Windows Analysis Report
Update.js

Overview

General Information

Sample name: Update.js
Analysis ID: 1520587
MD5: 25f77d065e86649afff03a1ac4791f52
SHA1: 6cbf2d9fe70da875f726eaaf39a5e6f593df85c2
SHA256: 0c39052a52eda424ffef8dc4e230e17a142b1e6239ada891fb3a0946a501e4ae
Infos:

Detection

Score: 68
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Found WSH timer for Javascript or VBS script (likely evasive script)
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript

Classification

Networking

barindex
Source: Network traffic Suricata IDS: 2056180 - Severity 1 - ET EXPLOIT_KIT ZPHP Domain in TLS SNI (roadrunnersell .com) : 192.168.2.4:49730 -> 79.141.163.131:443
Source: Network traffic Suricata IDS: 2056179 - Severity 1 - ET EXPLOIT_KIT ZPHP Domain in DNS Lookup (roadrunnersell .com) : 192.168.2.4:58051 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2056180 - Severity 1 - ET EXPLOIT_KIT ZPHP Domain in TLS SNI (roadrunnersell .com) : 192.168.2.4:49737 -> 79.141.163.131:443
Source: C:\Windows\System32\wscript.exe Network Connect: 79.141.163.131 443 Jump to behavior
Source: Joe Sandbox View ASN Name: HZ-US-ASBG HZ-US-ASBG
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic DNS traffic detected: DNS query: roadrunnersell.com
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://0.30000000000000004.com/
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://stat.ethz.ch/R-manual/R-devel/library/grDevices/html/boxplot.stats.html
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/API/CanvasRenderingContext2D/Variable1CompositeOperatio
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/Events/mousewheel)
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://echarts.apache.org/examples/en/editor.html?c=custom-gantt-flight
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/apache/echarts/issues/14266
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/apache/incubator-echarts/issues/11369
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/apache/incubator-echarts/issues/12229
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/d3/d3-hierarchy/blob/4c1f038f2725d6eae2e49b61d01456400694bac4/src/tree.js
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/d3/d3/blob/9cc9a875e636a1dcf36cc1e07bdf77e1ad6e2c74/src/arrays/quantile.js
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/d3/d3/blob/9cc9a875e636a1dcf36cc1e07bdf77e1ad6e2c74/src/layout/treemap.js
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/d3/d3/blob/b516d77fb8566b576088e73410437494717ada26/src/layout/force.js
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/d3/d3/blob/b516d77fb8566b576088e73410437494717ada26/src/time/scale.js
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/ecomfe/zrender/blob/master/LICENSE.txt
Source: wscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1702807223.0000028188911000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1707444503.0000028188951000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, Update.js String found in binary or memory: https://github.com/google/closure-library/wiki/goog.module:-an-ES6-module-like-alternative-to-goog.p
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://graphics.ethz.ch/teaching/scivis_common/Literature/squarifiedTreeMaps.pdf
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://jsbench.me/2vkpcekkvw/1)
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://jsperf.com/try-catch-performance-overhead
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://momentjs.com/
Source: wscript.exe, 00000000.00000003.2608386580.0000028186C56000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571975946.0000028186C11000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2572364520.0000028186C66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571895557.0000028186C66000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://roadrunnersell.com/
Source: wscript.exe, 00000000.00000003.2608386580.0000028186C56000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2572364520.0000028186C66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571895557.0000028186C66000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://roadrunnersell.com/qL
Source: wscript.exe, wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2619276208.000002818D1B4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571975946.0000028186C11000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2608386580.0000028186C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2572364520.0000028186C66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2616655913.000002818ED1F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1706648325.000002818C11D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2617244155.0000028188BF1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571895557.0000028186C66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2618831195.0000028188BF1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2616586676.000002818ED1B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://roadrunnersell.com/trade/fix.php?624
Source: wscript.exe, 00000000.00000003.2571975946.0000028186C11000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2608386580.0000028186C27000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://roadrunnersell.com/trade/fix.php?6242d4
Source: wscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://roadrunnersell.com/trade/fix.php?624p
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://tc39.github.io/ecma262/#sec-daylight-saving-time-adjustment).
Source: wscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, Update.js String found in binary or memory: https://www-googleapis-staging.sandbox.google.com
Source: wscript.exe, 00000000.00000003.1707036235.0000028188B53000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www-googleapis-staging.sandbox.google.com(
Source: wscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1706818670.000002818C07D000.00000004.00000020.00020000.00000000.sdmp, Update.js String found in binary or memory: https://www.google.com/intl/en-US/chrome/blank.html
Source: wscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, Update.js String found in binary or memory: https://www.googleapis.com
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49739
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49737
Source: unknown Network traffic detected: HTTP traffic on port 49737 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49739 -> 443

System Summary

barindex
Source: C:\Windows\System32\wscript.exe COM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4} Jump to behavior
Source: Update.js Initial sample: Strings found which are bigger than 50
Source: classification engine Classification label: mal68.evad.winJS@1/0@1/1
Source: C:\Windows\System32\wscript.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: jscript.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: msisip.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wshext.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: scrobj.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: msxml3.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: mlang.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32 Jump to behavior
Source: Update.js Static file information: File size 6980191 > 1048576
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Window found: window name: WSH-Timer Jump to behavior
Source: wscript.exe, 00000000.00000003.1704907771.000002818E0B6000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMCiVM
Source: wscript.exe, 00000000.00000003.2571975946.0000028186C46000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2608386580.0000028186C46000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2572364520.0000028186C76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571975946.0000028186C11000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2608386580.0000028186C76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2608386580.0000028186C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571895557.0000028186C76000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\wscript.exe Network Connect: 79.141.163.131 443 Jump to behavior
Source: C:\Windows\System32\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs