Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2023, 22:58

General

  • Target

    0a8a5565d0477d1a9990050a1402f6e056359653a8006d0aa2c711233742cbad.exe

  • Size

    1.2MB

  • MD5

    a7a6c43adbfc950d04d12381774f3aba

  • SHA1

    dac730df61135a8d8b9b78af9780141247bd2f11

  • SHA256

    0a8a5565d0477d1a9990050a1402f6e056359653a8006d0aa2c711233742cbad

  • SHA512

    8d35755ba1526ffeb37fdb85be5653a2dd929866acb628a12b8f1a42b56b50676d541d58c42b6a1d2acee78084329fe1bcd32f092cbcf80adf5b0b3fe67984a6

  • SSDEEP

    24576:vlAzF5dI2vYKWb6Dsq3P3K4XY0esxUAUbwvaoslG45wyvCj8z7mw1:voep0hUbSklG45lvMc1

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 23 IoCs
  • Loads dropped DLL 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a8a5565d0477d1a9990050a1402f6e056359653a8006d0aa2c711233742cbad.exe
    "C:\Users\Admin\AppData\Local\Temp\0a8a5565d0477d1a9990050a1402f6e056359653a8006d0aa2c711233742cbad.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2544
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:604
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:592
              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1228
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:1044
                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2828
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                      10⤵
                      • Loads dropped DLL
                      • Suspicious use of WriteProcessMemory
                      PID:1320
                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2452
                        • C:\Windows\SysWOW64\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                          12⤵
                          • Loads dropped DLL
                          • Suspicious use of WriteProcessMemory
                          PID:2016
                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                            13⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:1780
                            • C:\Windows\SysWOW64\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                              14⤵
                              • Suspicious use of WriteProcessMemory
                              PID:1624
                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                15⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:1000
                                • C:\Windows\SysWOW64\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                  16⤵
                                    PID:2232
                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                      17⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2440
                                      • C:\Windows\SysWOW64\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                        18⤵
                                        • Loads dropped DLL
                                        PID:1552
                                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                          19⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2684
                                          • C:\Windows\SysWOW64\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                            20⤵
                                              PID:2096
                                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                21⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2012
                                                • C:\Windows\SysWOW64\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                  22⤵
                                                  • Loads dropped DLL
                                                  PID:2616
                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                    23⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2836
                                                    • C:\Windows\SysWOW64\WScript.exe
                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                      24⤵
                                                        PID:2876
                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                      23⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:604
                                                      • C:\Windows\SysWOW64\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                        24⤵
                                                        • Loads dropped DLL
                                                        PID:1504
                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                          25⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2808
                                                          • C:\Windows\SysWOW64\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                            26⤵
                                                            • Loads dropped DLL
                                                            PID:1232
                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                              "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                              27⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2828
                                                              • C:\Windows\SysWOW64\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                28⤵
                                                                • Loads dropped DLL
                                                                PID:1172
                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                  29⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2660
                                                                  • C:\Windows\SysWOW64\WScript.exe
                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                    30⤵
                                                                    • Loads dropped DLL
                                                                    PID:1820
                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                      31⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:1508
                                                                      • C:\Windows\SysWOW64\WScript.exe
                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                        32⤵
                                                                        • Loads dropped DLL
                                                                        PID:2304
                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                          33⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1560
                                                                          • C:\Windows\SysWOW64\WScript.exe
                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                            34⤵
                                                                            • Loads dropped DLL
                                                                            PID:1604
                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                              "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                              35⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:1864
                                                                              • C:\Windows\SysWOW64\WScript.exe
                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                36⤵
                                                                                • Loads dropped DLL
                                                                                PID:1720
                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                  37⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:2756
                                                                                  • C:\Windows\SysWOW64\WScript.exe
                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                    38⤵
                                                                                    • Loads dropped DLL
                                                                                    PID:2536
                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                      39⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:2456
                                                                                      • C:\Windows\SysWOW64\WScript.exe
                                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                        40⤵
                                                                                        • Loads dropped DLL
                                                                                        PID:1728
                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                          41⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:2584
                                                                                          • C:\Windows\SysWOW64\WScript.exe
                                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                            42⤵
                                                                                            • Loads dropped DLL
                                                                                            PID:2000
                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                              "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                              43⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:1636
                                                                                              • C:\Windows\SysWOW64\WScript.exe
                                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                                44⤵
                                                                                                • Loads dropped DLL
                                                                                                PID:1052
                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                                  45⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:320
                                                                                                  • C:\Windows\SysWOW64\WScript.exe
                                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                                    46⤵
                                                                                                      PID:1228
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                  4⤵
                    PID:2512

