bdd570260a080d68fd3726ff62401d10688e71fb63c64e86bceff292a4ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54438d385f5c6cf0262785f24b99749e9
SHA18ba20f561364651da662e103effc792eaef6f449
SHA256d0e12e478fdb3f3364683b8146b29f4e9beee01970e44ccb66dee9c6fd7562f1
SHA5127bf4388c7947166cb8199de1547c1fe1916ca779b8470bf7375169ead6017dbcccd29954e731534c93aa52d6969ae987aed50e137ca7f9cea280817405597e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ce5552dd8065a8a5f3b290a87ef2559b
SHA1604a9b3ac9850f9538169040336ba64480797791
SHA2568040d0506b9289bb9f82df7c1ca0b2155adb89cbc272bfa3d238a7b5a3f8fa57
SHA5120fe7e27c5b58573a57113773dbed205454d466289926c9a69b4a6cd71bf4e43c69e0feab228fac366fb18fbdf73e7b4633756e23af7b543f89fd1411cfaf5bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55fd618b10a2fb52aa61d7a900ccfe407
SHA1d5619aff8089d8ac10a0e1f9e2b8577fc8c0d7d0
SHA2567684218c6bb668f72bba9e5a1e4f0f583e7c6926c8fedc2d433275132c8d5b41
SHA512ed7cfc25f94daf46ba1b6fc7a0d72f7becc59c09caee8dd7b01bd456e5b0115842236645703c4f93d5b1db130a88365ee2d2d1e1ce21b6087e68dd67193f2a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD502c583b61b5130ffeb944e301772fad9
SHA13f9907382db77f4df30fff4d58012d7c2741992e
SHA256e4a63ac7f7b97b6205c2fefc960ec3a089c5accff3e4b3651c2e8ee13a3af713
SHA512ea1ee7f9697c66d072dec54a07c4cf29e6c444e7838ee1ae49f9629e322f4de5b37c336af91622fc8434e042371ab4020fed81b9e47d9ca0031bcc8f59eb16ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53f44a365c2089d43f9876ca45620a8d9
SHA15ce5be775c94e5fd926be8d819ac49630dae34c1
SHA2569ee44cc8eccb2b52f80516017ab289634016e5c7e10b743a56325365335c027b
SHA5125bbfa4d515a0dd01b511de00e4735ec0b1a17c38d2e09f0eb15eec056717d3dc78a251e9539a1b9c0003cbdd87008157ef205ef945637daeb7caa9527efe46af
-
C:\Users\Admin\AppData\Local\Temp\Cab4F48.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar5441.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
memory/1684-13-0x0000000002E80000-0x0000000002F00000-memory.dmpFilesize
512KB
-
memory/1684-10-0x000007FEF5D20000-0x000007FEF66BD000-memory.dmpFilesize
9.6MB
-
memory/1684-5-0x00000000028E0000-0x00000000028E8000-memory.dmpFilesize
32KB
-
memory/1684-6-0x000007FEF5D20000-0x000007FEF66BD000-memory.dmpFilesize
9.6MB
-
memory/1684-4-0x000000001B800000-0x000000001BAE2000-memory.dmpFilesize
2.9MB
-
memory/1684-7-0x0000000002E80000-0x0000000002F00000-memory.dmpFilesize
512KB
-
memory/1684-8-0x000007FEF5D20000-0x000007FEF66BD000-memory.dmpFilesize
9.6MB
-
memory/1684-12-0x0000000002E80000-0x0000000002F00000-memory.dmpFilesize
512KB
-
memory/1684-11-0x0000000002E80000-0x0000000002F00000-memory.dmpFilesize
512KB
-
memory/1684-14-0x000007FEF5D20000-0x000007FEF66BD000-memory.dmpFilesize
9.6MB
-
memory/2596-40-0x0000000000400000-0x0000000000724000-memory.dmpFilesize
3.1MB
-
memory/2596-35-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2596-38-0x0000000000400000-0x0000000000724000-memory.dmpFilesize
3.1MB
-
memory/2596-36-0x0000000000400000-0x0000000000724000-memory.dmpFilesize
3.1MB
-
memory/2740-15-0x0000000000400000-0x0000000000724000-memory.dmpFilesize
3.1MB
-
memory/2740-16-0x0000000000400000-0x0000000000724000-memory.dmpFilesize
3.1MB
-
memory/2740-17-0x0000000000400000-0x0000000000724000-memory.dmpFilesize
3.1MB
-
memory/2740-18-0x0000000000400000-0x0000000000724000-memory.dmpFilesize
3.1MB