Resubmissions

02-01-2025 17:54

250102-wg6gyszndw 10

02-01-2025 17:46

250102-wcm5tasqcr 10

02-01-2025 17:29

250102-v2qfsszjgt 10

Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-01-2025 17:54

General

  • Target

    DCRatBuild.exe

  • Size

    1.9MB

  • MD5

    4b61a00f5577de5a7ee8567df7493cce

  • SHA1

    99a5213aa902c60d51b91e109060888155c38216

  • SHA256

    c605ffe0512bb5accf0d1eae0b0e3642734bd6af198ec97c584e56f4b0ef16a1

  • SHA512

    5dc268fb96f453f4143e01a31ccb5496cdcf3ad22a45a0fa5326fd2e888ee8114ec546ef21cf6c21c3a044497e7c54635bb93d5c11d368b533ce78b01f204ba1

  • SSDEEP

    24576:2TbBv5rUyXVDI0yOyS/zqhGaicQCSIHs2VF2r3Gdi4d8bC/HxGu2AA4VsXaaWsLh:IBJkzS/daDsz74GG/RGubA2sX8sLVP

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe
    "C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\unityerrors\bYeXWJBH1D29N8b8xhxhApBfWgwfPCJJ.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4588
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\unityerrors\T6hu6d4Qn2VEtC2DhOZHt9ctteszFLQsKEuCXmaSiscHtJt.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4436
        • C:\unityerrors\error182.exe
          "C:\unityerrors/error182.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4280
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RQ08JCBy1T.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2096
            • C:\Windows\system32\chcp.com
              chcp 65001
              6⤵
                PID:3552
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                6⤵
                  PID:3160
                • C:\unityerrors\error182.exe
                  "C:\unityerrors\error182.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3360
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
        1⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x10c,0x110,0x114,0xdc,0x118,0x7ffa8fda3cb8,0x7ffa8fda3cc8,0x7ffa8fda3cd8
          2⤵
            PID:1696
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,10760484344199614194,9666167900491997276,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:2
            2⤵
              PID:1952
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,10760484344199614194,9666167900491997276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 /prefetch:3
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2168
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,10760484344199614194,9666167900491997276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:8
              2⤵
                PID:4516
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,10760484344199614194,9666167900491997276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
                2⤵
                  PID:2700
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,10760484344199614194,9666167900491997276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
                  2⤵
                    PID:2952
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,10760484344199614194,9666167900491997276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:1
                    2⤵
                      PID:4620
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,10760484344199614194,9666167900491997276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:1
                      2⤵
                        PID:716
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,10760484344199614194,9666167900491997276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4116 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3932
                      • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,10760484344199614194,9666167900491997276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:956
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,10760484344199614194,9666167900491997276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:1
                        2⤵
                          PID:764
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,10760484344199614194,9666167900491997276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:1
                          2⤵
                            PID:2832
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,10760484344199614194,9666167900491997276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:1
                            2⤵
                              PID:3628
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:2088
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4448

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\error182.exe.log

                                Filesize

                                1KB

                                MD5

                                06b6e970c1277570433f7e5a622fa88d

                                SHA1

                                b58eb5ff3589dbe6d752686afbb736a2437dbf92

                                SHA256

                                bfd7f3baffb00c778d03362aa26ab616f5c13cbedde5fbdb92855983af34719d

                                SHA512

                                0608b12df061b9926f658723e192150ba62ded48005d1e7fa0a5071d0b7fd68b2257a8f039495d70aa03d0435c654e42a9c6c33901e3655f6e5b08a6ba6b4090

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                02a4b762e84a74f9ee8a7d8ddd34fedb

                                SHA1

                                4a870e3bd7fd56235062789d780610f95e3b8785

                                SHA256

                                366e497233268d7cdf699242e4b2c7ecc1999d0a84e12744f5af2b638e9d86da

                                SHA512

                                19028c45f2e05a0cb32865a2554513c1536bf9da63512ff4e964c94a3e171f373493c7787d2d2a6df8012648bbefab63a9de924f119c50c39c727cf81bdc659f

