Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    793s
  • max time network
    765s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    27/11/2024, 05:25

General

  • Target

    https://github.com/NYAN-x-CAT/AsyncRAT-C-Sharp

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

Mutex

GGF41hifJmi6

Attributes
  • delay

    3

  • install

    true

  • install_file

    xd.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

127.0.0.1:4782

Mutex

abd61764-2256-41c2-ae70-7739d463e72c

Attributes
  • encryption_key

    224A079C40BF2588527AEA265249BF4F1DAE01C5

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 3 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 6 IoCs
  • Async RAT payload 2 IoCs
  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs

    Using powershell.exe command.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 30 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 3 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/NYAN-x-CAT/AsyncRAT-C-Sharp
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x104,0x130,0x7ffb3c0c46f8,0x7ffb3c0c4708,0x7ffb3c0c4718
      2⤵
        PID:5084
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:2
        2⤵
          PID:3688
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:428
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:8
          2⤵
            PID:3188
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:1
            2⤵
              PID:836
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:1
              2⤵
                PID:4536
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:8
                2⤵
                  PID:2060
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                  2⤵
                  • Drops file in Program Files directory
                  PID:3324
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x250,0x254,0x258,0x22c,0x25c,0x7ff6d02f5460,0x7ff6d02f5470,0x7ff6d02f5480
                    3⤵
                      PID:1596
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2632
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4924 /prefetch:8
                    2⤵
                      PID:4524
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:1
                      2⤵
                        PID:1848
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6128 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1564
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6692 /prefetch:1
                        2⤵
                          PID:4280
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6576 /prefetch:1
                          2⤵
                            PID:2336
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6928 /prefetch:1
                            2⤵
                              PID:5188
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6528 /prefetch:1
                              2⤵
                                PID:5196
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:1
                                2⤵
                                  PID:5920
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5936
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:1
                                  2⤵
                                    PID:6112
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5908 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:6124
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6480 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:112
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1804 /prefetch:1
                                    2⤵
                                      PID:2920
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3524 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5164
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:1
                                      2⤵
                                        PID:1980
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:1912
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6736 /prefetch:8
                                        2⤵
                                          PID:5228
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:1
                                          2⤵
                                            PID:5324
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6876 /prefetch:1
                                            2⤵
                                              PID:5576
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6296 /prefetch:8
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5572
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6752 /prefetch:2
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2480
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2676 /prefetch:1
                                              2⤵
                                                PID:888
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6720 /prefetch:1
                                                2⤵
                                                  PID:2016
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3032 /prefetch:1
                                                  2⤵
                                                    PID:5376
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:1
                                                    2⤵
                                                      PID:4644
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6856 /prefetch:1
                                                      2⤵
                                                        PID:2772
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6996 /prefetch:1
                                                        2⤵
                                                          PID:5376
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6544 /prefetch:1
                                                          2⤵
                                                            PID:4608
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6480 /prefetch:1
                                                            2⤵
                                                              PID:4336
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1244 /prefetch:8
                                                              2⤵
                                                                PID:2504
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:1
                                                                2⤵
                                                                  PID:5880
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8653548357183855229,10954124800404684231,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1244 /prefetch:1
                                                                  2⤵
                                                                    PID:4480
                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                  1⤵
                                                                    PID:3760
                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                    1⤵
                                                                      PID:1736
                                                                    • C:\Windows\System32\rundll32.exe
                                                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                      1⤵
                                                                        PID:2920
                                                                      • C:\Program Files\7-Zip\7zG.exe
                                                                        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap6673:62:7zEvent31565
                                                                        1⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        PID:5856
                                                                      • C:\Program Files\7-Zip\7zG.exe
                                                                        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap28053:74:7zEvent21787
                                                                        1⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:6024
                                                                      • C:\Users\Admin\Desktop\AsyncRAT\AsyncRAT.exe
                                                                        "C:\Users\Admin\Desktop\AsyncRAT\AsyncRAT.exe"
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Modifies registry class
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        • Suspicious use of SendNotifyMessage
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:2436
                                                                      • C:\Windows\system32\wbem\WmiApSrv.exe
                                                                        C:\Windows\system32\wbem\WmiApSrv.exe
                                                                        1⤵
                                                                          PID:3152
                                                                        • C:\Users\Admin\Desktop\AsyncClient.exe
                                                                          "C:\Users\Admin\Desktop\AsyncClient.exe"
                                                                          1⤵
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1740
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "xd" /tr '"C:\Users\Admin\AppData\Roaming\xd.exe"' & exit
                                                                            2⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:4856
                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                              schtasks /create /f /sc onlogon /rl highest /tn "xd" /tr '"C:\Users\Admin\AppData\Roaming\xd.exe"'
                                                                              3⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Scheduled Task/Job: Scheduled Task
                                                                              PID:5816
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8704.tmp.bat""
                                                                            2⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5856
                                                                            • C:\Windows\SysWOW64\timeout.exe
                                                                              timeout 3
                                                                              3⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Delays execution with timeout.exe
                                                                              PID:4976
                                                                            • C:\Users\Admin\AppData\Roaming\xd.exe
                                                                              "C:\Users\Admin\AppData\Roaming\xd.exe"
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:1712
                                                                        • C:\Windows\system32\taskmgr.exe
                                                                          "C:\Windows\system32\taskmgr.exe" /0
                                                                          1⤵
                                                                          • Checks SCSI registry key(s)
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:5068
                                                                        • C:\Program Files\7-Zip\7zG.exe
                                                                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap11990:84:7zEvent8667
                                                                          1⤵
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1632
                                                                        • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe
                                                                          "C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe"
                                                                          1⤵
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Modifies registry class
                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:4448
                                                                          • C:\Windows\explorer.exe
                                                                            "C:\Windows\explorer.exe" /select, "C:\Users\Admin\Desktop\Quasar v1.4.1\quasar.p12"
                                                                            2⤵
                                                                              PID:5696
                                                                          • C:\Windows\explorer.exe
                                                                            C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                                                            1⤵
                                                                            • Modifies Internet Explorer settings
                                                                            • Modifies registry class
                                                                            • Suspicious behavior: AddClipboardFormatListener
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:4288
                                                                          • C:\Users\Admin\Desktop\Client-built.exe
                                                                            "C:\Users\Admin\Desktop\Client-built.exe"
                                                                            1⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:4736
                                                                            • C:\Users\Admin\AppData\Local\Temp\zWim1uXM2EOt.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\zWim1uXM2EOt.exe"
                                                                              2⤵
                                                                              • Checks computer location settings
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2812
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "xd" /tr '"C:\Users\Admin\AppData\Roaming\xd.exe"' & exit
                                                                                3⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:5112
                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                  schtasks /create /f /sc onlogon /rl highest /tn "xd" /tr '"C:\Users\Admin\AppData\Roaming\xd.exe"'
                                                                                  4⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                  PID:1976
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7C42.tmp.bat""
                                                                                3⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:5512
                                                                                • C:\Windows\SysWOW64\timeout.exe
                                                                                  timeout 3
                                                                                  4⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Delays execution with timeout.exe
                                                                                  PID:6040
                                                                                • C:\Users\Admin\AppData\Roaming\xd.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\xd.exe"
                                                                                  4⤵
                                                                                  • Modifies Windows Defender Real-time Protection settings
                                                                                  • Modifies visibility of file extensions in Explorer
                                                                                  • Checks computer location settings
                                                                                  • Executes dropped EXE
                                                                                  • Windows security modification
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:5396
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "powershell" Get-MpPreference -verbose
                                                                                    5⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:6068
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true
                                                                                    5⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:1124
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
                                                                                    5⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:4788
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true
                                                                                    5⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:5640
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
                                                                                    5⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:6124
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
                                                                                    5⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:5456
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
                                                                                    5⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:3552
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
                                                                                    5⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:1964
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
                                                                                    5⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:5876
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
                                                                                    5⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:4120
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
                                                                                    5⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:1640
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
                                                                                    5⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:4612
                                                                          • C:\Users\Admin\Desktop\AsyncClient.exe
                                                                            "C:\Users\Admin\Desktop\AsyncClient.exe"
                                                                            1⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:1612
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "xd" /tr '"C:\Users\Admin\AppData\Roaming\xd.exe"' & exit
                                                                              2⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3912
                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                schtasks /create /f /sc onlogon /rl highest /tn "xd" /tr '"C:\Users\Admin\AppData\Roaming\xd.exe"'
                                                                                3⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                PID:1348
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp72B9.tmp.bat""
                                                                              2⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3552
                                                                              • C:\Windows\SysWOW64\timeout.exe
                                                                                timeout 3
                                                                                3⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Delays execution with timeout.exe
                                                                                PID:1468
                                                                              • C:\Users\Admin\AppData\Roaming\xd.exe
                                                                                "C:\Users\Admin\AppData\Roaming\xd.exe"
                                                                                3⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:888
                                                                          • C:\Users\Admin\Desktop\Client-built.exe
                                                                            "C:\Users\Admin\Desktop\Client-built.exe"
                                                                            1⤵
                                                                            • Executes dropped EXE
                                                                            PID:6008

