Analysis

  • max time kernel
    900s
  • max time network
    899s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    17-01-2025 00:48

General

  • Target

    https://www.upload.ee/files/13638229/Dox_Tool_V3_Cracked.rar.html

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Bnet1996!

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Office04

C2

192.168.1.11:4782

Mutex

QSR_MUTEX_f39lWqYnYtP5YngtM5

Attributes
  • encryption_key

    c5q7P5jsfrwN6nB5c3mG

  • install_name

    SystemUpdate.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    WindowsUpdate

  • subdirectory

    SubDir

Signatures

  • Quasar RAT 3 IoCs

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 10 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 18 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 9 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.upload.ee/files/13638229/Dox_Tool_V3_Cracked.rar.html
    1⤵
    • Quasar RAT
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3084
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff857b0cc40,0x7ff857b0cc4c,0x7ff857b0cc58
      2⤵
        PID:4500
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=1888 /prefetch:2
        2⤵
          PID:5112
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=2152 /prefetch:3
          2⤵
            PID:1920
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2296,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=2464 /prefetch:8
            2⤵
              PID:2004
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=3152 /prefetch:1
              2⤵
                PID:3700
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=3196 /prefetch:1
                2⤵
                  PID:1668
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4496,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=4512 /prefetch:1
                  2⤵
                    PID:460
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4520,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=4656 /prefetch:1
                    2⤵
                      PID:1956
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4808,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=4852 /prefetch:1
                      2⤵
                        PID:4600
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3208,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=4012 /prefetch:1
                        2⤵
                          PID:1740
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4968,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=5244 /prefetch:8
                          2⤵
                            PID:1880
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4492,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=5316 /prefetch:1
                            2⤵
                              PID:1020
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5908,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=6012 /prefetch:8
                              2⤵
                                PID:2260
                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                              1⤵
                                PID:4632
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                1⤵
                                  PID:4024
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:1564
                                  • C:\Program Files\7-Zip\7zG.exe
                                    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\" -ad -an -ai#7zMap21338:100:7zEvent4602
                                    1⤵
                                    • Drops desktop.ini file(s)
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    PID:3620
                                  • C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\Dox Tool V3 Cracked.exe
                                    "C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\Dox Tool V3 Cracked.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:4712
                                    • C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\data\Launcher.exe
                                      "C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\data\Launcher.exe"
                                      2⤵
                                      • Checks computer location settings
                                      • Drops startup file
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Adds Run key to start application
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1568
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath C:\Windows\IMF\
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3384
                                      • C:\Windows\IMF\Windows Services.exe
                                        "C:\Windows\IMF\Windows Services.exe" {Arguments If Needed}
                                        3⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2256
                                        • C:\Windows\IMF\Secure System Shell.exe
                                          "C:\Windows\IMF\Secure System Shell.exe"
                                          4⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:60
                                        • C:\Windows\IMF\Runtime Explorer.exe
                                          "C:\Windows\IMF\Runtime Explorer.exe"
                                          4⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1420
                                    • C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\data\doxsys.exe
                                      "C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\data\doxsys.exe"
                                      2⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:2136
                                      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                        3⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        PID:4460
                                        • C:\Users\Admin\AppData\Local\Temp\HQUHlwGxWA.exe
                                          "C:\Users\Admin\AppData\Local\Temp\HQUHlwGxWA.exe"
                                          4⤵
                                          • Executes dropped EXE
                                          PID:4432
                                        • C:\Users\Admin\AppData\Roaming\svchost.exe
                                          "C:\Users\Admin\AppData\Roaming\svchost.exe" C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                          4⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          • Suspicious use of SetWindowsHookEx
                                          PID:5464
                                          • C:\Users\Admin\AppData\Local\Temp\HQUHlwGxWA.exe
                                            "C:\Users\Admin\AppData\Local\Temp\HQUHlwGxWA.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            PID:5584
                                      • C:\Users\Admin\AppData\Local\Temp\Dox Tool V3 Cracked.exe
                                        "C:\Users\Admin\AppData\Local\Temp\Dox Tool V3 Cracked.exe"
                                        3⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:1968
                                        • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe
                                          "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"
                                          4⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          PID:1008
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            "schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe" /rl HIGHEST /f
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2384
                                          • C:\Windows\SysWOW64\SubDir\SystemUpdate.exe
                                            "C:\Windows\SysWOW64\SubDir\SystemUpdate.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: GetForegroundWindowSpam
                                            • Suspicious use of SetWindowsHookEx
                                            PID:5144
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              "schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Windows\SysWOW64\SubDir\SystemUpdate.exe" /rl HIGHEST /f
                                              6⤵
                                              • System Location Discovery: System Language Discovery
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:5352
                                        • C:\Users\Admin\AppData\Local\Temp\DOX.exe
                                          "C:\Users\Admin\AppData\Local\Temp\DOX.exe"
                                          4⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          PID:2868
                                          • C:\Windows\SysWOW64\NOTEPAD.EXE
                                            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\dox.txt
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            • Opens file in notepad (likely ransom note)
                                            PID:5920
                                  • C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\data\doxsys.exe
                                    "C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\data\doxsys.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:5380
                                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      PID:2420
                                    • C:\Users\Admin\AppData\Local\Temp\Dox Tool V3 Cracked.exe
                                      "C:\Users\Admin\AppData\Local\Temp\Dox Tool V3 Cracked.exe"
                                      2⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:5456
                                      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe
                                        "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:5672
                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                        dw20.exe -x -s 1544
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        • Checks processor information in registry
                                        • Enumerates system info in registry
                                        PID:5628