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                826c7cac03e3ae47bfe2a7e50281605e

                                SHA1

                                100fbea3e078edec43db48c3312fbbf83f11fca0

                                SHA256

                                239b1d7cc6f76e1d1832b0587664f114f38a21539cb8548e25626ed5053ea2ab

                                SHA512

                                a82f3c817a6460fd8907a4ac6ab37c2129fb5466707edcfb565c255680d7f7212a5669fe2a42976150f16e4e549ea8310078f22ed35514ee1b7b45b46d8cc96e

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                2e5f8c2c3e21e6053bfea3f965cbd8ca

                                SHA1

                                78bc20f013428100a22682477e3177a15c4bf8cb

                                SHA256

                                79c63455322ade274831e8099b17a2c6c2ec6373a548e3e32fc6ce70351376c5

                                SHA512

                                ebb58932a5ea85c8425247d1c8050acd105303f308d0b1f57ee634defd82370a2232113fc991382ed59f92fb4fefbcc20f24299ba48fc15d6683c42d4acde511

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                25cab2349a0cc6de056d6be878955efa

                                SHA1

                                d7bc7c41454d8e741170da180e3f4ee4aaad0674

                                SHA256

                                314032666ba9d16809b745e09cd42455e2f693a169397557a300fc1b5f1b6662

                                SHA512

                                f2f32d235c7ce48f9522a7f0e2fd73341c497a01ef31d609bd7bcfacfe34ee402ce0033f18804772b75720186e6e425f949d2f4a1c7dc53d18cd4004195c45de

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                47a216630ad36817682d808a72eca4e6

                                SHA1

                                80db393f679cc5f266442e283e4c43e82e624840

                                SHA256

                                ee53288c073fd514d5929e1d9ae1df86bc5c917687e340b5586f62b5f028c002

                                SHA512

                                729a06186723b7195ce9f6116df76bf2c5cb36dbc13c2ad67ecc64defe2578a76a389e51b589c06dde80343963839fdcb537741374c367da2843e50e5433a41f

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                ac1f0d1c2dbd39463abfb53c9d0c87ac

                                SHA1

                                111af1d8f6b0d05a35e4b04d6987eada78cab6c3

                                SHA256

                                0ec3df8fdcc9028c83931793fc5cca7f26e747d5ac6252289ce28e4b9c8edf73

                                SHA512

                                f58916370207119fb08bb30204f812b32194f237faabcba917d04587a29cd1917a7c3f401061b49a3acd9b564ebf73598b188338883ecbf14f5b3b6f1f4c0f2d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                88c3f4950d690716fbfe38db2e41091b

                                SHA1

                                85822dc09c164b91ab9af701980728abb6704e9e

                                SHA256

                                79dd29c70a82d8c2028ed93ef41d94df078a19c0df40d63504da73ebd8a49954

                                SHA512

                                dbefe137072d7fd35c7b0dab90948ff9a6715258807a79d0603065c6b1e57f68364f4d03f8dc943058fae7d116f40ed707f8167f2a33ec5eeeb601332e98c14a

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                Filesize

                                264KB

                                MD5

                                9b2da17546101f57b564f71ebcb3f67b

                                SHA1

                                22e3926ebafd0fcf89f1ca424c8886329a619320

                                SHA256

                                7944a1537f5206d9aea872843562dca19bd1261cba31bc5377ad1140665f71c0

                                SHA512

                                627679e152c5d9dac3f7b96e83101951e2196f706966b9f454d3a9d4700fb04398d8af929136b95dbfd277a6271da301cd8e9856af01798d99156155bbc3d6f2

