Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    299s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 06:46

General

  • Target

    original shipping documents.js

  • Size

    30KB

  • MD5

    c34e2fe548e947a64ac894a457bb598a

  • SHA1

    01408b7989f7b88220129c599c7a58a389b35cb2

  • SHA256

    bef77bb820ab4134ef575f8c68b0c0e75c124990790309cf6782928aaeba9d9c

  • SHA512

    cd37464c37db0082453b9c17df0b331e9d91105fd7c014010966bd423d496c127baa67cb46f8b939c67c1d5540ad7ef0cc35a738957cfb33020da1a99255898e

  • SSDEEP

    768:OJWm9aFqK2Y4WaQ4Vg4vf4bQuvAsBvPqMGzk6Q:O3mkk6Q

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 17 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\original shipping documents.js"
    1⤵
    • System Network Configuration Discovery: Internet Connection Discovery
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\ProgramData\restored.vbe"
      2⤵
      • Blocklisted process makes network request
      PID:2508
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {552FD790-291D-418C-8161-4447AEE24312} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\System32\WScript.exe
      C:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\VJsbEnSfUjMLrzV.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:672
        • C:\Windows\system32\wermgr.exe
          "C:\Windows\system32\wermgr.exe" "-outproc" "672" "1252"
          4⤵
            PID:1996
        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2000
          • C:\Windows\system32\wermgr.exe
            "C:\Windows\system32\wermgr.exe" "-outproc" "2000" "1240"
            4⤵
              PID:2788
          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
            3⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2332
            • C:\Windows\system32\wermgr.exe
              "C:\Windows\system32\wermgr.exe" "-outproc" "2332" "1252"
              4⤵
                PID:1144
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
              3⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1628
              • C:\Windows\system32\wermgr.exe
                "C:\Windows\system32\wermgr.exe" "-outproc" "1628" "1236"
                4⤵
                  PID:1668
              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                3⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2980
                • C:\Windows\system32\wermgr.exe
                  "C:\Windows\system32\wermgr.exe" "-outproc" "2980" "1240"
                  4⤵
                    PID:1256
                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                  3⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:896
                  • C:\Windows\system32\wermgr.exe
                    "C:\Windows\system32\wermgr.exe" "-outproc" "896" "1236"
                    4⤵
                      PID:2976
                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                    3⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1784
                    • C:\Windows\system32\wermgr.exe
                      "C:\Windows\system32\wermgr.exe" "-outproc" "1784" "1132"
                      4⤵
                        PID:2880
                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                      3⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2592
                      • C:\Windows\system32\wermgr.exe
                        "C:\Windows\system32\wermgr.exe" "-outproc" "2592" "1240"
                        4⤵
                          PID:2628
                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                        3⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:764
                        • C:\Windows\system32\wermgr.exe
                          "C:\Windows\system32\wermgr.exe" "-outproc" "764" "1172"
                          4⤵
                            PID:2024
                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                          3⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2768
                          • C:\Windows\system32\wermgr.exe
                            "C:\Windows\system32\wermgr.exe" "-outproc" "2768" "1136"
                            4⤵
                              PID:1980
                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                            3⤵
                            • Drops file in System32 directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2436
                            • C:\Windows\system32\wermgr.exe
                              "C:\Windows\system32\wermgr.exe" "-outproc" "2436" "1184"
                              4⤵
                                PID:2276
                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                              3⤵
                              • Drops file in System32 directory
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1500
                              • C:\Windows\system32\wermgr.exe
                                "C:\Windows\system32\wermgr.exe" "-outproc" "1500" "1132"
                                4⤵
                                  PID:2128
                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                3⤵
                                • Drops file in System32 directory
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:908
                                • C:\Windows\system32\wermgr.exe
                                  "C:\Windows\system32\wermgr.exe" "-outproc" "908" "1228"
                                  4⤵
                                    PID:788
                                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                  3⤵
                                  • Drops file in System32 directory
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:316
                                  • C:\Windows\system32\wermgr.exe
                                    "C:\Windows\system32\wermgr.exe" "-outproc" "316" "1180"
                                    4⤵
                                      PID:2900
                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                    3⤵
                                    • Drops file in System32 directory
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2380
                                    • C:\Windows\system32\wermgr.exe
                                      "C:\Windows\system32\wermgr.exe" "-outproc" "2380" "1132"
                                      4⤵
                                        PID:880
                                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                      3⤵
                                      • Drops file in System32 directory
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1588
                                      • C:\Windows\system32\wermgr.exe
                                        "C:\Windows\system32\wermgr.exe" "-outproc" "1588" "1180"
                                        4⤵
                                          PID:776
                                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                        3⤵
                                        • Drops file in System32 directory
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:688
                                        • C:\Windows\system32\wermgr.exe
                                          "C:\Windows\system32\wermgr.exe" "-outproc" "688" "1132"
                                          4⤵
                                            PID:284