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    312B

                                    MD5

                                    855fa03476e9fe5ea759531fcc818b86

                                    SHA1

                                    70d8d944eb7b4985790a309d03db69dffee2d9d2

                                    SHA256

                                    78dd21f99a544922cf97b66b4a492b2fd26c09f6913346bb1e5229f110e31263

                                    SHA512

                                    a43f7a7f51d4fb235b99134aa13fbc66adcb73c01adbc336268d5e6d89b09b3b80d6c94c168caa8682998c37fb52707d7a5b73ffb214a3712894447143724249

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    6KB

                                    MD5

                                    61482d2ebc8060a23aae81ef1482e118

                                    SHA1

                                    5b03afdd139f5e654d959dc5afc34733f02412c2

                                    SHA256

                                    7abd3f12992e35583f866cf78e9736da8cc912fdf4c1d0da2b2b83e629761a30

                                    SHA512

                                    ff8dea83190ea38847cdd13114d2cf1f493180693b57085d710dba4c3051dcca9ab16c90d5361af112678f61ea8d2bbe2ad9192ab4b33e607b2798c2bc1737a6

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\fa9acc9b-c959-4f2e-adca-d59ff213a0eb.tmp

                                    Filesize

                                    1KB

                                    MD5

                                    58c6b352a9249df00100a4213a072d73

                                    SHA1

                                    a85c7cc5515ba2fcf5a8d9031fddedac45c93376

                                    SHA256

                                    71db97db06b29f72c1266e646f7ba0aac2e77c9565d3c9c8175f6265aad53726

                                    SHA512

                                    39349e98839bb44718160bf2d24d3026267219d4e07ff0657640e9c4c84c7c0e7c0dd0d0ee18b16bb14a110b7689db29e3d496fa5f364ca6756910a53f932365

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    d117cf99d81bb1564bccf96a4932b30c

                                    SHA1

                                    b464cbbd190ba3d7bf4a018f86d4bbfae6f8201c

                                    SHA256

                                    f2cf75f2571e72c8965dbd8a06036822b1892220308b800247bf49eaee6b73fb

                                    SHA512

                                    f6efe72276b1c14dd758069d1dcaf981adbbc62cd3965dece0c306e42cc28fc79f6c0bd222d572abd1a42f7814effb2fa1ddd60fcdfc495532c0b15feba4cc3e

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    f04a196de36d449f202285a9ba2cdeb9

