Analysis

  • max time kernel
    297s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-01-2025 15:20

General

  • Target

    0969686.vbe

  • Size

    11KB

  • MD5

    4565da69d82d3d17f33436b132261de7

  • SHA1

    5e124ae25d9ec64cc681546299e0fa2d4f4b50d4

  • SHA256

    e2604e06a1d397760f22a668b48821dc20f06a8c3a28d165b9c96569b0e88bbb

  • SHA512

    7390abe671d2ad1a430bfb69888cdcb7f6e9284cc9432338a5b1eddeb0624987b92a56009e50c283c46894256ca1ab43640cac3ecbf09bd4b69867cccb6f4329

  • SSDEEP

    192:YeHNd/sigyX/tr7b7RMAv0Evwfk5Pv4fX//CxHQ6V62nN4je5K:zHMiTFPXHvwfk5PvQiHQ6EGijT

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0969686.vbe"
    1⤵
    • Blocklisted process makes network request
    PID:2444
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {D630E337-1CDF-466C-9AC4-2E8E8F9AC38B} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Windows\System32\WScript.exe
      C:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\uaDoJtHubxengYS.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Windows\system32\wermgr.exe
          "C:\Windows\system32\wermgr.exe" "-outproc" "2728" "1236"
          4⤵
            PID:2120
        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1372
          • C:\Windows\system32\wermgr.exe
            "C:\Windows\system32\wermgr.exe" "-outproc" "1372" "1240"
            4⤵
              PID:1868
          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
            3⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1696
            • C:\Windows\system32\wermgr.exe
              "C:\Windows\system32\wermgr.exe" "-outproc" "1696" "1240"
              4⤵
                PID:2912
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
              3⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2216
              • C:\Windows\system32\wermgr.exe
                "C:\Windows\system32\wermgr.exe" "-outproc" "2216" "1236"
                4⤵
                  PID:3000
              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                3⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1748
                • C:\Windows\system32\wermgr.exe
                  "C:\Windows\system32\wermgr.exe" "-outproc" "1748" "1244"
                  4⤵
                    PID:572
                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                  3⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1340
                  • C:\Windows\system32\wermgr.exe
                    "C:\Windows\system32\wermgr.exe" "-outproc" "1340" "1132"
                    4⤵
                      PID:1432
                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                    3⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2056
                    • C:\Windows\system32\wermgr.exe
                      "C:\Windows\system32\wermgr.exe" "-outproc" "2056" "1240"
                      4⤵
                        PID:2156
                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                      3⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2724
                      • C:\Windows\system32\wermgr.exe
                        "C:\Windows\system32\wermgr.exe" "-outproc" "2724" "1244"
                        4⤵
                          PID:2736
                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                        3⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1600
                        • C:\Windows\system32\wermgr.exe
                          "C:\Windows\system32\wermgr.exe" "-outproc" "1600" "1244"
                          4⤵
                            PID:1152
                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                          3⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1928
                          • C:\Windows\system32\wermgr.exe
                            "C:\Windows\system32\wermgr.exe" "-outproc" "1928" "1236"
                            4⤵
                              PID:1636
                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                            3⤵
                            • Drops file in System32 directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:840
                            • C:\Windows\system32\wermgr.exe
                              "C:\Windows\system32\wermgr.exe" "-outproc" "840" "1244"
                              4⤵
                                PID:2296
                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                              3⤵
                              • Drops file in System32 directory
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3000
                              • C:\Windows\system32\wermgr.exe
                                "C:\Windows\system32\wermgr.exe" "-outproc" "3000" "1244"
                                4⤵
                                  PID:1536
                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                3⤵
                                • Drops file in System32 directory
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:604
                                • C:\Windows\system32\wermgr.exe
                                  "C:\Windows\system32\wermgr.exe" "-outproc" "604" "1240"
                                  4⤵
                                    PID:1948
                                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                  3⤵
                                  • Drops file in System32 directory
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2552
                                  • C:\Windows\system32\wermgr.exe
                                    "C:\Windows\system32\wermgr.exe" "-outproc" "2552" "1244"
                                    4⤵
                                      PID:2440
                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                    3⤵
                                    • Drops file in System32 directory
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1584
                                    • C:\Windows\system32\wermgr.exe
                                      "C:\Windows\system32\wermgr.exe" "-outproc" "1584" "1244"
                                      4⤵
                                        PID:3032
                                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                      3⤵
                                      • Drops file in System32 directory
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2828
                                      • C:\Windows\system32\wermgr.exe
                                        "C:\Windows\system32\wermgr.exe" "-outproc" "2828" "1244"
                                        4⤵
                                          PID:2856
                                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                        3⤵
                                        • Drops file in System32 directory
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1768
                                        • C:\Windows\system32\wermgr.exe
                                          "C:\Windows\system32\wermgr.exe" "-outproc" "1768" "1236"
                                          4⤵
                                            PID:1192
                                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                          3⤵
                                          • Drops file in System32 directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1072
                                          • C:\Windows\system32\wermgr.exe
                                            "C:\Windows\system32\wermgr.exe" "-outproc" "1072" "1244"
                                            4⤵
                                              PID:2312
                                      • C:\Windows\system32\NOTEPAD.EXE
                                        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\StepMount.css
                                        1⤵
                                        • Opens file in notepad (likely ransom note)
                                        PID:852