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\ProgramData\restored.vbe

                                      Filesize

                                      14KB

                                      MD5

                                      50afd76634e638e6f90dc455ccd9a7d2

                                      SHA1

                                      e7bc02f20bc093fd3fc9cca318d6b829a2020b2b

                                      SHA256

                                      fb7a7d9e890523d16641782eadd7905720d7b62f4450029d4c4b5ac39e88a170

                                      SHA512

                                      a47c5aef0f1397dd09838f08a325f961cab2a3f2998db2b73b48e29da4ec2a6c219b0a43bc8c5186fe8204c4a5bfb03c97a5d41787b8837591f664140d0f450c

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259491876.txt

                                      Filesize

                                      1KB

                                      MD5

                                      09928c0b4a5d80e921c677fcc62a74b3

                                      SHA1

                                      297cb7360182a3ec4b2200a1bdc8c79b1d15ed72

                                      SHA256

                                      40304039cc1d2b78245ef29acb942d00ae77dbd842a9690a26b65382fd2a0585

                                      SHA512

                                      4ba2aca27ff616892a99ad8552cce49efe41af072b4faca6f37ba4204cd2edff55eeb60c802846a30e8ee3aaffcf016b43a4e1808474f920fd967543fadc1d39

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259506900.txt

                                      Filesize

                                      1KB

                                      MD5

                                      e9fa2d9918668f25112c7a14a718ad17

                                      SHA1

                                      915d72a00de9ff1f08f4255cc734f3e6c729199d

                                      SHA256

                                      9b1449748120bfe68e9b4c52c4f78d935d62a4a2015efad69e0f451537df5438

                                      SHA512

                                      d3c25ff90f1e0706d30fcf88c44f0efc011e59a703860542420723469cf7c6a8d6f4833e166b69b9cbb5f1b5846140312a8e49d3e3c77f831e3183409c5d4883

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259520104.txt

                                      Filesize

                                      1KB

                                      MD5

                                      0b22d536f885bf56c550f967f572d608

                                      SHA1

                                      0e62deb9b80ef0a4e8136d73152a3c01f39aafba

                                      SHA256

                                      66a919e67ba2f367d0c323a5a4acc8a886df38b154cc2a2c69145272c8f2052b

                                      SHA512

                                      04c793564a324aee6d9480269a5559ecf3d0497885f9728fe69a2fab47878ba45eac01cdfc0af093426e40c5cecc6d766b76b96bf4ec75f70c7f82c2d1505ca8

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259538288.txt

                                      Filesize

                                      1KB

                                      MD5

                                      80638e0f136e87d2d1532e565d9ba761

                                      SHA1

                                      0636c28dc4e2bf04105c2c6983a481fac489421b

                                      SHA256

                                      5e3ae02fa5d2fe1e3a2019c560e4327f9be2dee346ed213c69e1def0d9b9850e

                                      SHA512

                                      2f0e85d67b2cfae74972c065d5796427eca364ee9ceeba7f43e7d68c22be803c3802662f11bd8b6684c0852a8621945c39467c831a32ef77038048eb5ca1d2b9

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259554920.txt

                                      Filesize

                                      1KB

                                      MD5

                                      8e9413db64f53f17fdfcc7f28182f66a

                                      SHA1

                                      7cea3fad8b0ac4bcd62e4b430e7f9e4d0bb0588a

                                      SHA256

                                      17ace9b9e4da66439e15a275200b6b710fd1c436ac26303661fe036a1337f2aa

                                      SHA512

                                      b8eae5caf7ed7af34a6569fe7ff21bc1b8afc4b3f012433b187aa5486f8f6169b4426a18f556738232f50845e4d3f72a03cbdbc99fe7e9517eaec9a6a77338b0

