Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2024 17:36

General

  • Target

    94b4b5b599c81c62f2ea6c44530f0058cf7e42c11ab9b6f16fd78bdfe5a5f44c.exe

  • Size

    3.5MB

  • MD5

    36bdeb5656d37e4312f946c6c1e630db

  • SHA1

    586f4524a1f5404dd03009da2d3b2e7eb894bc67

  • SHA256

    94b4b5b599c81c62f2ea6c44530f0058cf7e42c11ab9b6f16fd78bdfe5a5f44c

  • SHA512

    8ae0ff67c163e6ec0bb6b3c2b479d0714db270ca043e49e6dd721ecbd7aff10a80eb729f4b8996a77f90c2db9b938f8942cba3760c590c410321328861e0530c

  • SSDEEP

    98304:ndBGsvKSM7gRcSt4K1xDhRIZ3u+hWEv7Kz+:uSyKcyrb+Rjm+

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

08-10-build

C2

crostech.ru:4782

Mutex

6792b0f6-5ede-4aec-96ea-721d3f317462

Attributes
  • encryption_key

    DD459BB92A43EF8EEB2FE401C8453F685AECE590

  • install_name

    ChromiumDaemon.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Chromium Extentions Service

  • subdirectory

    ChromiumExtentions

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3440
      • C:\Users\Admin\AppData\Local\Temp\94b4b5b599c81c62f2ea6c44530f0058cf7e42c11ab9b6f16fd78bdfe5a5f44c.exe
        "C:\Users\Admin\AppData\Local\Temp\94b4b5b599c81c62f2ea6c44530f0058cf7e42c11ab9b6f16fd78bdfe5a5f44c.exe"
        2⤵
        • Checks computer location settings
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:936
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c move Mozilla Mozilla.bat & Mozilla.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1892
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2344
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa opssvc"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2756
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3544
          • C:\Windows\SysWOW64\findstr.exe
            findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2464
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 837067
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4228
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "apparentlyquotescartoonsschools" Mrs
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4060
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Bizrate + ..\Relevant + ..\Electoral + ..\Became + ..\Header + ..\Monthly + ..\Places + ..\Cc + ..\Partly + ..\Bother + ..\Unions + ..\Paso + ..\Exclude + ..\Metadata + ..\Webshots + ..\Routes + ..\Care + ..\Eyed + ..\Logs + ..\Hero + ..\Pk + ..\Characteristics + ..\Examining + ..\Mad + ..\Accept + ..\Yrs + ..\Donated + ..\Royal + ..\Ln + ..\Endif + ..\Pointer + ..\Figure + ..\Letting + ..\Internship + ..\Jesse + ..\Wooden + ..\Velocity + ..\Ob + ..\Simpsons + ..\Duplicate + ..\Cumulative + ..\Phentermine + ..\Lying + ..\Publishing m
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4008
          • C:\Users\Admin\AppData\Local\Temp\837067\Notices.pif
            Notices.pif m
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:336
            • C:\Users\Admin\AppData\Local\Temp\837067\RegAsm.exe
              C:\Users\Admin\AppData\Local\Temp\837067\RegAsm.exe
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4324
              • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Импортозамещение.doc" /o ""
                6⤵
                • Checks processor information in registry
                • Enumerates system info in registry
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious use of SetWindowsHookEx
                PID:4484
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1044
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks.exe /create /tn "Exercises" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\PrometheusFlow.js'" /sc minute /mo 5 /F
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4576
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /create /tn "Exercises" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\PrometheusFlow.js'" /sc minute /mo 5 /F
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1084
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PrometheusFlow.url" & echo URL="C:\Users\Admin\AppData\Local\QuantumDynamics Lab\PrometheusFlow.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PrometheusFlow.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:1648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\837067\Notices.pif

      Filesize

      872KB

      MD5

      18ce19b57f43ce0a5af149c96aecc685

      SHA1

      1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

      SHA256

      d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

      SHA512

      a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

    • C:\Users\Admin\AppData\Local\Temp\837067\RegAsm.exe

      Filesize

      63KB

      MD5

      0d5df43af2916f47d00c1573797c1a13

      SHA1

      230ab5559e806574d26b4c20847c368ed55483b0

      SHA256

      c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc

      SHA512

      f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2

    • C:\Users\Admin\AppData\Local\Temp\837067\m

      Filesize

      3.1MB

      MD5

      afb553ad2760016d733dbe69617039c2

      SHA1

      3c091be64faaff9d458a0435b9714d765f3f1ff2

      SHA256

      809f2c46764c291f4fea45bf4ae24d64c1ea481e5f60af8bd1c1ce8f14495ca0

      SHA512

      e705bf271869dcbe20ba7b1a2096d836dcb065628911a70025a20e997dd76c2bf7ef247588b3f615dbef87e484b2710f025f9969c43de7720fef93f290eff7a5