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

              Filesize

              92B

              MD5

              67b9b3e2ded7086f393ebbc36c5e7bca

              SHA1

              e6299d0450b9a92a18cc23b5704a2b475652c790

              SHA256

              44063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d

              SHA512

              826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              753B

              MD5

              bd6e626ad993e6232439a0b18244e02a

              SHA1

              b9cbde6db8b015087b625491273ad7d3627b6518

              SHA256

              4295d9af047fa08cfee4fedbba8a3d8eb6cf72011961247dac3fbfbeef8f2d54

              SHA512

              15dcc7c7d6136f58739adb02045846ec3337481fbf7c4360ad206721f52037ba0788ba66a30a1fb2b19c721412cc746692e1a98b48dd02fc71d56e9f0a8123b0

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              696B

              MD5

              7d2c3f227d42fae4a5b7fbcb491b74e3

              SHA1

              c1271bbd86747cc709b694ba9579a68b5e75a17c

              SHA256

              9353a2f27a61e571c5bc92ccc1046c1059c5fad8e1e2cafe63a9cc73e1169c33

              SHA512

              50330ad733975966b32fbedffb99a25cd13004d685e5788ef11f1f0fedfc62658e3e8f5ed0030fe60ecb02ba95ffa7d440c067a1e164cc3bc02ac5008b6a27d3

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              696B

              MD5

              66dec81d7f7dc4e36f9d8151fe38056a

              SHA1

              fc169994b2239eb407778d28d35025f7c9a1658e

              SHA256

              a09a3c722b494400011829c5645415020d39c8e6ec90f466fc3109a1ba49db2a

              SHA512

              3e8af1d301ba9228d5afcfaa1e1d3e6f931c5f0ba5e19c74f73b88ddf7c4baa7b24f13533679096f6c94871985de9e47d0f91362ec2ee9132b1e1b772d56fbcc

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              696B

              MD5

              6a10838e65cf3aedda11230ee7f407b7

              SHA1

              7878e96feb82d309b74e4fe98ad256d3bfd63d08

              SHA256

              79b9776ab8d5f525f63ccab50ff6d79e7a7daeb47894ce971b63ab072314009e

              SHA512

              7fd419656935cef9e30f36f618df90399b015dc281dea6b30f12ba7bf2c07a58e7aa570ea5fd1f04b3643be33eb1d8521787c94384cb7ef0ec8d5459a8c50eaa

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              696B

              MD5

              f988db0382571319f9b0af53097c2376

              SHA1

              fd83936b61f5d4256a899610d5c13c5a9b24e625

              SHA256

              8557443470cff4b30c533603a8e73dd9b9c55af2bae1ed0a7ce86d860fe4953c

              SHA512

              8f0df896cf7432ac5248f1149a79cc721e40e80dc1ced770f830725c00e64bb96944bbdd375aa25587e0574dba32375934cbf99bf99f33267296c1e605ac8703

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              696B

              MD5

              3fe126921f6537cf36cd507b1649ffbb

              SHA1

              445c8796d072bb5829f0af8421e3eb7da34add70

              SHA256

              b4af7c7ab452f12e0ea38532d00cfa19cf99247ef169e5e698acd882e72750a6

              SHA512

              5d8527210f01cc30bda93521cdbd9828d03f2af3e2810996ad8c60cf62a35e415c0e54a34e00847ae30bf2718e8c431b65ed4f509c11986a8eb54ed6ed64ac94

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              696B

              MD5

              ddd204c2596c95e0b37f2faf17345158

              SHA1

              fb5c9a676eb0b0e08ed0498a5696bbd7d443b1a2

              SHA256

              6ba8498e50d16dedd7a4479998981b504b684f524c08329269fd4eb6e3fe52a2

              SHA512

              17f8ff158d74cb8b37954cd5d458440cbf7e41dd03d08d5101b55f7ca259fdd1e36967e5231a31362c68456d0e91bdbac1c83cc19876ab7ec1c97bde0ec03244

