Analysis

  • max time kernel
    61s
  • max time network
    4s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 22:00

Errors

Reason
Machine shutdown

General

  • Target

    6cf6ade8237b2c7d401b8aea07fedfa070f2d7fd7e34bde673632fe9250fa9a5N.exe

  • Size

    3.3MB

  • MD5

    94fafb9c5bad9356529fb599f4bf4260

  • SHA1

    7bbcc6309c587db43d8fef972eefc4bf27c98de1

  • SHA256

    6cf6ade8237b2c7d401b8aea07fedfa070f2d7fd7e34bde673632fe9250fa9a5

  • SHA512

    55f7e92bc321e6dbf14594a273fcc5c9046f8e2ae13196fd9caed55acd0fc3be601c0e3eaa4f58e765e28e5cdccb7fa442e8f6c113779eb6cd7bbed67646f65d

  • SSDEEP

    49152:Jv+lL26AaNeWgPhlmVqvMQ7XSKEp+oMfHzoGdNCTHHB72eh2NTsr:JvuL26AaNeWgPhlmVqkQ7XSKEp+nE

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    3000

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

zd5sq5d05s2ds-51922.portmap.host:51922

Mutex

28d11f6e-245f-478b-b5b1-72d29c906aa7

Attributes
  • encryption_key

    4EE40AC5CC3266A3AC1ABAC110B7261E7A052A63

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 3 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 10 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:64
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 64 -s 3580
            3⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:2664
        • C:\Windows\system32\wlrmdr.exe
          -s -1 -f 2 -t Your PC will automatically restart in one minute -m Windows ran into a problem and needs to restart. You should close this message now and save your work. -a 3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:4444
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:676
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 676 -s 2876
          2⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:1868
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:948
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:392
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
            1⤵
              PID:1036
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
              1⤵
                PID:1060
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                1⤵
                  PID:1068
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                  1⤵
                    PID:1184
                    • C:\Windows\system32\taskhostw.exe
                      taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                      2⤵
                        PID:2700
                      • C:\Windows\system32\MusNotification.exe
                        C:\Windows\system32\MusNotification.exe
                        2⤵
                          PID:5116
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                        1⤵
                          PID:1216
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                          1⤵
                            PID:1296
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                            1⤵
                              PID:1304
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                              1⤵
                                PID:1404
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                1⤵
                                  PID:1452
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                  1⤵
                                    PID:1464
                                    • C:\Windows\system32\sihost.exe
                                      sihost.exe
                                      2⤵
                                        PID:3016
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        2⤵
                                          PID:2392
                                        • C:\Windows\system32\sihost.exe
                                          sihost.exe
                                          2⤵
                                            PID:2876
                                          • C:\Windows\system32\sihost.exe
                                            sihost.exe
                                            2⤵
                                              PID:2196
                                            • C:\Windows\system32\sihost.exe
                                              sihost.exe
                                              2⤵
                                                PID:5100
                                              • C:\Windows\system32\sihost.exe
                                                sihost.exe
                                                2⤵
                                                  PID:3664
                                                • C:\Windows\system32\sihost.exe
                                                  sihost.exe
                                                  2⤵
                                                    PID:2748
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                  1⤵
                                                    PID:1500
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                                    1⤵
                                                      PID:1508
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                      1⤵
                                                        PID:1652
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                        1⤵
                                                          PID:1692
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                          1⤵
                                                            PID:1744
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                            1⤵
                                                              PID:1808
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                              1⤵
                                                                PID:1836
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                                1⤵
                                                                  PID:1960
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                                  1⤵
                                                                    PID:2040
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                    1⤵
                                                                      PID:516
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                      1⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:1768
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                                      1⤵
                                                                        PID:2064
                                                                      • C:\Windows\System32\spoolsv.exe
                                                                        C:\Windows\System32\spoolsv.exe
                                                                        1⤵
                                                                          PID:2112
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                          1⤵
                                                                            PID:2224
                                                                          • C:\Windows\System32\svchost.exe
                                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                            1⤵
                                                                              PID:2380
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                              1⤵
                                                                                PID:2416
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                                1⤵
                                                                                  PID:2420
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                                  1⤵
                                                                                  • Drops file in System32 directory
                                                                                  • Modifies data under HKEY_USERS
                                                                                  PID:2520
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                                  1⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:2620
                                                                                • C:\Windows\sysmon.exe
                                                                                  C:\Windows\sysmon.exe
                                                                                  1⤵
                                                                                    PID:2652
                                                                                  • C:\Windows\System32\svchost.exe
                                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                    1⤵
                                                                                      PID:2684
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                      1⤵
                                                                                        PID:2736
                                                                                      • C:\Windows\system32\wbem\unsecapp.exe
                                                                                        C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                        1⤵
                                                                                          PID:2968
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                                          1⤵
                                                                                            PID:3036
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                            1⤵
                                                                                              PID:3132
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                              1⤵
                                                                                                PID:3320
                                                                                              • C:\Windows\Explorer.EXE
                                                                                                C:\Windows\Explorer.EXE
                                                                                                1⤵
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:3436
                                                                                                • C:\Users\Admin\AppData\Local\Temp\6cf6ade8237b2c7d401b8aea07fedfa070f2d7fd7e34bde673632fe9250fa9a5N.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\6cf6ade8237b2c7d401b8aea07fedfa070f2d7fd7e34bde673632fe9250fa9a5N.exe"
                                                                                                  2⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Adds Run key to start application
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                  PID:436
