Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    09-02-2025 13:31

General

  • Target

    0326262b2d4562cccb0993c92bafd36f.exe

  • Size

    3.7MB

  • MD5

    0326262b2d4562cccb0993c92bafd36f

  • SHA1

    8ee1f6eab09f94cf7e41a22a94adf828a1397418

  • SHA256

    2ea69f49817149fb5d008a79ac6975b890d949aa57708f3cb76fa15d8ce3f106

  • SHA512

    bebe1d74e9076b7450a843dca179fe1091ff500ccab3897f526115f1f79a0931d5e9ce1f80bdfee67bdfe8e7c898630477ce1d554b1f3a579f977f6c094784ba

  • SSDEEP

    98304:qsrnfPTGPZp08A5lsdhunb72ZSXD94p2iqk:qOWZp0x5lbWZSp4T

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 24 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 8 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0326262b2d4562cccb0993c92bafd36f.exe
    "C:\Users\Admin\AppData\Local\Temp\0326262b2d4562cccb0993c92bafd36f.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\q0.bat" "
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Users\Admin\AppData\Local\Temp\Buildhid.exe
        buildhid.exe -p2222 -dC:\ProgramData
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\ProgramData\Build.exe
          "C:\ProgramData\Build.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1468
          • C:\driverHostcrt.exe
            "C:\driverHostcrt.exe"
            5⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2908
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\P13wV4ygMl.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2636
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:2668
                • C:\Users\Admin\taskhost.exe
                  "C:\Users\Admin\taskhost.exe"
                  7⤵
                  • Executes dropped EXE
                  • Modifies system certificate store
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1780
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a8dace94-1f3c-4934-8514-92a7fce0a0e6.vbs"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:580
                    • C:\Users\Admin\taskhost.exe
                      C:\Users\Admin\taskhost.exe
                      9⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2964
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7a6d71e0-f3b8-4d2e-96c2-6c7220c7c893.vbs"
                        10⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2788
                        • C:\Users\Admin\taskhost.exe
                          C:\Users\Admin\taskhost.exe
                          11⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1476
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\64d02890-eb93-4f93-94fb-969b9099c5d6.vbs"
                            12⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2084
                            • C:\Users\Admin\taskhost.exe
                              C:\Users\Admin\taskhost.exe
                              13⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:1096
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\76627d91-e824-4997-8570-fc343ba779d1.vbs"
                                14⤵
                                • Suspicious use of WriteProcessMemory
                                PID:1084
                                • C:\Users\Admin\taskhost.exe
                                  C:\Users\Admin\taskhost.exe
                                  15⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:2684
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\afab9e69-204c-450e-9302-8c5dd7452a0b.vbs"
                                    16⤵
                                      PID:612
                                      • C:\Users\Admin\taskhost.exe
                                        C:\Users\Admin\taskhost.exe
                                        17⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2764
                                        • C:\Windows\System32\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0e0b16d4-e3c6-4ee7-b567-81c79a4a2e4c.vbs"
                                          18⤵
                                            PID:2964
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7f459c00-34c5-4b12-85d9-2ae67fe14efa.vbs"
                                            18⤵
                                              PID:2912
                                        • C:\Windows\System32\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d28c46a6-494b-4eba-854e-d885219624c7.vbs"
                                          16⤵
                                            PID:1780
                                      • C:\Windows\System32\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ee18becd-c065-4b51-aaec-1ccb32df83a4.vbs"
                                        14⤵
                                          PID:2512
                                    • C:\Windows\System32\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\248b0a09-1adb-4675-b3a8-7b521052241c.vbs"
                                      12⤵
                                        PID:2088
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a2064ddc-72db-41a3-a489-c1a21bc56dce.vbs"
                                    10⤵
                                      PID:2928
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d9be4f16-4fcc-410c-9bb0-985c500d2b74.vbs"
                                  8⤵
                                    PID:1748
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Media Player\System.exe'" /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:1940
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\System.exe'" /rl HIGHEST /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:2380
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Media Player\System.exe'" /rl HIGHEST /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:3044
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\services.exe'" /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:1892
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\services.exe'" /rl HIGHEST /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:1808
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\services.exe'" /rl HIGHEST /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:2800
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\taskhost.exe'" /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:2364
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\Admin\taskhost.exe'" /rl HIGHEST /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:2236
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\taskhost.exe'" /rl HIGHEST /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:2484
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\sppsvc.exe'" /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:1096
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\sppsvc.exe'" /rl HIGHEST /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:1124
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\sppsvc.exe'" /rl HIGHEST /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:788
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Favorites\Windows Live\audiodg.exe'" /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:2080
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Users\Admin\Favorites\Windows Live\audiodg.exe'" /rl HIGHEST /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:2836
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Favorites\Windows Live\audiodg.exe'" /rl HIGHEST /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:1088
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Sidebar\taskhost.exe'" /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:2528
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\taskhost.exe'" /rl HIGHEST /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:1644
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\taskhost.exe'" /rl HIGHEST /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:1992
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Windows\Migration\audiodg.exe'" /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:2192
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\Migration\audiodg.exe'" /rl HIGHEST /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:2300
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 10 /tr "'C:\Windows\Migration\audiodg.exe'" /rl HIGHEST /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:960
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\smss.exe'" /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:1456
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\smss.exe'" /rl HIGHEST /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:956
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\smss.exe'" /rl HIGHEST /f
                      1⤵
                      • Process spawned unexpected child process
                      • Scheduled Task/Job: Scheduled Task
                      PID:1100