                                    SHA1

                                    44f3826940ad0c7e2012044b976f004d1b74d5ef

                                    SHA256

                                    c3c69906d81d25c12f71990e66e21fac1b28ddedcd7c4924439a4f0fe317b910

                                    SHA512

                                    64aba63aff149e525cc5e8f61500a4adec36b143ddad8a8eb8005abda4e35b3391165cb764d2491382ee7852e2c337563b6ae25c23a0c32700a652656cc45a19

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    3231c29dcc59036b2bbe425808e620c8

                                    SHA1

                                    5187f935659c624b040646189c845bb52c506235

                                    SHA256

                                    5ceeb6cc7222c09ec27e8ce6a2da87e9b91ef2c80083bf581a2abd809ba9cabc

                                    SHA512

                                    259e7b48f5116efbc018c7063b422df293c3694c86fbb9e8405857c159f198d9017118717a9676773655465cfd4eedf91d90f2027a47696ca1e00a0430039b13

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    b0e85b93e89a978e42a5f07d5b3da775

                                    SHA1

                                    2417ab6f5ec716403497a3684cbbd67931be66e3

                                    SHA256

                                    e84e40bb321f9fe2564e4a0731d5c9b4d9504c83678e05b63396abf0aad2ae8c

                                    SHA512

                                    b76a89dd65851721b2a047302baf27b8f2094cdfe9c4719536ff0db543f2587c4e21a2b9957ac0e680c1e2e6ff6ee0292333d9aa9ae71f612174e799bfd3326d

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    006dcdb31b5f7d96e111c16f0fcd9cb6

                                    SHA1

                                    e0d4876da28bbe6503f509f1fd449f889b8c71ae

                                    SHA256

                                    44d5fd7ebb45643db8511e60f84d5b0e5d4c4059c450a6885d0e09a88bdb9e39

                                    SHA512

                                    1b03e0c385b076621e9529a51cc6c4a3c54db1ea8b1d7a322685d6aea6e63403ddd16aa464438bd0b75f9c25a0655d87bf05847ae417599a90a7bb28d280ec17

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    eb7678889db8ad8ea77e029d8911e8d8

                                    SHA1

                                    be21a9b7b18fdcef8416df9f59bc1282a04d1278

                                    SHA256

                                    3aaa12891f4a12bc8ac07c0b6da881e2a30bd50e68b11db4e27d5bb710c6ffe8

                                    SHA512

                                    657b61f1bf2c4e3398e3b739ffb2283cda0ba70c3c8035da511a5d82219efefe4f7b99ea6c0497a880888debe2888c5fd277db664676d007a45d40e723f8e1ae

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    233KB

                                    MD5

                                    4f5aff78885db1af13da53eb76afa5cd

                                    SHA1

                                    b1ec96e52f41ccabcfb26de7f176480405183555

                                    SHA256

                                    6a069a034aa43462e8b3c94213df732049d7b254a6ae15b3e51b0d29af67d08a

                                    SHA512

                                    cd3274c18e04a7666e9fe9abfd34f9ec362f3655c8ed5f18f12134c0bb9dfd0b7f9607c98d62d1cb18d9e34855b44949148032ff8c30e7ebbb0aa227c9ebd1c4

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    233KB

                                    MD5

                                    304277ba912485cc40e5c554f67b78f5

                                    SHA1

                                    711a9732ddd48cd8b18d749501cdf6dfd6c73bf7

                                    SHA256

                                    af93955c5d30e534e673787349df28cb5b79d9acf94e75a37818008aa1d0eed2

                                    SHA512

                                    380fb67ed83117f37efc3583712678bf960356c1565f8fc0a251c6fa5d49d5279e9e28f99c4c0346e03dc7025ccc0b1303e203d5cbb1542f94e29313d1c838e0

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    233KB

                                    MD5

                                    37094c91956b793d0c7f9c60c76610c2

                                    SHA1

                                    1c5e33914748113104ef5a4dc748b2a130a38125

                                    SHA256

                                    fe4bb1ccc8df4a08b09816dc052106bb959a3c8ba6300bb7ee510ebb4cba55d6

                                    SHA512

                                    868b2ab981a426fef735a646b73e308195189669fa5e2f025400c454fd912ebc4bfda138bca0ed3b81bb0fde88fb20e9058a0fa6116d7833fd705492421314b1

