Analysis

  • max time kernel
    115s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2024 14:01

General

  • Target

    4b440b0b8a3c3c746f8626ae791576c5abbb1041b118729547370c4039375612.exe

  • Size

    1.1MB

  • MD5

    345a8e5f733ad27dd760594cba1bef17

  • SHA1

    1cad3ec1dd64f237738e1fbfa2a1e843e91843ed

  • SHA256

    4b440b0b8a3c3c746f8626ae791576c5abbb1041b118729547370c4039375612

  • SHA512

    216ae3c7ec6c1ca948acabe772e96c029f04ac6ee1fa6145df23c9df90d7facfbd793af0e74e44692fbda1dfdac00c1a337792770388bbfbea677bbb58a170a8

  • SSDEEP

    24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qy:CcaClSFlG4ZM7QzMx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 24 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b440b0b8a3c3c746f8626ae791576c5abbb1041b118729547370c4039375612.exe
    "C:\Users\Admin\AppData\Local\Temp\4b440b0b8a3c3c746f8626ae791576c5abbb1041b118729547370c4039375612.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2528
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2388
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1492
              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2584
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:348
                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:1300
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                      10⤵
                      • Loads dropped DLL
                      • Suspicious use of WriteProcessMemory
                      PID:1512
                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2036
                        • C:\Windows\SysWOW64\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                          12⤵
                          • Loads dropped DLL
                          • Suspicious use of WriteProcessMemory
                          PID:2012
                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                            13⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:1852
                            • C:\Windows\SysWOW64\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                              14⤵
                              • Loads dropped DLL
                              • Suspicious use of WriteProcessMemory
                              PID:1832
                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                15⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:1280
                                • C:\Windows\SysWOW64\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                  16⤵
                                  • Loads dropped DLL
                                  PID:1544
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2352
                                    • C:\Windows\SysWOW64\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                      18⤵
                                        PID:2380
                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                      17⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2480
                                      • C:\Windows\SysWOW64\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                        18⤵
                                        • Loads dropped DLL
                                        PID:2420
                                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                          19⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1076
                                          • C:\Windows\SysWOW64\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                            20⤵
                                            • Loads dropped DLL
                                            PID:1360
                                            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                              "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                              21⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2000
                                              • C:\Windows\SysWOW64\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                22⤵
                                                • Loads dropped DLL
                                                PID:580
                                                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                  23⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:844
                                                  • C:\Windows\SysWOW64\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                    24⤵
                                                      PID:2776
                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                    23⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2016
                                                    • C:\Windows\SysWOW64\WScript.exe
                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                      24⤵
                                                      • Loads dropped DLL
                                                      PID:2972
                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                        25⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1372
                                                        • C:\Windows\SysWOW64\WScript.exe
                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                          26⤵
                                                          • Loads dropped DLL
                                                          PID:1580
                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                            27⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1504
                                                            • C:\Windows\SysWOW64\WScript.exe
                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                              28⤵
                                                              • Loads dropped DLL
                                                              PID:3056
                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                29⤵
                                                                • Executes dropped EXE
                                                                PID:1976
                                                                • C:\Windows\SysWOW64\WScript.exe
                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                  30⤵
                                                                    PID:3008
                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                      31⤵
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2352
                                                                      • C:\Windows\SysWOW64\WScript.exe
                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                        32⤵
                                                                        • Loads dropped DLL
                                                                        PID:2720
                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                          33⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:2460
                                                                          • C:\Windows\SysWOW64\WScript.exe
                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                            34⤵
                                                                              PID:1156
                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                35⤵
                                                                                  PID:2640
                                                                                  • C:\Windows\SysWOW64\WScript.exe
                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                    36⤵
                                                                                      PID:1076
                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                        37⤵
                                                                                          PID:2528
                                                                                          • C:\Windows\SysWOW64\WScript.exe
                                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                            38⤵
                                                                                              PID:2508
                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                                39⤵
                                                                                                  PID:2728
                                                                                                  • C:\Windows\SysWOW64\WScript.exe
                                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                                    40⤵
                                                                                                      PID:2176
                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                                        41⤵
                                                                                                          PID:1596
                                                                                                          • C:\Windows\SysWOW64\WScript.exe
                                                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                                            42⤵
                                                                                                              PID:2036
                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                                                43⤵
                                                                                                                  PID:2148
                                                                                                                  • C:\Windows\SysWOW64\WScript.exe
                                                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                                                    44⤵
                                                                                                                      PID:2252
                                                        • C:\Windows\SysWOW64\WScript.exe
                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                          14⤵
                                                            PID:1608