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\0e0b16d4-e3c6-4ee7-b567-81c79a4a2e4c.vbs

                      Filesize

                      703B

                      MD5

                      7657414ca9bf5db89e5f29131ebf4dc4

                      SHA1

                      f27abfc3c7106c5336970b256c555c05316666d8

                      SHA256

                      7036d9d6a2ac11ff18a9841cd70e718ab1a98e0daa7ec731395b4121396e66c4

                      SHA512

                      1645a2912db3e2abec13b6436270f5a5be250f6cde6a7ed0e7cb8fd7751781b447d810d200c94a58066fa45ad0f8599fb8a290b20199ab7ecc2edc784bf46944

                    • C:\Users\Admin\AppData\Local\Temp\64d02890-eb93-4f93-94fb-969b9099c5d6.vbs

                      Filesize

                      703B

                      MD5

                      f561390ea3e3e60e366850c2b45d1ee7

                      SHA1

                      ed4348bbbd895e5a90f05298f9de53acc22df4c2

                      SHA256

                      4c6e6c74630fed6b3e702c971707744afc68c2dfc7d7ad2f01c13d81ebf52672

                      SHA512

                      661b13ba02aace38c40734edac7099eb022d82899161a48b17619c67fefc6279c2d4c89f4fcc7d47ca733c52a78dfc45991c14ae6ea0951f72a725b3d6d0c130

                    • C:\Users\Admin\AppData\Local\Temp\76627d91-e824-4997-8570-fc343ba779d1.vbs

                      Filesize

                      703B

                      MD5

                      5650e45626cff6d14a6de38df57160e8

                      SHA1

                      f2384e81d805124048e1aedae1c0cef31dc59ade

                      SHA256

                      72cb8ff67596f788792d544db3709e66fe59fe1e9ab12faea076d0c3e83af04a

                      SHA512

                      dc1cf2f7ba20973ea1283383d529a4d0205786a7636410f6645637c537b902092195837dd028401c0e7bb26492738e46d402b5d1ca013775f69c46994319a750