                              • C:\Users\Admin\AppData\Local\Temp\RQ08JCBy1T.bat

                                Filesize

                                203B

                                MD5

                                e6458e57a0097e0a0a532cc4858a7549

                                SHA1

                                b47fd184bfd31428120e77518ca6e87afb353138

                                SHA256

                                6a9e36083023e890fc2a8b438fc919c07b5428117ceb9b55d29cdb6abc7b100c

                                SHA512

                                ecbb32291eb3f4a30ecba796863e592d357bc4350067e36a69bfd752043084b36b327b5883fa5a6fc8fc53978b131bf7c7bf7409821db61af859ef5cc2caa852

                              • C:\Users\Admin\Desktop\CloseEdit.ps1

                                Filesize

                                430KB

                                MD5

                                fcd5ef3a5f9b29e3fa31fe7e7224b8b4

                                SHA1

                                4f0c989afef899a903e303d789a52ed0283d9e19

                                SHA256

                                472726e5fce576db31cd4df5e59df06e44ac52222f507e26bdcfd8ea12390861

                                SHA512

                                cee862689ff58352c613f827dad78e70b5cf8407263595a5fe9f96d2ed5efaba2677100f337b2aea8656b299d8a00b70b8242679bb558a589875f3f8fedabb63

                              • C:\Users\Admin\Desktop\ConvertExport.xlsx

                                Filesize

                                11KB

                                MD5

                                6066300774d012c6428baf3dba1d3d5d

                                SHA1

                                50ddca78070fb40e2e10cffd10b0221d90a4ffe5

                                SHA256

                                c983fca4173f259852d3605ebfb855403a2c2eaa0ad00f407219a6eefae83377

                                SHA512

                                8c5fad428dc45058655b5d7871d06d6520269bb1184b961fbf8b938d966cc16a02b098d4aa35293605e169ec705e20669796adcf15927fc9548927e02a2ef026

                              • C:\Users\Admin\Desktop\CopyDeny.jtx

                                Filesize

                                211KB

                                MD5

                                93071388d8b4abc2dcd7b8913b74f684

                                SHA1

                                55f377f9862354ebf4003572965950dccb38fbd0

                                SHA256

                                01858af4c91e87fcb00c2b3a063f2053d682e842e01025a5d482f27e37775e89

                                SHA512

                                0cf6b3aeb363fb27291635ebb8f7278233df9107232a0b9ce432452ee9341772bd143b232e05b96238525f6c0358bdf77a4ca0cbf3da5428be4df46eba9adc7e

                              • C:\Users\Admin\Desktop\CopyWatch.odp

                                Filesize

                                172KB

                                MD5

                                dbc1b606f264bbe45f654bdee68617d1

                                SHA1

                                e8c6fedefc98891a90926adae680c45a1abb11de

                                SHA256

                                0f394f0c5bb10fd80e6cc1c9f60da450c3cdfffc45b8d386a5983cc592c4037a

                                SHA512

                                075cd0f33d5f5b1d56e82c9eab4f576bcec571b6c2661093c1bc4d5e1a29c89ab7edb26e8d8aab57e1034b71a452c64698484bd99fb8cae4adbe51ba8cd571ee

                              • C:\Users\Admin\Desktop\DenyNew.reg

                                Filesize

                                274KB

                                MD5

                                e839c05b48e58fb79227bf33bb0b703e

                                SHA1

                                823cec965b8d907de251a1313bcba17b37ba9dbb

                                SHA256

                                ef680af1e802a4c6c810694dc4c526277c26ee4e35b350f4f37e06cc88da814e

                                SHA512

                                d84bf6986be3727fbf513b5051c136882f7efa101840e43e7beaf8a2858f934b85560c3257788a66489df31c444a27549f0040edb9bf752d364b7428cd7a84d0

                              • C:\Users\Admin\Desktop\DismountGet.mpa

                                Filesize

                                133KB

                                MD5

                                01224342214bca96a68fcf91c98f89a9

                                SHA1

                                28516e1304f0542956333d58af8a380ca7c5f8b5

                                SHA256

                                5d54a9cdad5fa20ec71d66e8cc540e2dc02cadb5e4648660964185e09515c792

                                SHA512

                                c409fd1ef53c39bcebf790ad7208e666dab4b9bbb213454120b95504c3563306aa2a9cd6c404b242efd04f8f456b9e2f4aa2530c88a7c57c47ef7b3a9dc130b6