                                                                          Network

                                                                          MITRE ATT&CK Enterprise v15

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                            Filesize

                                                                            152B

                                                                            MD5

                                                                            b5fffb9ed7c2c7454da60348607ac641

                                                                            SHA1

                                                                            8d1e01517d1f0532f0871025a38d78f4520b8ebc

                                                                            SHA256

                                                                            c8dddfb100f2783ecbb92cec7f878b30d6015c2844296142e710fb9e10cc7c73

                                                                            SHA512

                                                                            9182a7b31363398393df0e9db6c9e16a14209630cb256e16ccbe41a908b80aa362fc1a736bdfa94d3b74c3db636dc51b717fc31d33a9fa26c3889dec6c0076a7

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                            Filesize

                                                                            152B

                                                                            MD5

                                                                            32d05d01d96358f7d334df6dab8b12ed

                                                                            SHA1

                                                                            7b371e4797603b195a34721bb21f0e7f1e2929da

                                                                            SHA256

                                                                            287349738fb9020d95f6468fa4a98684685d0195ee5e63e717e4b09aa99b402e

                                                                            SHA512

                                                                            e7f73b1af7c7512899728708b890acd25d4c68e971f84d2d5bc24305f972778d8bced6a3c7e3d9f977cf2fc82e0d9e3746a6ccb0f9668a709ac8a4db290c551c

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000002

                                                                            Filesize

                                                                            38KB

                                                                            MD5

                                                                            4a6a239f02877981ae8696fbebde3fc9

                                                                            SHA1

                                                                            5f87619e1207d7983c8dfceaac80352d25a336cf

                                                                            SHA256

                                                                            ac546e02b937ee9ac6f6dd99081db747db7af6a4febf09cbe49e91452d9257b8

                                                                            SHA512

                                                                            783cf2ae4ba57031c7f4c18bdac428a1074bb64f6eb8cef126ad33f46c08767deeac51917bef0f1595295b9f8a708cb297b7cf63fc3f7db0aa4ac217ce10f7cf

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003

                                                                            Filesize

                                                                            37KB

                                                                            MD5

                                                                            a6dd8c31c1b2b06241a71e43a49a41a6

                                                                            SHA1

                                                                            dc871c551fa802ed8dfcc0e754b3d4d373fddd88

                                                                            SHA256

                                                                            0def324bda1cf4872a205e006d8fd6aafddb19880c1678bf66f18b304eeda99c

                                                                            SHA512

                                                                            f3437729f25077e830e5381e4468ce8222dc893ece8527159721f07e5f85977acde921af3d47ae07ac9f35e3ad06ae06faaa23d715a207d76ba6746c55aeddbc

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                                            Filesize

                                                                            20KB

                                                                            MD5

                                                                            b701fd5ce841ce90ff569c641bf0cbfd

                                                                            SHA1

                                                                            923ef9dff528ad65b6f135828aa39340be591a9c

                                                                            SHA256

                                                                            26ac894bd46903e9b8d08bf85cf4c7795e88f7c9dd85717b7560e16acc007fe3

                                                                            SHA512

                                                                            67d8cbd5ca9334aa5c784bb73b2057d28e2a3687341cd62358b5c5211ba833e10909dada2069b49b0ef328c1a40d8e02b58d27385e3d944eacde240a4bcf2fde

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                                            Filesize

                                                                            24KB

                                                                            MD5

                                                                            4b3e8a18f156298bce6eda1280ff618d

                                                                            SHA1

                                                                            c929ff9c0cb0715dc5ab9fa66a469cb18106ed0e

                                                                            SHA256

                                                                            eb8429f5918f8dfb14c7f8b32620f3516303c812869e9e8d1059e759a1550b49

                                                                            SHA512

                                                                            e51a54976d11fe25486d35ba92f99b8de28222a7dca8c272dfc43d8f0bc1d34b6259797fd5a7aad9c1553c0881772875ba90e7d99f6175d16ffdd00586fe8ba3

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006

                                                                            Filesize

                                                                            18KB

                                                                            MD5

                                                                            2e23d6e099f830cf0b14356b3c3443ce

                                                                            SHA1

                                                                            027db4ff48118566db039d6b5f574a8ac73002bc

                                                                            SHA256

                                                                            7238196a5bf79e1b83cacb9ed4a82bf40b32cd789c30ef790e4eac0bbf438885

                                                                            SHA512

                                                                            165b1de091bfe0dd9deff0f8a3968268113d95edc9fd7a8081b525e0910f4442cfb3b4f5ac58ecfa41991d9dcabe5aa8b69f7f1c77e202cd17dd774931662717

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000007

                                                                            Filesize

                                                                            17KB

                                                                            MD5

                                                                            1cfaad3a7f1973a02907d1b9ce15d01d

                                                                            SHA1

                                                                            1ab4a604be247934dbd931a13d4bc2a6903b1f5e

                                                                            SHA256

                                                                            16ec86e38e1e4415aa4474f449988de65007bdb7e1991a893318d3bff13b6590

                                                                            SHA512

                                                                            630d4bafc1e098e1e720815d8950ee5be7bf9a3ecc385e6b18dc327d46f79bf972cb27e716eea4d665e92f248e595f78ffb0facc4b6d19bea5e0df900f2c5717

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008

                                                                            Filesize

                                                                            59KB

                                                                            MD5

                                                                            6f70a26c82d4b5552c25449ec9818dcd

                                                                            SHA1

                                                                            53597fdbd4e5d42ed15d7b6683cf251dbcdfe690

                                                                            SHA256

                                                                            ed100f2dad52246b6d2d7e463eedc2bcceb2db39ef695014ee507eefe2175f77

                                                                            SHA512

                                                                            8d6f9ccd89f3ab05f3723fcb1535437dd5317f55c7af608d18fedfc761befef48c935a66db1dd83c4f3677bfe8c1c9b25ea59f04815f79fceb47cfed6a896e3a

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000009

                                                                            Filesize

                                                                            38KB

                                                                            MD5

                                                                            f6c1297fae3fc10f55d4959d9dc771ce

                                                                            SHA1

                                                                            2df076464b94b7b06d771f3ef68e7a1403ec3d82

                                                                            SHA256

                                                                            9aa5a405e664c215a315b794668de2faf252ee0bc0694596d82a1c0e91564ae3

                                                                            SHA512

                                                                            d0d3e4a6fda2f9abb60d05befceaec9f1dec9d5dd4a31df5eeb94f0c1c545cfdbf70b862d0340a460e6d0cc62b8df16d3ea839683fa534c67030e70a181659db

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000a

                                                                            Filesize

                                                                            53KB

                                                                            MD5

                                                                            cfff8fc00d16fc868cf319409948c243

                                                                            SHA1

                                                                            b7e2e2a6656c77a19d9819a7d782a981d9e16d44

                                                                            SHA256

                                                                            51266cbe2741a46507d1bb758669d6de3c2246f650829774f7433bc734688a5a

                                                                            SHA512

                                                                            9d127abfdf3850998fd0d2fb6bd106b5a40506398eb9c5474933ff5309cdc18c07052592281dbe1f15ea9d6cb245d08ff09873b374777d71bbbc6e0594bde39b

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000c

                                                                            Filesize

                                                                            88KB

                                                                            MD5

                                                                            76d82c7d8c864c474936304e74ce3f4c

                                                                            SHA1

                                                                            8447bf273d15b973b48937326a90c60baa2903bf

                                                                            SHA256

                                                                            3329378951655530764aaa1f820b0db86aa0f00834fd7f51a48ad752610d60c8

                                                                            SHA512

                                                                            a0fc55af7f35ad5f8ac24cea6b9688698909a2e1345460d35e7133142a918d9925fc260e08d0015ec6fa7721fbeae90a4457caa97d6ce01b4ff46109f4cd5a46