                    • C:\Users\Admin\AppData\Local\Temp\7a6d71e0-f3b8-4d2e-96c2-6c7220c7c893.vbs

                      Filesize

                      703B

                      MD5

                      13082ff623a01b882eecb219e93c3859

                      SHA1

                      67107e56c246cdbe0d2fc68ca9fec7370f80fc75

                      SHA256

                      3076b63e92600292aa24028a3f8afae5ca2da61515067219bb47e1963e3d7491

                      SHA512

                      60afeef4de04ed303729387c255d317073d99dad9cac785262b9e483e123462e8b169e98e79fe521c0b6f02d91c252bb1488b9bbfdb5dec1774573659a90b833

                    • C:\Users\Admin\AppData\Local\Temp\P13wV4ygMl.bat

                      Filesize

                      192B

                      MD5

                      e550c4fbbef241f11d63486e10672ea6

                      SHA1

                      a738da362e8dccaba1604fe8ab19696c01c40fc3

                      SHA256

                      62c1b3b1a2cb40e6d7bd511727ea5324769bcf344cfcb26016bbf6d59c410fdf

                      SHA512

                      24c5937922cdb848e46dab512fe8b9ba400c9a34f28c67105aec1ab98a80feb5ca5c31cf910921801f06fd17110e351e93eb62b38218a0c6c8c510d452e494dc

                    • C:\Users\Admin\AppData\Local\Temp\a8dace94-1f3c-4934-8514-92a7fce0a0e6.vbs

                      Filesize

                      703B

                      MD5

                      d112b24ca9994bcc3708a8f41ffbcefd

                      SHA1

                      d3d474b01013fe3107f86f0b6706386a589625d2

                      SHA256

                      04773ceb6a3aa30e87b73eddcc3fcb7dde50910a1d07cff342820cc3a01a7b30

                      SHA512

                      7852e37578d85895e550581f2bfe5b61fdfce04d69d0599db3766710bbd3b7d0d16fea22f8ad7180de67531ba648f1b72f5bedd6a6f9cfdcbd8463350da85adf

                    • C:\Users\Admin\AppData\Local\Temp\afab9e69-204c-450e-9302-8c5dd7452a0b.vbs

                      Filesize

                      703B

                      MD5

                      e7e367d2c100db741e55c7c3b1cf0c3b

                      SHA1

                      27e305aff61b308204ee44fea8441f806a6b2192

                      SHA256

                      b54be559c16b5a1815daa2c4c3cfe709737d4b00c67ad0cda5dd178b2e8a9ddd

                      SHA512

                      51dd4a27b2eec1c0c5ffd1fc82cba39d4f089eb7a895c5524bb226c740e8c3b722db5ce06053d7de8b9874b047a1202f55fea821dcd32c423796047258c25819

                    • C:\Users\Admin\AppData\Local\Temp\d9be4f16-4fcc-410c-9bb0-985c500d2b74.vbs

                      Filesize

                      479B

                      MD5

                      77ee628c212bf8cae6f5a398e5105c97

                      SHA1

                      88bd1c1198c65a3da807453b7e99f832f4e45e8e

                      SHA256

                      3e0c1249667f1636ab76f28da7d59e65adc0d1f5e1f132d716920c88c15e75b4

                      SHA512

                      ca5d880c8f2d5e267e2f554ab1c1efdcd96faf7e266d8ecf24af0da985618c1d6a0770103e29ddd1c7394d924e74521684008588b2c478f411b76642b48c0a87

                    • C:\Users\Admin\AppData\Local\Temp\q0.bat

                      Filesize

                      38B

                      MD5

                      b00782157d8f981c31e1ebe8005848bb

                      SHA1

                      6d6dad768cec7b2bd2d4de7b663e9763538d1bd1

                      SHA256

                      32b9132b1788971bc0d8e550babda3d3dd6f1e6e35748a545c828e32fff6cb13

                      SHA512

                      524540b34bee8b9475b64a09394ef294278bd0528106f62ffea8a8e465d411fbbeb2b3a2f8e40db196f2466cd9f5bffa89795950b98a97212d5ae2a6cec5198b

