Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 13:19

General

  • Target

    .exe

  • Size

    3.7MB

  • MD5

    a6be8a62c7f7d595db6ac9dc6e93da02

  • SHA1

    5f2e5d543b91a01055ab1263611c9df49e2a5e45

  • SHA256

    4fa2387a8a7d3c19888b5a07b5897f344be8e4364d5f5130f257715ad2a97fca

  • SHA512

    e6abac83f4e29cd344d22bde4a0835917c0e6636888f17394dca4ac7632f79cbc66ed25d800cb58aea46009a5d26cab847efd864a87972cb42512f1cc43cb7dc

  • SSDEEP

    98304:fcEeb0vNmYtGKMlmlywp5zE4LMXNoyhEqf+swZc8XRn:EEeb0vvAKMlmgwp244dphW9ZxRn

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

9-12

C2

crostech.ru:4782

Mutex

0676955f-264f-4ab3-b171-6c6abc3ad662

Attributes
  • encryption_key

    DD459BB92A43EF8EEB2FE401C8453F685AECE590

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3392
      • C:\Users\Admin\AppData\Local\Temp\.exe
        "C:\Users\Admin\AppData\Local\Temp\.exe"
        2⤵
        • Checks computer location settings
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4504
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy Clear Clear.cmd && Clear.cmd
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1188
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2640
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa opssvc"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3864
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4356
          • C:\Windows\SysWOW64\findstr.exe
            findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1644
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 638390
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1116
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "fightcountedsummermiccoursesreviewalignmentprobe" Disputes
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3632
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Live + ..\Tales + ..\Wrestling + ..\Probe + ..\Maiden + ..\Becomes + ..\Revolution + ..\Solved + ..\Jesus + ..\Occasional + ..\Aluminum + ..\Cited + ..\Shades + ..\Increased + ..\Constitutional + ..\Camel + ..\Margaret + ..\Diana + ..\Similarly + ..\Attachment + ..\Curves + ..\Beginners + ..\Meaning + ..\Searchcom + ..\Counties + ..\Hammer + ..\Relevance + ..\Arg + ..\Hydraulic + ..\Prot + ..\Router + ..\Photographic + ..\Water + ..\Caution + ..\Plants + ..\Market + ..\Worlds + ..\Countries + ..\Tool U
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3024
          • C:\Users\Admin\AppData\Local\Temp\638390\Interviews.com
            Interviews.com U
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2612
            • C:\Users\Admin\AppData\Local\Temp\638390\RegAsm.exe
              C:\Users\Admin\AppData\Local\Temp\638390\RegAsm.exe
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3536
              • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Долговая нагрузка.docx" /o ""
                6⤵
                • Checks processor information in registry
                • Enumerates system info in registry
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious use of SetWindowsHookEx
                PID:2660
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4540
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks.exe /create /tn "Aluminium" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SecureInno Technologies Co\InnoSecureX.js'" /sc minute /mo 5 /F
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3284
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /create /tn "Aluminium" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SecureInno Technologies Co\InnoSecureX.js'" /sc minute /mo 5 /F
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4676
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InnoSecureX.url" & echo URL="C:\Users\Admin\AppData\Local\SecureInno Technologies Co\InnoSecureX.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InnoSecureX.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:4856

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\638390\Interviews.com

      Filesize

      925KB

      MD5

      62d09f076e6e0240548c2f837536a46a

      SHA1

      26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

      SHA256

      1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

      SHA512

      32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

    • C:\Users\Admin\AppData\Local\Temp\638390\RegAsm.exe

      Filesize

      63KB

      MD5

      0d5df43af2916f47d00c1573797c1a13

      SHA1

      230ab5559e806574d26b4c20847c368ed55483b0

      SHA256

      c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc

      SHA512

      f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2

    • C:\Users\Admin\AppData\Local\Temp\638390\U

      Filesize

      3.0MB

      MD5

      92ac4d8efe5ff6d10ac053a3955555c7

      SHA1

      5a5d65e344073a966e0dabddc16db938a74e5fa6

      SHA256

      fc9fc9db62b8d1c8f6da25b014beb6fc071557279099d4adef49b0a9d932cdb8

      SHA512

      a39dd297c0e6e87c1cde37c5f83bedc35f48914af2f2558e15af1df1c8025a2df2f74d217de00c8655acc3a639652f22131a268f8f30aacb2c31fae0e4b45c1d

    • C:\Users\Admin\AppData\Local\Temp\Aluminum

      Filesize

      61KB

      MD5

      6f5acf712a1528ad0dcdd0cbade5e5c7

      SHA1

      75090bdec7ea922e28c12c2c970e377825665e08

      SHA256

      ff51e8a646bef60564629ef664427e04a61d370eda9626a29be070edae6d984a

      SHA512

      93ddb05d08122c05d199cef982d7a0582aa1b98f7fb1b57ff8355969d4fb4d67d74cac62686b8cafbfc7805b3d67cd2d8fe2f6259d986690d404e7a86a2cb5aa