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              696B

              MD5

              f76c7cf504b872903a1325a57e8baaf9

              SHA1

              896ac9d8338b41c7673781f07915612c538c385f

              SHA256

              46436b128cbdb907e9666c1aa6257164f7e5a2ebe1c79b9198b36e50115a8163

              SHA512

              59c0e9f508682af572185dd2578ad1e62abb99297a99018af7638bc8d2f6693fe00900bd739e00a912088f77624f08034dba041ce1677e2924cb8ab3196b6054

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              696B

              MD5

              6a10838e65cf3aedda11230ee7f407b7

              SHA1

              7878e96feb82d309b74e4fe98ad256d3bfd63d08

              SHA256

              79b9776ab8d5f525f63ccab50ff6d79e7a7daeb47894ce971b63ab072314009e

              SHA512

              7fd419656935cef9e30f36f618df90399b015dc281dea6b30f12ba7bf2c07a58e7aa570ea5fd1f04b3643be33eb1d8521787c94384cb7ef0ec8d5459a8c50eaa

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              696B

              MD5

              ee35194fa07bea6145178b37a18edb25

              SHA1

              7cbe9989cbc0090cc0ab534c7aa77d64d959e489

              SHA256

              e323603a594cf3a7e03aea20d2ab69a17040a02f256ac1e3fe02f8a36889a483

              SHA512

              d292e22575da17d694a33d6132cea65ca1c58a16bd2532dd24db161d2a77cf233039ed1b66b48868210f4d0ffff16678db3be341eca044432b8087b520e59f71

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              696B

              MD5

              ee35194fa07bea6145178b37a18edb25

              SHA1

              7cbe9989cbc0090cc0ab534c7aa77d64d959e489

              SHA256

              e323603a594cf3a7e03aea20d2ab69a17040a02f256ac1e3fe02f8a36889a483

              SHA512

              d292e22575da17d694a33d6132cea65ca1c58a16bd2532dd24db161d2a77cf233039ed1b66b48868210f4d0ffff16678db3be341eca044432b8087b520e59f71

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              696B

              MD5

              8cb32754e88999ece2a392d94875313e

              SHA1

              da0ef4e297872b82db206ebdc4cafefeed2a4e3d

              SHA256

              3dc5ae697f3f5a3ffe053412e05a646883c49be29b179039ceadf5f71a595f9d

              SHA512

              a331a2472d0ef04f4d6a9b41a147020a688c96977feec8d61878f31382af8c27b8e990dc404137475d48f0155d600cc0d6ebe0a5d1cbb60b1fecf364301ebaa7

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              696B

              MD5

              b80e64a84f22d05c1da6e47ce54973aa

              SHA1

              5cad9390328f2c7439c775fabb7a0456663085d9

              SHA256

              9dd0f5f176d3fad7c0eb3bdd6f14036a878cbce9fd50fb1a47318da147bfd82e

              SHA512

              983affb7f9189c1eb80982438c288ee607e7ee91675b6a6e854873c476961b39ddec66801e0a09bedd0f133a0132693a5fed5c8ff0f8c3d3aa4f470fdb8c39b9

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              696B

              MD5

              f9d25791d9949ef33ed0c208f3d11851

              SHA1

              1cdf525209a1d7ade65168011e4de530de7bdc5a

              SHA256

              d3592a18c2a195dba2db76e25fb1516b2a9ef5297e9d72716e232d3540bc4481

              SHA512

              efb6f3882b9c75aa5193cf1bfeeb430b0a963681bf5367f535e3eb9c4e7c796c0aa1d0e3df9803c635ba6d863dc129a9ab30c954c6d4af27803036859d3d3113

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              696B

              MD5

              780c5b88f55c3463a252f361d53f98db

              SHA1

              244e739c7401ce41027d7786f4a48f4806a9939b

              SHA256

              d8b383df125f83a39c299a3134c88e981cf47755ddd6b44310f70231305c6bb0

              SHA512

              b12e3266edea4f9dff105ed8617c81a29f9873d646b6b326c5c29c0c590049dd85458b8ff7541957f9ab995896e7bfd08b171959e592ccc6edbedf998fdf1045

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              696B

              MD5

              48e04b8c794b661550560f9e02af5bb4

              SHA1

              973d939e48bc7713c0338e95966219616bd415d0

              SHA256

              f3bfe9c6c363e0ef4e22d9990175cb4c1c5d7d087aa5a2cff9f912d5ac6676da

              SHA512

              23ca46c09e1c2c320c7c79e71056dc6cb78d1dbaa75f4cee92e63626fe1eef268d91c519a8a0219f816049d2babd0276d27471ccc57a05825ce339ea88eea778

