Analysis

  • max time kernel
    198s
  • max time network
    199s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    03-12-2024 07:15

General

  • Target

    https://github.com/quasar/Quasar

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    5000

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

199.192.25.210:21

Mutex

7d6c0416-a881-4b4e-859f-ff988ade76eb

Attributes
  • encryption_key

    4DA5328BC59748C0B906052677CCA6168A1C734F

  • install_name

    Javaw.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Javaw.exe

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 7 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 63 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/quasar/Quasar
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffa607846f8,0x7ffa60784708,0x7ffa60784718
      2⤵
        PID:4956
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:2
        2⤵
          PID:2444
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2552
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:8
          2⤵
            PID:2352
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:1
            2⤵
              PID:2280
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:1
              2⤵
                PID:1644
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 /prefetch:8
                2⤵
                  PID:3792
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                  2⤵
                  • Drops file in Program Files directory
                  PID:4260
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff6f7625460,0x7ff6f7625470,0x7ff6f7625480
                    3⤵
                      PID:2868
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:968
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:1
                    2⤵
                      PID:2892
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:1
                      2⤵
                        PID:3196
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:1
                        2⤵
                          PID:3224
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:1
                          2⤵
                            PID:3380
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3508 /prefetch:8
                            2⤵
                              PID:4008
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:1
                              2⤵
                                PID:4700
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6444 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3492
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6644 /prefetch:1
                                2⤵
                                  PID:328
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6640 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3408
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:1
                                  2⤵
                                    PID:4432
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6692 /prefetch:1
                                    2⤵
                                      PID:4480
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6848 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:3524
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15896397352571495317,15448284808840817000,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4796 /prefetch:2
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:820
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:4988
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:3032
                                      • C:\Windows\System32\rundll32.exe
                                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                        1⤵
                                          PID:4496
                                        • C:\Program Files\7-Zip\7zG.exe
                                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap4774:62:7zEvent22682
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          PID:3176
                                        • C:\Program Files\7-Zip\7zG.exe
                                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap19387:84:7zEvent26423
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4152
                                        • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe
                                          "C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe"
                                          1⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Modifies registry class
                                          • Suspicious behavior: GetForegroundWindowSpam
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of SendNotifyMessage
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3924
                                          • C:\Windows\explorer.exe
                                            "C:\Windows\explorer.exe" /select, "C:\Users\Admin\Desktop\Quasar v1.4.1\quasar.p12"
                                            2⤵
                                              PID:4592
                                          • C:\Windows\explorer.exe
                                            C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                            1⤵
                                            • Modifies Internet Explorer settings
                                            • Modifies registry class
                                            • Suspicious behavior: AddClipboardFormatListener
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2744
                                          • C:\Users\Admin\Desktop\Client-built.exe
                                            "C:\Users\Admin\Desktop\Client-built.exe"
                                            1⤵
                                            • Executes dropped EXE
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1220
                                            • C:\Windows\SYSTEM32\schtasks.exe
                                              "schtasks" /create /tn "Javaw.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Javaw.exe" /rl HIGHEST /f
                                              2⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2396
                                            • C:\Users\Admin\AppData\Roaming\SubDir\Javaw.exe
                                              "C:\Users\Admin\AppData\Roaming\SubDir\Javaw.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2312
                                              • C:\Windows\SYSTEM32\schtasks.exe
                                                "schtasks" /create /tn "Javaw.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Javaw.exe" /rl HIGHEST /f
                                                3⤵
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2492
                                          • C:\Windows\system32\taskmgr.exe
                                            "C:\Windows\system32\taskmgr.exe" /0
                                            1⤵
                                            • Checks SCSI registry key(s)
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of SendNotifyMessage
                                            PID:560

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            ef84d117d16b3d679146d02ac6e0136b

                                            SHA1

                                            3f6cc16ca6706b43779e84d24da752207030ccb4

                                            SHA256

                                            5d1f5e30dc4c664d08505498eda2cf0cf5eb93a234f0d9b24170b77ccad57000

                                            SHA512

                                            9f1a197dccbc2dcf64d28bebe07247df1a7a90e273474f80b4abd448c6427415bace98e829d40bccf2311de2723c3d1ad690a1cfdcf2e891b527344a9a2599d8

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            39191fa5187428284a12dd49cca7e9b9