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259582634.txt

                                      Filesize

                                      1KB

                                      MD5

                                      154289042a9e9b31c28aaca3193bcf98

                                      SHA1

                                      2c825b6d2e2d63e785c8cbcc8de1fe3f53df1ee1

                                      SHA256

                                      0d6a0c9414a5dc441a6c1865f07264db1bfcaaa7fee0f432454af8989b5203db

                                      SHA512

                                      246c3c5f07c2f018accebc119a5c97416debd6b19e643b89d252cbd2f0a98355d602a74d474c3391fb03661532f6f9bc47c343fcf56dc97c4ce2bb42e6d02176

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259583970.txt

                                      Filesize

                                      1KB

                                      MD5

                                      c7bf2a81a3568a077e83c5b2f9e93fc5

                                      SHA1

                                      af5fd4a05175cd93fdac0382708fcbc83a34c024

                                      SHA256

                                      a15c7766f7f527fe169a7ae4b4462a3e5814dd8d279b3b96e33fffe0c47c9a5f

                                      SHA512

                                      7140271ddfa22fdd5071218ecb0736effab15b3b87ab38b2a3676d15837bc1daa99fe856237623fb9b38bef5a0ba764e99289d5fef485b569275d513f0e47f32

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259599649.txt

                                      Filesize

                                      1KB

                                      MD5

                                      c7465ab2cb0dba5fa9d0edb24ee9e41c

                                      SHA1

                                      72dfddf825d5ab6ad041a73cca9ae0c6bbcd042b

                                      SHA256

                                      e9547f080f6d3d707327ead144f99589fe197a00e2863036c8dde4a96ebfbb23

                                      SHA512

                                      ef621f63fb96844091b43d97a2a058f7b4e5dd46bfa2543e65b175a1acfab948051c592d82eaa4a492252118945a9b99fd1fcb838c04498c2c8085b07fdeeda6

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259626573.txt

                                      Filesize

                                      1KB

                                      MD5

                                      708459b7ce376c4c146df5533c23d9ce

                                      SHA1

                                      77b548172389a86c28c3321631916575514092f7

                                      SHA256

                                      38956f37bb044fb92d5dd2f6eac36e3eef5a0788490c697f7ac75f276a4bbab7

                                      SHA512

                                      8129e8ff8db476ca9b663ef7393634d66be24811db90e07275d2aa2a6b716b04a62d7fa881089dab5221937aa13a17826ae23d25d41252725a247ad0d9f72d2c

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259628625.txt

                                      Filesize

                                      1KB

                                      MD5

                                      8afed300a2d1fc88fa71545a8c26d2e6

                                      SHA1

                                      f963fc97be48cdaa8675ce1b539f5523aafdd1e1

                                      SHA256

                                      9104ff9733e73fcdce69dc0c1aad36d1a2367b57b6e03726d21aac7080f26eaf

                                      SHA512

                                      46bb041bce58cfc07b9e1907fb39c67b5d301862f80b267f2c12305297a4310a54ece39abfbd1c28bb322a7391a91c64e9ee0c7d11d044df45f5737c94b3cfa9

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259659406.txt

                                      Filesize

                                      1KB

                                      MD5

                                      eb745ddeaf07306b6b28641bfbf36df7

                                      SHA1

                                      78a07d80db53436d7ff8b56aeb73a8263594ceb8

                                      SHA256

                                      2f877e5840c9659c9b651df307a8f2fadd00cfba4cb585f1804dd081e5b49b6b

                                      SHA512

                                      8f0392542a953342ac218f12274dd592e01dcbd99091cd5197a8c99af50374b0fb57053d26adf61a3bb9412193444a76e3d056b70a67d1a13149cbd700a8e991

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259660502.txt

                                      Filesize

                                      1KB

                                      MD5

                                      aaabbe523e17df90b8d3fd74dede2915

                                      SHA1

                                      6ba56d17fed816e7e48f49b9fec68adca4c5731c

                                      SHA256

                                      78dedb36e3f3ede052e212b141e35395ae2bc47ae511a38979131c6e294ee7a2

                                      SHA512

                                      15fd8b9be5b30fde05983b91e9e2eb9abc36ba1beceb8baf3cec82744d90422b57de1fef626ef16dcfad58957bd13b77e08e9783b0d682530c6181520efde5c6

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259673694.txt

                                      Filesize

                                      1KB

                                      MD5

                                      41913fd9c79d96180ad1ee9d563ad5ce

                                      SHA1

                                      560c936fb4ae81db8bf6e60dc2b9e17d25876502

                                      SHA256

                                      8ca1e09a58a19edf1f143b34676c98480f18085503f826f41a256b9eb4fd762e

                                      SHA512

                                      8ef40b616e94b764ff3989414d456a710e4aa0bfbb9e273bb237d367ca37f1917f4831038b8d0ddcd77614da4dcd933fde74a6fd28fcac31f839105dc45de2be

