Resubmissions

27-08-2024 14:08

240827-rfnhjawdkn 8

27-08-2024 14:06

240827-rer5bswcqp 8

26-08-2024 14:14

240826-rj5afsyhmk 9

Analysis

  • max time kernel
    285s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 14:14

General

  • Target

    FORM_VENDOR_DECLARATION_BANK_INFO.vbe

  • Size

    13KB

  • MD5

    46a86b1e4d1136f04743b65d4c402b9f

  • SHA1

    dc17d6fa8bdd838bf37efbbe60b8a169e3f794a3

  • SHA256

    db7c3bb3fa1311b696574ba3048e627b3ce3298d911a5946972655433be476af

  • SHA512

    5b7e79943a3d126b9879d34fd0c023e227477cb82b354855a81b4ca8b090d83a83ffbb3a1a7e63e5715ebccad3d42dc2e578ebd20b7fe5e8acf8a842d9d7f0b0

  • SSDEEP

    384:9ECYUlp+y4DdVWrXDYifV9IG8TLtonspm:2yp+y4ZYv/fAG8TRoom

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\FORM_VENDOR_DECLARATION_BANK_INFO.vbe"
    1⤵
    • Blocklisted process makes network request
    PID:2860
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {B762DB34-80B7-4E68-9AFA-FE1997EDE23A} S-1-5-21-3551809350-4263495960-1443967649-1000:NNYJZAHP\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Windows\System32\WScript.exe
      C:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\mBUojysElnsNYdM.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2976
        • C:\Windows\system32\wermgr.exe
          "C:\Windows\system32\wermgr.exe" "-outproc" "2976" "1240"
          4⤵
            PID:2632
        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1424
          • C:\Windows\system32\wermgr.exe
            "C:\Windows\system32\wermgr.exe" "-outproc" "1424" "1252"
            4⤵
              PID:1224
          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
            3⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2392
            • C:\Windows\system32\wermgr.exe
              "C:\Windows\system32\wermgr.exe" "-outproc" "2392" "1240"
              4⤵
                PID:2016
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
              3⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2244
              • C:\Windows\system32\wermgr.exe
                "C:\Windows\system32\wermgr.exe" "-outproc" "2244" "1244"
                4⤵
                  PID:1588
              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                3⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2232
                • C:\Windows\system32\wermgr.exe
                  "C:\Windows\system32\wermgr.exe" "-outproc" "2232" "1240"
                  4⤵
                    PID:1172
                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                  3⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1644
                  • C:\Windows\system32\wermgr.exe
                    "C:\Windows\system32\wermgr.exe" "-outproc" "1644" "1236"
                    4⤵
                      PID:2488
                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                    3⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2004
                    • C:\Windows\system32\wermgr.exe
                      "C:\Windows\system32\wermgr.exe" "-outproc" "2004" "1240"
                      4⤵
                        PID:1672
                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                      3⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:880
                      • C:\Windows\system32\wermgr.exe
                        "C:\Windows\system32\wermgr.exe" "-outproc" "880" "1240"
                        4⤵
                          PID:1700
                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                        3⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1492
                        • C:\Windows\system32\wermgr.exe
                          "C:\Windows\system32\wermgr.exe" "-outproc" "1492" "1236"
                          4⤵
                            PID:3068
                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                          3⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2788
                          • C:\Windows\system32\wermgr.exe
                            "C:\Windows\system32\wermgr.exe" "-outproc" "2788" "1244"
                            4⤵
                              PID:1508
                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                            3⤵
                            • Drops file in System32 directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2180
                            • C:\Windows\system32\wermgr.exe
                              "C:\Windows\system32\wermgr.exe" "-outproc" "2180" "1240"
                              4⤵
                                PID:2840
                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                              3⤵
                              • Drops file in System32 directory
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2424
                              • C:\Windows\system32\wermgr.exe
                                "C:\Windows\system32\wermgr.exe" "-outproc" "2424" "1248"
                                4⤵
                                  PID:2880
                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                3⤵
                                • Drops file in System32 directory
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2760
                                • C:\Windows\system32\wermgr.exe
                                  "C:\Windows\system32\wermgr.exe" "-outproc" "2760" "1240"
                                  4⤵
                                    PID:1848
                                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                  3⤵
                                  • Drops file in System32 directory
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2176
                                  • C:\Windows\system32\wermgr.exe
                                    "C:\Windows\system32\wermgr.exe" "-outproc" "2176" "1248"
                                    4⤵
                                      PID:1016
                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                    3⤵
                                    • Drops file in System32 directory
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2532
                                    • C:\Windows\system32\wermgr.exe
                                      "C:\Windows\system32\wermgr.exe" "-outproc" "2532" "1236"
                                      4⤵
                                        PID:3020
                                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                      3⤵
                                      • Drops file in System32 directory
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:620
                                      • C:\Windows\system32\wermgr.exe
                                        "C:\Windows\system32\wermgr.exe" "-outproc" "620" "1244"
                                        4⤵
                                          PID:2084
                                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                        3⤵
                                        • Drops file in System32 directory
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1776
                                        • C:\Windows\system32\wermgr.exe
                                          "C:\Windows\system32\wermgr.exe" "-outproc" "1776" "1240"
                                          4⤵
                                            PID:2412
                                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                          3⤵
                                          • Drops file in System32 directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1860
                                          • C:\Windows\system32\wermgr.exe
                                            "C:\Windows\system32\wermgr.exe" "-outproc" "1860" "1244"
                                            4⤵
                                              PID:1616

