Analysis

  • max time kernel
    126s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23/01/2025, 15:50

General

  • Target

    taskhostw.exe

  • Size

    1.2MB

  • MD5

    ac904ffc13b5f221270f475065687b59

  • SHA1

    ed6b4383582eae7b72064a10e33cebc6fd3690e5

  • SHA256

    963a316c03e4f88df946a43d537f6ed2d2001eaafcde40bdb52cd15104112606

  • SHA512

    9626483209d8546c835c94cfffd89e1cf6ae813730d04dfdb9b4b4019e12ee0c9166fa76fb47426251f6e669d6c63037718ffb8c8366766cadca1a9f78c91559

  • SSDEEP

    12288:URZ+IoG/n9IQxW3OBseUUT+tcYbqTHSOOJVu1SNEC8m+P1BAyrQ/ta3iruJtDwbD:u2G/nvxW3WieC2nOJVrj8m+aSDwbA9Nq

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 48 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\taskhostw.exe
    "C:\Users\Admin\AppData\Local\Temp\taskhostw.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\BlockBrowserWeb\73WPTP5CgKBkfusL13FoS1EalfC.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\BlockBrowserWeb\JLBdH8Facv2OZKr8pY7k2gD8clI.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2440
        • C:\BlockBrowserWeb\ComfontHost.exe
          "C:\BlockBrowserWeb\ComfontHost.exe"
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2756
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3BHrr2hGfN.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2044
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:2448
              • C:\MSOCache\All Users\OSPPSVC.exe
                "C:\MSOCache\All Users\OSPPSVC.exe"
                6⤵
                • UAC bypass
                • Deletes itself
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Drops desktop.ini file(s)
                • Drops autorun.inf file
                • Drops file in Program Files directory
                • Drops file in Windows directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • System policy modification
                PID:2620
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Local Settings\System.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2740
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Default\Local Settings\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2692
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Local Settings\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2944
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 13 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2652
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2684
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2724
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\WmiPrvSE.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2992
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1804
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1984
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Photo Viewer\en-US\taskhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1648
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\en-US\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:932
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Photo Viewer\en-US\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1152
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\cmd.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1008
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\cmd.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1784
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\cmd.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2640
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\dllhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1264
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2848
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1944
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\OSPPSVC.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2040
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\MSOCache\All Users\OSPPSVC.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3044
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\OSPPSVC.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2956
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2516
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2432
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2384
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Mail\fr-FR\winlogon.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3028
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\fr-FR\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:916
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Mail\fr-FR\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:896
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Defender\de-DE\WMIADAP.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2184
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\de-DE\WMIADAP.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:820
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Defender\de-DE\WMIADAP.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1496
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\Idle.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1340
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:960
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1736
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Windows\Cursors\csrss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1164
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Cursors\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1688
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Windows\Cursors\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1528
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\cmd.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:648
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\cmd.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1144
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\cmd.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2240
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Users\Default\spoolsv.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1620
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Default\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2276
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Users\Default\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1852
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\WmiPrvSE.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2712
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2576
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1732
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\smss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2328
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1660
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1300

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\BlockBrowserWeb\73WPTP5CgKBkfusL13FoS1EalfC.vbe

      Filesize

      230B

      MD5

      fdf72c94be3290267c930fab28fbd800

      SHA1

      a0e186ec44952baf296acd483f25327b0c6f33dd

      SHA256

      4eead935013d583296ca49f8fc8b70d38b7c32e1189204629f33cead574e2dd1

      SHA512

      a59b3fe649739e5d61d116149011f8d0f19ed8b217134aabb3f2c698dd52a5ccc4b67414209772be48fe4477158ffa7ebb2097280dccf1607955f1a95d264634

    • C:\BlockBrowserWeb\JLBdH8Facv2OZKr8pY7k2gD8clI.bat

      Filesize

      47B

      MD5

      68411cfd82c251c57e0fd3e2b6e7af03

      SHA1

      26b09d13a90b0e662d57c59dc903db51dd11a177

      SHA256

      0f31379f24cbc2ab580f9b2f77e4fa36123a732377be53d88c28546228e106d7

      SHA512

      78ba2559d614ed0dbcc2e32a5f6b9ef3d3585df4cc515728ff4cccdefbd00b50f3e34774af016a5fc9f8320ff48e963bc76f9c7b04e80ad69a43eef9c18f2f2a

    • C:\MSOCache\All Users\1610b97d3ab4a7

      Filesize

      415B

      MD5

      e49a64f9b00e0b5d60b04511fc1bace9

      SHA1

      6332b925278b152d86b362c70d574ff1506c8a33

      SHA256

      d918a6fff531edfcaa8032a0cdab55d3cd2606ed65eef9bd7c18f415e3fe365c

      SHA512

      b4b3de290382bf0f2b5fdbff061fc99fa27eb322492aae7738bc0694a8f0ab70cb99ec64f69e54ecaa980c89d95a13107352176ceba362970dab2d4df890d3e1

    • C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\69ddcba757bf72

      Filesize

      516B

      MD5

      1218baca91064feca9c0673f9a2393df

      SHA1

      b655bf7b4af6a6e16d3686a365d29afd01dfcd18

      SHA256

      acadfe2f1b4f6115bbc66ceb0cf18b5d68db2faca5685f4ffd3658d782ee2114

      SHA512

      53a2d6ce72f9697ad2e8ce57eedd4ab9e0a4da1b443857fcd6bee80b76e4c80c35ba8285e0df5e752da7ece5975dff55ba5051c70173d5dc2725756842205772

    • C:\Program Files (x86)\Mozilla Maintenance Service\logs\5940a34987c991

      Filesize

      806B

      MD5

      a9ae60dae93d61a5cbce55a2a525a165

      SHA1

      fa6154db4655ac197a67d2e878344d7319076649

      SHA256

      dc1d7a6afd02b5e82d5537d5259233c46f330748407814791584f6b89618b252

      SHA512

      d604288536905089cb7020de5091e5a21c55f11b4eb983dfd99f22f6d2e4c46aed77936d98cff1846821fd39feb132ee3df544af1e4057d450cbfdd0e1799f8c

    • C:\Program Files (x86)\Mozilla Maintenance Service\logs\6ccacd8608530f

      Filesize

      903B

      MD5

      16fa97534cbdeda9913db6c5c3993766

      SHA1

      6423d1f499a697ea65d92be1934f49b88a9a4c0b

      SHA256

      299abe590f020a253f8d4a40ac2b153a13e27ab9597e377fc664edc840070f22

      SHA512

      c15627b95f98e70441fbeef745a121707f582afbca2f81558f072f0b3b44fd7c3ca9ba73cb9b4778acfb64de0ed60a810e2c8021f088809623c4a524a3bbf418

    • C:\Program Files (x86)\Windows Defender\de-DE\75a57c1bdf437c

      Filesize

      95B

      MD5

      77ca72d3e4d03b256e734a1adeaa983d

      SHA1

      8bddb5c7dceec799c860dde38ddf71781e7a6f53

      SHA256

      3e789c6e24f17222a373be0e2ec95ae51e24f4dbfb614a124e9ca3fd723aed61

      SHA512

      dde15cef706488ee7ae2ffc99689520df19738d53da9b27848ccf6520766e7e31c7422d2a32bb1e08d00b10e9d9832b767b382f936d8bca2688b313f9591ad06

    • C:\Program Files (x86)\Windows Mail\fr-FR\cc11b995f2a76d

      Filesize

      298B

      MD5

      a43a248526bce40a9d1103514ad7c946

      SHA1

      295fbfbc6d8fd1396515d8b94d5ec8c68a25e948

      SHA256

      bfe8bbb26f372eb2f81e9bd57335b9da7f900a8de5563b506b88dbb4b9cf53db

      SHA512

      349dab314c3c14a1ab4869c5e6eb98e5963777833ef4a8e324c750c3c0a220f200deffa774e51d8a5c865d2fec4e779fc6d228ca4e4ff12c61f96a9e84333108