                              • C:\Users\Admin\Desktop\DismountRestart.nfo

                                Filesize

                                266KB

                                MD5

                                bae48a3205f7d258c88a29ee0ac7492b

                                SHA1

                                b1a84519f1321460a9bfb7f71fbd2b9042c930ec

                                SHA256

                                4b01f61e5806cacd859641b256aa84e9c4adf555c5474575a6df750a2ce10450

                                SHA512

                                7d75d022d6acfb8ab43827277ee35b54db1cfa0753842f53e097e935ac3a2b7c285cf324ce0fb799e9012fb231ee7aa9465625eeb2eb7202cc3e080053d09f02

                              • C:\Users\Admin\Desktop\ExitConfirm.wmf

                                Filesize

                                188KB

                                MD5

                                98da0f9635f2036862a4d7bc63c3e659

                                SHA1

                                3920861c3d947beb43f864e2f5a472e9d10776ab

                                SHA256

                                a6275411b1f3dc5ca60d5dc7b6ae46e3a95b234f69af875dbd7cc38819d90a23

                                SHA512

                                60bc367790392b79b755ad39ac12cf285de548214f36ab74e60ac63b496a1e1eb834133f835b59a72a6b32194552364c0246d27faa2f61ca9360c5e05224b70c

                              • C:\Users\Admin\Desktop\ExportConvertFrom.docx

                                Filesize

                                19KB

                                MD5

                                8c0c5f112608069219669017048a88d8

                                SHA1

                                30bc6295f4dec7b6590ede78135ee88b55b4b8e5

                                SHA256

                                4a30b08f0c4478bdd7980832f2aa11540f19ef688661f75672872544381a12b9

                                SHA512

                                5de7604bf8b1ae2d36748bfd8ae294fc32317d1cf0a5053351b4d3ab6b4b929366b6d7505b864f26a0185cc189133db86df8dbc5d65c5e81a664d313a15afe90

                              • C:\Users\Admin\Desktop\GroupStop.rm

                                Filesize

                                141KB

                                MD5

                                3ac30cfe2493fa113321828ce6cad7a0

                                SHA1

                                26458deba432bf328ccb764744e612a379047c77

                                SHA256

                                5a1c452d53e7929e33cfed29855d34637bbed6e6fa085a0edaaa003071a96bb5

                                SHA512

                                8bb1f38e5df4ea073d138128fbae47e2e7b6008034d7ed0543f86f8ab2b6f7217f6caf26c5be9942cb367703a59173d3b8975f750a174b5d5b11360c72559d92

                              • C:\Users\Admin\Desktop\ImportCompare.pub

                                Filesize

                                148KB

                                MD5

                                eee28e450fe17bfb57a3c4e0369b7ddb

                                SHA1

                                f7933b91aafa459229dcf0053ebeabc31bf637a6

                                SHA256

                                69f30acc4ac5e68afbf5e148be3104c23115417eff374234ae24159c60b6b7e3

                                SHA512

                                dfc47ccb7e10813fdcad84c0f7d781ed5112ad5dbf627a0ecc9ee73b17866feff78de1a1c19baa31e82e31f27567b18e6bcc98ee55539e3446296d910be99cb1

                              • C:\Users\Admin\Desktop\ImportRegister.vsdm

                                Filesize

                                242KB

                                MD5

                                8e0496c4ba1444e81c5b595f13e9cd29

                                SHA1

                                f2d8c336e91733c332c55f4e6b498428765165db

                                SHA256

                                934a0d84c9935b9ab0e2aa37c5ceef3664a71e54dc9683c2317682ed0b41e520

                                SHA512

                                535bae14c39eafe2fba7fc823caa30debb8ad4f5198837f60826a3dfa6ba7972c6e3f66cff7dd1132f7258ffebc57866b67172f431af0b119d7a294bcee7730b