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\kw0hwdcb.cf1.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\kw0hwdcb.cf1.exe"
                                                                                                    3⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                    PID:3208
                                                                                                  • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                                    "SCHTASKS.exe" /create /tn "Mason6cf6ade8237b2c7d401b8aea07fedfa070f2d7fd7e34bde673632fe9250fa9a5N.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\6cf6ade8237b2c7d401b8aea07fedfa070f2d7fd7e34bde673632fe9250fa9a5N.exe'" /sc onlogon /rl HIGHEST
                                                                                                    3⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:4264
                                                                                                  • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                                    "SCHTASKS.exe" /create /tn "Mason6cf6ade8237b2c7d401b8aea07fedfa070f2d7fd7e34bde673632fe9250fa9a5N.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\6cf6ade8237b2c7d401b8aea07fedfa070f2d7fd7e34bde673632fe9250fa9a5N.exe'" /sc onlogon /rl HIGHEST
                                                                                                    3⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2028
                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      4⤵
                                                                                                        PID:1348
                                                                                                      • C:\Windows\system32\WerFault.exe
                                                                                                        C:\Windows\system32\WerFault.exe -u -p 2028 -s 444
                                                                                                        4⤵
                                                                                                        • Checks processor information in registry
                                                                                                        • Enumerates system info in registry
                                                                                                        PID:4852
                                                                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                      "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                      3⤵
                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                      PID:4000
                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                        4⤵
                                                                                                          PID:2536
                                                                                                      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                                        "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                                        3⤵
                                                                                                        • Executes dropped EXE
                                                                                                        PID:2920
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                    1⤵
                                                                                                      PID:3540
                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                      1⤵
                                                                                                        PID:3740
                                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                        1⤵
                                                                                                          PID:3952
                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:4128
                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                            1⤵
                                                                                                              PID:2012
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                              1⤵
                                                                                                              • Checks SCSI registry key(s)
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              PID:4776
                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                              1⤵
                                                                                                                PID:2612
                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                1⤵
                                                                                                                  PID:4780
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                  1⤵
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:1552
                                                                                                                • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                  "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                  1⤵
                                                                                                                    PID:4328
                                                                                                                  • C:\Windows\system32\SppExtComObj.exe
                                                                                                                    C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                    1⤵
                                                                                                                      PID:1984
                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                      1⤵
                                                                                                                        PID:4972
                                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                        1⤵
                                                                                                                          PID:1524
                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                          1⤵
                                                                                                                            PID:400
                                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                                            C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                            1⤵
                                                                                                                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            PID:3600
                                                                                                                            • C:\Windows\system32\WerFault.exe
                                                                                                                              C:\Windows\system32\WerFault.exe -pss -s 448 -p 64 -ip 64
                                                                                                                              2⤵
                                                                                                                                PID:3424
                                                                                                                              • C:\Windows\system32\WerFault.exe
                                                                                                                                C:\Windows\system32\WerFault.exe -pss -s 476 -p 676 -ip 676
                                                                                                                                2⤵
                                                                                                                                  PID:2536
                                                                                                                                • C:\Windows\system32\WerFault.exe
                                                                                                                                  C:\Windows\system32\WerFault.exe -pss -s 456 -p 2028 -ip 2028
                                                                                                                                  2⤵
                                                                                                                                  • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                                  PID:112
                                                                                                                              • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                                C:\Windows\System32\WaaSMedicAgent.exe bebba0038c55ebd4731134e012f569ff NFgcdZWaBU+iJKTshqZSWA.0.1.0.0.0
                                                                                                                                1⤵
                                                                                                                                  PID:1864
                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                    2⤵
                                                                                                                                      PID:1092
                                                                                                                                  • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                                    C:\Windows\System32\WaaSMedicAgent.exe bebba0038c55ebd4731134e012f569ff NFgcdZWaBU+iJKTshqZSWA.0.1.0.0.0
                                                                                                                                    1⤵
                                                                                                                                      PID:1128
                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                        2⤵
                                                                                                                                          PID:2268

                                                                                                                                      Network

                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                      Replay Monitor

                                                                                                                                      Loading Replay Monitor...