    • C:\Users\Admin\AppData\Local\Temp\Arg

      Filesize

      54KB

      MD5

      eb7e83e02141e9812c2cd7debd28721e

      SHA1

      37d8961de0b461bbd433535e890baff36765c4e7

      SHA256

      dd7aff07ec19ba54af445f34d64cda8b916edc8d4d7e15f799cd1168b62526db

      SHA512

      ca78c14c5d075553aff6fca716e0f3fc9566b61cdf84fcf1c7fa1bf6a38651c7bb9f38b68c84dcccc766be0a13ebc2a323fb2925eb588014a2315d68b4d8e32b

    • C:\Users\Admin\AppData\Local\Temp\Attachment

      Filesize

      96KB

      MD5

      71032e9322962b5f8b06c304b3c8e9a4

      SHA1

      dcd087ea105365ebe3a526c661f747cab9e975f6

      SHA256

      22169d62da288e3d232e8ef6111d2f96c41b9dbf1db92518edaeb16a57809673

      SHA512

      7f874d336eff527c625627951aa0bb67abb2516231e8ec24a36e2400c736fad1ea22ffa3b211e23efdac982ab5ea89619e5577d08ff8c694bea04c12dbdd4793

    • C:\Users\Admin\AppData\Local\Temp\Awesome

      Filesize

      108KB

      MD5

      04004ea6d57f002898b42a39518eaa2c

      SHA1

      29736c48e76ddc160f96be81c48d268b9d7bcef8

      SHA256

      f337e6b745f20d333df0c78efe71cb6d5c5e180f6e4f2111b28c8d0e6c6db75a

      SHA512

      749fff1f121bae3b59fdf4224d9a86d87119af3f3bb6eedd070ea786604672a4cdcde515378ff7487f00c5059c16d7d6c9f3e4b680d63d139ebb51e663e9dc48

    • C:\Users\Admin\AppData\Local\Temp\Becomes

      Filesize

      71KB

      MD5

      4c31648fa2bc40ebf69d4c41c380feff

      SHA1

      add7ddf05a7badffc2953e81f0b57731510d8f1b

      SHA256

      3f517210b9ec4e9dd4d532bd5cdc77e50ae7ea608421eff61dab96bc46a6d4b7

      SHA512

      116934d287b0e72e4a904d346435d3ecf32b0542112500bcfaf723f02ac5f9b1de3bf4f62c04a871b88c54f18ec4f69fe352fa090b0db4a6156ff3c7888c2f66

    • C:\Users\Admin\AppData\Local\Temp\Beginners

      Filesize

      91KB

      MD5

      c2f6b2dccca2b1de7541a33692ee4b14

      SHA1

      914ac59b498fb1e09a6f548b03ac3d2b113ea847

      SHA256

      8e2694d40b39e36acf91382421395fbb138017a01de35fbea7473aa7e9940c89

      SHA512

      9d5fba82be2a127b3eb95cdbc27a95de9d47fe9c74c5a50df03390eb3dfb68896e53732fab57db24e2b10a1d5e9075c8e7e670375285a322628ac49353d02be0

    • C:\Users\Admin\AppData\Local\Temp\Camel

      Filesize

      74KB

      MD5

      e9b3cce3183551fbe0ff715b5d59c4f7

      SHA1

      f351d8eff92116327104d7ac813bb96a20440c6b

      SHA256

      4058ce58ba9a07f8f491a2107674e4c9279862a4b5478b801f600c0797ca9e30

      SHA512

      dda0bdf75b9953e0f058b70cde91b26dafbd460d165aa162593bd806a7e09d8db97a292d72c5b5b16f850612aa740e9510094fd1366e7a48f93bb8613fc59de9

    • C:\Users\Admin\AppData\Local\Temp\Caution

      Filesize

      78KB

      MD5

      af4f6272fa527d385ed9d323072d72cc

      SHA1

      7a9f72cf963129b59050b668585424dfd6deac51

      SHA256

      6de56a813a5f583805c2d952fae587285ee092871eab69759925317800970ad7

      SHA512

      cbb41afc90b54dda81246b26978d70be940142db79b82645a02655af4141d87e0f9e04a73eae4b12cf099f0d2e9563733b3d6ecf6bec672dc991d5a8f4d9d0c1