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    48afb4e8d5dae01585e6ee2dc962043c

                                    SHA1

                                    719ef99fdcd0da62e8f8613a822ac49db6ad827f

                                    SHA256

                                    5db945e209c6a54310e1f304c508c3927a30fcbf1278b99dbf6f5f16c890f7ec

                                    SHA512

                                    17c355d73c16d95d4ae92b46fbafe74755f6363c1b2597a04908fe1d21444e6a60964319b781d0f38066453d893295dd655a7efbd1e2ce9ea42b744242747808

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\doxsys.exe.log

                                    Filesize

                                    224B

                                    MD5

                                    61611046087f6dc9bd4709873e8f09eb

                                    SHA1

                                    d7ee8c54b4255ce2b7198bda0370321a83ecdae6

                                    SHA256

                                    8c1501db875933607b61adcc2810f00b86583055ba95ceb21db86b71f08be18a

                                    SHA512

                                    a5d631cb9443109cf9c58aa65d640b34be7e8f59e84fbe94a2fbb9cbc41eeaab8c920ef6d76c2e3abc421f86d1075dce2630a8a19a0b941ca6b21a4b061e1bad

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WindowsUpdate.exe.log

                                    Filesize

                                    1KB

                                    MD5

                                    7a81a494bd4a69be28fc8144363f6c2a

                                    SHA1

                                    5077f61cd60e014f13291327cc576e48edcdc5cd

                                    SHA256

                                    1b51ec5575abde0dd24eb950ebb7a338488596d8ea5e993062fd54ad33ac554e

                                    SHA512

                                    dc75e9c8e06c0727b5427c9d63eb8b08ceb9827793b7943da2b346a745cc4963218a2885866094f9e25c4909a6307c1e74a70296c78ca9a781867567445d8774

                                  • C:\Users\Admin\AppData\Local\Temp\DOX.exe

                                    Filesize

                                    154KB

                                    MD5

                                    670f75850165e3c3ef0df41e1565ff58

                                    SHA1

                                    784ae13c951ac390d7dea0071c97aded6800b708

                                    SHA256

                                    fb128eba50fac8bc22faac39de602c306809cb37167b950bd194eb0bd9832812

                                    SHA512

                                    c0355235fbce7829dbcd3fac26ec5663b09c880826a014599127f330ddd3c16a95a0ab973fa75ddbb4ce0f8756ab2494739b04d1fda0bb799d577e493c9ca9b9

                                  • C:\Users\Admin\AppData\Local\Temp\Dox Tool V3 Cracked.exe

                                    Filesize

                                    688KB

                                    MD5

                                    19d55f26a6237985cb72c59c08d4828f

                                    SHA1

                                    8bc51ad39e35f9be7d46e9e90e754e07d9c88b80

                                    SHA256

                                    317f9d304aea7c5a4b3516f5379a63e2a4fec91578f3c3f69507c8167798062e

                                    SHA512

                                    7a9de012783f9323264fb59739b76195acedd846ea15382d67e5ab19325269a37647865aaa44da9a97fb8eacdf365c1b6c55c0920c46a6cdca6a7c73b09e19d1

                                  • C:\Users\Admin\AppData\Local\Temp\HQUHlwGxWA.exe

                                    Filesize

                                    20KB

                                    MD5

                                    0d282d4eb8db6d5152b4e5fd3e2064b5

                                    SHA1

                                    72cec747647d5d0f6ef2e5ddb34f1db68fc183e5

                                    SHA256

                                    8663bef0304a937fe47af465c03b8930a5db2dad39bf4dd1cc6baa64cc272061

                                    SHA512

                                    16b2551711afa27baf9aa95d37c2d1b0689c32930ca5a4c7fabe66ea05513f460c58b36fdb96efb26963f10cdc518934dd3f5b623d424a2f299cc47d150f1e72