                                                                                                                                      Downloads

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER635D.tmp.csv

                                                                                                                                        Filesize

                                                                                                                                        36KB

                                                                                                                                        MD5

                                                                                                                                        d0906e8fe952af758136e974a7e21709

                                                                                                                                        SHA1

                                                                                                                                        7fc950f13c9d9949f2c19e2709d5680568c07654

                                                                                                                                        SHA256

                                                                                                                                        573ba17af1126b091912a1f6836b1d42d646664ed18ca2ab3b4369e009ddcaff

                                                                                                                                        SHA512

                                                                                                                                        66a3d061a0803ace7387e0689329d4538556b82490ba9f5993f945d864de0e16058014b81858813b501b2bec147a0c1f975ae114bf58b9cb4860617a0d8d68dd

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER636E.tmp.txt

                                                                                                                                        Filesize

                                                                                                                                        13KB

                                                                                                                                        MD5

                                                                                                                                        75954d2ea453572ffd1d56df4ca57158

                                                                                                                                        SHA1

                                                                                                                                        3c5d28ef28eecc9d2d78f46447d81b90280f1514

                                                                                                                                        SHA256

                                                                                                                                        fbd56607bad20f79d7eb427001e11f0c04000c21b0293fb9ba5342f944ecc24a

                                                                                                                                        SHA512

                                                                                                                                        38d7835ccdb6c4ee7b6a365408cbbd824f97c1cfd22114c7f8737dfdc7cc684ea0a92d89223adc7634bbba116ae1ab2223ff0306bc3f7ebf41f53fbf9434f8e9

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER636F.tmp.csv

                                                                                                                                        Filesize

                                                                                                                                        36KB

                                                                                                                                        MD5

                                                                                                                                        69e36e211ba96d94ae5ef1c4c0372161

                                                                                                                                        SHA1

                                                                                                                                        3c1af992da657ffd1d3cf442396bc9795717ff1b

                                                                                                                                        SHA256

                                                                                                                                        7e5b16dedc54e3ba2fbafeb4b42488027a5340c389190a3b8dbbbf7011871bac

                                                                                                                                        SHA512

                                                                                                                                        600fd535d7163a9aeab4a24be08de91baa60644eb83c385fae2e7304a98b694be83e4e8514f2686bb212612de470564cdc4e53407c533abbca056b172bd37090

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER638F.tmp.txt

                                                                                                                                        Filesize

                                                                                                                                        13KB

                                                                                                                                        MD5

                                                                                                                                        b1717880759252d7bb305dce2ee233f8

                                                                                                                                        SHA1

                                                                                                                                        8f2cca33716cf99bfbb6ee2020cc0317ab7cd698

                                                                                                                                        SHA256

                                                                                                                                        1fafb353535e5c4f1df47e6c7ab5828bb36d3986f0eb9e1c7303942d87fc45ec

                                                                                                                                        SHA512

                                                                                                                                        2d03dd8e01f952b094d636cfc7fbf66194a249279ee2f592d878d833e45448f4860f05915cfefc9b693376ef51270c230c001958322088570d3c62a8c9d0989b

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER65D2.tmp.csv

                                                                                                                                        Filesize

                                                                                                                                        35KB

                                                                                                                                        MD5

                                                                                                                                        3a4b3e16c08c66786fe7eff846b87719

                                                                                                                                        SHA1

                                                                                                                                        55ce858613a6f6908867f0f1ed28a09bb11ea188

                                                                                                                                        SHA256

                                                                                                                                        0c110d183827a0176794883a3557b91b80d0b4901a66b299a9885b1049c5b40f

                                                                                                                                        SHA512

                                                                                                                                        b779d2f0fd62248de2c1b9645f48d1cc37fba4f86f4979534691d8d7d9665487d7b4446d2f9c22fda06550ce76dc963e30f0cb00d0a90eedfb9a8169dd94fc1d

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER6612.tmp.txt

                                                                                                                                        Filesize

                                                                                                                                        13KB

                                                                                                                                        MD5

                                                                                                                                        521f986197a32ea0fbf75212e9d16024

                                                                                                                                        SHA1

                                                                                                                                        8daa43cdc458aab7d1b7227c626588694590a689

                                                                                                                                        SHA256

                                                                                                                                        4f9bd8938046b6b4c250e9f15271457e985eb822aba92532d6556749077a3cd3

                                                                                                                                        SHA512

                                                                                                                                        f00079fd1f551776cdd6e4aa9210210a2bacc59c417e6a7d2a3471745b585a291ea44bbe2e2bbc4bcfadfb1487f56354180618d08e6a812a342379e6804532f9

