Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    113s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 03:00

General

  • Target

    9b0c792999a00f8ffc04b71c7a3a7b86fd04c53eb752276b3bc723231447748d.exe

  • Size

    1.1MB

  • MD5

    145c96bbf0160209b619626e64813cb4

  • SHA1

    50d51cbf5c9d3e58ecdbee28eacde3d37fb2de98

  • SHA256

    9b0c792999a00f8ffc04b71c7a3a7b86fd04c53eb752276b3bc723231447748d

  • SHA512

    6fef27be6ce9a55ecf6652265bfe221d293af0fd143fb8abc33fc9dc483a5ef6d4830f55e1edfd7871c90257e3e69ab9bf08adeaa3c23d276a7868b8155cd0e8

  • SSDEEP

    24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qz:CcaClSFlG4ZM7QzMk

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b0c792999a00f8ffc04b71c7a3a7b86fd04c53eb752276b3bc723231447748d.exe
    "C:\Users\Admin\AppData\Local\Temp\9b0c792999a00f8ffc04b71c7a3a7b86fd04c53eb752276b3bc723231447748d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2528
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2348
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2320
              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2508
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                  8⤵
                    PID:2224
                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2212
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                    8⤵
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:2996
                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                      9⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:896
                      • C:\Windows\SysWOW64\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                        10⤵
                        • Loads dropped DLL
                        • Suspicious use of WriteProcessMemory
                        PID:1056
                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                          11⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:1632
                          • C:\Windows\SysWOW64\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                            12⤵
                            • Loads dropped DLL
                            • Suspicious use of WriteProcessMemory
                            PID:2748
                            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                              "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                              13⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:2760
                              • C:\Windows\SysWOW64\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                14⤵
                                  PID:2020
                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                13⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2516
                                • C:\Windows\SysWOW64\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                  14⤵
                                  • Loads dropped DLL
                                  PID:2596
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                    15⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2480
                                    • C:\Windows\SysWOW64\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                      16⤵
                                      • Loads dropped DLL
                                      PID:2572
                                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                        17⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2080
                                        • C:\Windows\SysWOW64\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                          18⤵
                                          • Loads dropped DLL
                                          PID:1824
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                            19⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1032
                                            • C:\Windows\SysWOW64\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                              20⤵
                                              • Loads dropped DLL
                                              PID:1956
                                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                21⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:784
                                                • C:\Windows\SysWOW64\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                  22⤵
                                                    PID:3032
                                                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                  21⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1596
                                                  • C:\Windows\SysWOW64\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                    22⤵
                                                    • Loads dropped DLL
                                                    PID:944
                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                      23⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2996
                                                      • C:\Windows\SysWOW64\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                        24⤵
                                                        • Loads dropped DLL
                                                        PID:2904
                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                          25⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:968
                                                          • C:\Windows\SysWOW64\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                            26⤵
                                                            • Loads dropped DLL
                                                            PID:1640
                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                              "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                              27⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1056
                                                              • C:\Windows\SysWOW64\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                28⤵
                                                                • Loads dropped DLL
                                                                PID:928
                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                  29⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2556
                                                                  • C:\Windows\SysWOW64\WScript.exe
                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                    30⤵
                                                                      PID:2464
                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                        31⤵
                                                                          PID:340
                                                                          • C:\Windows\SysWOW64\WScript.exe
                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                            32⤵
                                                                              PID:2380
                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                33⤵
                                                                                  PID:1096
                                                                                  • C:\Windows\SysWOW64\WScript.exe
                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                    34⤵
                                                                                      PID:3028
                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                        35⤵
                                                                                          PID:1008
                                                                                          • C:\Windows\SysWOW64\WScript.exe
                                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                            36⤵
                                                                                              PID:2216
                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                                37⤵
                                                                                                  PID:1984
                                                                                                  • C:\Windows\SysWOW64\WScript.exe
                                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                                    38⤵
                                                                                                      PID:3048
                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                                        39⤵
                                                                                                          PID:1512
                                                                                                          • C:\Windows\SysWOW64\WScript.exe
                                                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                                            40⤵
                                                                                                              PID:1764
                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                                                41⤵
                                                                                                                  PID:2764
                                                                                                                  • C:\Windows\SysWOW64\WScript.exe
                                                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                                                    42⤵
                                                                                                                      PID:2152
                                            • C:\Windows\SysWOW64\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                              6⤵
                                                PID:1860