    • C:\Users\Admin\AppData\Local\Temp\Cited

      Filesize

      62KB

      MD5

      c50c313e91c2240152870a807f317c36

      SHA1

      c6bafd394983c1d6b7a8b17ee20170dd0ad538e0

      SHA256

      45e2af9030e80b1500258814dd260b110d54e5a983e3cdbb1d2e02a54a214169

      SHA512

      5cf858675fddedbf01f5a1d8ed548350e433c886fb7888b4a5f846f37484acbe461be7957a481cb9247eb8061278c0adfceb3131170ac7b706f9c6ef4f9b6668

    • C:\Users\Admin\AppData\Local\Temp\Clear

      Filesize

      33KB

      MD5

      186213091bab1bcaa1e01a594553ee57

      SHA1

      e602c4ae7690b3f8ef59754a91cb2b524cb118f0

      SHA256

      6465bb2daaa40ace47c20fb2039f509c00a2329ae944960cc8dc782236555e3e

      SHA512

      a6dab388693a8ea76f76397b53b13e1c234cdc643761f52629cbd27f1e6a8bf781ff81f4d6e79714c31910fa32a41fac5fd7769aca823f75375a6c4e741233ef

    • C:\Users\Admin\AppData\Local\Temp\Constitutional

      Filesize

      50KB

      MD5

      841b390c0a2c4d0908124f5854dbd8f6

      SHA1

      98e069e3e191a2e209874bb85d4a09c4056d1bb8

      SHA256

      26d123b0e76feac09051fa8a7b81d1b05957419c04e6b971ea53dc39ce724f3f

      SHA512

      66043751227420eaec82076407a74e5177e8dc448071ad5f027051023bfa9072134d1f3f2c49c7116c6a1b77da57a2e56ae52cd91ed3290936e160f6eec30c48

    • C:\Users\Admin\AppData\Local\Temp\Counties

      Filesize

      90KB

      MD5

      3a49e4782c6785a6c0a23260a4167a01

      SHA1

      1bd056b03ebffcf4bea5104f058f543270ad4831

      SHA256

      6b6eb9171cf27df96216c802d8147b1038a73ee35580458944aca73a8d64508b

      SHA512

      6e04abcf150720a6f4b8a7bebafb70227e575c2d7a4fbe99d9f0c4b75db02a435c5be87cfd4e9c82e082d68ef4f8027a419806908a0f289e8ab56970bb0e5e2b

    • C:\Users\Admin\AppData\Local\Temp\Countries

      Filesize

      94KB

      MD5

      36616874cecc8be4a08896a872e44981

      SHA1

      c80d5564a125f425eefe663ef79eaf2339b848e6

      SHA256

      9f922f54206685d67bd969ec5ddda75958b7460a32c3b231abc0143d848bba5d

      SHA512

      dc221dea5ee1a5d7a35b0fa91e6ef797587d24c42142763f3f399b6cde7407277dc23bbc6ea409c18e7927eaea3c9e6bec0b6ef8fa39cb8fa1a4a25bcf99e5cd

    • C:\Users\Admin\AppData\Local\Temp\Curves

      Filesize

      93KB

      MD5

      4fce7e6fbc2c49f56e479a3c9efd17f2

      SHA1

      23ad12e3fc9501645877277365dea4cd4e8644e8

      SHA256

      5149139b671c7067481deff7fa1793b2de6d80d8e227d411639f2036d069a817

      SHA512

      a627c8f46b838c890ce3a6423cb2c1002218895130f0e533eb7384b2525dd8e7d4c43c4a28884f1de16e8611bb85d656d1476e3ca8de04b9ed053346ee9b1769

    • C:\Users\Admin\AppData\Local\Temp\Diana

      Filesize

      93KB

      MD5

      685ae53c5c52ae3095d3570391d6dcb2

      SHA1

      a20e2adb318f81c4d5959f914f2bb81b77c76177

      SHA256

      269e9656991e0d44250f06085689a0a45690bc724ff24fcae295ec5451b76a91

      SHA512

      90c333a7f570bcdc454dc2a23fcdfdba505ceb2df4baf86c787e0ae81119312e6b81b1539d01758efd6c13d40d35a0695cfb83e6a7fd9750a6ed61d4ba79ca09

    • C:\Users\Admin\AppData\Local\Temp\Disputes

      Filesize

      107KB

      MD5

      a70624a95b1ceec90f93279cdb0a5481

      SHA1

      c04fc6e5e2a78b2273bc600830831784eec8f542

      SHA256

      f07dc04911f805b88f0d5de5f5cab349a9bf6d64c3b77074fbdc2571904a016a

      SHA512

      8a0e3f1afe037d12353e5245264ddd2402a301547752b001f1e6f60992b5d082697ea841f271d83ddc515eb369e6b848491d42ca2d0361bd98248cae5644dbce