    • C:\Users\Admin\AppData\Local\Temp\Accept

      Filesize

      53KB

      MD5

      3e99f2482d01b79648676654a2cd76d5

      SHA1

      42743e23456a20709dc53e41dfc7726f1e77f48d

      SHA256

      ca532d3ac14c38c85b648bf854847320e222ff92d01053dfdee04649ae938689

      SHA512

      1603405ed911d3e623364757a4f6a3f49c1b98e5d0e782c840cf5eff2e03fab12b35ce59b8dfd7e8d235697f7442bc740a1ccda4087dde5affc24b840362ded0

    • C:\Users\Admin\AppData\Local\Temp\Became

      Filesize

      75KB

      MD5

      42279881da8aae788088fdd2aeca351f

      SHA1

      ef570ed35459709df196a6669e72206a5436b71f

      SHA256

      da66cc8849011c14c851f27026ddfbbdd53d434f3ac8d7f2f8dd91ba1e545128

      SHA512

      c43990086cfb2dc7d7d23740729770108d820b5b80be773c699cdbd06621a6c7e1c7db4225e8128c27d0fd79c522eaed51bda7b828d301a53d91cff1cb8e199d

    • C:\Users\Admin\AppData\Local\Temp\Bizrate

      Filesize

      50KB

      MD5

      e3a736e62b4831937164d0edf3d150b8

      SHA1

      73cf978c12f646381321d4846b439a62eac88afc

      SHA256

      1c0282b352470cfed1ca2edc3bc162eda3d022fe79b6d3908953664d229bc430

      SHA512

      e9ea5c1e8efb699eea14097402881e9230985cd5e2d8005c4149a103bbe5665ab88217eec988180123d8783726c20d08005e5a170b389ea8ab5ab50d1fa044d9

    • C:\Users\Admin\AppData\Local\Temp\Bother

      Filesize

      61KB

      MD5

      eed2811130a5ba46f0961a155f9ed7b3

      SHA1

      ed5c7f609bd94d361aa0ad2a147f69380fe5cbb7

      SHA256

      ca0f3b94f5149379189d5bf8ea9f06184afdcbd9bebd7af81bd11d8f81b28fc9

      SHA512

      07142313a4037f35e9fabd4f6d918553f3c725caf593f9a8e0cbbaae54671a5a8276b5d69ce9863bb3aad72ce141e6536ff74988ae96062fe2bbe4279c9c35b1

    • C:\Users\Admin\AppData\Local\Temp\Care

      Filesize

      87KB

      MD5

      053855034c759a368f298c9ee4dd495e

      SHA1

      677c5a887c6809bf3934daee32fdcf7b00944072

      SHA256

      d4b0cde03b082874a7fe46659b6935b0eaf06e8eeac0b94af9339d5ecd002687

      SHA512

      6916bdc8bc76ad6a1f012c974a0c37fb762ef679d217c09cb24c44c102b9bd130bed476ba3301b48f31b7c1a632080223298abf65e54fc4e2d00b986b457bfb7

    • C:\Users\Admin\AppData\Local\Temp\Cc

      Filesize

      72KB

      MD5

      702211269808f5020162a76532477c66

      SHA1

      427c3114ce02417f895035d0899a363f0b6535eb

      SHA256

      d87223ab59dc31ddb4a6288aa0dbab37a18e18232335aa706187f4eb5993ceb7

      SHA512

      31083631f4bb8f0cc147606674a6480bc04331ba4351ba7c8cd6d2d255cff4e76879a562b579cc5cc3b21a6cdbe17ff82b5dd49765597edfe908bf6e953ff631

    • C:\Users\Admin\AppData\Local\Temp\Characteristics

      Filesize

      86KB

      MD5

      af01e0681f57f52cb77b2a25697002f2

      SHA1

      21f875746def414ad7e818549349956a9a2921c8

      SHA256

      da24bd6ab0b4dbc0cf471294dbccf75dc2697f3e7c0ffe9636bf31a60037c416

      SHA512

      7cd866d32e767cc0c22ac812d60ca98e7dce1921e8dcd4d661753e148a9649c4aaf36c4d151c4395c06a6e9d25e7a66dd831640733cbd1136965ad5fd55d6ae0