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259478805.txt

                                        Filesize

                                        1KB

                                        MD5

                                        d74e476f01cae5bf22a66a2c177daff7

                                        SHA1

                                        9f6cc8f42437a4ca195fb6c83be0f8707b6e8f0e

                                        SHA256

                                        b79953b924a80062ba993a8b7788e046811d97fb720520112718a9f22d1517f5

                                        SHA512

                                        577517cd0fdeafe9097157a944c4891a325e17f49cf346775f7b6d4259c78392ca336af141d156cd9da9b7f7c65d76f95a5ede684c7e16298023d5afc4485c1c

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259497793.txt

                                        Filesize

                                        1KB

                                        MD5

                                        b9eaecae41bd3b1e17eb00fe301eb717

                                        SHA1

                                        089503efc5d5813d69c9c004a877b5ab89db9a5a

                                        SHA256

                                        85500dde4a4be08d9ccd14f5ab5c854a4475ed7b4dcf2aee1b287d06db48df53

                                        SHA512

                                        b57858df24fda783531c6768480d5f359dd49eaaa89a5ca27f245993f581a8d639990128862df367b547c64db31d2b274d647e4138b225d473a121dd5b075c02

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259510846.txt

                                        Filesize

                                        1KB

                                        MD5

                                        e0b62888569a407ccc9d54d9a64c9a16

                                        SHA1

                                        7fb597151998981d470f0fb1d27d9b6dd27fa114

                                        SHA256

                                        dd7de686d296062d196aa5fa609d046eeb4fd396145a91a507f4e1f44bd8ddbc

                                        SHA512

                                        321f428f07b8eb7daae020f6b408005bc6b6c4042f984059e668184c459f253744bc9bcdae37e4a493396354f30a3f8f1f714fe8db8ca80b7a82a2524d5edfba

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259524563.txt

                                        Filesize

                                        1KB

                                        MD5

                                        46b2b3b3f4ec5f34ad2075155fff79d9

                                        SHA1

                                        9c428318326f418ee395a6a2771d548c2179a705

                                        SHA256

                                        0cb98ad33ba8087a662c80063b7d7b32e69087238a7f8fe45b8db5e368bb893a

                                        SHA512

                                        99f8292c419cfb246f3825d65613742d8c6c7ff0e65043ca2fa977149a1858ced1533676c2326094d757928009328a9bd9120e697c8e1cefc2a4e24e48c74a8b

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259555878.txt

                                        Filesize

                                        1KB

                                        MD5

                                        9bac3dc376fe800778b0cb11f53a168b

                                        SHA1

                                        12d037bbf2b4cfaf26de947d344eff0cd1e0ade9

                                        SHA256

                                        e2ef1de00e8a6bc32e53850f2602d6c80b0507b92e974176987f6acab98ae650

                                        SHA512

                                        83788f3d1b3e167db33bf100c86ea4c264bb41412d5f1c43174d9094e6a2006bc5073aba7b50b3a76a74977d5d94122d694f6a8238d4a2b35d9bbcf7534d56f3

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259556134.txt

                                        Filesize

                                        1KB

                                        MD5

                                        262ad7705cac2b4b974156042f9a7e42

                                        SHA1

                                        5896590dfe1e7280e40b75e138693a7038acc11b

                                        SHA256

                                        2d5d6d50fc2312cf9b25a93bacd6e653ba281fe7972c7ee674cb92ed92f6547c

                                        SHA512

                                        f11fa33d635066cf50ffd1f52bcb6d6e21b78b291ec8a413cc1a883b19f2f90c7a281e226e02356a77f4fc4f172e3a0d15cc72d9d4ba656a2fa3fe82f8855ff3