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              e93f33a19dafb0ed0825b1c8e08ed63b

              SHA1

              96d937a0efffb673958b52330919056f46f3d5d9

              SHA256

              2d0d0abe7193e3cbd8276e3cb395104be523b1bee01a63475fee93c2aa82a32f

              SHA512

              0cb54d44f1ca4b2e07d97c2d53bc201e5923384f756b09c51b87693ad404bcdf0528a9e6689631851a7e134f81c04bfb79c3cc7ed43a1d6eb86e4bd719d32b2f

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              e93f33a19dafb0ed0825b1c8e08ed63b

              SHA1

              96d937a0efffb673958b52330919056f46f3d5d9

              SHA256

              2d0d0abe7193e3cbd8276e3cb395104be523b1bee01a63475fee93c2aa82a32f

              SHA512

              0cb54d44f1ca4b2e07d97c2d53bc201e5923384f756b09c51b87693ad404bcdf0528a9e6689631851a7e134f81c04bfb79c3cc7ed43a1d6eb86e4bd719d32b2f

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              e93f33a19dafb0ed0825b1c8e08ed63b

              SHA1

              96d937a0efffb673958b52330919056f46f3d5d9

              SHA256

              2d0d0abe7193e3cbd8276e3cb395104be523b1bee01a63475fee93c2aa82a32f

              SHA512

              0cb54d44f1ca4b2e07d97c2d53bc201e5923384f756b09c51b87693ad404bcdf0528a9e6689631851a7e134f81c04bfb79c3cc7ed43a1d6eb86e4bd719d32b2f

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              e93f33a19dafb0ed0825b1c8e08ed63b

              SHA1

              96d937a0efffb673958b52330919056f46f3d5d9

              SHA256

              2d0d0abe7193e3cbd8276e3cb395104be523b1bee01a63475fee93c2aa82a32f

              SHA512

              0cb54d44f1ca4b2e07d97c2d53bc201e5923384f756b09c51b87693ad404bcdf0528a9e6689631851a7e134f81c04bfb79c3cc7ed43a1d6eb86e4bd719d32b2f

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              d5c175af02df162bbcab4ced5ae677ab

              SHA1

              dbd389414a338c079f166834d03e0cf2b19d6911

              SHA256

              6a9b405a2ddab5cd220eaf4d1ef4b950a856ea436903305ecf8e15b6901302a1

              SHA512

              183f029f3c3b1c75e9369a0894d26f24ce69b960519c5c950d728eac88c5b049e50a1869953934c8f9445235076575b3eaf3d93b2e571d67216a5db2dd72050a

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              d5c175af02df162bbcab4ced5ae677ab

              SHA1

              dbd389414a338c079f166834d03e0cf2b19d6911

              SHA256

              6a9b405a2ddab5cd220eaf4d1ef4b950a856ea436903305ecf8e15b6901302a1

              SHA512

              183f029f3c3b1c75e9369a0894d26f24ce69b960519c5c950d728eac88c5b049e50a1869953934c8f9445235076575b3eaf3d93b2e571d67216a5db2dd72050a

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              17cc4d2c247046064de5e71204d3553f

              SHA1

              cd1395a4ca38b310776a8f62c1ae5044013c0bbe

              SHA256

              5224027b9a2394e71869a73951b0ada7b1d94fc49a611b0c19081d8252e7bcd2

              SHA512

              43a7fe35c52964d3bb9c6beab2ef20a07e8e7dad6801871de982fc185bdb938b3afa89a93bc764ec68da4775dac0c450baa3b055ec1d153310ece6a78f874c95

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              17cc4d2c247046064de5e71204d3553f

              SHA1

              cd1395a4ca38b310776a8f62c1ae5044013c0bbe

              SHA256

              5224027b9a2394e71869a73951b0ada7b1d94fc49a611b0c19081d8252e7bcd2

              SHA512

              43a7fe35c52964d3bb9c6beab2ef20a07e8e7dad6801871de982fc185bdb938b3afa89a93bc764ec68da4775dac0c450baa3b055ec1d153310ece6a78f874c95

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              8a3c769f692ccdd70c80d7a9bb37099f