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000d

                                                                            Filesize

                                                                            101KB

                                                                            MD5

                                                                            9a861a6a772b86aaa2cc92e55adf3912

                                                                            SHA1

                                                                            85156e7eaf0d3bff66bd6119093610e8d9e8e5d2

                                                                            SHA256

                                                                            6e7cc83f3b23d5f48bafdd934321de60485eb8d9ced04c6299e07dc6bcbc0d1b

                                                                            SHA512

                                                                            b0a051e2e703227a55674fe235a97643ab1478af2384a5a974605cdd0e4ed79916d65e2adf61d19f59779da920699e74ac72cce05ec078f22f9b6678c5022a26

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000f

                                                                            Filesize

                                                                            19KB

                                                                            MD5

                                                                            5d3fcef203db1b268099c036c99d2c00

                                                                            SHA1

                                                                            c430cec145006131ef1408e832b98499880dfe8a

                                                                            SHA256

                                                                            30949228cfa1131893900d7c3f7bd6f7b1b07abd64b51fd913809145b367e82e

                                                                            SHA512

                                                                            1fac46d1905de1fdb9681638d33589b4eae1f285722942c08161787b5078cb59a51d64bab8f31c2db884baabbdc7d52bd08d16ddc9dc524beca5190c66b13415

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            3c546757ea81aea81513753b9339c262

                                                                            SHA1

                                                                            37356f17be8d45bc0caf30a1c85be3f484159cfb

                                                                            SHA256

                                                                            8eb76b45300143bba3112c78156b4c617a692334ea92e21c5f3f5b59b34acaac

                                                                            SHA512

                                                                            e0f479c1e244aed3f2e90433a443cee507538e95dc6566cb8dfe907698f835935e99dadedf49514f7468e7dc53ab5f1cb223379b99f1e7e136ab048ac9fa0a12

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                            Filesize

                                                                            48B

                                                                            MD5

                                                                            572bfd179bea7f951ffe9f6ddfd08eb6

                                                                            SHA1

                                                                            b9fcb95a02a38728cbd75ada8a36963b2a922e22

                                                                            SHA256

                                                                            6767a56c8c588b3e256951951620a9b929c8177fae4d706366db332335723389

                                                                            SHA512

                                                                            726cbd4169a89ee53cec31dc0b635ee6c76a43686876f0e301f030db165a891f986ea9fe5a176cf795c43bc56eda279cda8defa73b597ed14cf5379bd2229ad9

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                            Filesize

                                                                            3KB

                                                                            MD5

                                                                            ff219a589faf81d136f641cfe2a731e9

                                                                            SHA1

                                                                            9a40f6a59ec6046c8255881a0e76a7afbc7794ad

                                                                            SHA256

                                                                            926f1befc4fdd3677cef8f12596d4acce0a4f5774071ec455148391e0d168dc2

                                                                            SHA512

                                                                            8fb146d3c61cdcaa5c5310317e35cb520619f026e367288c2fab1f3ef266d9b8a1713cd08e457726bf2f2facc461665de4e38dc9a567fc2120ff515131e8f0a5

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            17f78c137ca687ef16a4fb27e0a829ef

                                                                            SHA1

                                                                            17179490b4601b3f0cb1fb9a91f1a63a2917a7af

                                                                            SHA256

                                                                            1a0a1756aa99384b32a66bce1ccbe621325e7fa80561313a5e8286709b8aaca3

                                                                            SHA512

                                                                            c38276fada4c29892efc6fc11c1782200035371f34ffe91452fa22efdd6df0cf52d857f553250d40b3766fe61fe9868e36111613c5599368b4afc5005ecad677

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                            Filesize

                                                                            70KB

                                                                            MD5

                                                                            e5e3377341056643b0494b6842c0b544

                                                                            SHA1

                                                                            d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                                                            SHA256

                                                                            e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                                                            SHA512

                                                                            83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                            Filesize

                                                                            580B

                                                                            MD5

                                                                            4f124208709bba6bd1ee45f7c7fd71b4

                                                                            SHA1

                                                                            e6737c755de4b908e3073c7902246c4bbb4f59b8

                                                                            SHA256

                                                                            7b85e0462e7d1ec1646de34ad617771ed86988a74df50bc0465441359e415e9b

                                                                            SHA512

                                                                            8059e69a005e71eb3e643fb57ee4642d0f39e0a1ac5ba3bde891375651cf3a1283e27351e174a7878fed492e2155be5ec42f1c1df3fe8752bc9671f14ec971dc

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                            Filesize

                                                                            946B

                                                                            MD5

                                                                            9de70d850dcb08451edb2e37b2934ff4

                                                                            SHA1

                                                                            c237d95306b6f2ed759c2d0cc3461816d44990cd

                                                                            SHA256

                                                                            191fb667065865d2a4ff48c3da39efc13b2f8bd33bff9e2d3ddd0ad5cac5ea14

                                                                            SHA512

                                                                            4f0461337e4ced925f4214e71b82b6416ad60f8339fbdb051a10c9d439017b39a18a92f112d4f278ac92fe70d6ae59d7d9cb088406627f6b06eb0c4fc66cb089

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe58cd3e.TMP

                                                                            Filesize

                                                                            59B

                                                                            MD5

                                                                            2800881c775077e1c4b6e06bf4676de4

                                                                            SHA1

                                                                            2873631068c8b3b9495638c865915be822442c8b

                                                                            SHA256

                                                                            226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                                                            SHA512

                                                                            e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                            Filesize

                                                                            5KB

                                                                            MD5

                                                                            a8508ee0d7da6a43f2f3e2e9b998455b

                                                                            SHA1

                                                                            be120b7c7961c3346970bec7139515934e8b8659

                                                                            SHA256

                                                                            9c51517642a632ec7b1a5710c25a6e38653ac82b1add0713e3c7d2e88e38cc7d

                                                                            SHA512

                                                                            33ed8f96511434f4a480288d46a91fbee24d7d79a590f65270425546cd266c9c701afa76b4d885f19de673462c5ac84830e6d1da8326f4b6408ad3bd63772148

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                            Filesize

                                                                            5KB

                                                                            MD5

                                                                            5ee677b62ac6111094035d56b32efff6

                                                                            SHA1

                                                                            22c3643f58bcd2615d984c6efe4d01e3c1e94ef2

                                                                            SHA256

                                                                            938ffd448ea82edbed2dee751d0240f870d8c34abb4b36c430f92405ab839181

                                                                            SHA512

                                                                            7007a7f9c9b7793a24f2467297b198a190e835412317686a5466c96077f8c9e98b5ebfb995110d71cd8125c4f7e5bbd76af15818e91bcee99a89b1e6e15cab3d

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                            Filesize

                                                                            5KB

                                                                            MD5

                                                                            f807147b745fb9fc1e8e455bf4a7e3de

                                                                            SHA1

                                                                            336cd5007376a26e4e5cc3c37c3829a4fb67384e

                                                                            SHA256

                                                                            d85b071df460ad1bcb76160441af5f00d581fe8a0d65d1c8c6269cc650f54c67

                                                                            SHA512

                                                                            385082c2d9b053a033f1a1e9471bc0f9c1501c1ccb5cd38fd739afd0e0481801426442751d7cff8e7c2c846314083cd9c1469cf5deb5260f1ed1426335f7eda7

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                            Filesize

                                                                            5KB

                                                                            MD5

                                                                            7e3e91f8258b004212b6e0b6f1b5c5d0

                                                                            SHA1

                                                                            60d020df0281cdc5f4b552b921eff14cd87601c0

                                                                            SHA256

                                                                            8f5e966adcff8010ad59d962cc9c3c356b862831ca99edd235505d1cb929dade

                                                                            SHA512

                                                                            2e24027a9e872a3dde6239163e3122b60824cb47bd3e24038258d0ee132cdfb9706b7d3f188f675ca64ad06955ae618ebf6ecbc7de9231dd037d267a0faf3de2

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                            Filesize

                                                                            6KB

                                                                            MD5

                                                                            bb68e1b4c47d753b43b70df1d3250785

                                                                            SHA1

                                                                            9cecf969a3a531fb9e502ef9ea9a040383024a4d

                                                                            SHA256

                                                                            758f38b5ed42411392caa61698586381d0c39a3da46cfaa4dd5ed690d74c00f4

                                                                            SHA512

                                                                            e32791350930494525eea93af366658d1f8ee1e33f5e487a22dfd12ca872fec44809f69fcd77ee8e1c68ce4faadaa23b25033ab20ba114c4711000e55cbc27a6

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                            Filesize

                                                                            6KB

                                                                            MD5

                                                                            28c737f789044b49d9249c0d46074ba7

                                                                            SHA1

                                                                            2450dd913e1d88e25e51b59e83752aaae1d7eaaf

                                                                            SHA256

                                                                            a67b29142d534900f3ca614ec904c08d49254e8565608f9474b61825546dad3e

                                                                            SHA512

                                                                            62e77851b734421525645aa6c61232f962888f35c0f411d313a18dd47bfefda890943c1782c76de24770cfa507fc34a1bcb5fffc18cef915d2785df98c1f38f9