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

                                      Filesize

                                      92B

                                      MD5

                                      67b9b3e2ded7086f393ebbc36c5e7bca

                                      SHA1

                                      e6299d0450b9a92a18cc23b5704a2b475652c790

                                      SHA256

                                      44063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d

                                      SHA512

                                      826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                      Filesize

                                      696B

                                      MD5

                                      8b412aa0b6687b4da946906a06c460fa

                                      SHA1

                                      180bb2d6f0645242e91d23e76043c0301916f7f5

                                      SHA256

                                      923ae6b14f6c2bebf34efcf9db8485390ca298cdb952df04bc457df9c45647b3

                                      SHA512

                                      73d949f5159a7c976e250d20b975fff6469d5c41b47488d9738a3466dfb372c7977846f6d8fbf676e07715a5fe284ca1597b74f090e0b55301314f71522ac143

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                      Filesize

                                      753B

                                      MD5

                                      9d87cdac0004871e37a8c2ddd974905c

                                      SHA1

                                      79dfaeab045b443dbde8663a89cc49e9026acb36

                                      SHA256

                                      4468cc2c6c07ad461c8486b9b1e1e0de1509cc0505759f3224cd80b9436e8575

                                      SHA512

                                      52836a7395f5d52c2347a2e21fef1e8841ddda6139529659bd3485cbfab9efecad935d6606d1f5433b0b54ef79a680e5df463c0fbaf45547f6f58abd07ebca39

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                      Filesize

                                      696B

                                      MD5

                                      024be950e07002e527b8dd1efbb0e4b4

                                      SHA1

                                      1a56034c6366027442be28a75bce7cdea55a8a98

                                      SHA256

                                      51f47375c2a87dc9fe8cc958432adcc166d0faf75f7d1da1322e238fb5d72893

                                      SHA512

                                      96864be4661feeef155d1816192852146e5d2aa3266ce5b732ec203d43a6098a5fa456a7decb9ab1bd66bc959ed85b485de32c11cea6ee6d1a48d0bea2349b6f

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                      Filesize

                                      696B

                                      MD5

                                      9f87870aabac31b89e8f641cc4796a67

                                      SHA1

                                      0e7c4d9fa14eb4afe07e0ded564229685c3cbe4b

                                      SHA256

                                      c5ccc91ebc3838b354e5ae05c7b3efa01813e004b427f843ba23e78ff272e695

                                      SHA512

                                      28c7fe3049354286831a5c2b52ea96583bef30c4a294d07bfb10c11bb9e3469b944d8029d58f73611daa616a279e280d0c14fa037d390ab34a5daa2f5a25c4f6

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                      Filesize

                                      696B

                                      MD5

                                      ab52ce62f84a24d48d9cebec5331b1c6

                                      SHA1

                                      6fcb810a46e83020e55af419752f5583f9dcb9ba

                                      SHA256

                                      908bec6021a78b90a02c6123db4ac62b590ea738e97fa35aac7c4dce624f3244

                                      SHA512

                                      8823f3f60863692a8fd2be8610670b06077ea7c948b7c46f9a1ab712276b27e48c19d0a394e7f51c0fbdf753f989af4cac5dab078e4f04ee5ee6a50427368cd2

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                      Filesize

                                      696B

                                      MD5

                                      4433cc23fc280ad8dcff9966bac19fe4

                                      SHA1

                                      62cc2abfe6e2ee0fd6b5cbce20daff4ba787bff0

                                      SHA256

                                      ca7cfd972b03d0b30404c8233125adda1dacc81a2e43e919d70bf1c2700af55b

                                      SHA512

                                      6a5e7454dde98251a987bedc21e628550c469480cbe41f3b3644789da38e782c8b94660d4a076697cc7abf3fcc767650d00ac3639b11cfeba96ece8110920b4f

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                      Filesize

                                      696B

                                      MD5

                                      d6aef0b19d7d8dc2eda464cf358007b7

                                      SHA1

                                      c271fa23eee2c534cc862f7575df47f660c94d27

                                      SHA256

                                      70965d19e9afccec497ac21e98bfea9be46cf5df938982b3d19e6295aab3bb1d

                                      SHA512

                                      c547f50069f9f97dd9877bdb529f4ed49f9761d5cab1ff703e5185a6071e7591b98237834c6bd386b68b9c6504b76bdc581bf17a6fcef94e74b1483d47cf764a