    • C:\Users\Admin\AppData\Local\Temp\Hammer

      Filesize

      71KB

      MD5

      11034332143bc6186be2d7570c0cd675

      SHA1

      69a34f77890f0e64f6594c65024d34be3a6dcf1b

      SHA256

      84156c2cc1360e32c394f89328bf844e08bf29f6ca8892fca6b74be95379c1df

      SHA512

      b7c4bee12ba4ecc290b406c5cc3cb14ee39cdb6f594bc5eb868ca5c12b92d08843e3a6b9957ff826490ffb2d9ae72646b74a861f567ea32be5cc61d814cf6b32

    • C:\Users\Admin\AppData\Local\Temp\Hydraulic

      Filesize

      86KB

      MD5

      3ed8ba02b04893d78935108baff6c61e

      SHA1

      abf4f4b63e2553d1c4e87e0a8e4198ed6e6fd9e6

      SHA256

      71aa69cf74b0c45be0176144a404328c040ccc595ce6cb9a87fedaa503de2bd4

      SHA512

      be408b3f53ab15ee0e7d0546e56fa28105148e83b43224948436ca6ee3c1bf090319695bfe6843d58a728363a224644cc0f362ff1f6c0c058632d5c52184f5f0

    • C:\Users\Admin\AppData\Local\Temp\Increased

      Filesize

      75KB

      MD5

      8408f0d3cc03eb46518463558144e5c0

      SHA1

      59453c4e0474effe9c7a1a88d818412263319f91

      SHA256

      0dcb4132a9c354337f70a26ef9a2517a4078669c6184382e1d055014a7e7fa64

      SHA512

      b3f0b6ea16050c480be19f1b7f799ccfa07309a75384680060a188e130aee402c5f36f282a3b972618d46c6911d8dc564e0672d0ad848f0a7a975327af3a02c6

    • C:\Users\Admin\AppData\Local\Temp\Jesus

      Filesize

      92KB

      MD5

      9449348d4bbdd252ca91c8295481bcfe

      SHA1

      7f9353b5543b096c870a83ccf55880ebdcabb3ab

      SHA256

      e1dc9dae1529350692fbd883d5a3abc295a06f090f166b533375539e355bb44d

      SHA512

      f5666578182165304c5eb0cf9c2485a2a423e59c2231bc9c52787a687a50b3464434e4e6849ca5e66110ea320b3b99d0c6b2662bb3e33484ba59e16fff60de03

    • C:\Users\Admin\AppData\Local\Temp\Just

      Filesize

      68KB

      MD5

      24875c319f99091e2f200946100569e0

      SHA1

      9a2c39ddd78606289f1d0ff5cd2265cc69209bb6

      SHA256

      04aa200c40b69e0c8dcc58856ed45b15d991654bee3041a594a121c0e1f27a24

      SHA512

      7e01fe4af76a7998af2791469220d37e907c2b68d84ee12099742bc3dafaee1aa614962b813b223bd4848b2530d22dd5c4cca4485c5903a37f400ac952911996

    • C:\Users\Admin\AppData\Local\Temp\Live

      Filesize

      98KB

      MD5

      fe2a5242e55227e598ac0c03a4d89028

      SHA1

      47512b64a525ed07d7e734ff55a1618f0390fdd4

      SHA256

      99f0b5c3eaa95ed4f80d119b5305504bd22efd9215cff7b5e3a9f1718bd30e7d

      SHA512

      9e5f0edfe08153be32c14d7db1846c7d6344dc9ad3dc717aadd2e7603689af408bea0bf6bb56bdb20d2fd4fecc51c5e9b47730eed4e913505308e27339641158

    • C:\Users\Admin\AppData\Local\Temp\Lived

      Filesize

      142KB

      MD5

      e8db5a1745d68569552223d2c15fa8d3

      SHA1

      d4cad1e7399863f31c4ae3be70b42e6a76090644

      SHA256

      f43801761648e173e045532471843445fcdd72fe300b205af80051cff303820f

      SHA512

      88b8e8b1d6f71575415bbec59bc2a308a567d9bc10ae6ab70fd2bb111d848ffd6af331099880d328359b01ad8e591fc29f2fb0bd52b507825d8af2905dc4f701

    • C:\Users\Admin\AppData\Local\Temp\Maiden

      Filesize

      70KB

      MD5

      a3f22ee40fd9bde83124a1637050b957

      SHA1

      8f02dfce506c33ee7ad94f99f0bea03824266bdd

      SHA256

      c4f19b775ace5573a310b245dcbb53c15eedb495eaf53ffc4c58fe4eea59beae

      SHA512

      de16f4a25732004d863f5cae1eff81323861a77a254b77c06045d58d2a41c0ca565c3606e2c9c366fb4443c86de738697b9d79c0ccae5f839bc9b510fb7d6018