                              • C:\Users\Admin\Desktop\InvokeLock.xltx

                                Filesize

                                180KB

                                MD5

                                6d9762fff58755f47d5fd8bc428abf53

                                SHA1

                                9ed8a6ed2f9bb01d18da8ac7f3199c17fca47002

                                SHA256

                                339ddbe4a4914780e6358f0812951ed4c55306cba71b2acfa7d33f3bdcca5b22

                                SHA512

                                82f14299c4f42e56be5c55178e91ef64cbf123f6be8db0b5adc3c7a05a928fb13c1a8e585db3a2e41186abd5e4bbf1c99caa7356e6669a04129abd16883df00b

                              • C:\Users\Admin\Desktop\MeasureSwitch.ps1

                                Filesize

                                305KB

                                MD5

                                f7375464d230448d3225d9a11aa3c6bc

                                SHA1

                                72229eee309ac0279e49f40b7d955d72b2f6ad46

                                SHA256

                                597a887eaffb3de11d92157b1f0cd1279272030829d8475be9a3fb5d397da6f1

                                SHA512

                                c38786c12760cb5dad717cf3820c5032ecd0b01c471630f1706c13203d6653af9155693215d59d3e9f262c5397f8bdc8ce0c373961effcc4a12804ea76ff4818

                              • C:\Users\Admin\Desktop\MergeDebug.mpeg

                                Filesize

                                258KB

                                MD5

                                dec67ba57ade0cd6ecfb3b869c35f810

                                SHA1

                                abb748be5790041703c446131316d4336b374787

                                SHA256

                                c5b0759849c58f8b64bac8af1c5ab58c4c555023bb20156ad62e93aef875181d

                                SHA512

                                5713b82bab6fa22ba50923721c4c3f3e9e1cde030860ec1227ded2492a155e3c386ce900036ab575688c25a29b1ad929a405c5ef98eb489dfe794fdad2eec702

                              • C:\Users\Admin\Desktop\MountBackup.pcx

                                Filesize

                                117KB

                                MD5

                                199977ab5c64b107015c9a69a79a2729

                                SHA1

                                c989f699dcc90731366d6ded458ba8e8e12574c8

                                SHA256

                                13af3d7a0bc3b0c1ddd061222854ae8d077c94686d07b1a7d401d7c216fde180

                                SHA512

                                ea962b1ed6666286f7468d5ffa79e21de98dd6515734df662abe92d7818e54b5b796adcd818e1cc4684fd60bad4d5257367c9d159310f52569fc4bc685655893

                              • C:\Users\Admin\Desktop\MoveDeny.mpeg

                                Filesize

                                125KB

                                MD5

                                fb047c1aeb2796a6dc8fa54a0d2368ff

                                SHA1

                                8ace76a179c054c405e94cb09ef87669574ac880

                                SHA256

                                d67f03a22e35570869b1c9f62de455927e743daf51caad33e940e1689423af4a

                                SHA512

                                5f6165be3eb8d4db84ef844e732bb7546f901ee3869dd342b3712441dcaf3b480e6bf24f5cd7669b12bf65153bd0d5c3cab0c7828b6432978dbe3254adb68ad3

                              • C:\Users\Admin\Desktop\OutEnable.tmp

                                Filesize

                                203KB

                                MD5

                                6bdf1d348e65e3c02c9c3b681332dcad

                                SHA1

                                7f454e7556f10d6af306f8c2a65697e0e2181bf9

                                SHA256

                                012fa26c8213315a35264351563495b8e9bd1edac49c5dd8bac40ab990c3684f

                                SHA512

                                de832c56dc4bdfc98e692e1aa769560d73f3eaed266cff5bde42008ca7237d053be0ad04faef49501352b482cc52c74aaa544428453d0ae1e7b3adfaf39cb3f2