    • C:\Users\Admin\AppData\Local\Temp\Cumulative

      Filesize

      64KB

      MD5

      fe7c49f6ab67116c973e4493ea278830

      SHA1

      bd59e08d9cfd4e77a474ed5e11f80a0f9a1f1ae6

      SHA256

      68ff4376d31e49e69e39d6440b25ecba3606f7edbed3511ae92633043d0735d1

      SHA512

      f1904ff92b04083d9f85451092f1bec598422cc44cd7118557bf8717b786349aff45ea5a3599edbaa866742bb23639c1a19d427c2e99f2b8e990f3b944470870

    • C:\Users\Admin\AppData\Local\Temp\Custom

      Filesize

      866KB

      MD5

      deb81ef3632c5f01dc49886211b34925

      SHA1

      ffaf2a2e33a231853e9f3feca915d6da23f1a244

      SHA256

      2a8202f287356ef9103b58d80b4bdb17f2d9fcb92e907b5f93aa192009b0a465

      SHA512

      535b6d2285ede3735bbe2de6766a48db86df118f0c09a2ae1206d250cada1193a14110bc2e030962ce7f7cfb2dbe302fbd90ffbce3c74e5da4652898eb1134b6

    • C:\Users\Admin\AppData\Local\Temp\Donated

      Filesize

      65KB

      MD5

      96d11a177a30a06e8974215ec3f757fb

      SHA1

      a4a83aa6c71b700d6e72959a843ec41dd35913ad

      SHA256

      3a09471a76d6d9589916daebb5c524f08103e8e543dd79c1c77f69003479f9f1

      SHA512

      8c90f996186ff432a0d3b68547bc02b46fc1b9e3e2deadb3c8aef390dc8cefecee18a261b4dfc80e03efb86d0c6d94fc78f7d1078f9a9830966d20dc1b8d8e83

    • C:\Users\Admin\AppData\Local\Temp\Duplicate

      Filesize

      93KB

      MD5

      33a178c6ffcd17015ca2c7e707872f74

      SHA1

      8cb8793e13aad54a9cbf47a98a843dfff7e61b2e

      SHA256

      0d24a4c50aa466e055916d2e51a52cc8968796df9731e5b660fa93da313b59ee

      SHA512

      0f934246b5255e9f0349da3cd1cf593a5e5448bc22e6eb547c674661d51566c7885eab4554381debeba3f863129e3a6b901c0ec8e27ae78766eccd3bd342b61c

    • C:\Users\Admin\AppData\Local\Temp\Electoral

      Filesize

      73KB

      MD5

      8be3dfaf6748ec36d74634e4f4957174

      SHA1

      36f05de5022ecf9c73dc6b20662f89ed4b9fcb10

      SHA256

      94d351050e350db0331b49474602409e1e9415b1697ac87cb72d8beafe9c42dc

      SHA512

      e5eee0ff50db5d23eb4bbccd7bfd7f3b8c30c8122ce291e1c23555f2e1a1a2a6aad074b929657da1f5b9f925b7d635684465be88afdc4c5866487847da786383

    • C:\Users\Admin\AppData\Local\Temp\Endif

      Filesize

      74KB

      MD5

      9fe311cf53975f6ed473b8aad39c0ba5

      SHA1

      237468bdbefff74488fc44e58e347752d86a1023

      SHA256

      92fa6a4c24fe424da010cebe538b319014e5a958b034558cc7d3cf14c1550c6f

      SHA512

      8eff647ce342e3d31d244ccb16a6b0571f7da2762fde77cf0d587a0d2598be1226987c6f6f3734bed981354ff05ca236325d1cc68a8d453fcf74ca156ad90f78

    • C:\Users\Admin\AppData\Local\Temp\Examining

      Filesize

      91KB

      MD5

      7e337840a8c10473607a2aee8ffa12d0

      SHA1

      595377a9ff3897809777d737bac1e8df2716712b

      SHA256

      20fa6561cd4af5626ae41c85f83875a7579b47245a3d557f62ebc206901f2d61

      SHA512

      caf019e88c3f2ff4947b8f3ce24cf6d0c1133c5d2f64c66dd495ae14cef523b6f9f798a529ceb39bb7971c87acac011117186092af506ff0fb2e7c94e7f2d398

    • C:\Users\Admin\AppData\Local\Temp\Exclude

      Filesize

      56KB

      MD5

      3e903cbb9a287a24d1ef2ba23cc30d93

      SHA1

      c75fe81abda42f4426317072fe712d6d7dcf34ba

      SHA256

      e26479225cf1b681b5a98d72caf02dd9ae77a82be293ea776910b75d37127190

      SHA512

      7db068d309edeaed086e4d86938812d6090ce51f95acd19ffed5eead48cbb49561b48573ea219aaa904cac5afca20e2c22f50c249c4e03a0c7886144ad2b5aaa