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259704235.txt

                                      Filesize

                                      1KB

                                      MD5

                                      50b1942e9fcf42c194fbf21048f09b5b

                                      SHA1

                                      121718bf2ed1358c25305b43e3bbd028adab5061

                                      SHA256

                                      1dd5a610eed3e2accefe62bec7aebe55ef32bff40afd25dddf05afb4110020dc

                                      SHA512

                                      48c120ea048d0ca1d9fe1bce5884f4f26ee9eebbdbef47945ce0aff7b51dc9cc1a268f9b625257fe35432c9b7399f48499fd5e7fd5ca497ac0c2e174c3a6c0f1

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259706331.txt

                                      Filesize

                                      1KB

                                      MD5

                                      81948dd4e9db8e41d117675f506a338c

                                      SHA1

                                      8f1d9019137c772063c5b0f509be17e88aac462d

                                      SHA256

                                      784a9563629f8fa953cb32a0dffe5462aea912a2d667cb99f1c7f38e7dd7db95

                                      SHA512

                                      e3cfdf102978de14c8954ccedb8c34191a0f6c0792f090f06d20fe65caccdaecb2ed6afcb02a531984b4eadf7018a68a7587fcf5466645df7eb6062921ee158c

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259733504.txt

                                      Filesize

                                      1KB

                                      MD5

                                      1cbb7c91cf0636a9aaeaeb4992597972

                                      SHA1

                                      9da364888eaff3eee592c624ec2ba8844c35f3c2

                                      SHA256

                                      2d5bf7a8ea22d3859f455e387116e0c011c4d9e60331caa54d861e8a657adc4e

                                      SHA512

                                      fa81de2a65d4d63bc9ff8d7736ae9d74fccc3ded026d96e20c32c957eb9ecf48ec77160d05b82aa917b038c93fa07be902388436893cf41f0f437ccf5d952e50

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259734660.txt

                                      Filesize

                                      1KB

                                      MD5

                                      304e342b081885ed5968f30089cb3fb2

                                      SHA1

                                      b30bea8869f7a5686c58f331ab2291df60e1090e

                                      SHA256

                                      effd8fa5cee3e3a3ae3bb0ecc26dda0d20e898e8be43a187dfa2719ddfbe3de8

                                      SHA512

                                      dbf9be2246a0555f43075031ae16419d9ab0498e9a65946f5a32b2462882b4e393b2730650bebe1fa4a77b50eaf0426473583259295ce1affa2aa0ba63de8e27

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                      Filesize

                                      7KB

                                      MD5

                                      7fc6f00e4fb5a677ba234b2d56e1c8e6

                                      SHA1

                                      307e0bfb02d45a551180a8ab574d5a1fa17c12cb

                                      SHA256

                                      3d22a8310a525bf0c6734855bfe01deeaa5a57129906852a581e218d363b197f

                                      SHA512

                                      50c577b56f16cb2d776ed7952b4ee4f973f8e5156758a973f31a8712725e6a15dd7352fcf1e07955f571e229c05b8bf79eb348749b2f85c2366cea1c742869c5

                                    • C:\Users\Admin\AppData\Roaming\VJsbEnSfUjMLrzV.vbs

                                      Filesize

                                      2KB

                                      MD5

                                      c9fad78878dfb374e55163fd728a42e9

                                      SHA1

                                      08a0cfd1d4155301c6d308917a305a1142a1bd15

                                      SHA256

                                      0df392e595e30753e10b2e5b0263ef2b6a2538610e2e0af3dd4340f1dd205b67

                                      SHA512

                                      2e7766a7e9b93c1e83091bda164cb2e09ba681b6c5ba8e6f2f7b3dd41c640ac214cf586f22dd46283bc70f0d26abad23cac7ab89a8f163077d9887d505ea2000

                                    • memory/672-9-0x000000001B6B0000-0x000000001B992000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/672-10-0x0000000001F70000-0x0000000001F78000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/672-11-0x00000000029F0000-0x00000000029FA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/2000-20-0x00000000026A0000-0x00000000026A8000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/2000-19-0x000000001B720000-0x000000001BA02000-memory.dmp

                                      Filesize

                                      2.9MB