                                            SHA1

                                            36942ceec06927950e7d19d65dcc6fe31f0834f5

                                            SHA256

                                            60bae7be70eb567baf3aaa0f196b5c577e353a6cabef9c0a87711424a6089671

                                            SHA512

                                            a0d4e5580990ab6efe5f80410ad378c40b53191a2f36a5217f236b8aac49a4d2abf87f751159e3f789eaa00ad7e33bcc2efebc658cd1a4bcccfd187a7205bdbc

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\93a2ecc3-db6e-45cd-96b0-3616164cca01.tmp

                                            Filesize

                                            70KB

                                            MD5

                                            e5e3377341056643b0494b6842c0b544

                                            SHA1

                                            d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                            SHA256

                                            e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                            SHA512

                                            83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                            Filesize

                                            48B

                                            MD5

                                            1006eae885dc9574548c7a7f14e00004

                                            SHA1

                                            1072ce2fe0fa260b7f6e5f979d4cb05c956d6d3f

                                            SHA256

                                            50509f085f4601c4985b78541146869728fee1ce007146df5187a094cfbedeee

                                            SHA512

                                            b362f986de264b1ec701fce65a0133a6fb07ddff271e8ce91ac333e3bda003782f02bab3be108c4b2790c872cc8cac1bf0344a16f296527b022df56b19b69d3b

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                            Filesize

                                            1KB

                                            MD5

                                            eeaa87a3aae983bfc68fdacf80e435de

                                            SHA1

                                            f40fb6d718c3f9c1d6985dae0fa8910f0013ccb1

                                            SHA256

                                            a21740b7ca3aba4c9ef0f46a4a102bdd4f4f85db58cb521a53b7d195f5c0c6b6

                                            SHA512

                                            284153fddf08b15c77636fe06732fb739f12e57b74494b9a87b1f7a397e019eb9827e05af7e2ff74dbf617a55054f5bbc7452c9a601ca0edc825aba9cab0b028

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                            Filesize

                                            1KB

                                            MD5

                                            44a146e71b9c2353fe23352312ad6758

                                            SHA1

                                            e1b97bfeabf748134e59e1a10201a34c830cf61b

                                            SHA256

                                            cde6ea835465651af62beef7fc1bb2852d92d02a55aa9fbfe705051b777a2981

                                            SHA512

                                            6cbdac9e27b09e71121c660d3d204afbad1421c3aa4cfa6c106772e60e5023411dda4426cffeb95a681c04bc9565f84edd887e9721062c81cc4b804d7d266d57

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            46295cac801e5d4857d09837238a6394

                                            SHA1

                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                            SHA256

                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                            SHA512

                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                            Filesize

                                            580B

                                            MD5

                                            e862a6ebc1dc7eec5ce1d3d743936229

                                            SHA1

                                            22ad1f14f9dcc31b0e6f9c8bf3edbd586a5ba480

                                            SHA256

                                            635c51ab580fc939751257df28c8b1a6f91e1b5c81bbdc2266ebf83f4b1bf74e

                                            SHA512

                                            a93303cd8735cecfc14e53ccb43a774afaf91c566617035de9b798f7ac0f132c62d8df4e0e97e84cbb010f60e1ecc9a3d77c4c9a5b5acf7555630b94d785923b

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe58ba04.TMP

                                            Filesize

                                            59B

                                            MD5

                                            2800881c775077e1c4b6e06bf4676de4

                                            SHA1

                                            2873631068c8b3b9495638c865915be822442c8b

                                            SHA256

                                            226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                            SHA512

                                            e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            5287daf9a1fe467eff91aea2b851e69e

                                            SHA1

                                            d9995e777850c06a07412ee3b452ce2cf24bd75f

                                            SHA256

                                            07e0dd35a03b5a79f3ec80095ed98ee4896e73552eed2c5cffdb186ebd88ce47

                                            SHA512

                                            0769172786d4954578a2c64c45d1c9fe90669b926c407c55abc4cf75567ff311ef45f68bfae7a9903eeda305e7f9e1c3bdf94c90b5ad32889dd7c1d50982dc7c

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            2ed87abd76785b623c902cdaf33928cc

                                            SHA1

                                            af034cca095747ac39bb6a98a50a72911bbadd03

                                            SHA256

                                            6ce0ee4ecc165b9a093f35e68dc0d82b5670f5ba053fa521cbde9f04a7d92438

                                            SHA512

                                            85f6a77b72c377f1f7a1cc4c1d96e9a2bbd14b447d55e97889da19bb2f5338d946cc985316eeab1c715fd1ea5b6921f15543958158f091beeea238de6614745b