    • C:\Users\Admin\AppData\Local\Temp\Eyed

      Filesize

      97KB

      MD5

      3c3b26dc9c2364639a321b44f7e452f5

      SHA1

      60c1fe4bafeda473927f611212be8c8c1256c362

      SHA256

      06668851fda9797206db70b72040e2e099851ff8cdf1e3c2110e1cd5cf1bff9a

      SHA512

      9bc3ffe3d2333e0bb972f3e6bb19b9358597af9a503aa9c3748c8d6e18dbff269ce8f1ee48c8a1fcfbd779f9d915d9680b88a0ff2391d8e2cd321f9a29fa06c2

    • C:\Users\Admin\AppData\Local\Temp\Figure

      Filesize

      50KB

      MD5

      6a9eab72d0fbcb33f87a721dfded65cc

      SHA1

      7410e7c2cb8b999d5c0f151a38db4b7de426d414

      SHA256

      bd867dcac494b0828073fa760d43c44b8f3ad89d7ab1ab4f05fbf8700caa6018

      SHA512

      b7b37b7e1d0b7fa5943484a9f6deb205e58cd59e4ca6b9f3015d7a3e231af92f0c9da2cdde5a8cc628e2be8cdad358935f6d73ec72fcd398d330ac7b00d24d5c

    • C:\Users\Admin\AppData\Local\Temp\Header

      Filesize

      50KB

      MD5

      25113f52a0850a18364ea9f514eb7f0d

      SHA1

      5eeb24e7dac06b726ee1daf8d6e7beb2334c7de0

      SHA256

      44152cf71c872aa29904d0f3482a6a302c825617a8e83eb92b5c3d42bf1d3f2b

      SHA512

      3fbcc14349c309a7ece4d5d1b5fde74ed34bfbb3b009fda500a19e8742fdcc92af03b6f147fe0e8d10d84c63aea72997a5a0ca80b9416384e2980a0b12f9c909

    • C:\Users\Admin\AppData\Local\Temp\Hero

      Filesize

      71KB

      MD5

      a7ee23676cb04e16bd2ceb6afcb0db9d

      SHA1

      adbfcaba9c17a3755db457bde987cde2b5ca1f7e

      SHA256

      a3f14f60caff71b270a17a2ea210960e72f25236b1c0aea24aeb6640874dddb9

      SHA512

      8463e8ef490859d89d1fac1c921009a0ac32b8ede2832eb52e048982aa252e13d9d4a7296297c98bc767dc0f72eaab69763205b63ff6c6e254f22126655f8e9f

    • C:\Users\Admin\AppData\Local\Temp\Internship

      Filesize

      59KB

      MD5

      257ee6c4d902abf2e7db5f5c666f4f9b

      SHA1

      5697ef110cd87aeb1a0512d2fddf53f89be6e418

      SHA256

      cd0123bbbd2b0438d93e3b9c1aa7801192a216020dad4fd5c0d0d8028581fc90

      SHA512

      9f34a85c5b265f2038051048ff37a4d22db0f11592cae9407453fdb78e6c7bd1dc095e3b669fa51245e877b28893d8f96b6bd80dc65ec00b63e66cbe43574863

    • C:\Users\Admin\AppData\Local\Temp\Jesse

      Filesize

      51KB

      MD5

      f23fdc35fc7357883f26f38026108a9a

      SHA1

      3c33317bd1334e4a6bb18aa1539bd8c2ac2fcda8

      SHA256

      e2445f092b5bfbe7577e4bb3a2042a16773cbedeb8f1b09c2e7e6d3360d541bf

      SHA512

      549c63af4c68062898e0541e75dde39a53abe399d77578ad20c44e07332d2a611d9444964fa4e7dcf1b57a71cc857bbb51561d0c2ca30859a896ccdc611bc039

    • C:\Users\Admin\AppData\Local\Temp\Letting

      Filesize

      77KB

      MD5

      e3bda9d8aaa8e1fcf9d886cfc839d10c

      SHA1

      eaccfe7b06474edbda850777a7a77f7092460106

      SHA256

      3426f77f21a0c3673b29d5671d77abf4552b2b259a82ada0ae407a9fd9c011d8

      SHA512

      d697836d59feee9f4d93d18b2fc7ac3d36d539eee4daeb95c2f92030f554448d1cf71230812f659c5b776b02f34763616385b3f5160edda83b47c92f6021d8f1