                              • C:\Users\Admin\Desktop\PingCheckpoint.dib

                                Filesize

                                109KB

                                MD5

                                38e596b2dd5ad5e5065f6a6504507e51

                                SHA1

                                dc45623bb37aa7f1f57fb65361e16030770d2147

                                SHA256

                                7fac26fcc96aba2de515cd2d0a112516e35e74b0b4723467329230685d3a17d8

                                SHA512

                                501dcde2866e3155588b6f40db1918e96e9d4609c5fc2e58bb3dc45902a75283845405742e0edbc35e8f82c9b79c584b823a1e9c01a1f7e1be6f093be3299904

                              • C:\Users\Admin\Desktop\PublishEdit.M2TS

                                Filesize

                                156KB

                                MD5

                                3432b66bfa361b7b0d984c34c8941307

                                SHA1

                                7921f1963f867c7216e626b388d80dbe41e9c0bf

                                SHA256

                                953647ef51ed25640a870c10b8b99a5dfbc91eb91c718939884c2136245186eb

                                SHA512

                                e90f291dacbe80b0399168b338abe49f262f6f8faf9bfec1eb8c9c1df3d87e768c8c3299c96b74a92ef73a6c54715e8ef88ed8c4c938d40ea49b07455df14d63

                              • C:\Users\Admin\Desktop\PushDisconnect.crw

                                Filesize

                                227KB

                                MD5

                                ca17c16f45c06be3ab45b6ae14d55757

                                SHA1

                                d6120e133e47c312a1f5cd320e7bdf31a1fd8370

                                SHA256

                                9d49191418eae2c8c2411f78e9472fc0cf4eb56bdebcc1ffdcde79ac5f942794

                                SHA512

                                7e090d67097d5824fbb5c342f748cfc4f85898116d6b763f682418546d0922e6c6e5b9fbfded5c9197d19c2027db1993eda8b95582da2bf38137cec2cdea6d2f

                              • C:\Users\Admin\Desktop\PushRestart.vbe

                                Filesize

                                235KB

                                MD5

                                ae54f1fce1b7a4e1675f08ccf9a60abb

                                SHA1

                                2d395d0c506a0c962f91343451bac0976f018d21

                                SHA256

                                c6ca99a017f94cd1334ba75d76f19afd86ebed67148d887bb15a5f3830ecf9e9

                                SHA512

                                b2e8c272829372560ef2abbadae6220ed818a70153bf866ae52aa19d96f9f34993e10240099398ed42afc7ff8120dc0a55e9b8fae02eb99d6494f29b0818fd8a

                              • C:\Users\Admin\Desktop\ReceiveSearch.xlsx

                                Filesize

                                14KB

                                MD5

                                4abf9fabd6c4d3ceea1f7303a1d328cc

                                SHA1

                                0b270eabda152a76c073e4f30c79a4c8e3befec3

                                SHA256

                                dc65feabb3e69055ea364dfddf91e622c9f7bc8ce3c0741232ae33f4b9392973

                                SHA512

                                3b618936488c3d212cc490e348bf948b15153c35df8acbe078e29933dc42ba412a83d8d978187b67ccfe75782c0ebe078569d87a4552872237b4ab6bbda3bdea

                              • C:\Users\Admin\Desktop\RemoveHide.docx

                                Filesize

                                15KB

                                MD5

                                5f05bbea4080aedcd06f3d7a49c8eaf0

                                SHA1

                                a757d6ec22ecbb0431046914a47e4a12656ce114

                                SHA256

                                a3516e18085fa731bc732e2c28673fa3f7f8a373b13715fb50699c5c44402656

                                SHA512

                                bc01f6363338580275af673f15381ac974680a0d00e2a72821f49b6d49b263d22f649ff2a817cba408032da7777dfba065908970983f0c2797caefa84dd58415

