Analysis

  • max time kernel
    269s
  • max time network
    281s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2024 20:55

General

  • Target

    https://github.com/quasar/Quasar/releases

Malware Config

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 27 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/quasar/Quasar/releases
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:928
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9da2546f8,0x7ff9da254708,0x7ff9da254718
      2⤵
        PID:3604
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:2
        2⤵
          PID:2808
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1972
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:8
          2⤵
            PID:2028
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
            2⤵
              PID:2600
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
              2⤵
                PID:3436
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4040 /prefetch:8
                2⤵
                  PID:4844
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4040 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3804
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:1
                  2⤵
                    PID:5052
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:1
                    2⤵
                      PID:4168
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
                      2⤵
                        PID:3480
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:1
                        2⤵
                          PID:1528
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4960 /prefetch:8
                          2⤵
                            PID:2212
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:1
                            2⤵
                              PID:3772
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:912
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:1
                              2⤵
                                PID:1504
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:1
                                2⤵
                                  PID:3540
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6476 /prefetch:1
                                  2⤵
                                    PID:2320
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,13332547783528063765,955050767717982591,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5516 /prefetch:2
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3744
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:4472
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3460
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:632
                                      • C:\Users\Admin\Downloads\Quasar.v1.4.1\Quasar v1.4.1\Quasar.exe
                                        "C:\Users\Admin\Downloads\Quasar.v1.4.1\Quasar v1.4.1\Quasar.exe"
                                        1⤵
                                        • Suspicious behavior: GetForegroundWindowSpam
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:1708
                                        • C:\Windows\explorer.exe
                                          "C:\Windows\explorer.exe" /select, "C:\Users\Admin\Downloads\Quasar.v1.4.1\Quasar v1.4.1\quasar.p12"
                                          2⤵
                                            PID:4468
                                        • C:\Windows\explorer.exe
                                          C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                          1⤵
                                          • Modifies Internet Explorer settings
                                          • Modifies registry class
                                          • Suspicious behavior: AddClipboardFormatListener
                                          • Suspicious behavior: GetForegroundWindowSpam
                                          • Suspicious use of SetWindowsHookEx
                                          PID:632

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          0a9dc42e4013fc47438e96d24beb8eff

                                          SHA1

                                          806ab26d7eae031a58484188a7eb1adab06457fc

                                          SHA256

                                          58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151

                                          SHA512

                                          868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          61cef8e38cd95bf003f5fdd1dc37dae1

                                          SHA1

                                          11f2f79ecb349344c143eea9a0fed41891a3467f

                                          SHA256

                                          ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e

                                          SHA512

                                          6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\22d3b2ae-9370-4a18-9223-79f1004d1f06.tmp

                                          Filesize

                                          6KB

                                          MD5

                                          c941fa47b01f66d2f693a39ced36288f

                                          SHA1

                                          5466bece1a73a3b188bddeace9f93fb6a08eb4a3

                                          SHA256

                                          5eda690dca9b7460dd89d5fed9b2ae5e5476a13205ca602b69fcb6a8e244b288

                                          SHA512

                                          6dc957a8d33032918a060446d8a50d8529614beb9bb1ca80913f45c87ac6b78f920b1baf8f356c028f71ad47b005847400ae3af5d5a18346273d80a5ac35d6ea

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          1KB

                                          MD5

                                          5498555577a1e6cbd9b24975bb3af7f4

                                          SHA1

                                          5eea96dca6bb485d8c8be05d1289e3821b88ea85

                                          SHA256

                                          5581051e14a53e618b3d105260ae0e919cc11407e99ed89f81d752e629316a2d

                                          SHA512

                                          ea6228271aa20abff1e1bd0938a5e4847a927b6fcbd3fb239be3782f14b2487ecd31bdacf317d23e66645a77b4987373065de2c93e73c5848265522856270add

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                          Filesize

                                          496B

                                          MD5

                                          1b92794633aaa7d8ca83e408ef516a36

                                          SHA1

                                          4ae0678d6cf8abedb3e9819fc9d7d715d3f72bb6

                                          SHA256

                                          0ff76dc871bd6e59abe386781ef988b4c8d734bca726a4d1eb556d3d78f1e7e0

                                          SHA512

                                          698bb4adf1932dd48fbffb344b0053b9dc753b97a92d88a26341e0c3b0fa2e03481c5193bd2b4a1caaa2aa2f00e41eae73c53aaadc1ac6bb8be17d0f229a61bb

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          10cb1d2c0d549228177a9bd48116415e

                                          SHA1

                                          09f2df28584a67d63aeb6a2343438b9706f726c7

                                          SHA256

                                          8c7164f80d9fbf01a77add6c415a64aa25f9579638afa1e1bf9fe9513efab897

                                          SHA512

                                          5b4af7ffb6ea9307d9c5b7e655f72a75c5a26b11ddb908cbc26770c8b56ebd3b19bae200dbbec19371940044c56697acc312cb12457e2d6c9799261aea2006aa

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          e2f3d93c7e5776531fe86f9919edbbe6

                                          SHA1

                                          4efb602c97c30ce83fe43091e38413b17cdb58c8

                                          SHA256

                                          20732779c9d44dcf43797cfb9c8fdd32d8fc4f1dc4a90bc4d0e1b210ffa5d6f9

                                          SHA512

                                          9106d34511d5c165b76040f9112177d70605f75d0c5f83298468c8e50d11fce3df032e49587d65a4041a08067a81719d5cd479b1f05df02710b47a5652f1f89b