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                            Filesize

                                                                            5KB

                                                                            MD5

                                                                            eb649cf9c7a6e38a1553425feb9a979d

                                                                            SHA1

                                                                            d7bdb60b94f577c7b9732e64350b3c86195f99df

                                                                            SHA256

                                                                            60c05123dbc634ad719a30b6869cbad8090e3fe10028dd51fbe290b4ab410e4a

                                                                            SHA512

                                                                            377ff9e2af67f9c2a40909e088a40395338e1b2b50eccff253df71014ab2adf579a12c3626aef1722b3d62e7681f4149ef3b8e75a68ef680ff75e8705a0cba54

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                            Filesize

                                                                            24KB

                                                                            MD5

                                                                            6e466bd18b7f6077ca9f1d3c125ac5c2

                                                                            SHA1

                                                                            32a4a64e853f294d98170b86bbace9669b58dfb8

                                                                            SHA256

                                                                            74fc4f126c0a55211be97a17dc55a73113008a6f27d0fc78b2b47234c0389ddc

                                                                            SHA512

                                                                            9bd77ee253ce4d2971a4b07ed892526ed20ff18a501c6ba2a180c92be62e4a56d4bbf20ba3fc4fbf9cf6ce68b3817cb67013ad5f30211c5af44c1e98608cb9e3

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                            Filesize

                                                                            24KB

                                                                            MD5

                                                                            ac2b76299740efc6ea9da792f8863779

                                                                            SHA1

                                                                            06ad901d98134e52218f6714075d5d76418aa7f5

                                                                            SHA256

                                                                            cc35a810ed39033fa4f586141116e74e066e9c0c3a8c8a862e8949e3309f9199

                                                                            SHA512

                                                                            eec3c24ce665f00cd28a2b60eb496a685ca0042c484c1becee89c33c6b0c93d901686dc0142d3c490d349d8b967ecbbd2f45d26c64052fb41aad349100bd8f77

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000001.dbtmp

                                                                            Filesize

                                                                            16B

                                                                            MD5

                                                                            46295cac801e5d4857d09837238a6394

                                                                            SHA1

                                                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                            SHA256

                                                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                            SHA512

                                                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            a2df37c8a6694048e28c07f675893eb2

                                                                            SHA1

                                                                            75ea9d4144b037c49d1206da5f1e788843f2dd0d

                                                                            SHA256

                                                                            119869da3458d4d152861dbf25b9e12d67b1c7cf2a9368f68f6a9c84599806ad

                                                                            SHA512

                                                                            657eeadbaec4ee771d31080bcb35f262f6f02b2ed4e02350521bc72f304bb35637b3fea40231527cdc3b3e4172d7cd18531d92d37037728938c26581de42f91e

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            04572debf636e7cf8706f45e5d472958

                                                                            SHA1

                                                                            55e1ed93e995dc549e9053218c8f9dd4f14bcbb3

                                                                            SHA256

                                                                            443ff682f0a68a76635a84f213c9e24499eb0db0070292d64b828b45246869a4

                                                                            SHA512

                                                                            4446175d1b0805f329407ce290fd20f6f4c7ff405dba966adc0ff43964a1187edcbbeab7157a895c65c0b0cf1d113f9adb450c807bc4e48a19ab3cc8b88eacdb

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            ab7686104aea32d448721ceec02f9c4a

                                                                            SHA1

                                                                            91afc1897a52ed6cd0f5958f3dc5e2fd7df2c4a9

                                                                            SHA256

                                                                            3d46d1ff42933c9bb3f2797e2e58d15418ae456abcf5877b489f111558fb5e80

                                                                            SHA512

                                                                            27cca288d84d2888940ce68840c4dec374930ba9223faa4bc65ced20b37f9c1cb017050ffe7fe4bd627c01b6c84c981e7a1a71c51f7993c783bc836608734380

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            6ad46b8e8a9aed96b7fad72204e537aa

                                                                            SHA1

                                                                            d6b7b11efe190bebc59043dd3580382342ced090

                                                                            SHA256

                                                                            e7ef67d2cf6c4e3a97311ed9a689ee75a043ff06e703885e59f0a83061427da3

                                                                            SHA512

                                                                            a6efa0ffb3871b1727541b5debe18317781d4f1758764414c257c201733102527bef6c974a311af098ed6ac3af5fc331ba27adc0e6ec562b0f56908285ead2cb

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            4a28d7282eca2fadf406681c6f11b32b

                                                                            SHA1

                                                                            8341873b4c4b75e8deb2181e1e391df942b8d993

                                                                            SHA256

                                                                            70e8ce196bd9d38e5862c3d9cf9cda14ab131746f88a274c3988346f92d0d2f4

                                                                            SHA512

                                                                            2b1274359e0b8f828e666f54856e233cf27ac5fe7c618cc910f409314993d2a2c8f63dcc613a19a8613e25c1b821053c22936f0294c8ad2def3de70ccc8d4d64

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            d8dce72b3bd4f5067047e66b67673432

                                                                            SHA1

                                                                            6c8a07fb083f7e383eb3f8604ee1f315d0dc7da6

                                                                            SHA256

                                                                            122ec75e4efbb81a325e7e48449f6c7fd9c54c9826b2f1ea313480c33f997d5d

                                                                            SHA512

                                                                            bc703acdae3c5c974b6ee3032cea4243f7a768fc334c7435343e4b61f12e112586d4a31db74a73a4d645d3bd1e7cdffb08ae0c81b007f4b1dd33bd8bc2a228b8

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe583459.TMP

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            007b3c44954353c02dd90333289b02c7

                                                                            SHA1

                                                                            d3e3e1b940a80a4051715ce472d7523ea70bdfdc

                                                                            SHA256

                                                                            151c5f7b71f34282d6a443ba2aa33da953ac22b233bb04d3607c091bd6079709

                                                                            SHA512

                                                                            9d30c82e7efa747066341e0c465dba8a27dda2e63ba85c4046bd0f1d99eb300ab10055ae16c5ddbd9af9268eed230e8715c47209aa94920021af5c0dbb7f7c79

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                            Filesize

                                                                            16B

                                                                            MD5

                                                                            206702161f94c5cd39fadd03f4014d98

                                                                            SHA1

                                                                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                            SHA256

                                                                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                            SHA512

                                                                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\efe09165-5633-4c80-be01-9e137a09985d.tmp

                                                                            Filesize

                                                                            5KB

                                                                            MD5

                                                                            c37750a6ab9df5b25c96fad3a98bab1f

                                                                            SHA1

                                                                            df4b05b710a256f166a32f24b04a66313b3e6bb7

                                                                            SHA256

                                                                            2d862df43302c8bcb6703ee52eb721a3c83892b1928a5a7e5263574d21c18911

                                                                            SHA512

                                                                            531d6668074c6e1f0aad47b4d9645de14089713b27e7ee34ca4df8fed90f0fbd173b05c23f87d8d81b671df19bc6b6830f971133f1657ed2f62f9aba7af75279

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001

                                                                            Filesize

                                                                            41B

                                                                            MD5

                                                                            5af87dfd673ba2115e2fcf5cfdb727ab

                                                                            SHA1

                                                                            d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                            SHA256

                                                                            f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                            SHA512

                                                                            de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            33b7ebb91a29ad23097ea9e43bb7065f

                                                                            SHA1

                                                                            6141cc4ca02f6263981233d8021c2d47374b4e1c

                                                                            SHA256

                                                                            de91ded2acabe12838be3cba3261f7e9683126e58a6746905295bbf31c401e53

                                                                            SHA512

                                                                            248948e5bc011738e7995fbdcbd83c2d22adf7b151730846fda756f318c9c3d993adfa29467fc3b88612b1da852626e828012e638dff9ef0097a6aad72488cb6

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                            Filesize

                                                                            10KB

                                                                            MD5

                                                                            816d1b24ce0b106d3ce7824f126a3298

                                                                            SHA1

                                                                            189b9b796760809e0c04eb7df0a67de95f4deeb9

                                                                            SHA256

                                                                            a66678e52889c86c897e081bccd96dde40f0785e60cf6d20b7ba44ac9d6b7be8

                                                                            SHA512

                                                                            d78ee9cd3cdfcf11a27affa645a623208d18f2a062e20c883c465969e0a259a9e06837040fef4ad3b6fda2a97caa0c39c500842f9ebc0e0512f4a79ef750db28