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                      Filesize

                                      696B

                                      MD5

                                      463784728a0ab2b8cc52ee1ed0e5258e

                                      SHA1

                                      620a618c31439d36e8539e50359713befcc28e92

                                      SHA256

                                      a34e1ed304dca4f58275bdd5daaf071d1767db7bb7ccc6bf2aea2df5e2be023b

                                      SHA512

                                      52f9736297fbaf65179d35e01c7a15d516d2ff8b5c949a45046bc668bbe94b5da63aea4d5920ebfc1a884721f16fdcae75ea08ca9a6aa78297a44051ed979c7f

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                      Filesize

                                      696B

                                      MD5

                                      0192d17fea0102bde8e142aabd30379e

                                      SHA1

                                      f625075beef58c06ca68d43a3ba5cc1caa8efdfd

                                      SHA256

                                      98e8ea7a93d93f491f56d4026b5683e7fdeff25fe26f518e2e81a1319ef49719

                                      SHA512

                                      43002329c61c0fedc908a1838c1868573a5f6f64b4bad3295182b341562cd4b17710ce021e75157830b5b29d29141ae394b3addae4f8c180259f02cb44648163

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                      Filesize

                                      696B

                                      MD5

                                      d9ab21af2046aedc3484d569036c3ef7

                                      SHA1

                                      ade5e9eb5b1180a77a2164e61f74beb411cdfb56

                                      SHA256

                                      90b8f17e573879b63c512e7c0dd6ff9454d177163e2d95d0090b2ef22ae5ec79

                                      SHA512

                                      cb8c202cd3d66ee897982e42257320dfef0a23eb96b9a3189869e9a0ce030d4baaa8c0a6fc5e197d2d19d742b0d7b3f34adb12933192dd6e4b1388433755d1ac

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                      Filesize

                                      696B

                                      MD5

                                      f080eefd41c0fca1c404d5133fb5c957

                                      SHA1

                                      bef3f9c014eca7cf4dc001f3d85befd3681d4bcc

                                      SHA256

                                      758f74e1aa31de598fbf37f70ffd76f936c0b5dd2227b17c0d8e9ac4506f3aaf

                                      SHA512

                                      e2066e4082f51d4064bfd68eff48c97c481bbb524bb0fa2da0b5ae25bda730811d2933480a72d91a8e5c10ac794f0e793fb8323892332eb9b7c43890ee25c4d7

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                      Filesize

                                      696B

                                      MD5

                                      c85adfb789ee03eba0d843b08042e4db

                                      SHA1

                                      263793011d11bd0dd1daf4b55215a8802f9bf6e2

                                      SHA256

                                      8cc7784dcb4efa452913063eacec257cd1b6577c80bb3540f7cfcc48320dbf59

                                      SHA512

                                      b52184fa3c8a36d8e9293921a40820991247bbd203aa991678dafcd5cc96af20bf2df3e0b876b77a0d6a91f5b43aa2768137f88fca28357f883410d3b9f77539

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                                      Filesize

                                      696B

                                      MD5

                                      1af246ca0660faf0fa7da4b4c9c61316

                                      SHA1

                                      c050b0bd311f2e5240cd7e9df583e41b133e9521

                                      SHA256

                                      2b84bcefb62d7564e2e7d1be8105a26f798b4c73cca142c054da02262f61ede8

                                      SHA512

                                      3fadf6605620aea1f9c9e94d62193fc416af6d5272bc675d399ea1ea96a070b4de69cab61736cea89c744ce3b203f0790d617789d25811a6ca535fc9f6159793

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                                      Filesize

                                      1.1MB

                                      MD5

                                      de6289c5001d6f62f8daa099d05be0e8

                                      SHA1

                                      daf459642c0b609eb647cb7f676701ec830d8bed

                                      SHA256

                                      24c218ce0231b7926eadc53e502b34d84e0d27e4cf4a3c006666baee3db4ce85

                                      SHA512

                                      953a5f9c6f6448439abae24f40fce3c84f64b623deb2376a212427d3376d20be0ea9f7cf22284f85d09570a986d8a4f5da4fddc6f0a2c533342d461a26a099ff