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259480626.txt

                                        Filesize

                                        1KB

                                        MD5

                                        1142c3a7396d6e82dda17d15ab294ba8

                                        SHA1

                                        c33b3f8b9864452c92788fab92a21c89863cb320

                                        SHA256

                                        b8406ce2eb896ac531f3fedd459a120375083b6f92a5abcc5a10a19b5bb21980

                                        SHA512

                                        637781f04b1667a2d28be99308eab767df79636c378b9774198570bfb7eb2369d3b639293eac73c58828b3b3d91c4bb368d52581faade2fa689ab37d61e592b3

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259495919.txt

                                        Filesize

                                        1KB

                                        MD5

                                        47dd2c69b699447d6d8cd928c53b260e

                                        SHA1

                                        6ff5133c664ed4ba7cdefbadb302ed47ed9ea8df

                                        SHA256

                                        f97cb05abd18358fb3b5a2a067e2be7f07b3202f3f7ee2f073dfe5120695397d

                                        SHA512

                                        dd9a585fe4d9f87c8839781b432947e0381792371f1d622c97369670bc5d891df5b11795e7f973af428c52fd62e9288097cf00057b951242ec51809993e2e0ec

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259507412.txt

                                        Filesize

                                        1KB

                                        MD5

                                        2e239ecc7f0e9f986924b3d65d50e40d

                                        SHA1

                                        66c4f429eb7ac28b3a502df23120dd838202acc8

                                        SHA256

                                        ae0b39d984de92fb372edd5718c93864e0735da927c676f9a6b687f8d4d98d28

                                        SHA512

                                        fffd4e64ac3cbea252f1449b94cd2969f495d6e6f505b0cf4fb32c4d77f7cf6aa4b58957072bcb599b7bef3fb3194e4c52b88281f65acb8bef177937827e296b

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259522684.txt

                                        Filesize

                                        1KB

                                        MD5

                                        44aebf231be24fd25b48100bbdd67a04

                                        SHA1

                                        60b3181128494c87cf684280a20d53457d6eaa81

                                        SHA256

                                        618e38a53b464084d8a0701b9ee60d9f7f4e7e50a38676227201e95c609065fd

                                        SHA512

                                        8fd6764612db89e43b42a48435a03779310f2063e1571bcf5a6ef2499e586eefc3c4912533e3191d41e9bc0d147a4f82efdac90b6af374836c329f436f4ccb44

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259542202.txt

                                        Filesize

                                        1KB

                                        MD5

                                        5e3ba3489da8f5144a3e8ab299e78c70

                                        SHA1

                                        34495e62e4d6d8fdd62cd9efcf9a7b638c38620f

                                        SHA256

                                        984c0ee6008670043ee42437f7d44ebcfa12c74561460506cdff8792de94dfd9

                                        SHA512

                                        90430e79cf36446a1147faa5a1e94b10454dad7066e8833143acb3e63be7c984f5294fe5f06ca0dbf3cab155612693371f7b6b957e903c0906fee3c89a2d349e

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259553469.txt

                                        Filesize

                                        1KB

                                        MD5

                                        39b5904d2216bfa05640f73468e38a61

                                        SHA1

                                        798e7784b95793727b8b4dccecedfaacc3e83be6

                                        SHA256

                                        f6cffdf58fcdcc2bdb996e45b151bc98c325aebc8eca0b0f3faaf193ac201c07

                                        SHA512

                                        3c821285d904ca2d54a90089adaa8fcc5b2aba62f74acc8ef1ce5f8503320e77d34f9601c6c83643ab52fafb87aec972fe7a139987c4e54054b8a980ab706129