                                                                          • C:\Users\Admin\AppData\Local\Server\AsyncRAT.exe_Url_id0rl34oxreuuoxkuh1icsh0qae0uc4o\0.5.8.0\user.config

                                                                            Filesize

                                                                            319B

                                                                            MD5

                                                                            f71f55112253acc1ef2ecd0a61935970

                                                                            SHA1

                                                                            faa9d50656e386e460278d31b1d9247fdd947bb7

                                                                            SHA256

                                                                            d1ad588a08c8c0799d7a14509f1e0a7ae04c519102ed9d328a83fe65999e6179

                                                                            SHA512

                                                                            761b5c13e39bd4ae21d298084bbe747ae71c383fedf9a51fd5e9723a8b3b4547de459d82bac7f3f8f3bfc11cfb0528a4f1057b51996d7d046583109a53317b44

                                                                          • C:\Users\Admin\AppData\Local\Server\AsyncRAT.exe_Url_id0rl34oxreuuoxkuh1icsh0qae0uc4o\0.5.8.0\user.config

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            44e39f17a3e567788131a94903a460ca

                                                                            SHA1

                                                                            082aedd72a325324647581528dd02527fe45ade0

                                                                            SHA256

                                                                            d3fc905febea15e8fa0be73c6ebd524dba82c5ef7ea2b8c5870d152d24785a4b

                                                                            SHA512

                                                                            4823d7bd0eff2fc8a2163f91013427aa11bbfbe06d3d160122883bcb46789bdd32751fb3e308c7b274bcf1de5bb9d7263acfaa775c52339059806460e8f0b2bb

                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_m5vs4ahs.jyn.ps1

                                                                            Filesize

                                                                            60B

                                                                            MD5

                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                            SHA1

                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                            SHA256

                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                            SHA512

                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                          • C:\Users\Admin\AppData\Local\Temp\tmp8704.tmp.bat

                                                                            Filesize

                                                                            146B

                                                                            MD5

                                                                            0e0f0bdfd9f5ad89c048e78278df1333

                                                                            SHA1

                                                                            2e74a9082b031f46cf302824523c3929c573fb3a

                                                                            SHA256

                                                                            2d8e8400d3656c87744c1a1d6dedd3574bdff106fbdfdb60a878d588eb7bf709

                                                                            SHA512

                                                                            c4756ba92e0ad08b4a68914a3db6121240445c2f221134e9ffccb57a6ea9c352792dfc26e6047d1697c0678b0d873f36fc053ef501e58761d284c4ac5c797073

                                                                          • C:\Users\Admin\AppData\Local\Temp\tmp981F.tmp.png

                                                                            Filesize

                                                                            1.5MB

                                                                            MD5

                                                                            c954d046f147bcff0c9a6e5d9208e765

                                                                            SHA1

                                                                            a52e337709706705afe372333c108dbceeeba751

                                                                            SHA256

                                                                            3812e524f55e86cfd7d1403e713bfa5bf66bb95d2deb6bda4822ea5c2fd8a825

                                                                            SHA512

                                                                            0c0ac8703367cb277f915c2d14e5072d1ec2654c2db99968c7447a5c1bb1cc673f8be7b9d2d43d3d4c17989a44b0b6378a96451a367218854023dc0bfa807ba1

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                            Filesize

                                                                            3KB

                                                                            MD5

                                                                            372ae77daf2472fb5f166d988656f96f

                                                                            SHA1

                                                                            3576d69d2967462420d066a7d2452d0d24528439

                                                                            SHA256

                                                                            3f06bb8394576e571958cfb3ea8637d9c45211d2000c440d781e58e07776eb7d

                                                                            SHA512

                                                                            b4d8eee67ca377ad43a487cb2c3e36429bdbd5ff4496bb6d02553465da3a363686fee9aafdec4cefad5e6da9f5e81d114fdaa2f10def312067e3572508694341

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                            Filesize

                                                                            3KB

                                                                            MD5

                                                                            8c1841625f600eb04e3f8123bc653e5f

                                                                            SHA1

                                                                            3ae3f3aabb8487a45aa6bee7a996796ec6f315b1

                                                                            SHA256

                                                                            fec0436095079b9f6051f50248f5c2065031ae36553aac0e380338b3e90a97ab

                                                                            SHA512

                                                                            342940cefdcfb4c380eace524fac77b466c432e9ad9e50e058de455bf704576e495882d56d0a5dff6351f25bed1e7494f034465ee0a4123a3fe3ce715d738f31

                                                                          • C:\Users\Admin\Desktop\AsyncClient.exe

                                                                            Filesize

                                                                            48KB

                                                                            MD5

                                                                            a5eaa9f2c4d9390796989a76193cd8f1

                                                                            SHA1

                                                                            1d2a8312d00fe4d37f138b316649df72b26ef2d1

                                                                            SHA256

                                                                            c3fd1606a6112fdd38b3e8246857a0bb858216f3f2021bbffd43e026579bae47

                                                                            SHA512

                                                                            3772f35bb5c9ab6bdf34b51daccd8b8ef7baab3d4ce57f314aaefe1ee9efb6d07c359429469a50d302836dff7062a958c60d5cdfff9ea64666d807aefdaaa71b

                                                                          • C:\Users\Admin\Desktop\AsyncRAT\AsyncRAT.exe

                                                                            Filesize

                                                                            6.4MB

                                                                            MD5

                                                                            97a429c4b6a2cb95ece0ddb24c3c2152

                                                                            SHA1

                                                                            6fcc26793dd474c0c7113b3360ff29240d9a9020

                                                                            SHA256

                                                                            06899071233d61009a64c726a4523aa13d81c2517a0486cc99ac5931837008e5

                                                                            SHA512

                                                                            524a63f39e472bd052a258a313ff4f2005041b31f11da4774d3d97f72773f3edb40df316fa9cc2a0f51ea5d8ac404cfdd486bab6718bae60f0d860e98e533f89

                                                                          • C:\Users\Admin\Desktop\AsyncRAT\AsyncRAT.exe.config

                                                                            Filesize

                                                                            5KB

                                                                            MD5

                                                                            cb1f2dcfeb5cbb5af8efa7ea40b8e908

                                                                            SHA1

                                                                            ceb040761554040cac2fc7ca18623498d3bfc7ce

                                                                            SHA256

                                                                            58f956abe9d717683f4a1cfa6f70e256c80461315a8d47b6456116b3d3075372

                                                                            SHA512

                                                                            f0d805bb7983a111b7083e08d5e53c30dd78a0a5fa2baa2af6c5d3395475a3399fd085d151cc8cce312c7eb3e11ac7c2cc78c49ff8a9bfba4b6ad6585caeaeea

                                                                          • C:\Users\Admin\Desktop\AsyncRAT\Plugins\Chat.dll

                                                                            Filesize

                                                                            367KB

                                                                            MD5

                                                                            b230da150aa974d2a0801cef654cbe05

                                                                            SHA1

                                                                            ab28e63c165ebd7d43d6d0eed4de2750743b9b27

                                                                            SHA256

                                                                            37d41c7042210845593ddd7e5a5e37a37f6605305264d50a30aa2be1686000f6

                                                                            SHA512

                                                                            2d81546548b6ed2e799eaaf4766ac9a811344d9f57726bed7270e289234f7b917df07deff9d1f6e93b9f4d186daefcbfd2d0181b12406a0b5b81e3bdffa65aaf

                                                                          • C:\Users\Admin\Desktop\AsyncRAT\Plugins\Extra.dll

                                                                            Filesize

                                                                            375KB

                                                                            MD5

                                                                            3bbcb7c7967c714f767d751db17ed1d0

                                                                            SHA1

                                                                            ea15b176c5c7073bfa3bb58ebe9280b032414fbc

                                                                            SHA256

                                                                            7dd3978e7721f4460d639d17c47fe1307917dbacfb858d0d12e403105cd47089

                                                                            SHA512

                                                                            c20bf3b9b4051b050b6efebbe3c6ea54e520d68172f4ef7bbab961169c4479e9c77b39719e0139edd6ff4c4366b355579226f49aa979331ac8ab8c69bf3a165f

                                                                          • C:\Users\Admin\Desktop\AsyncRAT\Plugins\FileManager.dll

                                                                            Filesize

                                                                            392KB

                                                                            MD5

                                                                            9caa1fa3b3b7824167610d309446223d

                                                                            SHA1

                                                                            093fa014488ea1ddacf083c398fb8b2d07b8a0e0

                                                                            SHA256

                                                                            9d1b94035f381b5183e82a317f001725674c8ea1c5cd82ab5af408f7f53ca19d

                                                                            SHA512

                                                                            feba121ed3ccdef26b0c78874c5247cbb223b2992649fed6bbc088bfe952cf86de1145d84666048ad37b0f2c6a9dcd4da95cf972ec790b43deeb1c22322d17e1