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                                      Filesize

                                      358KB

                                      MD5

                                      9d9c4f20c553d62898b18f1f5231ddb4

                                      SHA1

                                      b1c23242c5e7aa596122d4705f4faf9a4c98ce80

                                      SHA256

                                      6eca84ff0ae02d79209516e0443ba2d2d838e40b55d37da64f48ce03ec51230f

                                      SHA512

                                      2530f9c0edf73e26b3ffaf17eb047de129a171c02fa37326e8c3fd4d429b8fef682b76da8e27d3fb528057a29f8e9e611448752050e00c557edcc5c897d15077

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                                      Filesize

                                      475KB

                                      MD5

                                      87b3e0d8355d7fb241198363188ecc5c

                                      SHA1

                                      5bd63f311a7b462c63319bb7acf6a996ae97eed6

                                      SHA256

                                      7639e93c81f03d5e75127c2c2a2c403e7070a5e5581f96b7e690893d32b076b8

                                      SHA512

                                      6640fb08d97179c7a1e893c6a916bac01f81e8ca241a372a145c4fa05cc4011550c454afafa69115bd4ae6ae5541fbff22771ed7d2e01ce5648526f18dd23a57

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                                      Filesize

                                      1.1MB

                                      MD5

                                      013d170d6b630716ec60e92903899e22

                                      SHA1

                                      ee88272ad24cf78b5d20461f5a14518a54ecef98

                                      SHA256

                                      436befe2dd1d96f3cd143ebe3253790df6e628a4e64e2ca7fb31ffe331c08e30

                                      SHA512

                                      7d6630f24cc348000b72b090fbca95ed60555db3234852a3392cd6f27f338ab27b082b977ae9bab2c593d757b974447cf6417f70d7537b7eb10ed9cfc05a1ac8

                                    • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                                      Filesize

                                      514KB

                                      MD5

                                      64958fd8a92ad75c6e061d5208a87b9a

                                      SHA1

                                      aaa9d8327be455b03859774401c435258a97aeef

                                      SHA256

                                      be46fdb964a4c27da23af38b72cab012b116448a60b18d0ce2d29472a849e429

                                      SHA512

                                      51b39f10809f511116d0fc0ede28464f58c6639b910956254b91987e93d1f029021f6512192ffe6a77ec46d9f60460d94213ab46aac1e0ddfbe24d6ca4244060

                                    • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                                      Filesize

                                      505KB

                                      MD5

                                      7cf6c7286c653198147599c8cfb2ced5

                                      SHA1

                                      dbbd09e179922223c0c512ad93933ae6ce159437

                                      SHA256

                                      cce6f789915609b6c425b732aa5b984212aaefde415ed6e3ba70569fe58e1970

                                      SHA512

                                      16fbef393f15ade9253f18070546808c3c60e3799336bf80047580b958bdb23a0a291a3ab63569899500707035d1d2071cb62ab258c99cc40e0fedb66c4f225d

                                    • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                                      Filesize

                                      1.1MB

                                      MD5

                                      26430019fdd7e1d3722bbbb19a10578f

                                      SHA1

                                      c342dcb996551521b96bb0d7ed19d136d28eefa8

                                      SHA256

                                      94ec5d5a43e19e8ffdf407b3f36bf6942dbef467fae52cf72a54a62dd3c9a998

                                      SHA512

                                      83359ecfceed7886e462f014788b2f76ccb19871e086075b5d4c227d17f178520de2b2cc86d6a3be700e53da829a78fefb1534d8a6a5c3e0c1362da7127f4dc3

                                    • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                                      Filesize

                                      1.1MB

                                      MD5

                                      1c18c3a83bc59159f99a8095728a80f3

                                      SHA1

                                      8c1629325326b25903bf34ab7e6c6fb6fba3972d

                                      SHA256

                                      c3cd0e662969eb6107001dd9cc7fc3911e725fe7d364a387d5e47fb8c9dc0184

                                      SHA512

                                      253221c13529c85001e6b9b51ea4604caf6238ab692427a58be0c869596da2be097c92c2d11b13cb6f5dc0bb08548bd7f73454a67ba0b0693d2e7babec8b0d51