    • C:\Users\Admin\AppData\Local\Temp\Ln

      Filesize

      85KB

      MD5

      4643ec4e8fd7f80b792b010f2259677c

      SHA1

      fea1f6448568a3597297987cb8d9e72bb2eac152

      SHA256

      610eb025999b5362de84f46dc0afbc28980148faa2a42b7bc259f9719b7c2950

      SHA512

      ed08dd12cfd418d4f84b9124898df3df4b75407112741c155c1161c2652ca4ab66d7bbd21ac489f91c50ba3c122502780a39eb037b9e4958549fa4a93a982084

    • C:\Users\Admin\AppData\Local\Temp\Logs

      Filesize

      92KB

      MD5

      dc40b0174b53f893da92c365c14ef1c5

      SHA1

      81311061654ab97deeb0bc622fa388cf1ac60cbc

      SHA256

      0421a5048db97d0076061ccfc902701af27dbbf8d2862ea756d30201d767f4f0

      SHA512

      3ade49041b6ee6f2298d2bd844b0ff5254d1e80222854b14126c0ec477a941f6b947da36699c9630043212cce79157183aba8e28c8526625a40e65a180f8e409

    • C:\Users\Admin\AppData\Local\Temp\Lying

      Filesize

      93KB

      MD5

      842d88c7fbf87410fd8cb8aa5ccc4fa6

      SHA1

      ce2d425b52c513b410c511a03aa9cb94369d439d

      SHA256

      25f8ffd7a13f258f7f63a6e4632e6c2ec0c14f0edf1936c9f6078cb2c64b841f

      SHA512

      5030dc7f2b273846faa6099257c87e1ce0f8427b437e0bd42d95668386a9eadcc0d784d695e24026c2af316eff04f701d3be44930930bf53783446f14db01da6

    • C:\Users\Admin\AppData\Local\Temp\Mad

      Filesize

      76KB

      MD5

      2ddc2b4d7970f3fcc46cebe87144666c

      SHA1

      e70e84c223214317e9d866a3d97523366ce1896e

      SHA256

      05edcf110cefa4a49847535bbae978d0ff7eed1713d364e22df86aef77b35bb7

      SHA512

      47c267c4e5897a0c84ce7623dde09094182b5f1b54c41960b923533294d5fbd42c56ae72655fdbf6f9b90d33553aea602e65d3a92db54e44eaeaeaa10cc8736d

    • C:\Users\Admin\AppData\Local\Temp\Metadata

      Filesize

      72KB

      MD5

      aeea461a17194c26e412736d9a172a2a

      SHA1

      76c2eaea309af5e70102e1156159314a284e8eaa

      SHA256

      1436a4177ee34de1b4ae65d45319767cfdb20a1d93117b446701f9c3a9e6eaaa

      SHA512

      407ea048cefb6c3eef84ec1790b4084b1698cfb1556cbf743daea4e0b397f3f27dd72c024682a2e81e98a848c4671beb9b1bb9fd181ef82d6108d9563e4de176

    • C:\Users\Admin\AppData\Local\Temp\Monthly

      Filesize

      88KB

      MD5

      1ef2a64c026e3bd53274bb7b57628139

      SHA1

      fe14c687a4a6a2fd378a4ebc256287ef69882a14

      SHA256

      a03357492aafa43eee659daacbb1e91d34ead506227477f218983f763c3e5309

      SHA512

      25962add2ac4c5bbcda06d0ee86a2be9edda5644c9a2b043b420cc3d63970611c0e784d4b60eff7fbdf43a7de3a3b784bd9580390c0475d6b67ab4db19bd6e75

    • C:\Users\Admin\AppData\Local\Temp\Mozilla

      Filesize

      12KB

      MD5

      284dac0f499500d35912c5a2eb48a490

      SHA1

      73a2b7e9cd08be0680eaa9e534611b058826d9ae

      SHA256

      ece5c2239277920fba89cb136efa0c727db99bbb9a464e653a9ed1f14629a572

      SHA512

      63075cbb3dae166677e0fff7fb2fc40193773fac8974520b8730ca75910c1e74189d4381f98bb6d4a292387140cc29dfe25cc4780502a8438fd421f0c28d102a

    • C:\Users\Admin\AppData\Local\Temp\Mrs

      Filesize

      5KB

      MD5

      af3624692a66b4c088128a4f83c7f8a6

      SHA1

      c6cf9219ff6a0d5e66523682333531f8030758d7

      SHA256

      6ef4d90c977edd0902513605162931b725c0b8698b75fac756df9885e62ffe79

      SHA512

      4704bc81be39f164d854266163c385b4894d1aba448d3989c0064415085db5f5758d7ec83ee6f5cc60cca547cbbe5ddaeec22da0bdccefde051b49374581d4af