              SHA1

              3394929f791c81240c8604760fe42b717d05c9f4

              SHA256

              67deafe29cf52fd41a38e791a4a923004506f81392bb30707d82e3dfb8053dfc

              SHA512

              f60b13e32c63eed93cd3a85cb17ccc7982a4167790c6bfadac34ca26078ad3a8cd72f640134c427f2df851ed64f838410ac3b549525d1fddab94e5c78c0adeff

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              8a3c769f692ccdd70c80d7a9bb37099f

              SHA1

              3394929f791c81240c8604760fe42b717d05c9f4

              SHA256

              67deafe29cf52fd41a38e791a4a923004506f81392bb30707d82e3dfb8053dfc

              SHA512

              f60b13e32c63eed93cd3a85cb17ccc7982a4167790c6bfadac34ca26078ad3a8cd72f640134c427f2df851ed64f838410ac3b549525d1fddab94e5c78c0adeff

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              bdef598ebf31eb67abd4ad1f4564649a

              SHA1

              fa49426b9f79f85229eab9d72f4215c08c884474

              SHA256

              d04ea4ececf4a06c8680fbea9ccf3bc299fa615e44eb67014785adb6a06d3e05

              SHA512

              b7c0c9fdcdd72de149f620795cd52c1010a7ca4e808446865479a6a09886a0316e2e64aecc8f18c3b69b181ec92d504c5156c04b61ce55b6329ce4ddd0b758c5

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              bdef598ebf31eb67abd4ad1f4564649a

              SHA1

              fa49426b9f79f85229eab9d72f4215c08c884474

              SHA256

              d04ea4ececf4a06c8680fbea9ccf3bc299fa615e44eb67014785adb6a06d3e05

              SHA512

              b7c0c9fdcdd72de149f620795cd52c1010a7ca4e808446865479a6a09886a0316e2e64aecc8f18c3b69b181ec92d504c5156c04b61ce55b6329ce4ddd0b758c5

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              65791e630ac45671f65f52fbea64494e

              SHA1

              b9d10059060dd97a2db100829b7756929c5a57a7

              SHA256

              5d59a7bbb909002310a58d1a288f4cd4e82cb223eb1fa0f507d6ea7c1f4b68da

              SHA512

              4550cb6c609bae743014b3a1b11f36d4715926141b56372e4f6c1b69228ac2c313dac30eaeb5bed06f72f7c2a734979b7d43596df4d8ee3d1d2632bc5022a749

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              65791e630ac45671f65f52fbea64494e

              SHA1

              b9d10059060dd97a2db100829b7756929c5a57a7

              SHA256

              5d59a7bbb909002310a58d1a288f4cd4e82cb223eb1fa0f507d6ea7c1f4b68da

              SHA512

              4550cb6c609bae743014b3a1b11f36d4715926141b56372e4f6c1b69228ac2c313dac30eaeb5bed06f72f7c2a734979b7d43596df4d8ee3d1d2632bc5022a749

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              65791e630ac45671f65f52fbea64494e

              SHA1

              b9d10059060dd97a2db100829b7756929c5a57a7

              SHA256

              5d59a7bbb909002310a58d1a288f4cd4e82cb223eb1fa0f507d6ea7c1f4b68da

              SHA512

              4550cb6c609bae743014b3a1b11f36d4715926141b56372e4f6c1b69228ac2c313dac30eaeb5bed06f72f7c2a734979b7d43596df4d8ee3d1d2632bc5022a749

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              82f286f620463a6f8663963039b9a897

              SHA1

              d19eb375684213b8a7c90fd4c36581bb986e29e8

              SHA256

              a518cf3d9e26086eb18e02243ee3cc2e23be2003aef6eded2e46382a65b5c583

              SHA512

              44cd0ee42f6e8bfb40522c0113b3ebb2d45bfe20f0487f4407a3411f5a967b162983141a9e868608ea0c1df605afa206ca087331d32f5cc2e26387afd7fd7d11

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              82f286f620463a6f8663963039b9a897

              SHA1

              d19eb375684213b8a7c90fd4c36581bb986e29e8

              SHA256

              a518cf3d9e26086eb18e02243ee3cc2e23be2003aef6eded2e46382a65b5c583

              SHA512

              44cd0ee42f6e8bfb40522c0113b3ebb2d45bfe20f0487f4407a3411f5a967b162983141a9e868608ea0c1df605afa206ca087331d32f5cc2e26387afd7fd7d11

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              82f286f620463a6f8663963039b9a897