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

                                  Filesize

                                  92B

                                  MD5

                                  67b9b3e2ded7086f393ebbc36c5e7bca

                                  SHA1

                                  e6299d0450b9a92a18cc23b5704a2b475652c790

                                  SHA256

                                  44063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d

                                  SHA512

                                  826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09

                                • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                  Filesize

                                  696B

                                  MD5

                                  aac0fba8016aa15609aa7abb5db077ae

                                  SHA1

                                  f8afa6ff11a91f46eb961727ec6a5fad360fa1c9

                                  SHA256

                                  76a6ce5f2e579dc37db23bb0e1ef5ebdd8b02e6b22b6f8da1a17964db237a8a0

                                  SHA512

                                  26a4910f08563b7c4b1e1abba82fefdefcb43b7d1149d5e6c7dda36db4aa142c4b74bc64263f23a5177804e2191696795e0de5d5368ea6903b398415d435962e

                                • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                  Filesize

                                  696B

                                  MD5

                                  072a46f071251f08c67b3aba4c983435

                                  SHA1

                                  371837f885eac20c802901026d2e7aa1d4f6cd5c

                                  SHA256

                                  0d0a8daeceed64600e817a5a0437a39048c52e857868a35d9130d42fdfa896ed

                                  SHA512

                                  e3d35d428a29eec047b0cc43c87aa701eed81e9efe921b4ef13fa2e8e24ef11ce602bd67868b7ad1bdbd9f39eb681a8c95c715479238a2f17c17105ea4653c83

                                • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                  Filesize

                                  696B

                                  MD5

                                  efa4b9f79f0e80cc4480b4196f965c98

                                  SHA1

                                  56401c277c2e9c8111a865c9225b943fc4a7433b

                                  SHA256

                                  5db1107f337e47becfbcacfdc107678db82fb69fc4a9a1341c0decacff5146c3

                                  SHA512

                                  c3b3f2cd4b0a7257fcb391a7defee9a0db1650febb3dab466732bf81cdec9a8bbfb9e28afd2ffff03d57f2cd2be8adc8da67abeb39e295c94b3dd536fb092180

                                • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                  Filesize

                                  696B

                                  MD5

                                  70e226fbd8b4b3f2ddf8a8753a77586a

                                  SHA1

                                  a81a39d08f77479d0ee65599dd2749031c32fc19

                                  SHA256

                                  3eb2bfca11e83ada63c9e426764e07267c058964f959ca5e0c3f0f8933e40026

                                  SHA512

                                  f8c3f2f4172e8cabb856cbc2527dae48cba6d740a8ad9844bb32013ccba200b4c03dfdbe3713d9caa5f7416b8729cba4d516a73989b388c952ab08205b3cd4b8

                                • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                  Filesize

                                  753B

                                  MD5

                                  8472dd1e19622930c88409c601604a5c

                                  SHA1

                                  93e0e29a0761a6a7883dcc2dc0f6ca2c7be5001f

                                  SHA256

                                  4da8ce62d207ed0819968cf9a9cdde221d57ffb53999ccc2f28012ff685a07e1

                                  SHA512

                                  d9d8393cac7a15be685fd7885a80db8f4992405ec0888b0ac841b3f25b8d876544e19d2fe4954d787d1029e75dcc76c0a8b70bc52d6fbe303ec1aa1a3d3ae4b3

                                • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                  Filesize

                                  696B

                                  MD5

                                  48e04b8c794b661550560f9e02af5bb4

                                  SHA1

                                  973d939e48bc7713c0338e95966219616bd415d0

                                  SHA256

                                  f3bfe9c6c363e0ef4e22d9990175cb4c1c5d7d087aa5a2cff9f912d5ac6676da

                                  SHA512

                                  23ca46c09e1c2c320c7c79e71056dc6cb78d1dbaa75f4cee92e63626fe1eef268d91c519a8a0219f816049d2babd0276d27471ccc57a05825ce339ea88eea778

                                • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                  Filesize

                                  696B

                                  MD5

                                  052d0351a5a2283ca385805bf30cc37b

                                  SHA1

                                  0f86c2c33b5641b89bcc430a98956447cb8f6f06

                                  SHA256

                                  643f8c0adfd63b72f9419f5b077829fa7f6d454b738cbcaeead63cd1feb4a9af

                                  SHA512

                                  6e4f1c407fa96a3ed03b416fcf4cb300f7ecefd2e67ddc0d45407b0f97f254ffa55cf34fac7c8ed1e69ece8704fae1d483612948dab8fb6d0c9d39e06bbb23ae