    • C:\Users\Admin\AppData\Local\Temp\Margaret

      Filesize

      73KB

      MD5

      0eff2f194a478624eb321adc336ead4a

      SHA1

      6f115651a02def9a83a59a0c62798ba462452068

      SHA256

      ad902e5969a9cb3dd1dbe5639c8a1f5ab2e5c0ee0b52920e34f0aaf29466355a

      SHA512

      ad9d626aa72c563d3843702dbc8789e7436f7f578d38881cfee222cbbabdce69e710cce4c22151b7971228a15578da2cf7bbe4e766c254682dcf248f498d78b3

    • C:\Users\Admin\AppData\Local\Temp\Market

      Filesize

      84KB

      MD5

      094b17e6a4f3076c2549ba854754bc2f

      SHA1

      b16ea87d0e607f3aafa8a91fd132ce967ce5e16f

      SHA256

      3c6032ced1c7747bb9df86237359406d13caee7a83f38dc98f96d23e5da77301

      SHA512

      db658e31d1a475d797ea53c1093d63f8e5ec6dafa7669f8aa8a2d4817bd7564b5abf257286f65ad5418c143ff74ecbf47bac153cb9baa0443119b3beb5c19ea5

    • C:\Users\Admin\AppData\Local\Temp\Materials

      Filesize

      143KB

      MD5

      431d989ed4198104d4c8adcf59f4bb4b

      SHA1

      e0a20d0f4dfc2b273956df7f0c8e1d7d393742ae

      SHA256

      d931ac77d193354907fa26d076273d40556e51a3b58c681c2e86b7e2ee3b0f77

      SHA512

      1ce029bb49731b953a57675a71a129ed0aa6ea90b3ed96bd674057961e18dcd96894189686060d47364b94ad4507f831c0fae34ec2d657e000bf5662045cf75a

    • C:\Users\Admin\AppData\Local\Temp\Meaning

      Filesize

      91KB

      MD5

      89c00c8c6dec09448e1efaff873485bd

      SHA1

      e88cbbad5f0273a2b72cd82a3f5190d99538ab8c

      SHA256

      387e1210f595bded2c5554936afdd5acf403be829f1c7f54ed7e2d11d8eb418c

      SHA512

      f67672a8e45c2587576881fc84b62632bff4dbcf3139373ed38802ce1fb659e39c000f6cd8b4de51d1a0236ef9e23db11e9f5ee16388154bc86722b3c332c70e

    • C:\Users\Admin\AppData\Local\Temp\Measured

      Filesize

      53KB

      MD5

      7004fba44b8e74f3ac8219755115a969

      SHA1

      4a8cfddb7e89e0de2eb3833afe4061dbdca6ca8b

      SHA256

      5027423a880d189768e5c82af7cedb645af53e1ed4f4abc79d4abccfb7bfc1a9

      SHA512

      ee8365a02d694909e952eecb8ed81835954c1563b6e5f6968eba9d8fd2139de0c10a7a950b5a96d3172608cb97c4844a25e06d97c63a87574881d3323ea1edff

    • C:\Users\Admin\AppData\Local\Temp\Occasional

      Filesize

      97KB

      MD5

      45aa016421f59321d73e372483367e27

      SHA1

      48dcf47493a3ab5a21c75f6873507ba2b4ebebe3

      SHA256

      e282a1d1e36585d3e739ed5aa3d0ba233d865ca75822721443c9d0d7cab7cf8b

      SHA512

      ee415af651e1e83c02d7e962b8d2b5309cd59472e60363c8c71780935d289a37098ab8d778be1af43fb7bb8e246297c3f1aef786e8d82abb374f0b1e2579a3e6

    • C:\Users\Admin\AppData\Local\Temp\Photographic

      Filesize

      88KB

      MD5

      a450120c5933897ec27f35181c12850b

      SHA1

      6894ac94abe2532189cf4462e42fa289dfdb203a

      SHA256

      1b3db9156fa3edb8b4240e8661c223eb03ddc6ae3b2f7202f45d9bb2c80a397d

      SHA512

      e38a213a7eb0faef7a3d6b2f224effbc79c80e178f736578560c6603cb492a348726210d3269885ca8ceb001b006bb08f9cbaa27cd6c76e0b0a8c1b272f08096

    • C:\Users\Admin\AppData\Local\Temp\Plants

      Filesize

      76KB

      MD5

      aaea37307529d5d0bf6815116b5a4e5a

      SHA1

      a51e58f6c7773da8fd0c7ab7d1c325664976e1a5

      SHA256

      4a91ab55a83df53b460704aa0c28831c40c92382cb0194e481382244b43fc9cb

      SHA512

      182b85c107fd73e73eafc02b60d04b36dd3bc8d055efa50439622c31410ccdb1ec9001262a95b67a0cd708a92f4e66cde9a7e3f8a70abc08899b8d47f0945fa4