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259571043.txt

                                        Filesize

                                        1KB

                                        MD5

                                        e5298fe734875cfe9b9bcc9def6fad57

                                        SHA1

                                        9d51b1a33a09ea1c499d52e8b0ba27acf23b67e0

                                        SHA256

                                        98f4e2e2c1fabf5e6bbd7055743008daceb42a92da3d6eb98d1bacfb0a21b22e

                                        SHA512

                                        648aeeb293d22770ab3d4e163a031cd3c22491fac22eb420a76c165b61baf59573307a6eaeffc663ebf4fffcdcea2442bbb0a7973c7f0d783e5be59fe18ff3d7

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259585946.txt

                                        Filesize

                                        1KB

                                        MD5

                                        48fcf55f54e35d89228d226bf31997bf

                                        SHA1

                                        32873fa75ca9a9b9206e4cd6a6c8ef1f16948c77

                                        SHA256

                                        1ef812158a0d8ccf219108267383b392a7f2f1d0918878b45aeb8f24322f8e5e

                                        SHA512

                                        2fb63d2561a4d6ba8ccec1894e63f308bf303dbc78c514b92c2e2946471482d6145983c8737b66be928c2243bcc9af756f4295c5fc860f50efdae9aa1a733114

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259601765.txt

                                        Filesize

                                        1KB

                                        MD5

                                        e6205ec3c13d2e6e4be3d4edf41d6cd6

                                        SHA1

                                        cbde76d755032066c9735da69ec2a0eb49d1340e

                                        SHA256

                                        c8856563e27555aef43a5255eb8e328612344ad1ad6d1ab0c16c38eecf22f7f5

                                        SHA512

                                        8e6460f39a0a21f22ce172891215e7f22a21dae289efcc88d026ed17678dd4d5f110b14cbd1c6d3d33406e98b9e31e4c45e7dda3effc4e2d173407c2400594da

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259613060.txt

                                        Filesize

                                        1KB

                                        MD5

                                        bf3e5129623609c7e56b59f7e82b4e6d

                                        SHA1

                                        124154e58a9f7c87d96d9c5eb0a850b1997dae3c

                                        SHA256

                                        e197891f43cae6de8cc9bba931d453dd0b1575eb587befc0bf200a0e055bb0f4

                                        SHA512

                                        cc4b2f3d432a34192a21b75c02233e4fcee1f9072a129edea5bec61d24d6a3b3fa7f681bfe17d8ad9c03d6ab9c4622d7dda881bafc8d247ae0597c2b773be4c4

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259633052.txt

                                        Filesize

                                        1KB

                                        MD5

                                        11f730aaf5a4c64081df23c8e35089ff

                                        SHA1

                                        f98064be509c9be63d7d9531b6a7316c51d88541

                                        SHA256

                                        d985620117e8ad9a60b0266226393fbc3b7724b167e0935f9c8001579561af50

                                        SHA512

                                        37040116fc75d56dd921755e970a155e477ef515aafd2255ed2cf2f95fbe8085e4b3256f6822fb9ea5795db081fa6df06082c1f3882f19cfcc89945451001513

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259647646.txt

                                        Filesize

                                        1KB

                                        MD5

                                        04221a89572a90e275ee698986da5a23

                                        SHA1

                                        dfb168c2adab9b547a75d9425150a7ea4f3afd17

                                        SHA256

                                        e86ad64e7301f08e018b6f6627f1efe553d5158de7cfb4f35ea48edde6c097b9

                                        SHA512

                                        10a705cb25799965b5de36130cd3c4d51610dc03990d31aa242de938f65a6b9108393ff48e80b65483867a3e881921a022c547aab8f82d8df56d732ed1320ccc

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259659754.txt

                                        Filesize

                                        1KB

                                        MD5

                                        6d855ed2193c9a096ff8e3e4c7740dbd

                                        SHA1

                                        17d6116cadd31a07f74d45de3a44da18ae298a6c

                                        SHA256

                                        41c3793e1b457a748444f58f226cf88e859127853a6f701eee3ceec21ab2b6de

                                        SHA512

                                        61819b2d72447e6a100f3917b181322459324386921a45c51aaf165de0de52c954bc79f7f065dbebf22571b88ec60641be8cb4b8b79b73bd30769bc8db9fc9fd

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259678064.txt

                                        Filesize

                                        1KB

                                        MD5

                                        6569b5e77c6e87fcd4d15798508fde63

                                        SHA1

                                        98afe369ed516c7c81f1e97f8d5a7700115e3d2e

                                        SHA256

                                        97ea26bd2dd0988e21b594a7d91c1e06855726dc5e5d2973dd5559130afde771

                                        SHA512

                                        1205e38433c87444de8590e8d03b065e81fd61042d826451b70ed132ce875383e142d9ae9d4dbcb0fd6dec996ca8d1f026a5ef15734195e5ae50eadfb71bb2b8