                                  • C:\Users\Admin\AppData\Local\Temp\WebCam_Capture.dll

                                    Filesize

                                    20KB

                                    MD5

                                    94306f6cf69f7e7c0b4f10ea499f73dd

                                    SHA1

                                    3228b4c2ca9109aa86f2810afc3d528947501c92

                                    SHA256

                                    ed937977d846c19ea5a721c8f720dafc4c697c2b136c17d66d7b6a4200090a7e

                                    SHA512

                                    d6c19775a96dedbd40be96d5b3aa3fb0db3d52749e0d54667b38a2f677c94b630ab543457708a1c123776ec473e9f40f18eb4080703ee9adf08110c417dea136

                                  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

                                    Filesize

                                    348KB

                                    MD5

                                    a59f7fb8ac2dc166432a86eb8e2179ff

                                    SHA1

                                    9c8b24bda935e397e1c0cb33752331fe1f773b45

                                    SHA256

                                    82d315a2102a1bbd8c1533ea70f93982d2ad0fbbad3d48e9a4265c45353ceacc

                                    SHA512

                                    ff05149ca95d982ee44c820d8bc03e48d6230a7085291f0653398a410a16610038fbc336ec843db7020458fbe982762439990b348de050248758450b3ea263be

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ei24pqtg.kaf.ps1

                                    Filesize

                                    60B

                                    MD5

                                    d17fe0a3f47be24a6453e9ef58c94641

                                    SHA1

                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                    SHA256

                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                    SHA512

                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                  • C:\Users\Admin\AppData\Local\Temp\dox.txt

                                    Filesize

                                    1KB

                                    MD5

                                    d3c805ba98e3e0b8a447ee15895f889a

                                    SHA1

                                    e2b7e8bf64cf0671faf231478228e0afb995c0f1

                                    SHA256

                                    bebe88e7ac9f376739fa986ec35158ebd21451761c3e6374f4371d142ffbb054

                                    SHA512

                                    612dff02e9131c1c69b51e3503f6b5491de549a630b0297c7a3a34dbc3c35f8d0c859dff1b9c51344c7569bf5de84c35d62835c4713873ae0c3b8708eb6d7a52

                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

                                    Filesize

                                    76KB

                                    MD5

                                    a57d275fcac1be0b9aad189223a313df

                                    SHA1

                                    0762b222741fa30751dce16e7dae2bcd191adaea

                                    SHA256

                                    1c6d4e2a60849385c9b4cfbb1fc92032cb503497099208f62d7908e52b9b487b

                                    SHA512

                                    41d90ec2548654b86bba21d178bae55b538bc7acf7811b9615095e4719e52075096053427ff85428a51047f405e8d1e6a633b999655e296c9ac396fb2bba36a8

                                  • C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked.rar

                                    Filesize

                                    1.6MB

                                    MD5

                                    3644f99ddf506a39da30126c9a0abb6a

                                    SHA1

                                    f04f0277ff79aeea0d5cd0f28e8245f50a2c7d65

                                    SHA256

                                    9c09ded5ae06efdb1d52f183d70f6a3fc821618bcd60d6f4a9f0c46d20bf589a

                                    SHA512

                                    2c750caa10db3d32aee69b229e6c4060df15dd4d688b4e52fca2f1214e466356f920f40eb5d5dc27b292a0dc68b58db0b9454e738f7725d4996b64db644bcbe4

                                  • C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\Dox Tool V3 Cracked.exe

                                    Filesize

                                    207KB

                                    MD5

                                    6c206cadf297a02c0af977c65637a166

                                    SHA1

                                    7d382b1e6cefd120f9d87f894e14088e18d01c73

                                    SHA256

                                    f4f78f44719af71a363bd50107840f53f8eebf3190505c10bac2cf7be3c29e59

                                    SHA512

                                    2672ae02fb6b768861f469556f9818fd84866d62122f243309b5f2d13c4c907b6555e968bfb4b10cd48188fe3b2182b15ee7f425ddd14835b483d0dfe721b515