    • C:\Users\Admin\AppData\Local\Temp\Probe

      Filesize

      90KB

      MD5

      66e980ba45d23c42279e8cfeb36da171

      SHA1

      da11759403d255b094d5d7d957f42b951d01ec6b

      SHA256

      6ae9fb4109bbbcd79591498a2c612dc2892a1735a5b0f171588c88b002b229e3

      SHA512

      d195c9958257ed4e33711a8191dfbbab4132bc48cb1098d8143ae1978c11375e4fb22ac0173a216795fed9f73e4297a8253ef0d1295f3f765cc9366c2dbd2ecd

    • C:\Users\Admin\AppData\Local\Temp\Prot

      Filesize

      52KB

      MD5

      7deda2e884103266d6fe4a7934344d46

      SHA1

      bfe479ca3a97b3fe2aa72a5cb2614a9c22ff650a

      SHA256

      ce9f479f36c1cd62ed8dafa3abcbcb802b541258306c923ec0cceb7e80226454

      SHA512

      20833a94d753ce6889247a117b2dcc7c3b79e55480f1571ed8be4d698548e2a628e190bcfc8269f7d53f02cbc3f22c2e0fa1596f7a519ab7805c4ed5bcfc5b75

    • C:\Users\Admin\AppData\Local\Temp\Relevance

      Filesize

      87KB

      MD5

      449d3f7a762b7e282b1a479afafaf61a

      SHA1

      ab260a3feebe64e2a9c83378b71f11c646d3fa5b

      SHA256

      d92f0207491e4d5f3275d4ce6b86a4e1feaae73192623ff649628c7abd3947a1

      SHA512

      c35d0ad10ad5c074953b88174c6712b2a909f2888e0653fa78120bcbc5c8adb7a673b3aa464cd9e73ce8fdadfdfecdc6e20d9bd057b65de959d2af139fab015f

    • C:\Users\Admin\AppData\Local\Temp\Revision

      Filesize

      74KB

      MD5

      2428add5c5d57c0117b9cf1c1f0db25d

      SHA1

      11c22e71790f1974eb62758a0caece157a6f75c1

      SHA256

      30302c63a81ae1488d635fd3bdd408042d4a21bf8dad1bbd4168363ff5b5749a

      SHA512

      c9209c5d5de8097db873fc7b3b3fcf326e96e4bd24d3c791186ea80006b9c1f4489716792ab20dcfda8bf07dd61abc736d6901516ed4544b605a9aaebf3b3a32

    • C:\Users\Admin\AppData\Local\Temp\Revolution

      Filesize

      67KB

      MD5

      9bca27a16de1f72d6d2109e993fb11aa

      SHA1

      600f75d5e7f815c27ad66240badaa0698be26567

      SHA256

      c9dae25354959733be8f437eabf8ecbb913277d45bd3bb3c6f8d860b1b83e1a4

      SHA512

      66b0963604912138253d7665653d6358208bc83d61777b8e293764e2c0e4b123bce739cf6b5797ea97267012190735791762e32206ac3b0c44fcd9f91e24bb5d

    • C:\Users\Admin\AppData\Local\Temp\Router

      Filesize

      91KB

      MD5

      a6fff6b593061c3e8b9eb350cd5a35a7

      SHA1

      7c2be2d760acbe74f94c54ee1d386ccea68eaf4d

      SHA256

      2e9524f350de758e373d0ba1becee240aec4671ec14bedeab842f91ea555a9f0

      SHA512

      f1313b598a5b88791ea6bf97e7e6a137a55a55f1d15f37619cb7ffa9fd42a84aa2af4660141c194745c8d22d308f9fec0e7005d473731c93b6d2c1f74075d439

    • C:\Users\Admin\AppData\Local\Temp\Searchcom

      Filesize

      51KB

      MD5

      6ea253e4ce0d444a3963e3e006106f40

      SHA1

      995859a08e1de139781d24ea793b2a0c715abb4f

      SHA256

      f7b7aa18b119e31ce9b5f91ab5804b84ae56f0f29f35927b8ced13a2411dcfcb

      SHA512

      690340c67f499a05a5c086365e7b08ad4bca82c73d6cf1745cf2a73f88fee4ad584354e859270b395fd48c30966d6fd531204f897bae6042d2309ce25f2a5e76