                                • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                  Filesize

                                  696B

                                  MD5

                                  7d2c3f227d42fae4a5b7fbcb491b74e3

                                  SHA1

                                  c1271bbd86747cc709b694ba9579a68b5e75a17c

                                  SHA256

                                  9353a2f27a61e571c5bc92ccc1046c1059c5fad8e1e2cafe63a9cc73e1169c33

                                  SHA512

                                  50330ad733975966b32fbedffb99a25cd13004d685e5788ef11f1f0fedfc62658e3e8f5ed0030fe60ecb02ba95ffa7d440c067a1e164cc3bc02ac5008b6a27d3

                                • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                  Filesize

                                  696B

                                  MD5

                                  99190cc32e9995c46b8a5b9b268a5bbe

                                  SHA1

                                  4ad00bc8655bced61776b40f2cc5bf0180a175d4

                                  SHA256

                                  308f79dad8498e1020104d40c992a2a6b9d4841f2c9c705e4b4401c48764a096

                                  SHA512

                                  f6447cdd779f7e95f6e84469388e55d7c18249f434aadf7cb7d4ec18cded20161a1cd8bb8830186c55ce8a945ab7c7cff08f85787c2616d447a90cb6f4622571

                                • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                  Filesize

                                  696B

                                  MD5

                                  ab52ce62f84a24d48d9cebec5331b1c6

                                  SHA1

                                  6fcb810a46e83020e55af419752f5583f9dcb9ba

                                  SHA256

                                  908bec6021a78b90a02c6123db4ac62b590ea738e97fa35aac7c4dce624f3244

                                  SHA512

                                  8823f3f60863692a8fd2be8610670b06077ea7c948b7c46f9a1ab712276b27e48c19d0a394e7f51c0fbdf753f989af4cac5dab078e4f04ee5ee6a50427368cd2

                                • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                  Filesize

                                  696B

                                  MD5

                                  bb73f45ba0ab8d0e25bc6dcd5900a0f1

                                  SHA1

                                  18dd20b311cabf033725cb71f00e22449f559963

                                  SHA256

                                  c5b311f8ce95c93ed51768b74c6765874352e5fc61641ab54034281a5206c3b5

                                  SHA512

                                  f2adbb4978b02ce150fc2f4a8f6d7734ca465351c502e5a425a9dc0f751be9a048df54dfff086b4b049a80cdc8127863ea704a3b6e1855f9d4406e5778b82e04

                                • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                  Filesize

                                  696B

                                  MD5

                                  379619305716718fbeeab2f364946c39

                                  SHA1

                                  b663cf106c4673549692fa39d25e9e8f4561cd64

                                  SHA256

                                  c844bc25686320e65c1b5259a6d0d6d47f61709f46e2c8eb2ad3f9c3b9333d84

                                  SHA512

                                  b2c91d0f1cbc9e253bb3bb339acbab0e31eef31188cc00132c423fee2a85c7a91132c9259b99b23a149f6ba1172b8522e2d8350f88dbb735ad8d7a32f71e2ed8

                                • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                  Filesize

                                  696B

                                  MD5

                                  f02b234115a56496bcd6642d1de04e5d

                                  SHA1

                                  d383b9d3c82fe145f25a9a6e7e4333151fd4ecc6

                                  SHA256

                                  9eca0120263ab4947d38369d9a4986744e61189382c1d313eb464ad449ea2651

                                  SHA512

                                  c446eccd822729a81d49321c88ecc0fba4e4f7b6f6277d2660c7f3a18a67614915ae24a96353bf93b039eb441f0c260c1961a1363f16524dbeaf2554626c1b4e

                                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                                  Filesize

                                  551KB

                                  MD5

                                  66f15a5e729cb936bbba7652eda2ec4d

                                  SHA1

                                  4fb4e0a73b306877851626deae4754f8ca975afb

                                  SHA256

                                  9c9cbb61266ba96cf784ec48c633c461f08b32cfede406abff80050023c863f4

                                  SHA512

                                  362603c6b322ebe85db1bf96d63ab4ef0728d6fc5cdb0a5c4ccc689a43d79d2216cc5d4b567b0ecb63f201f370123a7ec56defc82fe40dfe72de411ca814acbe

                                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                                  Filesize

                                  1.1MB

                                  MD5

                                  3d59e494f8299926685c521529528adc

                                  SHA1

                                  9271bbcd967daf1029c71fe5de52f0dbe172d980

                                  SHA256

                                  6ec50bd9a71bd52866eae50a21a1a4444337a65e6177b24ecaa83b36c35befa3

                                  SHA512

                                  8dff7860671b91550fd51179a6e9ae838fe593dbdc00e3edb74d0d4ffc5838f2fab3b2e5be365f6fc2de1b808fc5db4e1322df94e9808e986b57bb73fecc51bd