    • C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\ebf1f9fa8afd6d

      Filesize

      587B

      MD5

      d2159c43cb6676961f6a014e1a752f13

      SHA1

      a1e6bca12e9fdd0d8cbb593526a4e64c2e0905c6

      SHA256

      be939810c8d195f82fe4f4811a65ed62526fb46351c2e967e18b9ac444937909

      SHA512

      2cec82670ec44bb1f64e049d9eedda223cfd2e2e26fa917a3f0da26511c686a84f1c25bf12754874f47d46df942ff728eeed04ebae7ae5e3052348a06f9e9600

    • C:\Program Files\Windows Photo Viewer\en-US\b75386f1303e64

      Filesize

      561B

      MD5

      3ce855663f34e701ef39d0c6a99fffca

      SHA1

      2dd137f5a85d55d266f67bd67fb0326191e0c450

      SHA256

      215023bad2207f46eb5091a4cfad411653c5748cbc3f5dab136cadfa771ecab4

      SHA512

      51e680dd8785e2e0cc9ef141a4a849bc85c3244dae65a2f4fde0b327cc3f7d202bd08f055647ab358c07e0e2036d4a746cda85ee481b3287139c71046309a7c7

    • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\24dbde2999530e

      Filesize

      273B

      MD5

      89586c7843e5341544ab540f2f0124c7

      SHA1

      50a5d12978e4e1452b033f60cc1e241550fc9805

      SHA256

      c635bf8f8e72cf49b85a8247a79c39098bd92ef56829f8148dc578a0f03ab06a

      SHA512

      bb03abc83ca68acafc3f5b6fc89a5704ef9ae0a6ae43951b9b045813c4849f93ce8bde7d6429ba592dca418b8145188e9699d193bbe6df36f90d45f790927284

    • C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\24dbde2999530e

      Filesize

      764B

      MD5

      fc7aedd75ad542f33370617a2e494fbd

      SHA1

      5a805f4095609f45dc5d6ef7d00dcbc628b63bec

      SHA256

      f8a30dd24838486f5ef2fea493a2637109cc727b126cafc218af32445317ab35

      SHA512

      45cbdc4d529803814e71f3e4351eac84e9ba787d8aff63d98f04bad436ad0e2ba4d48b7452e902fdeb9d7bec2f0ed1cbf60b3f6ff86ac91622870b1a54258266

    • C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\42af1c969fbb7b

      Filesize

      905B

      MD5

      8fdde40d4e17135b3b87b92cca15e33c

      SHA1

      a758038d056835cad6dbfa68e138389a655f629b

      SHA256

      91fff9e548693ed33af6da617ed61275c32488e082f4e14ce397d0a88d76dc3c

      SHA512

      2c08e4a370a8c2e7192db0c006fc6a3849a5645d12f3eac92df04043e3138f10e487be6248a352c1950202b7f67fa90af150b99b4a1707590015a858a9dce3c8

    • C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\5940a34987c991

      Filesize

      971B

      MD5

      34293b48b731cab6a59b1a0d6f8234cf

      SHA1

      b3c71f311a60aba66b05053228cbe38a827a926f

      SHA256

      e0b7fd9c393554078ed387204689cf88f0fb4763ea0c8e722505e647be30caa5

      SHA512

      705b47342a75b9dc4723496ba795c38a86a6db6d5903d53ddb00efcbd5c274c3bf4adde737a4544882365bbc9af801eb2706d72f30ce7a43b201cccf021d5500