                              • C:\Users\Admin\Desktop\RenameAssert.xht

                                Filesize

                                164KB

                                MD5

                                64a6cf61ebf439f9c77b5ef75ec05ed0

                                SHA1

                                4e139cab4cd0c3a5717ab392f5bf8106b8554d60

                                SHA256

                                3f045504b479e26f990973ddb907641708c6a535ef35123e04749916eafacc1f

                                SHA512

                                5a65f4323ee62adcb15684b719b6b456e3d3b1756d0eef71320462f6e5128e4a2300abafa210c4ccfd0d28c79e958f9780ea0cb49655c39ba08830d6c9d910a6

                              • C:\Users\Admin\Desktop\SaveUndo.mp4

                                Filesize

                                289KB

                                MD5

                                ca0fa782fbab0834105fbfc9b36d3777

                                SHA1

                                8000559f2fd95e3c3fcbcaf2988ab39d5cc2ad9f

                                SHA256

                                17c8e76bf655e6aac0b2cb8ad30be9d7c2fc90c0bee4eadf3dff12ed6b3ec1cd

                                SHA512

                                b39d5942d1005cbf62720988d7251e41d196985dc872a4cbb8f3b6d9f1c31b551cde9e13df1790d99b3b01ed7c542bad3d6c62a8f73646664652bd0b4980d91c

                              • C:\Users\Admin\Desktop\SelectDismount.lock

                                Filesize

                                250KB

                                MD5

                                846a9ad6d3192ffd8fa15fc24917850f

                                SHA1

                                b428f599b360bfbe5a2476834d14ccee5a260681

                                SHA256

                                ab99bfe05160b34db05bbb3ea7108d06ccb7c9dddf7258c51532af36ee711db3

                                SHA512

                                e68ecdb0144a9bf01be9cd9adce91b3ae4cc53d9557f5bbe5951f5052e90bc691344946aee50b684a1cd201b18c064cc7e90b8812fb0d7da4db15c214650128e

                              • C:\Users\Admin\Desktop\StopNew.vbe

                                Filesize

                                297KB

                                MD5

                                ef3b4b99e33d2e1299872b1136bbe2bd

                                SHA1

                                6e9344565c25fc61eae3771766e240004beca752

                                SHA256

                                40325944820026dacc57570ffd7350e47530acfd591f48273765f37701e498a2

                                SHA512

                                0518816dad0d7a579e6ea4b4771b76d9193da250d3fd35b33b25f3d441216995f48abdfb01c226936742473f59fda2483356967dd54cd988cb47e13edfc68c2b

                              • C:\Users\Admin\Desktop\TraceSync.tiff

                                Filesize

                                195KB

                                MD5

                                15d0000235e4ae459ecac83b04e81a85

                                SHA1

                                994b0d0d2d0c61744ebb4037676d38a083e56321

                                SHA256

                                5dbeac1bf1793ed4bc89286a12895496f54c2c22c67481ab6ac50401660ed1e8

                                SHA512

                                b878282fefa010ba6c946e9131f4f701565eee8c5b2788327a0266b0de2dcdd3d27e98b1f3d117dac055255a659a27c20db714cacd240aadb3c37a53c8aa6982

                              • C:\Users\Admin\Desktop\UpdateRedo.bat

                                Filesize

                                219KB

                                MD5

                                e85246378aa1159400a28dda8940cf7e

                                SHA1

                                12025636f8c0952a16ea7896798e53a0bffd97b2

                                SHA256

                                90ec0ad0499a12df4c1ad309d945d87bb65be2744f2d07c164de56f5392c6c5c

                                SHA512

                                f787b7865ce78cfcb8c15caa7c12137c328efaa91a92c20785e1a0c12906dc9bf18df6cc6b93c8578913e475e924b44a4c4d9f0e57c521cdcc133283bfb86654

                              • C:\Users\Admin\Desktop\UseSuspend.xlsx

                                Filesize

                                9KB

                                MD5

                                add929487c016f8faba6aed0a438b013

                                SHA1

                                2917bb03ffaf9ee18758afef671158641982a7c7

                                SHA256

                                9bed3da3f31dd03d74f0512fec61995a1270777381069e7381c9e85049e3670b

                                SHA512

                                9759c97dfcfe0b59579de0e902f869a69bee3ef56d8f077199f95c0aa9bffe8935f788e79031681622de8aeeab77e7838d0f430b29082fcc6269332e24e2efd1