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259574006.txt

                                        Filesize

                                        1KB

                                        MD5

                                        782d5ac762f684fef2219895a05f49aa

                                        SHA1

                                        2ee8d4e6d3f9840f0ee9d4d26600cca4b459ac90

                                        SHA256

                                        ca11d2049db068f2075a0f04177058b24dced7225b90b8d816cb337f3d6bf4ac

                                        SHA512

                                        3714c625c392ce96805b57f915a7f31ec151ae95a09b680a444efa81652d27f043e307b4eeb5234dcf7a01409795017dcecdb07199cdf8066ad46864bdbc88ef

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259585756.txt

                                        Filesize

                                        1KB

                                        MD5

                                        5d0d7830259cc6bd92bcf18b23274d0e

                                        SHA1

                                        5fa5870506ad0c30c0543bb58217543fb0e57f80

                                        SHA256

                                        e1cd5bb6172a3399679f0870f253d6a5b5b8738e368541939ee2bdbf1710d040

                                        SHA512

                                        5ed278b5d81ca3c0ca706c64e72e764c31fc0c96e7ea12c66f4f5bb849cd0e8f59cb5ded51f4b0ad16c400e59e28c2cc377149b61f0613b28a55d393ac340d8f

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259600771.txt

                                        Filesize

                                        1KB

                                        MD5

                                        b4a334925ba42e7a77eaa7e9d5e2c0d0

                                        SHA1

                                        41e353d44bca9d701ac3602ab08fec7f2deda734

                                        SHA256

                                        35168c7e78308b0446814f5f15b7a38abd622e7a31d0f7c96691b95f18ba77f5

                                        SHA512

                                        b1c62356a3a3214b6e99c6869118b2ebb8910f5d5d99840f3f93a2f611cdebe42be98d40678a1d794fec81057153a83b021a94970351d3a88659deb3de431700

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259617973.txt

                                        Filesize

                                        1KB

                                        MD5

                                        a768aaf972c037567eafac6bd9b22b8d

                                        SHA1

                                        0148800868616d35fec96a6b762fd985793c7e3e

                                        SHA256

                                        b7718ecf17470437cbafd236ce5f7d459f0536c74022c006ff6e2ee5c1ba0453

                                        SHA512

                                        0fbd845764459da62629491d8fc21baf588294c1e830069243451658bff719359c03413d85cff548a648abc776e09d442ad38caed5805b3d408b88ad4e2a030a

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259632607.txt

                                        Filesize

                                        1KB

                                        MD5

                                        a859f0dc2d1f192fe1d6a877ba13a4a9

                                        SHA1

                                        28e39c5d158ec97eaa569a3d2bdb733c3378fd24

                                        SHA256

                                        7f050761f5c2e3d9181decc228ec76beb4c1b163fd7fad6174ecc9efbea747a6

                                        SHA512

                                        0d1104681b1cf0de3ed010e368869a857dfe2ec78e9f8ceebe0d14856742576050be351e821259672526b191a046d427e50a8a8b7b5a9ab7c9099c56adea6e0c

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259645996.txt

                                        Filesize

                                        1KB

                                        MD5

                                        1cb04ba2a6eb035f27db8a268afdc07d

                                        SHA1

                                        fcb6c846f574802b295ceeb4a38f1d6df7e74a51

                                        SHA256

                                        2b96762f3fdc6fece1ea8f612aba6f976fef9ed1fc6bfd169fc663bda04ddf04

                                        SHA512

                                        fa5c2b66200181659df5268320891b8c8292892f471a2a021ddfdfaaa05c4ab0d5a90750686d00501cc0a9ab21497d64ac68f5fb780b1f6393b623b7d8ff7571

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259663616.txt

                                        Filesize

                                        1KB

                                        MD5

                                        64ecf41c3a3a1fbf08efd160796bc7f8

                                        SHA1

                                        8a1081cdbd65060ae1992224ae71e4b5c1394dda

                                        SHA256

                                        97526987da4b9954b663f03e62d446a9d200793ba041b40983ba917613be4e97

                                        SHA512

                                        3427d1cfdeedba967e73f3f0fabe44600313fb36f469e922b9df9b612572ffd56697d124d98608b16f98e098870d5ccec5701cfc2d7ec8520520e47db174c28c

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259680673.txt

                                        Filesize

                                        1KB

                                        MD5

                                        452682384a0b87bef17862ef864a6cac

                                        SHA1

                                        902d0f0bccc858165fe24e88ca2c254ba6696623

                                        SHA256

                                        d3502880d560ae90722a6c91ae0df54407c71f2c252f62ded29ea27c5615e3df

                                        SHA512

                                        957611f78a42634ff9ce2402fe601e670a127186ee3b2f7b48f9bb960cbb3b83a5225ed93b60fe9147538f94a013dad06d75498816417e0003efbe7c98e6a26b