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                          Filesize

                                          874B

                                          MD5

                                          684e32d2aaeec364129e899b746606cb

                                          SHA1

                                          f5919f1c47f2e1757646cf5b7352c812d2058f66

                                          SHA256

                                          51738657a2429c94282cf49baf3b671ac25c7544115a369c0dfaeefccf23b579

                                          SHA512

                                          42e19fafcce6fac2774f0d710fea5623a10160d0e71a49079f38e8d0d057dbd1488262ad2a823800f8d72d7a76bc5d81b10c0b0e493f5ed3ac30247989846e5f

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                          Filesize

                                          874B

                                          MD5

                                          178f82ae357cc2b92da8c44a9585f3a7

                                          SHA1

                                          c6f8ffd7ab5548871bae82f3c06d8d0407903c65

                                          SHA256

                                          f2a48b76aef33127298feebb329fa02a6c5dab9a61b0aeb773bc554f50baefc7

                                          SHA512

                                          02cb0ec92919529ad63785cb079f6acf062e3a844d39e9a1cef35f4892498580db18b73b8a84f5e7ecef17ebca07045478e95d201dbcba76fb0f45b738533f12

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe586e26.TMP

                                          Filesize

                                          874B

                                          MD5

                                          15990a8af636b47cc72cbf2101350fd7

                                          SHA1

                                          784be80586de1a71180cd59a13f46a4c4d3ed5cf

                                          SHA256

                                          889b3134545ae0bd3f5c8ad83f2fa51545d7e64d8ba75adce88387eaf09ca854

                                          SHA512

                                          64c07ad6be4d432ccef9f54b890423e657b5094571c686097908573821678c55ed4b0ebf35ff2fcfd098e4b58759f62113cad2030631ab8590ba599fd6fbcf56

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          6752a1d65b201c13b62ea44016eb221f

                                          SHA1

                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                          SHA256

                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                          SHA512

                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          11KB

                                          MD5

                                          8b4aaa76ec578e20274e6c107fbfa0ab

                                          SHA1

                                          0cc11911911fb8cc2248b709f242ff8bfb384b9a

                                          SHA256

                                          5254aac83f54288ce59226b09e892434dd13991e3a90bc22107448e8e05ac2d0

                                          SHA512

                                          7e279fd29434bff1e1f521ba4b3ac54e1ef59ed649fc26b516b9927fe64f8b774a1ba429f3dd636d209078f56e98601fc73f475fa028c7a593c0c20c7510fa38

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          4372d384fb67a67bd9ec6976771bbdb0

                                          SHA1

                                          08efd230067338f35b89708111a506b9d046e3a1

                                          SHA256

                                          3be5fcb92dcc2888b5d9015eb6b453ea953c6b8b8ead711217dd322875d5ce7e

                                          SHA512

                                          ce0e52f4274a9a8af76940ce2b7ab4275c3afb0786ba0a1e4cda11e6c62f8eddd463d364644d2b12d6dfba956079b7dcb2a1aab68acb84396e587ce8245624d3

                                        • C:\Users\Admin\Downloads\Quasar.v1.4.1.zip

                                          Filesize

                                          3.3MB

                                          MD5

                                          13aa4bf4f5ed1ac503c69470b1ede5c1

                                          SHA1

                                          c0b7dadff8ac37f6d9fd00ae7f375e12812bfc00

                                          SHA256

                                          4cdeb2eae1cec1ab07077142313c524e9cf360cdec63497538c4405c2d8ded62

                                          SHA512

                                          767b03e4e0c2a97cb0282b523bcad734f0c6d226cd1e856f6861e6ae83401d0d30946ad219c8c5de3c90028a0141d3dc0111c85e0a0952156cf09e189709fa7d

                                        • C:\Users\Admin\Downloads\Quasar.v1.4.1\Quasar v1.4.1\quasar.p12

                                          Filesize

                                          4KB

                                          MD5

                                          9e1e3bd95a8c8a00c6c84cd801829ae8

                                          SHA1

                                          0ddde0b6dd905aa7e3a4fa02fc6df33263cbbfd6

                                          SHA256

                                          7db4824d6b74a4a608cb1ce1cbf0d3756b64103ef82e688f5c5aa18fcbf754d8

                                          SHA512

                                          19d551e0aedc77f3906e51086e1a8c486ecaa6dad1b203cd62416701e5e0f6ecff9226e917af8d200b9836fdc20adff21297814e538cdc3568f30c6007ff5ea5

                                        • memory/1708-275-0x00000206EFA50000-0x00000206EFB88000-memory.dmp

                                          Filesize

                                          1.2MB

                                        • memory/1708-276-0x00000206F1740000-0x00000206F1756000-memory.dmp

                                          Filesize

                                          88KB

                                        • memory/1708-279-0x00000206F52F0000-0x00000206F561E000-memory.dmp

                                          Filesize

                                          3.2MB

                                        • memory/1708-303-0x00000206F4490000-0x00000206F44A8000-memory.dmp

                                          Filesize

                                          96KB

                                        • memory/1708-304-0x00000206F4730000-0x00000206F4780000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/1708-305-0x00000206F5090000-0x00000206F5142000-memory.dmp

                                          Filesize

                                          712KB

                                        • memory/1708-306-0x00000206F4FD0000-0x00000206F501C000-memory.dmp

                                          Filesize

                                          304KB