              SHA1

              d19eb375684213b8a7c90fd4c36581bb986e29e8

              SHA256

              a518cf3d9e26086eb18e02243ee3cc2e23be2003aef6eded2e46382a65b5c583

              SHA512

              44cd0ee42f6e8bfb40522c0113b3ebb2d45bfe20f0487f4407a3411f5a967b162983141a9e868608ea0c1df605afa206ca087331d32f5cc2e26387afd7fd7d11

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              82f286f620463a6f8663963039b9a897

              SHA1

              d19eb375684213b8a7c90fd4c36581bb986e29e8

              SHA256

              a518cf3d9e26086eb18e02243ee3cc2e23be2003aef6eded2e46382a65b5c583

              SHA512

              44cd0ee42f6e8bfb40522c0113b3ebb2d45bfe20f0487f4407a3411f5a967b162983141a9e868608ea0c1df605afa206ca087331d32f5cc2e26387afd7fd7d11

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              be73e3f8139aff9b9f9104d28c42e0e5

              SHA1

              b0a362eaf3e2988e2af4d71818f369f900a6c515

              SHA256

              ca57bdc2e91561d477654fef705b425b58127bff9573c9193d0b69766e6b8445

              SHA512

              70a67230233306a4d864abb9bf614fc122b9d52a5bf8ca9924c347ce29bd1e0a9bc90f2e1a5ea96d39e20c8ac64fa92dc829e74f75626a678f0faebf0b5971a0

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              be73e3f8139aff9b9f9104d28c42e0e5

              SHA1

              b0a362eaf3e2988e2af4d71818f369f900a6c515

              SHA256

              ca57bdc2e91561d477654fef705b425b58127bff9573c9193d0b69766e6b8445

              SHA512

              70a67230233306a4d864abb9bf614fc122b9d52a5bf8ca9924c347ce29bd1e0a9bc90f2e1a5ea96d39e20c8ac64fa92dc829e74f75626a678f0faebf0b5971a0

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              00d6d1db4fd2ac03309e9f0cd75ae100

              SHA1

              c4287e51e95f1a446ce5bf41403cd5d569a00897

              SHA256

              b9148f0e75de9f76a8e17ef01c889c898ed920e4d9c5bda3abf54ef5a58c34df

              SHA512

              7bcae9f929abb19c3e254a5c14f07364d81347256c813761e2d7fd587752a51c11cc783fd17d25186231ca514216ff88207051f26fc2a383d1ee7cb7e4f6d9e4

            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              00d6d1db4fd2ac03309e9f0cd75ae100

              SHA1

              c4287e51e95f1a446ce5bf41403cd5d569a00897

              SHA256

              b9148f0e75de9f76a8e17ef01c889c898ed920e4d9c5bda3abf54ef5a58c34df

              SHA512

              7bcae9f929abb19c3e254a5c14f07364d81347256c813761e2d7fd587752a51c11cc783fd17d25186231ca514216ff88207051f26fc2a383d1ee7cb7e4f6d9e4

            • C:\Users\Admin\AppData\Roaming\svchcst.exe

              Filesize

              1.2MB

              MD5

              82f286f620463a6f8663963039b9a897

              SHA1

              d19eb375684213b8a7c90fd4c36581bb986e29e8

              SHA256

              a518cf3d9e26086eb18e02243ee3cc2e23be2003aef6eded2e46382a65b5c583

              SHA512

              44cd0ee42f6e8bfb40522c0113b3ebb2d45bfe20f0487f4407a3411f5a967b162983141a9e868608ea0c1df605afa206ca087331d32f5cc2e26387afd7fd7d11

            • C:\Users\Admin\AppData\Roaming\svchcst.exe

              Filesize

              1.2MB

              MD5

              e93f33a19dafb0ed0825b1c8e08ed63b

              SHA1

              96d937a0efffb673958b52330919056f46f3d5d9

              SHA256

              2d0d0abe7193e3cbd8276e3cb395104be523b1bee01a63475fee93c2aa82a32f

              SHA512

              0cb54d44f1ca4b2e07d97c2d53bc201e5923384f756b09c51b87693ad404bcdf0528a9e6689631851a7e134f81c04bfb79c3cc7ed43a1d6eb86e4bd719d32b2f

            • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              e93f33a19dafb0ed0825b1c8e08ed63b