    • C:\Users\Admin\AppData\Local\Temp\Ob

      Filesize

      52KB

      MD5

      dddf4ad3d168395efa3d1c1711b2f8c0

      SHA1

      af60532fe9c9f39a048225bf5841f0566b1bcd2b

      SHA256

      8ac7b0a1b03113f871d82ae6f6555d253fbb8d03233ad5208a98544c8792bbe7

      SHA512

      758c73207bb35e3623df127e8a36e73470a7b6c7c98bb25b88af921b876b518b8bfcf96631c648ccf77e332f596d97ec5723e1a55d5c1c53c4a01b29b29fbd72

    • C:\Users\Admin\AppData\Local\Temp\Partly

      Filesize

      56KB

      MD5

      fb463e5ac2f679ce52a8e5e725d790d5

      SHA1

      4e57cf609a97e65f79caa9074abbc7fd3d7d0cb5

      SHA256

      ccd250fa820eaed39d9c8e8ab2e4bc34994d423c964301f57b86afe2cabdaeb0

      SHA512

      8bd8fa395ee0117415f2c311ed1a6b16cb6bd1ccb718beb673b75ab7e1e596b7378d666ceaaef80443e0902913bffde8b196624f5993ceecdfeac33f76ded7c9

    • C:\Users\Admin\AppData\Local\Temp\Paso

      Filesize

      98KB

      MD5

      a80dc2b889ff48755d431640dd93f715

      SHA1

      a5958caf6bbc45fbbc0ec7ad6c6ea69fb3db2456

      SHA256

      a09d587f1268d68cf618af7b2c0ade3ada602dd889c98848a67408e0164753f4

      SHA512

      611c355da3d53db2f56f07ed9295b9bd877f3a129b6089287857f37b897e67908f066b77a74d9b99115231c395545f9705d55b018a1818f1b36cab6f00fb5000

    • C:\Users\Admin\AppData\Local\Temp\Phentermine

      Filesize

      50KB

      MD5

      12db8ee9eefc7e0e0ef2ba92588a8cd1

      SHA1

      0770bd5f747208291de3859be7eead20b1ada1cc

      SHA256

      1eed5c6b1dd17079e6ea83950413b5a32e64402a1c173144415eeaff7571321e

      SHA512

      c7653e7f8c074038c2f7d51a47e8934b294e212151781b4c3fa974c60f522b51cf69895f6e92ca4c09eb17da0c55e5d9c4e4fc06ff50f57ad15c060d85f0fa1a

    • C:\Users\Admin\AppData\Local\Temp\Pk

      Filesize

      85KB

      MD5

      e3eecb334cd5a8a8e3407b943f1abc1c

      SHA1

      d83947fd89ffbf502190a8e438413bf9bb6a62bf

      SHA256

      30c3f29ad4e6bf7d4bf236d5229bbf755446d2ecbf215adc87fc0b0329d8b700

      SHA512

      5c146eb4f0b29e5874127ebc8a0fc4b422daf172a9d5ef785a7dac44a30e6e958ed06f8023ad5f1f1656a3ea6c156826dc7c469295fd0d2b2504fa45382e982e

    • C:\Users\Admin\AppData\Local\Temp\Places

      Filesize

      83KB

      MD5

      d19451889f5efc597232d26da0efcf76

      SHA1

      9188561a81fba27cb5a7afd619336efec06e2bca

      SHA256

      ae5fff2e1adba5a2830e55232dcd400812ddd4db1b0935306ec3e1e90903190f

      SHA512

      19928d1fddeca5c635eda94cfc6a479c8d31e6fdd89eba14b2700dcbcff8c8a895eb6a63a85d236a5030e0af3e0c09f5585d15ab50d76ec827fdecd3eb351863

    • C:\Users\Admin\AppData\Local\Temp\Pointer

      Filesize

      75KB

      MD5

      2f633dc629b6d79b5b9586b3f03a1a17

      SHA1

      5aa2c223509d527a2409861543ac9e77a4e2659e

      SHA256

      90c1aaf61e73e60e5668839ade663749449d5c2d7acfc768e7b145b553e9bc68

      SHA512

      27ed5fc4c13a92a3674837392f08b721722423a2b80053187a5eb3cca93310933c73069390432c44dd2546d493bddd15b0e18e995e672ec8f909b0d95652ffa9

