Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    30/06/2024, 21:22

General

  • Target

    7f2f59a770a329a19c2f553da5b552c6a522ce4058934d3aa8c2f6f903c82ca7.exe

  • Size

    1.1MB

  • MD5

    a9eac697c9ae3b58760706ee5d2d53e1

  • SHA1

    0c556069ef02c87ded5d51b5127580e6bed14115

  • SHA256

    7f2f59a770a329a19c2f553da5b552c6a522ce4058934d3aa8c2f6f903c82ca7

  • SHA512

    16f5ea218c2a61fb91ecd730c2fd4fa3fde5bf2e40a864ef6805ed7a385e1188846efe1aaa07be465e209614a6eb9ecb60817af971d30c5a50609d9c79b2ebfb

  • SSDEEP

    24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qm:acallSllG4ZM7QzMt

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 24 IoCs
  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 50 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f2f59a770a329a19c2f553da5b552c6a522ce4058934d3aa8c2f6f903c82ca7.exe
    "C:\Users\Admin\AppData\Local\Temp\7f2f59a770a329a19c2f553da5b552c6a522ce4058934d3aa8c2f6f903c82ca7.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2520
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2572
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2964
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1240
              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:756
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                  8⤵
                    PID:2832
                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1616
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                    8⤵
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:1764
                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                      9⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:760
                      • C:\Windows\SysWOW64\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                        10⤵
                          PID:2088
                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                        9⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2380
                        • C:\Windows\SysWOW64\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                          10⤵
                          • Loads dropped DLL
                          • Suspicious use of WriteProcessMemory
                          PID:944
                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                            11⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:604
                            • C:\Windows\SysWOW64\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                              12⤵
                              • Loads dropped DLL
                              • Suspicious use of WriteProcessMemory
                              PID:2396
                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                13⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1976
                                • C:\Windows\SysWOW64\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                  14⤵
                                  • Loads dropped DLL
                                  PID:2036
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                    15⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2296
                                    • C:\Windows\SysWOW64\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                      16⤵
                                      • Loads dropped DLL
                                      PID:2668
                                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                        17⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2968
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                    15⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:3064
                                    • C:\Windows\SysWOW64\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                      16⤵
                                      • Loads dropped DLL
                                      PID:2156
                                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                        17⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2556
                                        • C:\Windows\SysWOW64\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                          18⤵
                                            PID:1520
                                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                          17⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1608
                                          • C:\Windows\SysWOW64\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                            18⤵
                                            • Loads dropped DLL
                                            PID:1312
                                            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                              "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                              19⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:968
                                              • C:\Windows\SysWOW64\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                20⤵
                                                • Loads dropped DLL
                                                PID:2916
                                                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                  21⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2236
                                                  • C:\Windows\SysWOW64\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                    22⤵
                                                    • Loads dropped DLL
                                                    PID:1764
                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                      23⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:3004
                                                      • C:\Windows\SysWOW64\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                        24⤵
                                                        • Loads dropped DLL
                                                        PID:2648
                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                          25⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1800
                                                          • C:\Windows\SysWOW64\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                            26⤵
                                                            • Loads dropped DLL
                                                            PID:1420
                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                              "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                              27⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2664
                                                              • C:\Windows\SysWOW64\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                28⤵
                                                                • Loads dropped DLL
                                                                PID:2852
                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                  29⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2980
                                                                  • C:\Windows\SysWOW64\WScript.exe
                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                    30⤵
                                                                    • Loads dropped DLL
                                                                    PID:916
                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                      31⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2000
                                                                      • C:\Windows\SysWOW64\WScript.exe
                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                        32⤵
                                                                        • Loads dropped DLL
                                                                        PID:2868
                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                          33⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:2988
                                                                          • C:\Windows\SysWOW64\WScript.exe
                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                            34⤵
                                                                            • Loads dropped DLL
                                                                            PID:1636
                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                              "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                              35⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:1464
                                                                              • C:\Windows\SysWOW64\WScript.exe
                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                36⤵
                                                                                • Loads dropped DLL
                                                                                PID:2816
                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                  37⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:1124
                                                                                  • C:\Windows\SysWOW64\WScript.exe
                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                    38⤵
                                                                                    • Loads dropped DLL
                                                                                    PID:408
                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                                                      39⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:2436
                                                                                      • C:\Windows\SysWOW64\WScript.exe
                                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                                                        40⤵
                                                                                          PID:2924