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259693279.txt

                                        Filesize

                                        1KB

                                        MD5

                                        3433d68c591190ec90c379f5518e0b35

                                        SHA1

                                        7e930515b45350c9f123f52394981c51b4ff22e7

                                        SHA256

                                        600676c4ef178b12b92c3f805e8ec28316c39ac74e51bdc85e34af9353739010

                                        SHA512

                                        f2abfb79bd1f27d88a331bb43430b811ebfe57bff06327069ada71783facb3e01e7f5499aba74e02a98ad8dc87f5b2e5685197f163d5017d04a92df76095ebc5

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259705915.txt

                                        Filesize

                                        1KB

                                        MD5

                                        cb7bcf68e1b8029457210d35fbc48cf3

                                        SHA1

                                        ef36a20cfb2f5fb101035395bb1caaf3764003ec

                                        SHA256

                                        83a2305efe230eaa6b9d457a0d61a1a23802ae6f52a5af5e1a367e48e71067a6

                                        SHA512

                                        15486451ffa0b9109f0b675571e687f8f04ecf6d86121b055f589bbdbb670a8f232ecb11aabd533f2aa855e7f4df97a09c8566845f29cc6eb6baa65d186d1f62

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259723122.txt

                                        Filesize

                                        1KB

                                        MD5

                                        91c5be4c02f308e9562cd567eb656e73

                                        SHA1

                                        0c6c6d3bffc0dfebab5b51e6d050e1c2a06c6967

                                        SHA256

                                        932d7acd07ce1c3f0f34d40ae03f40397664cd2eb5fb39a0024ad6d57b77cc5b

                                        SHA512

                                        d1369e0c61b0ff6a62cab16a69cc73167742f1d3cf42e494f26a0efdf648be5d7306ff62bfbe2a1762a4965a70bf38ab49e51ed23808d9b875f8a4700687e4df

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259736720.txt

                                        Filesize

                                        1KB

                                        MD5

                                        77423569e6fd72143333ff8ae3a6d0b5

                                        SHA1

                                        53ecc0149059fa125c63e9678948f36305408d40

                                        SHA256

                                        cc87e346027002d124385d83d8f66dc6a69fae0bcdf48d45640687728da07d32

                                        SHA512

                                        f636909c9394ace7d6b9e17a86a4ee913fdd576b46f3b0f0a224ccbf0265589996099f61ceb953e836d5b795c9b20a1015299faadc7970c9d21af1189830e532

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                        Filesize

                                        7KB

                                        MD5

                                        ac24a5b71983c4ed288168dd6b4a9624

                                        SHA1

                                        4a1f803ba13a7fb326272eea9869392a58f83ec9

                                        SHA256

                                        2255f28b4695e53ccaff9a877c1537b1625d8f6631615d883770bc6cfb14ed37

                                        SHA512

                                        46a20d863c87852240e0997cbc1f507e5e6e4c1596049249d855ee911e6c2929b76630af5550ff38e107ff20e5276b7fafb8c5ff4e0450f276feaf7b07fe39f6

                                      • C:\Users\Admin\AppData\Roaming\mBUojysElnsNYdM.vbs

                                        Filesize

                                        2KB

                                        MD5

                                        48a6b987d0cde29aca20f8162a24e89b

                                        SHA1

                                        44cc5f173979e6ca893f9cb14f6b0c3bfab0992f

                                        SHA256

                                        693d00bde18e9246ea67b1c6db570d5092aa1c1a5f48d582e0905c518f7560c2

                                        SHA512

                                        00a4e31e5b7a6db0ea3849d5711f37c431d641bf871bdcbc7e382cd840fc496f4ae12601b7ad10fe64b451532caa91d79c6b0fdae93c6a1ece2057aa2a93ec4b

                                      • \??\PIPE\srvsvc

                                        MD5

                                        d41d8cd98f00b204e9800998ecf8427e

                                        SHA1

                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                        SHA256

                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                        SHA512

                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                      • memory/1424-17-0x00000000027E0000-0x00000000027E8000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/1424-16-0x000000001B770000-0x000000001BA52000-memory.dmp

                                        Filesize

                                        2.9MB

                                      • memory/2976-6-0x000000001B620000-0x000000001B902000-memory.dmp

                                        Filesize

                                        2.9MB

                                      • memory/2976-7-0x0000000001E00000-0x0000000001E08000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2976-8-0x0000000002A70000-0x0000000002A7A000-memory.dmp

                                        Filesize

                                        40KB