    • C:\Users\Admin\AppData\Local\Temp\Semiconductor

      Filesize

      123KB

      MD5

      5c00c4696273c988dcadcacf745ee2e4

      SHA1

      d5bfbcf1e611a90fd30388b2ba699250a2352d07

      SHA256

      a25cdda89045a9c53b02eaa2ac5c201ab48d96699d0f54ad14e5a539c6439841

      SHA512

      84600d22cd8a8dcff3e015ffade9a28952725a623bdb0472cc63ded55e09fc3808c0a19a6d7fcdabdf8e736e847e6c08b4b017febc187551b247ba1c87794b7d

    • C:\Users\Admin\AppData\Local\Temp\Shades

      Filesize

      78KB

      MD5

      81cf057729b19ad42c54c6afb1d49494

      SHA1

      ebaf542fc3abed01a4dbea4d05cb88ccaa20e65f

      SHA256

      9ca7509e59b3c43d94e77ce3f45513ec197a508947b7153161a26466a8cf20a0

      SHA512

      1292cdfdbe4fffdb9f15eeef472632df6771f0025ce62dde20514645903223210029f23bed95d43c73afda1e41d47715514e3c47514cff5a109e4078137c4dec

    • C:\Users\Admin\AppData\Local\Temp\Similarly

      Filesize

      93KB

      MD5

      f4f9029c9809698e220b6a4cefcdaf0f

      SHA1

      0d170481212efbd2b0e4029f8fdbbd52cfd61394

      SHA256

      f77867b2903feb51ede2a06b3118f3ca0259e13fa582921d43b2e18df85c3b08

      SHA512

      6d57fc02dc24199dba10126312db45d9c1886a095c8124645617ca45a15b607cee04039b8ec4d58c31741eeef473102ce36ac0154d5c555beff5d50d37590ec7

    • C:\Users\Admin\AppData\Local\Temp\Solved

      Filesize

      67KB

      MD5

      643e96378647e287ef5668cc8edbd1ee

      SHA1

      aedc837f9320f3b50e22871f5385de4fd7339ffa

      SHA256

      66dfb1b9b7c6c288badfd05f58e831213ee63e34ef8dfb8fa2eb2b1d8a47f069

      SHA512

      169185c12f260caa7550baa7606cb542334412532d2e1707905c2a95fd009687165b64d89053c52e8448eeedcc55f642285a8d5c488dd1b2fc2cd3e2c8b5c196

    • C:\Users\Admin\AppData\Local\Temp\TCD4880.tmp\gb.xsl

      Filesize

      262KB

      MD5

      51d32ee5bc7ab811041f799652d26e04

      SHA1

      412193006aa3ef19e0a57e16acf86b830993024a

      SHA256

      6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

      SHA512

      5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

    • C:\Users\Admin\AppData\Local\Temp\Tales

      Filesize

      89KB

      MD5

      8233aef38e2ce4f31ca31f320458305e

      SHA1

      d9620460027e842044e1b172a7cf5ad434fbe7f3

      SHA256

      1cf9e56d1050ffd23ea569dae2529079b7dd5c7c2f1fe7d560915afb571ad8da

      SHA512

      4eb4242051bd5d83101dbc85cc2cba0c6804d74d2dfe4c5e7032a9296d4adf997764a5cee8a92bb709e29295a6d87023631bd2c13f77c69df03b0a979899b97f

    • C:\Users\Admin\AppData\Local\Temp\Tanks

      Filesize

      67KB

      MD5

      b2322dbc1650bb6bca76e26033612ea1

      SHA1

      728bbf1ded9b2aa787e96686084830c1721ad83c

      SHA256

      1d23834517ebeaceb9be8751d0f1ba3d84b146634e1636ca52ddaeb974a92aee

      SHA512

      0938f541e91f981037fd584c5269422a7a2e5912172770381627915b4ac7331535a76a910e984e81561f036a07072faaee6ab18659c0da2d06ffd971e801b1df

    • C:\Users\Admin\AppData\Local\Temp\Tool

      Filesize

      29KB

      MD5

      6fcc6b5163716273ec4e3ab1dde17811

      SHA1

      39d95cb1df68a5672ed1dec62a79429521ad6ddd

      SHA256

      6667e7564c6eec7f16344f713d9d96bed060b5abb060f015ff2eb0b3a6cdfaf9

      SHA512

      85a7da99a5a070695d97c6f9eaaaee64d207a313e660deb9cb6d3dad0c80eda4ad9a7647d2dd934b832b126f4d15ee88ff0bc2e8980853169d22e868958351cc

    • C:\Users\Admin\AppData\Local\Temp\Touched

      Filesize

      40KB

      MD5

      d6807a89d076ae2175b1e99ab77dc1f4

      SHA1

      7cbf55b3fcfd7a7588164ff865cb0b1fcd2edc23

      SHA256

      f935f694b8dac34bb981b51cabd7cc9f998cc3ad5c5d02734ade5d83022926ad

      SHA512

      1c27bb6624a7d0d60aeb7e3e269cee9e268845a419b7b3b13def794e41313e32fe9964d7178ccf89a3315640f7bf2bd36c2be4a4b398a910e3e5d83397bf370b