              SHA1

              96d937a0efffb673958b52330919056f46f3d5d9

              SHA256

              2d0d0abe7193e3cbd8276e3cb395104be523b1bee01a63475fee93c2aa82a32f

              SHA512

              0cb54d44f1ca4b2e07d97c2d53bc201e5923384f756b09c51b87693ad404bcdf0528a9e6689631851a7e134f81c04bfb79c3cc7ed43a1d6eb86e4bd719d32b2f

            • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              d5c175af02df162bbcab4ced5ae677ab

              SHA1

              dbd389414a338c079f166834d03e0cf2b19d6911

              SHA256

              6a9b405a2ddab5cd220eaf4d1ef4b950a856ea436903305ecf8e15b6901302a1

              SHA512

              183f029f3c3b1c75e9369a0894d26f24ce69b960519c5c950d728eac88c5b049e50a1869953934c8f9445235076575b3eaf3d93b2e571d67216a5db2dd72050a

            • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              17cc4d2c247046064de5e71204d3553f

              SHA1

              cd1395a4ca38b310776a8f62c1ae5044013c0bbe

              SHA256

              5224027b9a2394e71869a73951b0ada7b1d94fc49a611b0c19081d8252e7bcd2

              SHA512

              43a7fe35c52964d3bb9c6beab2ef20a07e8e7dad6801871de982fc185bdb938b3afa89a93bc764ec68da4775dac0c450baa3b055ec1d153310ece6a78f874c95

            • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              8a3c769f692ccdd70c80d7a9bb37099f

              SHA1

              3394929f791c81240c8604760fe42b717d05c9f4

              SHA256

              67deafe29cf52fd41a38e791a4a923004506f81392bb30707d82e3dfb8053dfc

              SHA512

              f60b13e32c63eed93cd3a85cb17ccc7982a4167790c6bfadac34ca26078ad3a8cd72f640134c427f2df851ed64f838410ac3b549525d1fddab94e5c78c0adeff

            • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              bdef598ebf31eb67abd4ad1f4564649a

              SHA1

              fa49426b9f79f85229eab9d72f4215c08c884474

              SHA256

              d04ea4ececf4a06c8680fbea9ccf3bc299fa615e44eb67014785adb6a06d3e05

              SHA512

              b7c0c9fdcdd72de149f620795cd52c1010a7ca4e808446865479a6a09886a0316e2e64aecc8f18c3b69b181ec92d504c5156c04b61ce55b6329ce4ddd0b758c5

            • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              65791e630ac45671f65f52fbea64494e

              SHA1

              b9d10059060dd97a2db100829b7756929c5a57a7

              SHA256

              5d59a7bbb909002310a58d1a288f4cd4e82cb223eb1fa0f507d6ea7c1f4b68da

              SHA512

              4550cb6c609bae743014b3a1b11f36d4715926141b56372e4f6c1b69228ac2c313dac30eaeb5bed06f72f7c2a734979b7d43596df4d8ee3d1d2632bc5022a749

            • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              82f286f620463a6f8663963039b9a897

              SHA1

              d19eb375684213b8a7c90fd4c36581bb986e29e8

              SHA256

              a518cf3d9e26086eb18e02243ee3cc2e23be2003aef6eded2e46382a65b5c583

              SHA512

              44cd0ee42f6e8bfb40522c0113b3ebb2d45bfe20f0487f4407a3411f5a967b162983141a9e868608ea0c1df605afa206ca087331d32f5cc2e26387afd7fd7d11

            • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              be73e3f8139aff9b9f9104d28c42e0e5

              SHA1

              b0a362eaf3e2988e2af4d71818f369f900a6c515

              SHA256

              ca57bdc2e91561d477654fef705b425b58127bff9573c9193d0b69766e6b8445

              SHA512

              70a67230233306a4d864abb9bf614fc122b9d52a5bf8ca9924c347ce29bd1e0a9bc90f2e1a5ea96d39e20c8ac64fa92dc829e74f75626a678f0faebf0b5971a0

            • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.2MB

              MD5

              00d6d1db4fd2ac03309e9f0cd75ae100

              SHA1

              c4287e51e95f1a446ce5bf41403cd5d569a00897

              SHA256

              b9148f0e75de9f76a8e17ef01c889c898ed920e4d9c5bda3abf54ef5a58c34df

              SHA512

              7bcae9f929abb19c3e254a5c14f07364d81347256c813761e2d7fd587752a51c11cc783fd17d25186231ca514216ff88207051f26fc2a383d1ee7cb7e4f6d9e4