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            7815b6f3e2652f674574a5a1c81bb0f6

                                            SHA1

                                            1adcf7ecb5e1ab8a52d5b346580a044880e0cef3

                                            SHA256

                                            5f2b16a8119ed6720efa502d7e47ca59829cf5d28cba0e581108a0c21199299d

                                            SHA512

                                            d3e7bc62ced2658e68dd074fad61c09d8ad2a32e5b2496838511e75ef076995f4656d604ddf7d988accce50f5ff0a4b20ce1eec13b70ecd2e8d4c149bb5933fe

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            bf6bf21d330f4e661d48aa3fc3667e1a

                                            SHA1

                                            81af5ba8487b00ac186577036d87cf5063f2675e

                                            SHA256

                                            3e83fccc9406bf4e07aa353278b9a3b81374f343ddb9c5c7d26a9583be4b7182

                                            SHA512

                                            7abbba7a169df0fe912532adf8a896b199bbd2550326a8fb5233deb187994474f04033acee26ed9d9d916311a05553b25917b2da32eef203a7ee8395a00e203c

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            83456a488e4fda8db9e7287cdc56b211

                                            SHA1

                                            26d17379e4b5b3f7368682091fc5db6e22e23dec

                                            SHA256

                                            e0f7e79bc9b38931e3a842c87cfb8125cd06fda2306c9b909435d0ec424e7da9

                                            SHA512

                                            f64b6614c1c5a04629087f3c78eb22b5c506222a5266c6b3c4e33a35f5365af33411fdca71021121494ca04f30b10290938c3f9df74482fe48dad900c9c36f19

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            937dea860ecadd7a532c06e6a5113a0e

                                            SHA1

                                            c42b8b90323f26ae0d2c641ca00d899e3020f6b3

                                            SHA256

                                            f243dad6164344dc8820f00c9fbced308d8d6a856ef3fdf4f3f2a6d88f553867

                                            SHA512

                                            d3d90ff23f917ae45e5fd54caefb5831b925a93150665e2a66dd6b76b9ccbf2aef1d1325d6f3a04db2aa03cac359625f41768be7ccc94efc6f63d4b5e0d6cade

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                            Filesize

                                            24KB

                                            MD5

                                            0e98d1679e15688ad133f11eee8458ee

                                            SHA1

                                            a4b1a83f0a3f2867954d3146d95d314441950606

                                            SHA256

                                            8aa7eaf918f2969424996a8f3575478006d9d74b308a750f996fe4f5f045554e

                                            SHA512

                                            eb34d52a8df4992444000a93c8d0d11254069b5f43a68a6def21061be03a538f36c42b2e968a8637f12b93235de3140002b0212aa2cdebe0950fd115c04bc72f

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                            Filesize

                                            24KB

                                            MD5

                                            60d82bd601d64fd00bb0373f5ecd65b8

                                            SHA1

                                            0e8bde426270dfa3ea285c2c5b7282ab37771d4c

                                            SHA256

                                            bdec91a5061c6a400ef33c2dca5b1d0c16c1fe9e464f8ec99a72442b752e6a97

                                            SHA512

                                            5ea1b33784438acd246c02c95716f72c78293bc8d8e8e6d71aeaab370ae9fc2063ba8ffa443bbfc26c96e45a95549b62894b846a459c986531b34a110d0be38d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            00dc3fae50bba72c1b4588b7e5acdb94

                                            SHA1

                                            0eb5e5648cceefcf8b026b7b0ae919def8c6b024

                                            SHA256

                                            3df05fe324cf6ab0b704ca6f6d9a2b4a9fca407b8a5221455c4a702d6a03b61f

                                            SHA512

                                            71c15d2b47cef59de73c3a9a67fe0bde55c61283e208f159ef65c491031796e4fb04c6895a852e71fe4fcd8021e9905e09b788f2520b00703c58eb34349ace17

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            1d769003e15ae23f6c89a3cbdc947420

                                            SHA1

                                            6b0bb88214c09f2eacdb26fd8b4328ca92779f37

                                            SHA256

                                            ec6ec42d37de21a9f6bf65db70116d3d88c8cb211cf7f26d5ca9ea646fd9140a

                                            SHA512

                                            1b6b0b0ae5f405ce585a04a3213e6a5ef6d5ac4253494225e3fbbe644058523003539b8fef4e1d62f8ad990b42b46e785f1bb6c1b2ef4fbd18314669693df77e