                              • C:\Users\Admin\Desktop\WaitUse.ppt

                                Filesize

                                313KB

                                MD5

                                402c84098ec815995e027686e65a0fa3

                                SHA1

                                9574459f7e163ec570431705fc102b430cd3d799

                                SHA256

                                36a743a2124bae3e5e3eb2869c10de0f62726339b6238bc85d0993cde17e73a1

                                SHA512

                                208bd3ad865787f98ac90e37019de799fdcd5edd141e23340bfecea8a88244f11789206056188cdf049417067153aeeafa84a839821783888085297c9cd42cf6

                              • C:\Users\Admin\Desktop\WriteRevoke.wm

                                Filesize

                                282KB

                                MD5

                                1c4afc6b3c56807b5e6a59ba44dd0462

                                SHA1

                                40ce8a27986f6593375b162fbb97887370d6e9ed

                                SHA256

                                3d864cf6686f359a409eb87fe83ca883372924e68d5ec1bb8f77f411029ce38f

                                SHA512

                                43288de4984b57c38c42d2f9ae298ae78c42c5a87e2785039a2546401a16f9a18e2544aa64fb469a818cf2a4051e367f1238b64af0ef3a04188a563fbc091f1e

                              • C:\unityerrors\T6hu6d4Qn2VEtC2DhOZHt9ctteszFLQsKEuCXmaSiscHtJt.bat

                                Filesize

                                77B

                                MD5

                                9faf77c055a261b24b5c1e15607985e9

                                SHA1

                                23f8c09e9c2da05c1533818121a462bfee913cff

                                SHA256

                                264e26a51dd4b717829415e521d4c87e7c5e9d7721e063640b8195ef76b74981

                                SHA512

                                f27c2b7b3e23a8bdcddb879aa2d0dd0d0b53f13b384a0cbfd95da7edc0c70be5804b61a2866b4db5a681cc955894088ca3c51bca35eb8bf6f2ef19bec9e42bf1

                              • C:\unityerrors\bYeXWJBH1D29N8b8xhxhApBfWgwfPCJJ.vbe

                                Filesize

                                247B

                                MD5

                                d3b7b0c12c82a0bd7f49b453b6898fe5

                                SHA1

                                f718ca30521e8b23c73c68eeff9f892bcc99fb34

                                SHA256

                                a0d22126a686c63d048a94e1e2c3f7d8c6552fd9047f685a76ceb20698902cca

                                SHA512

                                3a2819e72391c1233b1051262ac0a59d402ea7e6758b65da72d0224a2fec8ff6214cab39e5786fbdec23b92b0b28822df2746a1ca88ff5dc2dc0ebca9275cbe9

                              • C:\unityerrors\error182.exe

                                Filesize

                                1.6MB

                                MD5

                                bd6014af94efc99287a35feb118c40cf

                                SHA1

                                524aeec33273c9051ddd4a7d40c45ccb3ab831ea

                                SHA256

                                9fa75ca22d9d82496aeac9ddcc9c0a9deb0438a7748c0a71d4ee13ca4c22e558

                                SHA512

                                e8718ea2a84419dafb35418dd057fd3208599119df11190634b5091c87e6b81585d37cd6bf1ee114aa44ef471046a99035b6ef7231c43b12068e23cfb691b453

                              • memory/3360-141-0x000000001DA20000-0x000000001DA7A000-memory.dmp

                                Filesize

                                360KB

                              • memory/4280-13-0x0000000000F60000-0x00000000010F8000-memory.dmp

                                Filesize

                                1.6MB

                              • memory/4280-12-0x00007FFA94BD3000-0x00007FFA94BD5000-memory.dmp

                                Filesize

                                8KB