                                                                          • C:\Users\Admin\Desktop\AsyncRAT\Plugins\FileSearcher.dll

                                                                            Filesize

                                                                            433KB

                                                                            MD5

                                                                            4e1922ee8333847507a34823ed695131

                                                                            SHA1

                                                                            5df1f96b0a0a43eadeb101c54864a85cf51e9521

                                                                            SHA256

                                                                            a6bdd625fa1d9a7ee66e4ca09ced0b3dca8afd2ad92ecaf44fd9a879b57cb198

                                                                            SHA512

                                                                            e4f2bc24f7d44e19580d561599b563ef2d011cffbd64851c867b03aab22e650da55150b6bc9c02389acffe546efdcc17da72204fef4e6e49a53e27be1a290f0a

                                                                          • C:\Users\Admin\Desktop\AsyncRAT\Plugins\LimeLogger.dll

                                                                            Filesize

                                                                            368KB

                                                                            MD5

                                                                            732839c93b7e0ab6796cb1c4544eda66

                                                                            SHA1

                                                                            2dc3d39d74a5b72e6320596f92bcfc15edda3915

                                                                            SHA256

                                                                            cd5cdf0eade067fb0d97881258e4e29d88386cc9ec7a6ea315d159d284858857

                                                                            SHA512

                                                                            faa264925d636fa743d0448ce97c0b26ed7974b48c2fbf66000993119749d721bc27cf2626c3eaac3b1374abc0d16cca9e8222c4da054d1aeb56b34505fbeec6

                                                                          • C:\Users\Admin\Desktop\AsyncRAT\Plugins\Miscellaneous.dll

                                                                            Filesize

                                                                            560KB

                                                                            MD5

                                                                            07ba8685ca3faff186f0d9f5400c1117

                                                                            SHA1

                                                                            a673a7b55e4cf168856a7d3564a5521f0f8fc4e5

                                                                            SHA256

                                                                            783d9d5334aa40f35acf8ff941a6b5bed908fd94dc14a05712b8a9eb9220cd5b

                                                                            SHA512

                                                                            358c85a586d8b590497ea180eae76608ef38a4de09b95e907632bbad8f2c522bec4ea5568017ea1120a1553abb2be730006613872fe053b1fc00a36d005ab096

                                                                          • C:\Users\Admin\Desktop\AsyncRAT\Plugins\Options.dll

                                                                            Filesize

                                                                            378KB

                                                                            MD5

                                                                            a1b5048e3f10f7105bd47244b2930137

                                                                            SHA1

                                                                            a12cbae3ec815ce704fafb0e2eadb9f31ccbb6f3

                                                                            SHA256

                                                                            8dc80b8bf9b3123289e132270e74a31176deec4f74e6ac20d7b6a9fcdb89e8a1

                                                                            SHA512

                                                                            fcae7c456f71e03afe2e67954fc3c9491978a54825436c51b351c47adb6cd8a1ef15e0e6f6d99094b986ff910e21a287a7de9e4ca2818221aa858152a8c6dfe9

                                                                          • C:\Users\Admin\Desktop\AsyncRAT\Plugins\ProcessManager.dll

                                                                            Filesize

                                                                            361KB

                                                                            MD5

                                                                            fced22a0c1edad786a59703842fd3b14

                                                                            SHA1

                                                                            dceabc613c694f7f2f6439ea176988fb373d6a29

                                                                            SHA256

                                                                            3ad861ad9bc3edfdd486c060879f4f2450a51757c67f3b514f71381057580218

                                                                            SHA512

                                                                            8904c36c364d29244c598895e877d7897547ce2a187adb197ba281a0512ca3ff52464c478fc42a2ec7f614dd0f91dea2dbb31f4af81c6c0f08cd23f79a71f57c

                                                                          • C:\Users\Admin\Desktop\AsyncRAT\Plugins\Recovery.dll

                                                                            Filesize

                                                                            600KB

                                                                            MD5

                                                                            d8793438a77750cea1b0d7eaad3d0d0d

                                                                            SHA1

                                                                            36bb36d6dabaa1285dbe7ba26581322630984c71

                                                                            SHA256

                                                                            7fd48ac68f182e0ced2ace00b223fa1d35bd8a20d75600b5400267cd5db5cc84

                                                                            SHA512

                                                                            68e00d97edf0ab768d40672d3b39dfcd09d8ff81b3e6abfdcfa8db88d66ae6070c8b6ad2c540538dd6f47da0174f9ab2d48cd7bef95d6021ffb844c71289822d

                                                                          • C:\Users\Admin\Desktop\AsyncRAT\Plugins\RemoteCamera.dll

                                                                            Filesize

                                                                            452KB

                                                                            MD5

                                                                            1b2c9164e625b600e699151de11d9e98

                                                                            SHA1

                                                                            2ce0aa3161c641623afd1acfa922fce5f10a709c

                                                                            SHA256

                                                                            87938027a63a867b831c86611dc6a2c1fc6af61526dc2269328af4b59e15b1e1

                                                                            SHA512

                                                                            aa0785b079059463a1df409380451c2be7c3bd627a199661627815f364689ed3816dc9cb78725fab510d687d6866186f3fbdb62b633554b9a0aa324730487729

                                                                          • C:\Users\Admin\Desktop\AsyncRAT\Plugins\RemoteDesktop.dll

                                                                            Filesize

                                                                            390KB

                                                                            MD5

                                                                            cd4a9e669264419eca4de564e6272fe0

                                                                            SHA1

                                                                            bb69bb1542ea06395df74dbedc98866d6c8a36cb

                                                                            SHA256

                                                                            56fd699258a7186f709068c283cd725797bab392e3a6f1cd28f35bbdb3e98e38

                                                                            SHA512

                                                                            5addb4f97c7e1cb69e5167e670bd2c3a817e0415f1fd8a5158af7e03e4340a8b1a6d803e85c9ea56415b9e7d3dcb4c352775a6a6b4770443d72114396ffaa1e5

                                                                          • C:\Users\Admin\Desktop\AsyncRAT\ServerCertificate.p12

                                                                            Filesize

                                                                            4KB

                                                                            MD5

                                                                            b41bd7adf94e14d84a232de4a5257cbd

                                                                            SHA1

                                                                            0978c3fc50defb007158bdb8ddc198137603200c

                                                                            SHA256

                                                                            e32f5d1f69d2ce1eb073cad5ff675647e1a478d4bbc1090062366db1f63cc254

                                                                            SHA512

                                                                            437687dd56f754b9068169fa88ea39b9279e1c08240853cf76f059c58a34288a8b73bbbb19f9ad3211772cbaa64d914cc1e8e59ef6a06354b72729cb050af9d8

                                                                          • C:\Users\Admin\Desktop\AsyncRAT\Stub\Stub.exe

                                                                            Filesize

                                                                            38KB

                                                                            MD5

                                                                            f76702fa423ce2b2b4b0fdcf547b0789

                                                                            SHA1

                                                                            ea408a4419e8a3139ef14df987608964c12d3190

                                                                            SHA256

                                                                            0e19cefba973323c234322452dfd04e318f14809375090b4f6ab39282f6ba07e

                                                                            SHA512

                                                                            03c7d8814687bb4f11ac41a555f368d89d5be749c92624073b77da0e57d872df201f2657b180ad0c9d5bc9ffa0a85989bf31374c7e5deefa06cf36bce3697971

                                                                          • C:\Users\Admin\Desktop\COMPILED.zip

                                                                            Filesize

                                                                            6.9MB

                                                                            MD5

                                                                            30b1961a9b56972841a3806e716531d7

                                                                            SHA1

                                                                            63c6880d936a60fefc43a51715036c93265a4ae5

                                                                            SHA256

                                                                            0b29711ec115c27f4cd6963b9ea1e4febf15624f1c17d1c018611ee3df8c333c

                                                                            SHA512

                                                                            9449065743226bd15699e710b2bab2a5bb44866f2d9a8bd1b3529b7c53d68e5ecba935e36406d1b69e1fb050f50e3321ef91bc61faac9790f6209fec6f930ed0