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259694004.txt

                                        Filesize

                                        1KB

                                        MD5

                                        2f3bf5391703b6c41620995af39545e7

                                        SHA1

                                        b5bb64397bfa9908a80e2907e2938e1481020c11

                                        SHA256

                                        1ff1cf3a8d92e5e43c1f7eb8434a18378da595352cdfe60fb74dc68e042e812e

                                        SHA512

                                        cb23022583b6619312a5a9063ce7bb6453c8980b24d4972278fabd8de6a37389273116707004eaf35a6205093333899c70e8ba77249a848845bf9d798a43c815

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259710450.txt

                                        Filesize

                                        1KB

                                        MD5

                                        3a71cd2f5f359d1acc61762bcd7a2d91

                                        SHA1

                                        03145aafc45bbfa50e417d74233218d4c3c15d19

                                        SHA256

                                        ec914a6f7151a4dbfd1b760865f7d7a1c872c14fae98189c97b88c68e3074f31

                                        SHA512

                                        3e0bfe32c3f5f02d034ff65328b12ba3fe4b7d087f17228cc10de1d3ae8894b640445044a20430288fff70dc2abfb8b4ea31d2cf5d6e1b1a6e179181f53d2585

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259724497.txt

                                        Filesize

                                        1KB

                                        MD5

                                        db5a379ce599948f2afbf9f4a8b82d1e

                                        SHA1

                                        c329492efbb91c0d6002e7ba865a5e048fc31955

                                        SHA256

                                        5a1eff35968f993a66e21af781927ff17d164d183e951cbe7d759b477ce1e25f

                                        SHA512

                                        099cd156f41a779cb739d1a0400bff745cfe37c19c071b0badeee17b01a4b2792eb7d8abef086d4d242450ce121a1ba676ba1754870ce66975b17dbde8bc4720

                                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259738145.txt

                                        Filesize

                                        1KB

                                        MD5

                                        16d551a8abf357c2b1a16f1477042aaa

                                        SHA1

                                        612ef32e2b8c5f7018dcf11e38c3506a06c2019f

                                        SHA256

                                        04e9f0ab92965f78dfc5bf4eb585a18820dbeebf634226c12bf9d604fc886b40

                                        SHA512

                                        5207f7b610a8d1416d243fd2f1c109d685060d354222d3b150c382439328a6849dc2bdabdf0f58febba09692922cab4a709313dd13403f03fd16cae7a72c5aa2

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                        Filesize

                                        7KB

                                        MD5

                                        f0606ad23508d08cd7d988593ef162ca

                                        SHA1

                                        935a883eb24d8e5d47f37c703becfc18a2874dc5

                                        SHA256

                                        6481c650de25f5a960c7def5256eb2764870bb52206aeb2fcbe4405ecc2f1b1e

                                        SHA512

                                        99ef175ee3ed5484315c6959af7aa233e6811fe1e5cf68f586ccd682a179bb3e3bf019ed3f1830f36a06b5d271964fe9be3f4ae0b9189f89893d8256ed2b18e4

                                      • C:\Users\Admin\AppData\Roaming\uaDoJtHubxengYS.vbs

                                        Filesize

                                        2KB

                                        MD5

                                        477e3b6cbf610f72373118d4ca9cdbb2

                                        SHA1

                                        ca88c1b80fa6248644497449c294f92b5a32b300

                                        SHA256

                                        9d75154b064fc63a3de686569088ef8c7ac31f2826dc4557d5e7074535bbdf3c

                                        SHA512

                                        ad3d81784cb1199839e66c7b88ac1da0c14a7f8a6f3f9a7bbb496fc953f02253733e5f7370efe5c08d9c5f4a9f037d84d814e958ea8715732d9e3df14b94b119

                                      • memory/1372-16-0x000000001B500000-0x000000001B7E2000-memory.dmp

                                        Filesize

                                        2.9MB

                                      • memory/1372-17-0x00000000026F0000-0x00000000026F8000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2728-6-0x000000001B540000-0x000000001B822000-memory.dmp

                                        Filesize

                                        2.9MB

                                      • memory/2728-7-0x0000000002790000-0x0000000002798000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2728-8-0x0000000002C80000-0x0000000002C88000-memory.dmp

                                        Filesize

                                        32KB