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            c8c0d1613de56bd564be784793d4a29d

                                            SHA1

                                            97f9d88316825e19ad1c26bc95f200fcba1270c0

                                            SHA256

                                            7413580bae6cc1b3ba8f9c3fd69a228f62b589b5a340ea5ad2bdae915315b54a

                                            SHA512

                                            879c0de991541f3ddd1580cb52d399c3f6318ec9535b0bb0d8514e21233da08ab5b7cbd27b0c38fe504455079dfd0cbc52708b158734d4777c26e7d29afeb7fa

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57fe36.TMP

                                            Filesize

                                            1KB

                                            MD5

                                            6418161d8f15ffd2114ab31e717ef783

                                            SHA1

                                            08941babba657c6dc3fd394b10766ab5ecad892f

                                            SHA256

                                            e2591b34a03433f59346c4703439329da258807c4778f951508f644c13d97f9f

                                            SHA512

                                            d525ac0c5eb7c3d110f6e1a9a4980bf707e83929f928bd57d5c92ca123d0bb2b106f29185991b4c7cd0f1396fc71f6f929e6135214cbff3a0e1ad355cd02842c

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            206702161f94c5cd39fadd03f4014d98

                                            SHA1

                                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                            SHA256

                                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                            SHA512

                                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001

                                            Filesize

                                            41B

                                            MD5

                                            5af87dfd673ba2115e2fcf5cfdb727ab

                                            SHA1

                                            d5b5bbf396dc291274584ef71f444f420b6056f1

                                            SHA256

                                            f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                            SHA512

                                            de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            11KB

                                            MD5

                                            ddea83d013ea1dd1c2d7d2dba338bcb3

                                            SHA1

                                            c38fab1cfaa69cc662cc1d3487932a4848f79302

                                            SHA256

                                            37db508fde1fbffef7ad08d079dca11a4b3fb43602a9b3e22e5ebab41671b58f

                                            SHA512

                                            17c719f5838c4ce9c1f0f0f9dd0892fd579fda453e73a972d0b93daa91bbbd74a2db5186d3011ddff2c84a8f8484e1baeea8b3e815002d09fbb4c0ef5b96b6a1

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            11KB

                                            MD5

                                            5cf7d50c21c32b601025a4a64f362b1b

                                            SHA1

                                            d2283365d9a7f02fec573ded9e222aaddb0706b6

                                            SHA256

                                            34bd82acd26b3bcacd1ccf9c90995dafa89e12cb878e58bf894b1df8693bd454

                                            SHA512

                                            3532e5b38eebaecd8b7427d9f6b3b012a95a71831a7e0035aa6538afdc7a3e8fa4c327600c1f99ef0e6af7210f6d4851fd36b909d91deb5a96632512b9016e67

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            8KB

                                            MD5

                                            5666c5efa11f21890da493c611a05591

                                            SHA1

                                            804590a1f3e3fae52bac9b19b36f91c25050f0a0

                                            SHA256

                                            0dcd2d82cd2ac66e2b582472a3f1af80c1f4454cca0cd6aafc5197fad69593d8

                                            SHA512

                                            d2506a042188e21f73a47711cc9f4863bff481f0ddae27372a764a3a169acd1a5fd1efe9220361092b159edd8dc9ab418ab1813e89827553fb1e272389e49a79

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            e94a0b212d61ae83bb6afbf465e67d97

                                            SHA1

                                            6683572609eaf4653a29e9141bb42d17c22efebc

                                            SHA256

                                            085b88d6a8322e830aa0f08d8feca1af556854ab34f2ad7ce4a2fc3c16ae24c9

                                            SHA512

                                            12d6124de9a1ec5b944551fe9521551d1582f3ed24802bbab506adab7e6467903889d0bbffc3c3fc8170b08f35f32dd41b4db7fec7b027a4b6869a3589954f17

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                            Filesize

                                            3KB

                                            MD5

                                            4117c76d0262c1967e239b09d7f8b236

                                            SHA1

                                            dca33b5a2d664cfadf78e8f32d82ff69e1925bb2

                                            SHA256

                                            c96619039d680f3940a0fb26ea659c88f1ff8b2e7fa1f293d072b9eff5b3b8ef

                                            SHA512

                                            fdcdab178b226ea7e3fb3d07516a123c40599abb84f0d79ffd253448745348cdbfb4171524ee2e5bc88d44e9ccefa339584256c8c951e221e46d00b84ea5813d