                                  • C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\data\Ionic.Zip.dll

                                    Filesize

                                    480KB

                                    MD5

                                    f6933bf7cee0fd6c80cdf207ff15a523

                                    SHA1

                                    039eeb1169e1defe387c7d4ca4021bce9d11786d

                                    SHA256

                                    17bb0c9be45289a2be56a5f5a68ec9891d7792b886e0054bc86d57fe84d01c89

                                    SHA512

                                    88675512daa41e17ce4daf6ca764ccb17cd9633a7c2b7545875089cae60f6918909a947f3b1692d16ec5fa209e18e84bc0ff3594f72c3e677a6cca9f3a70b8d6

                                  • C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\data\LICENCE.dat

                                    Filesize

                                    68KB

                                    MD5

                                    f5aadc03147d77ab7a70fe6264834ed8

                                    SHA1

                                    cba9736640d95ee657df2399933358c8ff32c18b

                                    SHA256

                                    7e3279436507b8a3df5b42f2abe80a18d79612f3f02393b149a473ec4df4ea1f

                                    SHA512

                                    84aa83da4b875a65e81339392602e59b6fe261ad84a710e92cab41877b7c0dc808226bb46d4f1e1a1588539408ac9f548df7ee6e2754d9e70f5b648285692322

                                  • C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\data\Launcher.exe

                                    Filesize

                                    53KB

                                    MD5

                                    c6d4c881112022eb30725978ecd7c6ec

                                    SHA1

                                    ba4f96dc374195d873b3eebdb28b633d9a1c5bf5

                                    SHA256

                                    0d87b9b141a592711c52e7409ec64de3ab296cddc890be761d9af57cea381b32

                                    SHA512

                                    3bece10b65dfda69b6defbf50d067a59d1cd1db403547fdf28a4cbc87c4985a4636acfcff8300bd77fb91f2693084634d940a91517c33b5425258835ab990981

                                  • C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\data\doxsys.exe

                                    Filesize

                                    1.0MB

                                    MD5

                                    8f36caf603f3f2b192c5fd06a8e3c699

                                    SHA1

                                    44f387152ee1fb02a83ed0be5e942fd4a733e235

                                    SHA256

                                    0ca828c630091173cafd2663393888849459fbc9581d1fd062567d0afdf79a38

                                    SHA512

                                    9df012c7420a4f6224907a8ac1e3293985b30c9ff829ecc9cdeea56fdcaa1c46d8e131fdd9b525e6af092065a29401c11f24390ba30969e9f3ab7e60e094dcba

                                  • C:\Windows\IMF\Runtime Explorer.exe

                                    Filesize

                                    128KB

                                    MD5

                                    4576eb05633bafdd3064313307a2ee6c

                                    SHA1

                                    73fce9ab20bb8b640d11f384f1375fe24271d842

                                    SHA256

                                    51e3ec5fd9d485eaa7582326eedb2fc16e43f9b3ca1c83d64cc80a73aeaff17c

                                    SHA512

                                    ec6109e71a991d84788395d51e1cc4e2212859e4ab293f2f7b96b4a9d439609b90ba6c73ee47b5a59d4dc1027a2946232157c2c6cfa4613abcaa8d3279716cc4

                                  • C:\Windows\IMF\Secure System Shell.exe

                                    Filesize

                                    45KB

                                    MD5

                                    7d0c7359e5b2daa5665d01afdc98cc00

                                    SHA1

                                    c3cc830c8ffd0f53f28d89dcd9f3426be87085cb

                                    SHA256

                                    f1abd5ab03189e82971513e6ca04bd372fcf234d670079888f01cf4addd49809

                                    SHA512

                                    a8f82b11b045d8dd744506f4f56f3382b33a03684a6aebc91a02ea901c101b91cb43b7d0213f72f39cbb22f616ecd5de8b9e6c99fb5669f26a3ea6bcb63c8407