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\kw0hwdcb.cf1.exe

                                                                                                                                        Filesize

                                                                                                                                        161KB

                                                                                                                                        MD5

                                                                                                                                        94f1ab3a068f83b32639579ec9c5d025

                                                                                                                                        SHA1

                                                                                                                                        38f3d5bc5de46feb8de093d11329766b8e2054ae

                                                                                                                                        SHA256

                                                                                                                                        879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0

                                                                                                                                        SHA512

                                                                                                                                        44d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c

                                                                                                                                      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

                                                                                                                                        Filesize

                                                                                                                                        3.3MB

                                                                                                                                        MD5

                                                                                                                                        94fafb9c5bad9356529fb599f4bf4260

                                                                                                                                        SHA1

                                                                                                                                        7bbcc6309c587db43d8fef972eefc4bf27c98de1

                                                                                                                                        SHA256

                                                                                                                                        6cf6ade8237b2c7d401b8aea07fedfa070f2d7fd7e34bde673632fe9250fa9a5

                                                                                                                                        SHA512

                                                                                                                                        55f7e92bc321e6dbf14594a273fcc5c9046f8e2ae13196fd9caed55acd0fc3be601c0e3eaa4f58e765e28e5cdccb7fa442e8f6c113779eb6cd7bbed67646f65d

                                                                                                                                      • memory/64-351-0x000001E5553D0000-0x000001E5553FB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/64-30-0x00007FFB0CA0D000-0x00007FFB0CA0E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/64-31-0x00007FFB0CA0F000-0x00007FFB0CA10000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/64-23-0x000001E5553D0000-0x000001E5553FB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/64-29-0x000001E5553D0000-0x000001E5553FB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/392-39-0x000001DF27570000-0x000001DF2759B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/392-48-0x000001DF27570000-0x000001DF2759B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/392-471-0x000001DF27570000-0x000001DF2759B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/392-40-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/436-469-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.0MB

                                                                                                                                      • memory/436-1-0x00000260F28F0000-0x00000260F2C44000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        3.3MB

                                                                                                                                      • memory/436-440-0x00007FFAEEA33000-0x00007FFAEEA35000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        8KB

                                                                                                                                      • memory/436-431-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.0MB

                                                                                                                                      • memory/436-430-0x00000260F54A0000-0x00000260F57C4000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        3.1MB

                                                                                                                                      • memory/436-2-0x00000260F48F0000-0x00000260F491C000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        176KB

                                                                                                                                      • memory/436-0-0x00007FFAEEA33000-0x00007FFAEEA35000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        8KB

                                                                                                                                      • memory/612-16-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/612-14-0x000001AD8A3C0000-0x000001AD8A3EB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/612-24-0x000001AD8A3C0000-0x000001AD8A3EB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/612-25-0x00007FFB0CA0D000-0x00007FFB0CA0E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/612-26-0x00007FFB0CA0F000-0x00007FFB0CA10000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/612-27-0x00007FFB0CA0C000-0x00007FFB0CA0D000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/612-13-0x000001AD8A390000-0x000001AD8A3B5000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        148KB

                                                                                                                                      • memory/676-28-0x000002CD32570000-0x000002CD3259B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/676-19-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/676-18-0x000002CD32570000-0x000002CD3259B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/948-33-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/948-35-0x000001C4CB2D0000-0x000001C4CB2FB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/948-32-0x000001C4CB2D0000-0x000001C4CB2FB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/948-470-0x000001C4CB2D0000-0x000001C4CB2FB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/1036-472-0x000001FD8EEC0000-0x000001FD8EEEB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/1036-49-0x000001FD8EEC0000-0x000001FD8EEEB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/1036-42-0x000001FD8EEC0000-0x000001FD8EEEB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/1036-43-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/1060-473-0x0000021853A90000-0x0000021853ABB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/1060-50-0x0000021853A90000-0x0000021853ABB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/1060-46-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/1060-45-0x0000021853A90000-0x0000021853ABB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/1068-54-0x0000019ADACD0000-0x0000019ADACFB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/1068-55-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/1184-57-0x000002ADC13B0000-0x000002ADC13DB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/1184-58-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/1216-61-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/1216-60-0x0000025E2B8A0000-0x0000025E2B8CB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/1296-66-0x0000016F8B360000-0x0000016F8B38B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/1296-67-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/1304-70-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/1304-69-0x000001F9E38F0000-0x000001F9E391B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/1404-72-0x000001B3ED090000-0x000001B3ED0BB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/1404-73-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/3208-12-0x00007FFB0BAE0000-0x00007FFB0BB9E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        760KB

                                                                                                                                      • memory/3208-11-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.0MB