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                            Filesize

                                            3KB

                                            MD5

                                            5c1def5ab7d38f1d947ff00e02ff02dd

                                            SHA1

                                            d48b19063ea918f02203cf7e9182adfe0e4aa4d6

                                            SHA256

                                            d6fe1486eefa475a6329accb97bb0fbde21170d73bf833df287586f63abbffde

                                            SHA512

                                            cc50e8d351fb403ba0ff2fe11a671639f0586bd00d358e5459897856db60190c4595ea962eac0c64985b5c259941cd1996f97687249c92aa0ff4e9657e7bd0f2

                                          • C:\Users\Admin\Desktop\Client-built.exe

                                            Filesize

                                            3.1MB

                                            MD5

                                            5eec7e9935486c0ddf4c4aef234a1cb7

                                            SHA1

                                            2aabe8ab8ce1c8053837ed55d33776551cc18212

                                            SHA256

                                            f86aad9582f0a4162d1401fb312a4de84250b640f8d333b65f7558f7f57f7571

                                            SHA512

                                            b07af5568a5d5edd4c9b8c6303d1d4f49a11d299a165a1ab6ff6440128f451a5ca61e72b2ac011f205473f7ab82e27b6f44df96a49f23b6da082b8af0c7e2183

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\BouncyCastle.Crypto.dll

                                            Filesize

                                            3.2MB

                                            MD5

                                            0cf454b6ed4d9e46bc40306421e4b800

                                            SHA1

                                            9611aa929d35cbd86b87e40b628f60d5177d2411

                                            SHA256

                                            e51721dc0647f4838b1abc592bd95fd8cb924716e8a64f83d4b947821fa1fa42

                                            SHA512

                                            85262f1bc67a89911640f59a759b476b30ca644bd1a1d9cd3213cc8aae16d7cc6ea689815f19b146db1d26f7a75772ceb48e71e27940e3686a83eb2cf7e46048

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Mono.Cecil.dll

                                            Filesize

                                            350KB

                                            MD5

                                            de69bb29d6a9dfb615a90df3580d63b1

                                            SHA1

                                            74446b4dcc146ce61e5216bf7efac186adf7849b

                                            SHA256

                                            f66f97866433e688acc3e4cd1e6ef14505f81df6b26dd6215e376767f6f954bc

                                            SHA512

                                            6e96a510966a4acbca900773d4409720b0771fede37f24431bf0d8b9c611eaa152ba05ee588bb17f796d7b8caaccc10534e7cc1c907c28ddfa54ac4ce3952015

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Open.Nat.dll

                                            Filesize

                                            68KB

                                            MD5

                                            cc6f6503d29a99f37b73bfd881de8ae0

                                            SHA1

                                            92d3334898dbb718408f1f134fe2914ef666ce46

                                            SHA256

                                            0b1e0d8f87f557b52315d98c1f4727e539f5120d20b4ca9edba548983213fbb5

                                            SHA512

                                            7f4c0a35b612b864ad9bc6a46370801ed7433424791622bf77bf47d6a776cb6a49e4977b34725ead5d0feaa1c9516db2ca75cb8872c77a8f2fab6c37740b681f

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Profiles\Default.xml

                                            Filesize

                                            106B

                                            MD5

                                            dd0e14460acff70fc8f214fab5e0c579

                                            SHA1

                                            5b282c371a7ea54851af0899b5452a4007a48e21

                                            SHA256

                                            1c3ec1263782c53ac3e082d2f9163c0df9d50f9a1302e41776645697b746b839

                                            SHA512

                                            12b7519a365951d6571e62caed7b328ba6675fb62d44f39b5e680f885efeee3e55dde3cad17cb6b09425f22fd7a0535c899d907a4628691595b5e9dbd6734c0d

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Profiles\Default.xml

                                            Filesize

                                            1008B

                                            MD5

                                            569567236db22b01d0f48f580167abef

                                            SHA1

                                            6096a4b52708d5865393bc52114fdde3b56cbe0e

                                            SHA256

                                            cba4bad1dff1e560d891e4b60a1b69411165fd28fd3c37237a53a92175ebd53f

                                            SHA512

                                            e3121e414aa4dd116adf204d1e9b3f66e350052283e309013843d656c4ae6d8bd614f3e6168e6cb1dedfaca6bb2db0d5ba54df028214d87801139bbf9cdf88ea