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

            Filesize

            92B

            MD5

            67b9b3e2ded7086f393ebbc36c5e7bca

            SHA1

            e6299d0450b9a92a18cc23b5704a2b475652c790

            SHA256

            44063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d

            SHA512

            826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09

          • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

            Filesize

            696B

            MD5

            3fe126921f6537cf36cd507b1649ffbb

            SHA1

            445c8796d072bb5829f0af8421e3eb7da34add70

            SHA256

            b4af7c7ab452f12e0ea38532d00cfa19cf99247ef169e5e698acd882e72750a6

            SHA512

            5d8527210f01cc30bda93521cdbd9828d03f2af3e2810996ad8c60cf62a35e415c0e54a34e00847ae30bf2718e8c431b65ed4f509c11986a8eb54ed6ed64ac94

          • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

            Filesize

            753B

            MD5

            742f03fbb45f83e024b30c192c3179cd

            SHA1

            76da251572f6d5b0c7fd8751af69f4fc41c7245d

            SHA256

            e495e8e585b309277ba1480d29f74d7064bfacd8fd3da2555666b6b66a14d95f

            SHA512

            54192fb558b23ec434b0806e3512c872a89d0dd2a7ed9b8ba7081376c2f81eb31e99dbae6aeb159538f82a256dff72cb4ff40108ad0c4baceb6d394e624b8a8d

          • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

            Filesize

            696B

            MD5

            f8db619ebe2f315356d8a3c1cb7ce863

            SHA1

            6a7be253323ec01b077ec2632a10159e39c17b2b

            SHA256

            99940aede45164365f56d6948655491bf5e5eaf8cc50400fe99620b5d3cd29c8

            SHA512

            6abc38a731254105c4f336ef9954159d7711889c704002838872473450f9077a940b4817cf36ae7fa04f08439a2acb53c9ab37c85e21c2981eab353379bf431a

          • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

            Filesize

            696B

            MD5

            423a0fabd3a9fd2cbedc3aba67c69650

            SHA1

            880097557ac6718e93822ac7efc9a3e2986c51de

            SHA256

            d77f549afde3b88ac747c3d0dee3069f914fac77b572ae08737ffc05f696491b

            SHA512

            c65d3db8250c7885b05075ebc3485db4506dde6c435247ad6a86e9085d59b039f4629583b327662a2eb40c79bc135d5d17b5bfb01f63ee02726aa57ecd7ed139

          • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

            Filesize

            696B

            MD5

            ab52ce62f84a24d48d9cebec5331b1c6

            SHA1

            6fcb810a46e83020e55af419752f5583f9dcb9ba

            SHA256

            908bec6021a78b90a02c6123db4ac62b590ea738e97fa35aac7c4dce624f3244

            SHA512

            8823f3f60863692a8fd2be8610670b06077ea7c948b7c46f9a1ab712276b27e48c19d0a394e7f51c0fbdf753f989af4cac5dab078e4f04ee5ee6a50427368cd2

          • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

            Filesize

            696B

            MD5

            7c7211c6ab078878929bb3683f705560

            SHA1

            5a52049f54692294392837b5922d865e9c407022

            SHA256

            bb9e2a89c0fc9574eac35f2b2c4bc696f3642fc96ff2fd1f6a2d3467784fbeff

            SHA512

            4d9b5d0053b0f57651c08084c87416d2ae8613b9ea74651e51f251e5d806f36c194735e4f6f3152d7c72592f60f2a7e971ee82c60410762472942823b1956c38

          • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

            Filesize

            696B

            MD5

            d5a26bd3b4366107ffbb4663050f6576

            SHA1

            09a5b81e452620340fcc2343a146ac5469576d44

            SHA256

            6e6abc76efb5447d4e9b20d07396db93d0368e6f81f558217f81a4dedc437eef

            SHA512

            527fe34594e983df77843639208f832c63f24a23e6e72fabc3e27eb1cce2e08e4306f3a5ebd288142f9684c6730431fe09f2c60f699a0825dc8270e961abbb10

          • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

            Filesize

            696B

            MD5

            6d7f7c489889b75561316023d3e8b801

            SHA1

            222906d8a273e49d99b9107d388856ba8e6a5400

            SHA256

            3c01dd72d85883db4a345c0092b799f8deb31d43fde226e7df011c64d95202a7

            SHA512

            7238e65f9b93ee3be8828f01b54fbb6acaeaaf31e2b62af398356b02fa80d615acc3f41139fb001b9c1e8855e5cfa467f2883acda663a08194955cadb409a24a

          • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

            Filesize

            696B

            MD5

            dabf4e9d32908d961aaffdd1c77d4879

            SHA1

            e41572d98b7452016fb004c843236377364ab1d3

            SHA256

            3488c64a6d2da3c00e50e954c495ac354ee504e54f3ed6dda6a991c5b9d33e19

            SHA512

            911d46aca8005857c86eddbb3cbbc4301ee5e173b2358a717053cf12727c06cc3b2d757ddf513f969dafe61c6b88d03b1478d8c483495f153e30bf64585195aa

          • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

            Filesize

            696B

            MD5

            ad7007ed9542468662553e405df66821

            SHA1

            757c5ee287a113d689f2d370176fcf9c9e1223a3

            SHA256

            12967e637928b853b708430671e1b72f6ca847a2af2680f8f15da98efb31161e

            SHA512

            812220b05239ebb0e14f3cd738e58274deb60624eacc360d2b3be6c5010dc418f2587f5f6736a1d80a3a5f52ae9887a492e8934e64af66c89b45a9b47d3069c9

          • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

            Filesize

            696B

            MD5

            5c256ba320c7487a2c3cdb62bea97bb5

            SHA1

            2a28e5d7bd4483a40fb6035f1ec6fcf1d66cb2fc

            SHA256

            854aeaf6ba44537fc01088f8c336552a1aab4c6df84938d241c8616b6f0802e4

            SHA512

            bb55f293471dda9b074664d4cf2dad094f8f0c2479c1fd754dd85199d1d1b1012cfa3b050711ac0b59368d6bf1756cfcadcaff1e47d4f103a093a0b77782fdc0

          • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

            Filesize

            696B

            MD5

            22ee4efbc67fc70b9f9d483cf169e846

            SHA1

            5e0a01490f92c7a77457c1df61c009cdc5c641dd

            SHA256

            abd4fb5ee308e65770cced9ea111c1dcfc48e0571cfcb79284f4fbbab293e161

            SHA512

            7638f6551734a6256e6d7666a9811368ee2894afeb442f65c6da0680fe8134059c52f552e36b2539774c4e3e5fc0cc1ae027e3ef872b5bb5d4b8e0f6687ce238

          • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

            Filesize

            696B

            MD5

            c91530bbaec9815f2db19bd6645b8729

            SHA1

            ea901a28f06bfbfc1dc9c3391910a87bfaf07020

            SHA256

            7924a95b4fb309a069dcb92b65632f01f9db2560b224d4812ebb84130994ab8d

            SHA512

            7ebce2d0627561189c27073f3e43e84e6164c3c4a63fe4172d2c1214fe799795393573038fb3dd75359327e7cca4eec17889749411e289480580f568b02e6588