                                                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Profiles\Default.xml

                                                                            Filesize

                                                                            454B

                                                                            MD5

                                                                            309610cd4a7175a5b94b10d6069503b1

                                                                            SHA1

                                                                            1ece9c8fa3094518d22203f535d019e85fe6b168

                                                                            SHA256

                                                                            71bd6eb521fcb3123b0287f71232ade8370e5a9d1dbec24a6d2fd5273a750123

                                                                            SHA512

                                                                            6ba430f5cb112ca7af8af750b88a3b4951054f199fe6cd24958322f4862575f03be6dbbad7ca12d0db9693ddb637412563de755e953bf2f29cde05a805d76fb9

                                                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Profiles\Default.xml

                                                                            Filesize

                                                                            769B

                                                                            MD5

                                                                            b13554723166b184606c6cba1a84d248

                                                                            SHA1

                                                                            99cf2b29f0207491d92bfa9ef9fbfb51fb0d6ad6

                                                                            SHA256

                                                                            39521501bba0504598f7e7fd0b7bebe8c4647fa4e59b62c61d7d18371a07287b

                                                                            SHA512

                                                                            eb3f1af9c566d99c6ea91018b8488cb323e29c649e063edbe0318663c47696d8018380ff73e74404ae1660870a123708cb5d001f56f57521ac467dc5075c3ba0

                                                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Profiles\Default.xml

                                                                            Filesize

                                                                            1024B

                                                                            MD5

                                                                            3c3e2c27c23d86bbc6e61d3680b51877

                                                                            SHA1

                                                                            dda5ac1361276dd216038b8a7b924e797a53a8bd

                                                                            SHA256

                                                                            1cb200fb27999eaa248cba04dedfcc915abde75e986516c744f9bfc73383181a

                                                                            SHA512

                                                                            87b877d655a33be5c7be275fc633f1f274622438da694f0793e4de6ad17e88f65a200a818644e3c7040e0223bc8170df8df30ff0430afa73bed68cc7abb8948c

                                                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe

                                                                            Filesize

                                                                            1.2MB

                                                                            MD5

                                                                            12ebf922aa80d13f8887e4c8c5e7be83

                                                                            SHA1

                                                                            7f87a80513e13efd45175e8f2511c2cd17ff51e8

                                                                            SHA256

                                                                            43315abb9c8be9a39782bd8694a7ea9f16a867500dc804454d04b8bf2c15c51e

                                                                            SHA512

                                                                            fda5071e15cf077d202b08db741bbfb3dbd815acc41deec7b7d44e055cac408e2f2de7233f8f9c5c618afd00ffc2fc4c6e8352cbdf18f9aab55d980dcb58a275

                                                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe.config

                                                                            Filesize

                                                                            176B

                                                                            MD5

                                                                            c8cd50e8472b71736e6543f5176a0c12

                                                                            SHA1

                                                                            0bd6549820de5a07ac034777b3de60021121405e

                                                                            SHA256

                                                                            b44739eeff82db2b575a45b668893e2fe8fdd24a709cbf0554732fd3520b2190

                                                                            SHA512

                                                                            6e8f77fcca5968788cc9f73c9543ce9ab7b416372bc681093aa8a3aad43af1f06c56fcbc296c7897a3654b86a6f9d0e8b0fe036677cf290957924377bc177d9f

                                                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\quasar.p12

                                                                            Filesize

                                                                            4KB

                                                                            MD5

                                                                            7ae66996db2ddcf92e563b82adef2853

                                                                            SHA1

                                                                            5b8f0d7228dd2373d54756dbf8049373fa52e71f

                                                                            SHA256

                                                                            3fc28b0c46be6e33f96fc5f4fd3a8e89611879af67e2d8cf11ceb7c3ba811682

                                                                            SHA512

                                                                            0fcb69f30b03768972da12f9c4b59f395607d2fddfb136991f899feb646f59203eaf058501a0e9e8aac748604206f6d81eacd8ddc9c20dcad6df0d962f766aca

                                                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\settings.xml

                                                                            Filesize

                                                                            373B

                                                                            MD5

                                                                            b6af1da05c1a00991f04f8b898cea532

                                                                            SHA1

                                                                            24c48b062d8d864eefd32f2d84a36e1a7282e911

                                                                            SHA256

                                                                            f2ef0d8f29904a65ce6dbe29baf9379fb4659afb6930a5af5d9fb88f73b73f41

                                                                            SHA512

                                                                            2ab2de469911c3fee5b9bbfdbb373e5eb15023bf25b9e1835ebbf5890c66cfd7a06d7d5911e2fb630afadf9b30489e589634cefe52ca4c4156ae24b24c00c8aa

                                                                          • C:\Users\Admin\Desktop\v0.5.8

                                                                            Filesize

                                                                            173KB

                                                                            MD5

                                                                            e33c02762dcb1af0246c12ba5168e6c5

                                                                            SHA1

                                                                            dea91b5d6e3573df68e5a8302a88688db78672d3

                                                                            SHA256

                                                                            8ac83227b380fa2864d54d7b80fe3fd69b828aa996396422d4ca9aab85caa985

                                                                            SHA512

                                                                            74a78ad5c11ded0c48f56baefb35190dd1fe80ba484a02a9f36439a309f08c2d85f5bf3905d66d66239b14fb5cedf461f75e5abe2f1d0647aa0916cc184b3640

                                                                          • C:\Users\Admin\Downloads\Unconfirmed 287020.crdownload

                                                                            Filesize

                                                                            3.3MB

                                                                            MD5

                                                                            13aa4bf4f5ed1ac503c69470b1ede5c1

                                                                            SHA1

                                                                            c0b7dadff8ac37f6d9fd00ae7f375e12812bfc00

                                                                            SHA256

                                                                            4cdeb2eae1cec1ab07077142313c524e9cf360cdec63497538c4405c2d8ded62

                                                                            SHA512

                                                                            767b03e4e0c2a97cb0282b523bcad734f0c6d226cd1e856f6861e6ae83401d0d30946ad219c8c5de3c90028a0141d3dc0111c85e0a0952156cf09e189709fa7d

                                                                          • C:\Users\Admin\Downloads\Unconfirmed 342697.crdownload

                                                                            Filesize

                                                                            156KB

                                                                            MD5

                                                                            d5470ca570cf910bb847ed62ef2341bd

                                                                            SHA1

                                                                            846001381a0def9cad2f69e4333b32843e3c9354

                                                                            SHA256

                                                                            823aa3adcdcc284f98d5e238c070c1c4513f67a3358c643048b7b508b522fcec

                                                                            SHA512

                                                                            55beae93744c055523c9a09445cd0d6ab781ff76c9edb3e7d655309630b511556df3f1d62fd85276f941d38b719313a369026da441e980dd0c4c3861ce9fd9e3

                                                                          • memory/1124-1532-0x000000006FDA0000-0x000000006FDEC000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/1124-1542-0x0000000007810000-0x00000000078B3000-memory.dmp

                                                                            Filesize

                                                                            652KB

                                                                          • memory/1640-1603-0x000000006FDA0000-0x000000006FDEC000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/1712-1343-0x0000000006000000-0x0000000006064000-memory.dmp

                                                                            Filesize

                                                                            400KB

                                                                          • memory/1712-1342-0x0000000005410000-0x00000000054A2000-memory.dmp

                                                                            Filesize

                                                                            584KB

                                                                          • memory/1712-834-0x00000000062B0000-0x0000000006318000-memory.dmp

                                                                            Filesize

                                                                            416KB

                                                                          • memory/1712-833-0x0000000006130000-0x00000000061A6000-memory.dmp

                                                                            Filesize

                                                                            472KB

                                                                          • memory/1712-821-0x00000000057C0000-0x0000000005D66000-memory.dmp

                                                                            Filesize

                                                                            5.6MB

                                                                          • memory/1712-835-0x0000000006320000-0x000000000633E000-memory.dmp

                                                                            Filesize

                                                                            120KB

                                                                          • memory/1712-836-0x0000000006450000-0x00000000064E2000-memory.dmp

                                                                            Filesize

                                                                            584KB

                                                                          • memory/1740-809-0x0000000000520000-0x0000000000532000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/1740-810-0x0000000004ED0000-0x0000000004F36000-memory.dmp

                                                                            Filesize

                                                                            408KB

                                                                          • memory/1740-811-0x0000000005340000-0x00000000053DC000-memory.dmp

                                                                            Filesize

                                                                            624KB

                                                                          • memory/1964-1573-0x000000006FDA0000-0x000000006FDEC000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/2436-734-0x000001CA43690000-0x000001CA436A2000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/2436-730-0x000001CA28610000-0x000001CA28C7A000-memory.dmp