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.Common.dll

                                            Filesize

                                            62KB

                                            MD5

                                            2185564051ea2e046d9f711ed3cd93ff

                                            SHA1

                                            2f2d7fd470da6d126582ad80df2802aabd6c9cea

                                            SHA256

                                            de930a748e4dc08c851ba0a22afce8dcfd0f15f23b291f9306c8ef6ccd7460a2

                                            SHA512

                                            00af241c1f89b478e66d758db26ed0a413b690d695abf91211b5cbc3985133632327ea0fc41140bd61d02271b6aa278a8e8f539d8ca6ce94972aef50c1a9c868

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe

                                            Filesize

                                            1.2MB

                                            MD5

                                            12ebf922aa80d13f8887e4c8c5e7be83

                                            SHA1

                                            7f87a80513e13efd45175e8f2511c2cd17ff51e8

                                            SHA256

                                            43315abb9c8be9a39782bd8694a7ea9f16a867500dc804454d04b8bf2c15c51e

                                            SHA512

                                            fda5071e15cf077d202b08db741bbfb3dbd815acc41deec7b7d44e055cac408e2f2de7233f8f9c5c618afd00ffc2fc4c6e8352cbdf18f9aab55d980dcb58a275

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe.config

                                            Filesize

                                            176B

                                            MD5

                                            c8cd50e8472b71736e6543f5176a0c12

                                            SHA1

                                            0bd6549820de5a07ac034777b3de60021121405e

                                            SHA256

                                            b44739eeff82db2b575a45b668893e2fe8fdd24a709cbf0554732fd3520b2190

                                            SHA512

                                            6e8f77fcca5968788cc9f73c9543ce9ab7b416372bc681093aa8a3aad43af1f06c56fcbc296c7897a3654b86a6f9d0e8b0fe036677cf290957924377bc177d9f

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Vestris.ResourceLib.dll

                                            Filesize

                                            76KB

                                            MD5

                                            944ce5123c94c66a50376e7b37e3a6a6

                                            SHA1

                                            a1936ac79c987a5ba47ca3d023f740401f73529b

                                            SHA256

                                            7da3f0e77c4dddc82df7c16c8c781fade599b7c91e3d32eefbce215b8f06b12a

                                            SHA512

                                            4c034ff51cc01567f3cb0796575528ca44623b864eb606266bcf955a9259ed26b20bec0086d79038158d3a5af2ada0a90f59d7c6aae9e545294fe77825dbe08b

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\client.bin

                                            Filesize

                                            3.1MB

                                            MD5

                                            f4d16cfe4cad388255e43f258329f805

                                            SHA1

                                            fe7cc6c9eb76b5ad97867b46d053fae601fd4a2d

                                            SHA256

                                            8fb6ae3496d4ac025eab443d3e322b0faa3461d25b54093c9205d35746e3250e

                                            SHA512

                                            867045eac0f7765e6bea51e62bc4ed68b1e81ce6c2843d2e08714eb391a8ac94c2571c09828286252248400ea5c12bffa50a25c8ec5ad9e6d0bb836320ec188f

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\protobuf-net.dll

                                            Filesize

                                            282KB

                                            MD5

                                            abc82ae4f579a0bbfa2a93db1486eb38

                                            SHA1

                                            faa645b92e3de7037c23e99dd2101ef3da5756e5

                                            SHA256

                                            ca6608346291ec82ee4acf8017c90e72db2ee7598015f695120c328d25319ec6

                                            SHA512

                                            e06ee564fdd3fe2e26b0dec744a969a94e4b63a2e37692a7dcc244cb7949b584d895e9d3766ea52c9fe72b7a31dacf4551f86ea0d7c987b80903ff43be9faed3

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\quasar.p12

                                            Filesize

                                            4KB

                                            MD5

                                            33d01def570530e63e2c41583e199442

                                            SHA1

                                            7292c743c1780e3e32d64f84152517ca50c30b70

                                            SHA256

                                            c7fdbde84529404ce7261fbca0b1d401781d6e641affcbb3498bc128d69f4528

                                            SHA512

                                            7aa6d2125eb487fcb8ff51e857c5d31d4df9fce9328fe0357563f6e6e598f3a55ceb0e43b574eb11cc6aa3a60ba8f211bb88370664874bbfea8b5d846687e03a