    • C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\ebf1f9fa8afd6d

      Filesize

      904B

      MD5

      a67a06c480d408babcee6b427b2cf241

      SHA1

      9aaad62f9d716575d5390f05435690b7f4224f27

      SHA256

      7029593e714d17aca5cd232b0aea11ab9e957bcbdbf0e67caacb0545a7c2f8fb

      SHA512

      03ecc80d232fb8090d30ac6cc11485219b24ae4625c98005308b049f53d84c8430bd1b6aa4723d2df93ea4fdec40ab97f297e2b87bf3ce625d08c7863fb7af4c

    • C:\Users\Admin\AppData\Local\Temp\3BHrr2hGfN.bat

      Filesize

      198B

      MD5

      60bed6e27f01dec842cf5a44d312e1c4

      SHA1

      73b963ec317b2029824a924da031e03ed16cc524

      SHA256

      998bfc2ef01edaa89a6a4752cd38805aaa449b2aa3eb681f8539e7ebbbef8e5b

      SHA512

      2bc7d7a9648d764e7a45aef238bbd1ebbb4c808c9f668e859e783f6b756390530dc1524c802191a730d4bd05316da2ab4401697beb9d8ed6d1e462111e764c30

    • C:\Users\Default\AppData\Local\27d1bcfc3c54e0

      Filesize

      875B

      MD5

      c3930334ec3bca33e2f7d7bef3171366

      SHA1

      caae2b1f26f8cc881f582a2b074d55d97d713da6

      SHA256

      f2699d045c9e3b720a23ef35c97d39afb0798eb6cca53e23ad316f81958fc6ff

      SHA512

      66d2c4c1cab45ca3b607f24f913072f9f710c93ff2d07530e77122b6cd0593a7b48517f5e969b4a799f016148a542ee4afbf1da2454a81141b06aca49477a302

    • C:\Users\Default\f3b6ecef712a24

      Filesize

      283B

      MD5

      39dba2f3ee723989b666d41b39711d7d

      SHA1

      54643f125b96c1a9b35a9f099b76322e2a22538e

      SHA256

      9e323e63339bfcbe4827cd41617962b756fb694c98d6a653e764c61b1a909b5e

      SHA512

      8dd074cf0b81c1eae3946b3fb78c59d79d8e8937bc198012b765b7cefda7536c719ca68efe201ed183219b1c98ef84a2770bc809af0fe1ee44a10afd36e3e936

    • C:\Windows\Cursors\886983d96e3d3e

      Filesize

      563B

      MD5

      b407baf1e525f37bb79d2b3149a0ad2e

      SHA1

      5e69ca64ffc78b8fe3f7385f2093ff260cd8db21

      SHA256

      e9bde218c5dedef9465bff4b2e5a586cf73401760cc3c437e63d2bb409215cab

      SHA512

      1f0dc9fd90e7697b598dd606c71d257fa22f68a8bde74adc75adb01cccb86b69fe26dacc2c857914d4f8e7b16a76f85c5d50fad9d10a68112de59d7214841d7e

    • \BlockBrowserWeb\ComfontHost.exe

      Filesize

      911KB

      MD5

      082141e65f26ececc48552790d6c6da4

      SHA1

      fba9667158632e2dbfa128d1fa1bd4be282e773a

      SHA256

      b49adf276a5e055ef1a3685f032701b41be76177f7f9eb85dfac2d33b5fa7c9f

      SHA512

      cbe0fef685801d436b5637a0e08df052af119284491a382d689686735ee8352d3edaa6857754f16f022a0bb43f95039bc841e4ed1e20614ea0a9976258947946

    • memory/2620-55-0x0000000000B80000-0x0000000000C6C000-memory.dmp

      Filesize

      944KB

    • memory/2756-15-0x0000000000560000-0x000000000056C000-memory.dmp

      Filesize

      48KB

    • memory/2756-14-0x0000000000550000-0x000000000055A000-memory.dmp

      Filesize

      40KB

    • memory/2756-13-0x00000000013C0000-0x00000000014AC000-memory.dmp

      Filesize

      944KB