          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

            Filesize

            1.1MB

            MD5

            28c432197eb922b94a59bac4b1046dc4

            SHA1

            589d7b3fabf45a4c6d13e36105d6b006c80b9967

            SHA256

            b6d09ee7241e0902b385975ccdfa7e8bbc349266b3b889cee584f1758bf4ddb6

            SHA512

            1b7cf4f50b8369086a67bc24034ccc27f806b4f87d6dd42d67eacfa95facb9f114f63bb7f313977adb253421e7e76e53c9ed8a319d49dd35af622864e66702c5

          • memory/408-242-0x0000000005B20000-0x0000000005C7F000-memory.dmp

            Filesize

            1.4MB

          • memory/604-92-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/604-88-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/756-38-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/756-47-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/760-69-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/760-61-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/916-207-0x0000000004530000-0x000000000468F000-memory.dmp

            Filesize

            1.4MB

          • memory/944-83-0x0000000004360000-0x00000000044BF000-memory.dmp

            Filesize

            1.4MB

          • memory/968-153-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/968-160-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/1124-234-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/1124-241-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/1420-189-0x0000000005B50000-0x0000000005CAF000-memory.dmp

            Filesize

            1.4MB

          • memory/1464-225-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/1464-232-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/1608-152-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/1608-145-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/1616-57-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/1636-224-0x0000000005E90000-0x0000000005FEF000-memory.dmp

            Filesize

            1.4MB

          • memory/1764-72-0x0000000004700000-0x000000000485F000-memory.dmp

            Filesize

            1.4MB

          • memory/1764-171-0x0000000005B30000-0x0000000005C8F000-memory.dmp

            Filesize

            1.4MB

          • memory/1764-60-0x0000000004700000-0x000000000485F000-memory.dmp

            Filesize

            1.4MB

          • memory/1800-188-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/1800-181-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/1976-103-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/1976-96-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2000-214-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2036-118-0x0000000004770000-0x00000000048CF000-memory.dmp

            Filesize

            1.4MB

          • memory/2156-131-0x0000000005C80000-0x0000000005DDF000-memory.dmp

            Filesize

            1.4MB

          • memory/2156-144-0x0000000005C80000-0x0000000005DDF000-memory.dmp

            Filesize

            1.4MB

          • memory/2236-170-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2236-163-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2296-115-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2380-80-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2380-73-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2396-95-0x00000000040E0000-0x000000000423F000-memory.dmp

            Filesize

            1.4MB

          • memory/2436-243-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2520-25-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2556-132-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2556-141-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2580-9-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2580-0-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2648-180-0x0000000004370000-0x00000000044CF000-memory.dmp

            Filesize

            1.4MB

          • memory/2664-190-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2664-197-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2680-14-0x0000000004730000-0x000000000488F000-memory.dmp

            Filesize

            1.4MB

          • memory/2680-15-0x0000000004730000-0x000000000488F000-memory.dmp

            Filesize

            1.4MB

          • memory/2816-233-0x00000000046B0000-0x000000000480F000-memory.dmp

            Filesize

            1.4MB

          • memory/2852-198-0x0000000004130000-0x000000000428F000-memory.dmp

            Filesize

            1.4MB

          • memory/2868-215-0x0000000005BC0000-0x0000000005D1F000-memory.dmp

            Filesize

            1.4MB

          • memory/2916-162-0x0000000005CC0000-0x0000000005E1F000-memory.dmp

            Filesize

            1.4MB

          • memory/2916-161-0x0000000005CC0000-0x0000000005E1F000-memory.dmp

            Filesize

            1.4MB

          • memory/2964-28-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2964-35-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2968-124-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2980-206-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2980-199-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2988-216-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/2988-223-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/3004-179-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/3004-172-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB

          • memory/3064-128-0x0000000000400000-0x000000000055F000-memory.dmp

            Filesize

            1.4MB