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\settings.xml

                                            Filesize

                                            373B

                                            MD5

                                            b6af1da05c1a00991f04f8b898cea532

                                            SHA1

                                            24c48b062d8d864eefd32f2d84a36e1a7282e911

                                            SHA256

                                            f2ef0d8f29904a65ce6dbe29baf9379fb4659afb6930a5af5d9fb88f73b73f41

                                            SHA512

                                            2ab2de469911c3fee5b9bbfdbb373e5eb15023bf25b9e1835ebbf5890c66cfd7a06d7d5911e2fb630afadf9b30489e589634cefe52ca4c4156ae24b24c00c8aa

                                          • C:\Users\Admin\Desktop\Quasar.v1.4.1.zip

                                            Filesize

                                            3.3MB

                                            MD5

                                            13aa4bf4f5ed1ac503c69470b1ede5c1

                                            SHA1

                                            c0b7dadff8ac37f6d9fd00ae7f375e12812bfc00

                                            SHA256

                                            4cdeb2eae1cec1ab07077142313c524e9cf360cdec63497538c4405c2d8ded62

                                            SHA512

                                            767b03e4e0c2a97cb0282b523bcad734f0c6d226cd1e856f6861e6ae83401d0d30946ad219c8c5de3c90028a0141d3dc0111c85e0a0952156cf09e189709fa7d

                                          • C:\Users\Admin\Desktop\v1.4.1

                                            Filesize

                                            179KB

                                            MD5

                                            f6c20b75c107bd659b2a66dabe6bb48f

                                            SHA1

                                            8a7afa8e2b680713e7032fd1f926c65b802a679b

                                            SHA256

                                            7e434e1619a958752f6e174b1f9348d05a383885681a0238eb0932df1a0d3424

                                            SHA512

                                            57cbe99e55f6e5aa6a7980a0580be7dca3303d206dde0e49df238ab21d8cf920b2f06edd566b043853c8113637237d7416d4bf27074a43e1dca6afc38700fcd0

                                          • \??\pipe\LOCAL\crashpad_3012_TQZDVBUCANPPEATZ

                                            MD5

                                            d41d8cd98f00b204e9800998ecf8427e

                                            SHA1

                                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                                            SHA256

                                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                            SHA512

                                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                          • memory/560-831-0x000001326CE20000-0x000001326CE21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/560-830-0x000001326CE20000-0x000001326CE21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/560-837-0x000001326CE20000-0x000001326CE21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/560-838-0x000001326CE20000-0x000001326CE21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/560-839-0x000001326CE20000-0x000001326CE21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/560-840-0x000001326CE20000-0x000001326CE21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/560-841-0x000001326CE20000-0x000001326CE21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/560-842-0x000001326CE20000-0x000001326CE21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/560-836-0x000001326CE20000-0x000001326CE21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/560-832-0x000001326CE20000-0x000001326CE21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1220-827-0x0000000000DD0000-0x00000000010F4000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2744-730-0x0000000006330000-0x000000000671C000-memory.dmp

                                            Filesize

                                            3.9MB

                                          • memory/2744-771-0x0000000006330000-0x000000000671C000-memory.dmp

                                            Filesize

                                            3.9MB

                                          • memory/3924-703-0x00000267FCB10000-0x00000267FCB28000-memory.dmp

                                            Filesize

                                            96KB

                                          • memory/3924-680-0x00000267FE170000-0x00000267FE49E000-memory.dmp

                                            Filesize

                                            3.2MB

                                          • memory/3924-678-0x00000267E4280000-0x00000267E4296000-memory.dmp

                                            Filesize

                                            88KB

                                          • memory/3924-704-0x00000267FD7D0000-0x00000267FD820000-memory.dmp

                                            Filesize

                                            320KB

                                          • memory/3924-747-0x00000267FDFC0000-0x00000267FE01E000-memory.dmp

                                            Filesize

                                            376KB

                                          • memory/3924-705-0x00000267FDF00000-0x00000267FDFB2000-memory.dmp

                                            Filesize

                                            712KB

                                          • memory/3924-749-0x00000267FD780000-0x00000267FD79A000-memory.dmp

                                            Filesize

                                            104KB

                                          • memory/3924-707-0x00000267FDE40000-0x00000267FDE8C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/3924-676-0x00000267E25A0000-0x00000267E26D8000-memory.dmp

                                            Filesize

                                            1.2MB