    • C:\Users\Admin\AppData\Local\Temp\Water

      Filesize

      80KB

      MD5

      e00e6b9607e88537c83d91220097ef6e

      SHA1

      9d4b1323be4575f0b34124b27276365c68379836

      SHA256

      021fbabd771344fe7a3de1e0a7b485b4b24ea91ca3086f6f5ced42cd1d97cf06

      SHA512

      468e4fcab4b803dbb9865e85615bc804a2b6bdd4213a54f66ec651662345b5e5ac5fb755eab59607582245c54218a18014de98b145980ee26cfff9a1df2acef0

    • C:\Users\Admin\AppData\Local\Temp\Worlds

      Filesize

      83KB

      MD5

      31b2d7ccb8a7660e1708d4d250bf5384

      SHA1

      9952b639060e41209854df041679867789def794

      SHA256

      eff028d341ff25f3f12b5788340be8482e61c18a9af55009806abd7dbdaedb36

      SHA512

      5958d56833d39d428aa961b62b64dd47dcfff24b3b26e140eb9a6c1e51a31c32f3ce96ba2bb360b0fc1619ca1f67a0ecc347a6f04d490a026a64fcefdf0d1b47

    • C:\Users\Admin\AppData\Local\Temp\Wrestling

      Filesize

      97KB

      MD5

      ca677f2486eaab03e05946aa52e11c39

      SHA1

      b988ff64eb1f7e24eafb621cdf4ce3b7e696206d

      SHA256

      1e47809d204ac0f088324e1767b21ceab87f927d6bedb28ef41ed6edaed2f516

      SHA512

      2af5778404c848e19d7a87668474ea1c6521b90777b71235af5405e3ea4e50bfd3bdb90f40686840fcaf89e3d28790ba900e754b30624d591ff9a68da3aa5ae6

    • C:\Users\Admin\AppData\Local\Temp\Долговая нагрузка.docx

      Filesize

      52KB

      MD5

      90a7bf16ccea3a7813d480c7e83de45a

      SHA1

      b66daec0e51b688782d52ce0b50d34ec61dba4d1

      SHA256

      571126ec3e8d01f270bfc24964f1f5d02edb46d9c5eefe2c33325324f2df963e

      SHA512

      78c861965ba436468d3170ee2493379451b60f34f4e55ff2846a0d5f0517e488c7153a110380bc7ca8e20b07536261b1a04e9dd21b0d40115760e64579cd74af

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2660-788-0x00007FFED2240000-0x00007FFED2250000-memory.dmp

      Filesize

      64KB

    • memory/2660-783-0x00007FFED4850000-0x00007FFED4860000-memory.dmp

      Filesize

      64KB

    • memory/2660-782-0x00007FFED4850000-0x00007FFED4860000-memory.dmp

      Filesize

      64KB

    • memory/2660-785-0x00007FFED4850000-0x00007FFED4860000-memory.dmp

      Filesize

      64KB

    • memory/2660-786-0x00007FFED4850000-0x00007FFED4860000-memory.dmp

      Filesize

      64KB

    • memory/2660-790-0x00007FFED2240000-0x00007FFED2250000-memory.dmp

      Filesize

      64KB

    • memory/2660-784-0x00007FFED4850000-0x00007FFED4860000-memory.dmp

      Filesize

      64KB

    • memory/3536-787-0x0000000007090000-0x00000000070E0000-memory.dmp

      Filesize

      320KB

    • memory/3536-776-0x00000000059B0000-0x00000000059BA000-memory.dmp

      Filesize

      40KB

    • memory/3536-781-0x0000000007320000-0x0000000007938000-memory.dmp

      Filesize

      6.1MB

    • memory/3536-789-0x0000000007940000-0x00000000079F2000-memory.dmp

      Filesize

      712KB

    • memory/3536-775-0x0000000005A00000-0x0000000005A92000-memory.dmp

      Filesize

      584KB

    • memory/3536-802-0x0000000008320000-0x0000000008332000-memory.dmp

      Filesize

      72KB

    • memory/3536-803-0x0000000008380000-0x00000000083BC000-memory.dmp

      Filesize

      240KB

    • memory/3536-804-0x0000000008430000-0x0000000008496000-memory.dmp

      Filesize

      408KB

    • memory/3536-774-0x0000000005FB0000-0x0000000006554000-memory.dmp

      Filesize

      5.6MB

    • memory/3536-771-0x0000000001110000-0x0000000001464000-memory.dmp

      Filesize

      3.3MB