                                                                            Filesize

                                                                            6.4MB

                                                                          • memory/2436-1646-0x000001CA4BE20000-0x000001CA4C144000-memory.dmp

                                                                            Filesize

                                                                            3.1MB

                                                                          • memory/2436-782-0x000001CA464D0000-0x000001CA464EA000-memory.dmp

                                                                            Filesize

                                                                            104KB

                                                                          • memory/2436-762-0x000001CA4A560000-0x000001CA4A686000-memory.dmp

                                                                            Filesize

                                                                            1.1MB

                                                                          • memory/2436-759-0x000001CA464C0000-0x000001CA464C8000-memory.dmp

                                                                            Filesize

                                                                            32KB

                                                                          • memory/2436-735-0x000001CA47530000-0x000001CA477B0000-memory.dmp

                                                                            Filesize

                                                                            2.5MB

                                                                          • memory/2436-733-0x000001CA442E0000-0x000001CA442EA000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/2436-732-0x000001CA433A0000-0x000001CA435F2000-memory.dmp

                                                                            Filesize

                                                                            2.3MB

                                                                          • memory/3552-1563-0x000000006FDA0000-0x000000006FDEC000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/4120-1613-0x000000006FDA0000-0x000000006FDEC000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/4448-1195-0x0000013657720000-0x0000013657A4E000-memory.dmp

                                                                            Filesize

                                                                            3.2MB

                                                                          • memory/4448-1229-0x00000136576D0000-0x000001365771C000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/4448-1228-0x0000013658EE0000-0x0000013658F92000-memory.dmp

                                                                            Filesize

                                                                            712KB

                                                                          • memory/4448-1260-0x00000136593B0000-0x00000136593CA000-memory.dmp

                                                                            Filesize

                                                                            104KB

                                                                          • memory/4448-1259-0x000001365AC10000-0x000001365AC6E000-memory.dmp

                                                                            Filesize

                                                                            376KB

                                                                          • memory/4448-1227-0x0000013655550000-0x00000136555A0000-memory.dmp

                                                                            Filesize

                                                                            320KB

                                                                          • memory/4448-1226-0x00000136554E0000-0x00000136554F8000-memory.dmp

                                                                            Filesize

                                                                            96KB

                                                                          • memory/4448-1338-0x0000013659180000-0x0000013659192000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/4448-1194-0x0000013653E70000-0x0000013653E86000-memory.dmp

                                                                            Filesize

                                                                            88KB

                                                                          • memory/4448-1193-0x00000136398A0000-0x00000136399D8000-memory.dmp

                                                                            Filesize

                                                                            1.2MB

                                                                          • memory/4612-1623-0x000000006FDA0000-0x000000006FDEC000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/4736-1335-0x000000001C410000-0x000000001C422000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/4736-1336-0x000000001C4D0000-0x000000001C50C000-memory.dmp

                                                                            Filesize

                                                                            240KB

                                                                          • memory/4736-1334-0x0000000000120000-0x0000000000444000-memory.dmp

                                                                            Filesize

                                                                            3.1MB

                                                                          • memory/4788-1522-0x000000006FDA0000-0x000000006FDEC000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/4788-1421-0x0000000005860000-0x0000000005BB7000-memory.dmp

                                                                            Filesize

                                                                            3.3MB

                                                                          • memory/4788-1485-0x0000000005F40000-0x0000000005F8C000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/5068-837-0x00000239E44E0000-0x00000239E44E1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5068-838-0x00000239E44E0000-0x00000239E44E1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5068-848-0x00000239E44E0000-0x00000239E44E1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5068-849-0x00000239E44E0000-0x00000239E44E1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5068-847-0x00000239E44E0000-0x00000239E44E1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5068-846-0x00000239E44E0000-0x00000239E44E1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5068-843-0x00000239E44E0000-0x00000239E44E1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5068-839-0x00000239E44E0000-0x00000239E44E1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5068-845-0x00000239E44E0000-0x00000239E44E1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5068-844-0x00000239E44E0000-0x00000239E44E1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/5396-1368-0x00000000075B0000-0x00000000075BA000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/5396-1380-0x00000000052E0000-0x0000000005344000-memory.dmp

                                                                            Filesize

                                                                            400KB

                                                                          • memory/5396-1652-0x0000000009D60000-0x0000000009E12000-memory.dmp

                                                                            Filesize

                                                                            712KB

                                                                          • memory/5396-1651-0x0000000008440000-0x0000000008490000-memory.dmp

                                                                            Filesize

                                                                            320KB

                                                                          • memory/5396-1650-0x0000000007E40000-0x0000000007E4A000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/5396-1649-0x0000000009A40000-0x0000000009D64000-memory.dmp

                                                                            Filesize

                                                                            3.1MB

                                                                          • memory/5396-1648-0x0000000006DA0000-0x0000000006E02000-memory.dmp

                                                                            Filesize

                                                                            392KB

                                                                          • memory/5396-1654-0x000000000A400000-0x000000000A412000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/5396-1655-0x000000000AAB0000-0x000000000AAEC000-memory.dmp

                                                                            Filesize

                                                                            240KB

                                                                          • memory/5396-1653-0x000000000A490000-0x000000000AAA8000-memory.dmp

                                                                            Filesize

                                                                            6.1MB

                                                                          • memory/5396-1369-0x0000000007C00000-0x0000000007C44000-memory.dmp

                                                                            Filesize

                                                                            272KB

                                                                          • memory/5396-1362-0x0000000006160000-0x00000000061D8000-memory.dmp

                                                                            Filesize

                                                                            480KB

                                                                          • memory/5396-1363-0x0000000007780000-0x00000000077F2000-memory.dmp

                                                                            Filesize

                                                                            456KB

                                                                          • memory/5396-1367-0x00000000077F0000-0x0000000007812000-memory.dmp

                                                                            Filesize

                                                                            136KB

                                                                          • memory/5396-1366-0x0000000007480000-0x0000000007488000-memory.dmp

                                                                            Filesize

                                                                            32KB

                                                                          • memory/5396-1365-0x0000000007470000-0x0000000007478000-memory.dmp

                                                                            Filesize

                                                                            32KB

                                                                          • memory/5396-1364-0x0000000007460000-0x0000000007468000-memory.dmp

                                                                            Filesize

                                                                            32KB

                                                                          • memory/5456-1583-0x000000006FDA0000-0x000000006FDEC000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/5640-1543-0x000000006FDA0000-0x000000006FDEC000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/5876-1593-0x000000006FDA0000-0x000000006FDEC000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/6068-1386-0x00000000053E0000-0x0000000005416000-memory.dmp

                                                                            Filesize

                                                                            216KB

                                                                          • memory/6068-1413-0x0000000007BD0000-0x0000000007BEE000-memory.dmp

                                                                            Filesize

                                                                            120KB

                                                                          • memory/6068-1418-0x0000000008010000-0x00000000080A6000-memory.dmp

                                                                            Filesize

                                                                            600KB

                                                                          • memory/6068-1417-0x0000000007E00000-0x0000000007E0A000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/6068-1415-0x00000000083E0000-0x0000000008A5A000-memory.dmp

                                                                            Filesize

                                                                            6.5MB

                                                                          • memory/6068-1416-0x0000000007DA0000-0x0000000007DBA000-memory.dmp

                                                                            Filesize

                                                                            104KB

                                                                          • memory/6068-1414-0x0000000007C40000-0x0000000007CE3000-memory.dmp

                                                                            Filesize

                                                                            652KB

                                                                          • memory/6068-1387-0x0000000005C40000-0x000000000630A000-memory.dmp

                                                                            Filesize

                                                                            6.8MB

                                                                          • memory/6068-1403-0x000000006FCF0000-0x000000006FD3C000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/6068-1402-0x0000000007BF0000-0x0000000007C22000-memory.dmp

                                                                            Filesize

                                                                            200KB

                                                                          • memory/6068-1401-0x0000000006D90000-0x0000000006DDC000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/6068-1400-0x0000000006A40000-0x0000000006A5E000-memory.dmp

                                                                            Filesize

                                                                            120KB

                                                                          • memory/6068-1399-0x00000000066E0000-0x0000000006A37000-memory.dmp

                                                                            Filesize

                                                                            3.3MB

                                                                          • memory/6068-1398-0x00000000064B0000-0x0000000006516000-memory.dmp

                                                                            Filesize

                                                                            408KB

                                                                          • memory/6068-1393-0x0000000006310000-0x0000000006332000-memory.dmp

                                                                            Filesize

                                                                            136KB

                                                                          • memory/6124-1553-0x000000006FDA0000-0x000000006FDEC000-memory.dmp

                                                                            Filesize

                                                                            304KB