    • C:\Users\Admin\AppData\Local\Temp\Publishing

      Filesize

      14KB

      MD5

      118b3f093ecf506f9069f6a46c00aad3

      SHA1

      d532379448acb1d6a07ce9a46584fac5510ff2b0

      SHA256

      cc30fb85e2dcb2b9b123985760d4421b6903664afb9a5c411af3b1e36f64d1b8

      SHA512

      f50ee79c1bd0719bad9b5fa38d1fdc8add71a4c737f2a2457c6fdf8261a75864bba7fd2fb53c8f61d0479fe0303c819594dd279c21bbd8d337bf3735c82d13ac

    • C:\Users\Admin\AppData\Local\Temp\Relevant

      Filesize

      57KB

      MD5

      dc31de78c01e8f685686275504a8242f

      SHA1

      3137b46f6a8cd2166fcb0f3e15800625388e493d

      SHA256

      23c81c4ed277b391eb53135a6683a2f65a7f07e9913b6d6159b7a72b3444cf91

      SHA512

      5c8553785c79da77cef188f25fbd7365f3666f04b74457d8bcdc4b1e89578b84156b92d2c3b56321c24b7d99a0eb986f29133d663637017a4f5e92e47a7e1b81

    • C:\Users\Admin\AppData\Local\Temp\Routes

      Filesize

      83KB

      MD5

      b54d45e3465f99bd0a22ceb62543638f

      SHA1

      749982021530c76c61a352718d50e4317e4da503

      SHA256

      e10dfb063a9d63074211519470c3c9004acb663de83e4cfaee1aa782cbcf009a

      SHA512

      2553349e621c5a0749e06b8e5ce631616fe1dd6c146542332ad6b171105e3ae9a312a8709ede7fe5f8fde01e25e0c7a9c878bd3b6151ad038ce0619a88bc66d1

    • C:\Users\Admin\AppData\Local\Temp\Royal

      Filesize

      80KB

      MD5

      86496d57c9a2bb838a34820972f32b52

      SHA1

      4d1314c5002a9feef8646d255db8fb7a574f2686

      SHA256

      f0493013a4b9f40893b183b6d25c49da8ce2ef89db4e08416c2b6d9d3f8160db

      SHA512

      1ab49da4c8654f6dcb02df0bf84737abf4b49155786a39062dd262414b3ad5f1743c004884f1d3693f7879f37a2257d46d94bbe601812207b7aecfe83fb99869

    • C:\Users\Admin\AppData\Local\Temp\Simpsons

      Filesize

      79KB

      MD5

      222af126e3b8d47f19990d7d41d0361b

      SHA1

      677f17bc2facac1300fa4e6248787cbeeba1b1bf

      SHA256

      53fa83199d66d849270736789b7a9e98be7eb2f9ff094969cfa533c0ac726fa5

      SHA512

      faef3e367fbf6b267a33dc674a7f1b12f715e88d65365f1acef56520923ff1d382f96b197ab6161c6a131e69746f637065b9fb84e019555d722a396f8527e4e5

    • C:\Users\Admin\AppData\Local\Temp\TCD1242.tmp\iso690.xsl

      Filesize

      263KB

      MD5

      ff0e07eff1333cdf9fc2523d323dd654

      SHA1

      77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

      SHA256

      3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

      SHA512

      b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

    • C:\Users\Admin\AppData\Local\Temp\Unions

      Filesize

      93KB

      MD5

      d42c556da6135eefcce99b26625c971d

      SHA1

      21002d5c80d21fe02855fa020d8391817d4cd89c

      SHA256

      ab9a03909907eb79c0e5b5ff14aa4ed98728966ffe589c6b440e208b001d8cc5

      SHA512

      6133201d610cae6d415e5a6058f0157fb9e49fb466a28179fb8c619bef461e1924a29e2d808d0e32fcc0ad0b9ad5254c6068b30094372c4fce7c6f0515367b3f

    • C:\Users\Admin\AppData\Local\Temp\Velocity

      Filesize

      62KB

      MD5

      5c980c959826dc4c0dc1cb397f36624b

      SHA1

      3fa4767a8d8d971b08091e81f88c84a037c562db

      SHA256

      198a9d8d7fd079a49062030be4475d27b4baae69113e4eb2a1e8372e323b58e5

      SHA512

      ff4070ca886fb3c8d9bb222062ba7c3c3c04fafc43e62cc8e23eb8be491b07ee8b1350ed4bec403c94feb53ba13a773dd51f18fb69eb948f52534b53ad0a0e10