                                  • C:\Windows\IMF\Windows Services.exe

                                    Filesize

                                    46KB

                                    MD5

                                    ad0ce1302147fbdfecaec58480eb9cf9

                                    SHA1

                                    874efbc76e5f91bc1425a43ea19400340f98d42b

                                    SHA256

                                    2c339b52b82e73b4698a0110cdfe310c00c5c69078e9e1bd6fa1308652bf82a3

                                    SHA512

                                    adccd5520e01b673c2fc5c451305fe31b1a3e74891aece558f75fefc50218adf1fb81bb8c7f19969929d3fecb0fdb2cb5b564400d51e0a5a1ad8d5bc2d4eed53

                                  • memory/60-301-0x0000000000750000-0x0000000000762000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/1008-296-0x0000000006510000-0x0000000006522000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/1008-304-0x0000000006A50000-0x0000000006A8C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/1008-216-0x0000000000EF0000-0x0000000000F4E000-memory.dmp

                                    Filesize

                                    376KB

                                  • memory/1568-132-0x0000000000F80000-0x0000000000F94000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/1568-242-0x0000000008050000-0x000000000806E000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/1568-136-0x00000000077D0000-0x000000000784E000-memory.dmp

                                    Filesize

                                    504KB

                                  • memory/1568-241-0x0000000008070000-0x00000000080E6000-memory.dmp

                                    Filesize

                                    472KB

                                  • memory/2256-286-0x0000000000D50000-0x0000000000D62000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2868-217-0x0000000000870000-0x000000000089C000-memory.dmp

                                    Filesize

                                    176KB

                                  • memory/3384-139-0x0000000002F60000-0x0000000002F96000-memory.dmp

                                    Filesize

                                    216KB

                                  • memory/3384-278-0x0000000007B00000-0x0000000007BA3000-memory.dmp

                                    Filesize

                                    652KB

                                  • memory/3384-277-0x0000000006EC0000-0x0000000006EDE000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/3384-254-0x000000006DEA0000-0x000000006DEEC000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/3384-288-0x0000000008290000-0x000000000890A000-memory.dmp

                                    Filesize

                                    6.5MB

                                  • memory/3384-169-0x00000000068E0000-0x00000000068FE000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/3384-289-0x0000000007C40000-0x0000000007C5A000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/3384-143-0x0000000005960000-0x00000000059C6000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/3384-291-0x0000000007CB0000-0x0000000007CBA000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/3384-253-0x0000000006EE0000-0x0000000006F12000-memory.dmp

                                    Filesize

                                    200KB

                                  • memory/3384-170-0x0000000006980000-0x00000000069CC000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/3384-141-0x0000000005A50000-0x000000000611A000-memory.dmp

                                    Filesize

                                    6.8MB

                                  • memory/3384-295-0x0000000007EC0000-0x0000000007F56000-memory.dmp

                                    Filesize

                                    600KB

                                  • memory/3384-142-0x00000000058C0000-0x00000000058E2000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3384-145-0x0000000006340000-0x0000000006697000-memory.dmp

                                    Filesize

                                    3.3MB

                                  • memory/3384-144-0x00000000061D0000-0x0000000006236000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/4432-287-0x000000001B4E0000-0x000000001B9AE000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/4432-292-0x0000000000910000-0x0000000000918000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/4432-294-0x0000000000950000-0x0000000000958000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/4432-290-0x000000001B9B0000-0x000000001BA4C000-memory.dmp

                                    Filesize

                                    624KB

                                  • memory/4460-176-0x0000000000A20000-0x0000000000A3A000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/4712-129-0x0000000004C30000-0x0000000004C86000-memory.dmp

                                    Filesize

                                    344KB

                                  • memory/4712-128-0x0000000004A10000-0x0000000004A1A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/4712-127-0x0000000004B30000-0x0000000004BC2000-memory.dmp

                                    Filesize

                                    584KB

                                  • memory/4712-126-0x00000000050E0000-0x0000000005686000-memory.dmp

                                    Filesize

                                    5.6MB

                                  • memory/4712-125-0x0000000004A90000-0x0000000004B2C000-memory.dmp

                                    Filesize

                                    624KB

                                  • memory/4712-124-0x0000000000030000-0x000000000006A000-memory.dmp

                                    Filesize

                                    232KB