                    • C:\driverHostcrt.exe

                      Filesize

                      1.6MB

                      MD5

                      5b5f9e3f54a06e296c18bf01405db9ea

                      SHA1

                      edb260ff439166b4c1fa2c3d421a34f38c9a81dc

                      SHA256

                      794faed4b5cde0a56b06654e6b047b65fe1781bb68d8d517bc62d23244108aa3

                      SHA512

                      da3ac984755356f656a3ac4196edf115838aba4628e23e42a554c0a9428c16b6c0ce9b25d8c0ab11132082a7e41afb496bc2a1a1846f798befb51d6090a2c1a0

                    • \ProgramData\Build.exe

                      Filesize

                      3.3MB

                      MD5

                      0cba2000ff86e424021ba0145d643d2f

                      SHA1

                      e97fa820669717a1338de6698ead3c9a690ba4e1

                      SHA256

                      32137cf4d6060f5047dcee2185431bcfcd3fa5b244d63050410a4448df737b38

                      SHA512

                      908eeadeae8c9c41b71a4e83b3fdbb8e72978e92cde39c17f774bfa51cbacf7c74da5f30f5b3936bfb4ffc07bb0802dcbe4d7d9b44b90bc011abdaecd05d45f2

                    • \Users\Admin\AppData\Local\Temp\Buildhid.exe

                      Filesize

                      3.5MB

                      MD5

                      cdde5b2ecb291e287ad3943185f5e6ef

                      SHA1

                      8ccbae02e22c5cd238ba60305639a0d579192d06

                      SHA256

                      6330cedc46c388c0658105c56350958f726a6e73677716efccfafb7a12d698c9

                      SHA512

                      a4451afd4354075bd555a89dcbd4324d3642798d10b11c0cd9992497bac7e220571af63098600905ed19b0152c9b5e75071551502f4ac76e4b9dfebc1f86c90e

                    • memory/1096-124-0x0000000000040000-0x00000000001EA000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/1476-112-0x00000000005D0000-0x00000000005E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/1780-89-0x0000000000440000-0x0000000000452000-memory.dmp

                      Filesize

                      72KB

                    • memory/1780-88-0x0000000000D30000-0x0000000000EDA000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2684-136-0x00000000001E0000-0x000000000038A000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2764-148-0x0000000000EB0000-0x000000000105A000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2908-54-0x0000000000590000-0x00000000005A0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2908-60-0x0000000000B90000-0x0000000000B9A000-memory.dmp

                      Filesize

                      40KB

                    • memory/2908-63-0x0000000000D40000-0x0000000000D4E000-memory.dmp

                      Filesize

                      56KB

                    • memory/2908-62-0x0000000000C30000-0x0000000000C38000-memory.dmp

                      Filesize

                      32KB

                    • memory/2908-61-0x0000000000BA0000-0x0000000000BAE000-memory.dmp

                      Filesize

                      56KB

                    • memory/2908-50-0x0000000000F60000-0x000000000110A000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2908-59-0x0000000000800000-0x0000000000808000-memory.dmp

                      Filesize

                      32KB

                    • memory/2908-64-0x0000000000D50000-0x0000000000D5C000-memory.dmp

                      Filesize

                      48KB

                    • memory/2908-58-0x00000000007D0000-0x00000000007E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/2908-56-0x00000000007C0000-0x00000000007C8000-memory.dmp

                      Filesize

                      32KB

                    • memory/2908-55-0x00000000005A0000-0x00000000005AC000-memory.dmp

                      Filesize

                      48KB

                    • memory/2908-53-0x0000000000580000-0x000000000058C000-memory.dmp

                      Filesize

                      48KB

                    • memory/2908-52-0x00000000001F0000-0x0000000000206000-memory.dmp

                      Filesize

                      88KB

                    • memory/2908-51-0x00000000001D0000-0x00000000001EC000-memory.dmp

                      Filesize

                      112KB

                    • memory/2964-100-0x0000000001220000-0x00000000013CA000-memory.dmp

                      Filesize

                      1.7MB