                                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                                  Filesize

                                  1.1MB

                                  MD5

                                  96120b306b54fb4dce6479ebf6dc98b8

                                  SHA1

                                  7a19084033559e4f2e4cd5f9e2ec1801382a054f

                                  SHA256

                                  e438687a0ca525149f8b58b7afed6858541404a018aae3b52e05eb7d661c8237

                                  SHA512

                                  27262186df3b60f92991771c7f4972b6c26bd14de3db5928747342c85d7b9bc307c43e08ab84b3e5d828db8a8bb3995e639b0fe271d0fa896e0e1523f6b1a281

                                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                                  Filesize

                                  814KB

                                  MD5

                                  2626fbb62d9c750f4c9af8acba05ff3e

                                  SHA1

                                  25512154ff96ee5a16c41bdedf135307f94843d7

                                  SHA256

                                  9e689835c9def80d1b5dd34e30222a000c10cc6018dda7564c948ad95c610145

                                  SHA512

                                  acec43919c90784c737f68c5de1b734f09f655745d9c5f7f329289b0c486da8bcefdb8e68edb10738a9cdcbdc4f2afeaa11506379e48b48910dbd5de446c5384

                                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                                  Filesize

                                  960KB

                                  MD5

                                  f9d9eab895902b39f0edc90c236a459e

                                  SHA1

                                  f67ec5adc4d2f0eed74c71fba201297ce3607eab

                                  SHA256

                                  63a20f1ec8c21df4ebc468746fd65792f86d06a17acff4a3bc9967a45e74f97d

                                  SHA512

                                  842d64b8099b4e8cd0b01eedd15bd62abc215e567e6fad4239bfaee9772d431ecd1fbecdc3c85269932dcea722c568d7e8d9d6537e40c9e77702bac3b75c567e

                                • C:\Users\Admin\AppData\Roaming\svchcst.exe

                                  Filesize

                                  117KB

                                  MD5

                                  44d1bcef4daab93566f3621edb820e80

                                  SHA1

                                  a221c73b35fba76f3a3692d8cdb7c561e69a2729

                                  SHA256

                                  4d92c3861841c5d42566c933f03bee4148d3bddc65e077aa33087b382357fd5e

                                  SHA512

                                  66f9caba647c8bfd30b3fe8f5921660c7bc41a9a861b2442933fb1b97a3089ecb3e221ec139f034c4dbbbc1bb0e3956f645ae2a9e70e90c0ccb7d2dccb71dbd3

                                • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                                  Filesize

                                  637KB

                                  MD5

                                  b97440138006c6b965bc8a79245d1e27

                                  SHA1

                                  80f2b07bc877bdd8b12bb70232d3cb590df63f07

                                  SHA256

                                  da194b019c2557076a3a122963647033de7422cf584042cc4d1de5a32602aa69

                                  SHA512

                                  e83fce65a7b97fc449f75316186b1b03c72106d6c6b70fa003054abaffeb6f3777035fdd28dbb62be81c5f968c0732dafb3eadbe4f553ef0d94a6d09fbbbea88

                                • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                                  Filesize

                                  493KB

                                  MD5

                                  31e3f392df94f2d9c3f667a2ea1cabe2

                                  SHA1

                                  f0b00949bfaad4366ed12434dab66579c5161143

                                  SHA256

                                  8b8cc566f511d1ebb6f62504ecc6d3bc51e462c53b90bcd652ff450eef5ed4f0

                                  SHA512

                                  efcf55f7f41839cbde278839cd80d90c26d317414168b7cb19df9cadb3a7b061fc0a94866036c962d139fcf484822ba57079590bb1c051dabb4b1b3d0f6bf250

                                • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                                  Filesize

                                  758KB

                                  MD5

                                  8a50c0e587a3d125c9d528123d77564a

                                  SHA1

                                  e6e0f0ecdc2a89e58b5b21cd855ec0c0267d7dd5

                                  SHA256

                                  ce4650fdef52416cd7874fbb39fd5c9f9c6faa285a294f4723782e03bb4785d8

                                  SHA512

                                  5be3d98f26eff8a11d8e4e380200db2d13f21ddfa7a6f57bfc65d2911bfcc2366af016ebc1f02e52496c0074bdb4850cdb67c1ad7331f6970d3996a43c4becf4