    • C:\Users\Admin\AppData\Local\Temp\Webshots

      Filesize

      55KB

      MD5

      3aea9abbd85291ad50e443f7f0220c35

      SHA1

      66fb7399235c61e5dd9ae86b1a140053a3f8a39e

      SHA256

      079e6dfd7e7dad46341570fb897dded34656d5a0d10c09b13cb3e7e4e3a5d3eb

      SHA512

      a601e1f67745e446118626fcd36393081b652c11b2f6974752b9cde4ae5e8afa2fa731fa9676a8000813000866c18ea909138bc10ee8b95ffd0fc5279f81424e

    • C:\Users\Admin\AppData\Local\Temp\Wooden

      Filesize

      87KB

      MD5

      31f90cf220255be02581d56e6ea428ce

      SHA1

      d76120e05d6902a7c233ef1cfbbbbda2c048c618

      SHA256

      7f0054c4b42cdf917cb3eaeb1b6f4149598ce85122cd4eab8ef9bb2ed6e62dc5

      SHA512

      b0b66f27d359927b00f6e7e00b2f63496150499d7ffcdbd7499c0de63162700951e4059b4b0c49ba7bd4ff7472ecc62064dc823b6d010966aa75d50d7af19f9e

    • C:\Users\Admin\AppData\Local\Temp\Yrs

      Filesize

      59KB

      MD5

      6b61b99fdbf563358af7a518b446f9ad

      SHA1

      f73430c270e17971e6b2d4a90fb1f6d22a6a043c

      SHA256

      73b73bbeafa1c53f104863139b61c90dc88073c66b7194a9f05b7bb81fc0764a

      SHA512

      70dc3cbf801ee26fb6f6394a143805fc308e6045a61e818be335b752c68d27ceab986854846af2600cc0220bf8551f73da1014913ad157bbb50802f310992f75

    • C:\Users\Admin\AppData\Local\Temp\Импортозамещение.doc

      Filesize

      63KB

      MD5

      f284a285c3471b018173868eb60439df

      SHA1

      2e835f835997a9d7e0118a75eccf34b89a8074c9

      SHA256

      be6110c5c9a1ef96becec6671acb7cfe379dfc37decc7ccf9e194eaf7de611fd

      SHA512

      cc4b9023331b8e8bdd2759190f8d2ba31ab5a3097f0c109f8f972e40f089a7cc9135eda0a269e159dd2e68b786dd14997c5d0433513a1f59ea76b746e2e4e235

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/4324-112-0x0000000005D70000-0x0000000006314000-memory.dmp

      Filesize

      5.6MB

    • memory/4324-114-0x0000000005850000-0x000000000585A000-memory.dmp

      Filesize

      40KB

    • memory/4324-123-0x0000000007150000-0x0000000007768000-memory.dmp

      Filesize

      6.1MB

    • memory/4324-127-0x0000000006BC0000-0x0000000006C10000-memory.dmp

      Filesize

      320KB

    • memory/4324-113-0x0000000005860000-0x00000000058F2000-memory.dmp

      Filesize

      584KB

    • memory/4324-132-0x0000000006E30000-0x0000000006EE2000-memory.dmp

      Filesize

      712KB

    • memory/4324-109-0x0000000000FA0000-0x00000000012FC000-memory.dmp

      Filesize

      3.4MB

    • memory/4324-151-0x0000000008160000-0x00000000081C6000-memory.dmp

      Filesize

      408KB

    • memory/4324-150-0x00000000080B0000-0x00000000080EC000-memory.dmp

      Filesize

      240KB

    • memory/4324-149-0x0000000007130000-0x0000000007142000-memory.dmp

      Filesize

      72KB

    • memory/4484-126-0x00007FF7D6870000-0x00007FF7D6880000-memory.dmp

      Filesize

      64KB

    • memory/4484-131-0x00007FF7D41A0000-0x00007FF7D41B0000-memory.dmp

      Filesize

      64KB

    • memory/4484-130-0x00007FF7D41A0000-0x00007FF7D41B0000-memory.dmp

      Filesize

      64KB

    • memory/4484-129-0x00007FF7D6870000-0x00007FF7D6880000-memory.dmp

      Filesize

      64KB

    • memory/4484-128-0x00007FF7D6870000-0x00007FF7D6880000-memory.dmp

      Filesize

      64KB

    • memory/4484-124-0x00007FF7D6870000-0x00007FF7D6880000-memory.dmp

      Filesize

      64KB

    • memory/4484-125-0x00007FF7D6870000-0x00007FF7D6880000-memory.dmp

      Filesize

      64KB