Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 07:05

General

  • Target

    7ec4e6877e8783a769493afb9eb754f0N.exe

  • Size

    1.1MB

  • MD5

    7ec4e6877e8783a769493afb9eb754f0

  • SHA1

    2c63dabc54daf728559e5b67eadc9a9cea0b622e

  • SHA256

    7a1d14c49171c53d6f0b5679a1070227a11026a165bfa23f59b1a29ba6bf2edf

  • SHA512

    cf307d06aae1f5acb9ec3b5cd864551d2897a9cdf399526c9ddd1da76ee1ead76e98a84d4f23386a87fcc92830f23760c0d21d3ec82ff28f11cb70d56b8830b6

  • SSDEEP

    24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5QL:acallSllG4ZM7QzMs

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 22 IoCs
  • Loads dropped DLL 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 42 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 46 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ec4e6877e8783a769493afb9eb754f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7ec4e6877e8783a769493afb9eb754f0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2848
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2648
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2452
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:900
              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1620
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                  8⤵
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:992
                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                    9⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:1560
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                      10⤵
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:1260
                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:1108
                        • C:\Windows\SysWOW64\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                          12⤵
                          • System Location Discovery: System Language Discovery
                          PID:2836
                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:688
                        • C:\Windows\SysWOW64\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                          12⤵
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:2348
                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                            13⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:2120
                            • C:\Windows\SysWOW64\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                              14⤵
                              • System Location Discovery: System Language Discovery
                              PID:3012
                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                            13⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            PID:2920
                            • C:\Windows\SysWOW64\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                              14⤵
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              PID:2600
                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                15⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of SetWindowsHookEx
                                PID:2596
                                • C:\Windows\SysWOW64\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                  16⤵
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  PID:1724
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1960
                                    • C:\Windows\SysWOW64\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                      18⤵
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      PID:1848
                                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                        19⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:560
                                        • C:\Windows\SysWOW64\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                          20⤵
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          PID:820
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                            21⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1476
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                            21⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2192
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2576
                                    • C:\Windows\SysWOW64\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                      18⤵
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      PID:2356
                                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                        19⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2936
                                        • C:\Windows\SysWOW64\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                          20⤵
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          PID:2332
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                            21⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1448
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                            21⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1312
                                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                        19⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1876
                                        • C:\Windows\SysWOW64\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                          20⤵
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          PID:1828
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                            21⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2556
                                            • C:\Windows\SysWOW64\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                              22⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2620
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                            21⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2084
                                            • C:\Windows\SysWOW64\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                              22⤵
                                              • Loads dropped DLL
                                              • System Location Discovery: System Language Discovery
                                              PID:1412
                                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                23⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1860
                                                • C:\Windows\SysWOW64\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                  24⤵
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  PID:788
                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2240
                                                    • C:\Windows\SysWOW64\WScript.exe
                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                      26⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2652
                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                        27⤵
                                                          PID:928
                                                          • C:\Windows\SysWOW64\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                            28⤵
                                                              PID:2576

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

        Filesize

        92B

        MD5

        67b9b3e2ded7086f393ebbc36c5e7bca

        SHA1

        e6299d0450b9a92a18cc23b5704a2b475652c790

        SHA256

        44063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d

        SHA512

        826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        5d0d203da02edb604545d3d826c88b42

        SHA1

        9be0cfd40b48d4e6041e00827047a8b0d877d4a1

        SHA256

        5f341c2f1ff381eecedbf6fcbe549724323c30c05728132a98ea55f607bc3e81

        SHA512

        a3e01552a9576ba8dd9aa9f65211f74a69588a316d984b8887e740c6c174e19df2056dc0138d5af26bd927e192ec2c7d355fc8b4092e30d55de910e932fbd49f

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        722B

        MD5

        0f2b26654e6ba47e963fcbad9b1b378e

        SHA1

        2bdf4110199e91fe75366cf52d4b7ea7d603081b

        SHA256

        f25954ab5c4b9675dee4e6f45d96d1395b44a21e4b59d2c2a632f6a43e5aa142

        SHA512

        e9fe16ecaab9c53ef2214c67c00bd1a2ba15e30c364430ea11f1062fe8018407e0b24648c58c2d22aabd63bbe993d4acfee1f552a335929b035ed90a48c8c701

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        ebf405e49dade13da94f737cdc03dba1

        SHA1

        8a0c39e59beed0deb4e726566b235c42c70942bb

        SHA256

        d15af3885670c4fea9dd97da21025faa5fd2b42bddc310bad2893e23a3ed2bef

        SHA512

        bbdef781757a387898665650d8f951e7fc495770d34595d9badbe5a39d46ec49a06ec00cbe28ed5e2677e5eeea518241fb638580668baca8d7728c44f2069ea2

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        251a70f0c55d02e74e34c409c5795274

        SHA1

        b0eb587b5e8d597ef801848722b790692d804be2

        SHA256

        f5397f02a6c8c59bc9869c0e5c726c096a69c84ad7f0934608fdbd8bc7e5b9f3

        SHA512

        023cca65a97265961790183f43605fb3dd47426049f2152e5ed90d2daed98607d1e215cb8cabf54d7d2068f7a86d3b01b1d101823e8ed1acfb09076e69b67c71

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        81da78e4c29b5abf222c1425d1b8da16

        SHA1

        c68fae858982c6217d14f0a94f1e424dc47e5abb

        SHA256

        e1c0bac8ec1a6de7acf76dbaae7862a630d01697c06843f75330f8be29261f38

        SHA512

        859ff4f8d8119e4a12c83c8aa7a7c392b9bde66358d189f67f0d44ae6777f75dd7f994536d812cb00f0612a9c4444a3775ff729512d50c1a6173f23b5866fdb0

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        99c82369839776d3d954a85361e76565

        SHA1

        fe01d71a20a80f468e5fa4df991eacca97e650a1

        SHA256

        ecfe1904a389f25b460a8eec64349498fde06733fa12cd5ae8e0c49a9699154f

        SHA512

        5deb6fd1534298cbc80f4653e60b9dcaba6cfd4af1f3b1e5369929472ab4f8cba7d50d3f63d7154170b5ea84f40f7511f1839f2e89340c6942fede255c93b69f

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        03088ab16e4136b8d3a3366505b767ed

        SHA1

        e1d73c9dc7e6009659519b33b3dd80f3011adad8

        SHA256

        b31956814f1bc7c1e47a025622160df37664a3ee8e6d2016ce8919f1fba63a59

        SHA512

        0c841cc8236b405951c5bdf0ea7c620ef32ab930077442e5c1f2eca9fe474c113e1377829e8072afdbfd9a0f0b2797cf156b2f861395d14b851abc7b365ec11a

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        99c6d3daae7cb362152020047cb956dc

        SHA1

        4d70b60a43d37fbfea1be333aad269606ae3d3a7

        SHA256

        b35a71753d085b170fca9949910d93671a298e1fcc05cf0cdff308dba4d12324

        SHA512

        37098e0594a21439720df6adc851063d275020c7a337326cf0f83c8fce79ac210bd42c5458e49e560c4641b569be88b34ee5ee99dccba5c2655fee127c21e110

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        16b9011648a577741b7fb4a55f1eeaac

        SHA1

        b0d86d1cf62b882bf28f0897ddb610e41cc6814c

        SHA256

        7bf3fbb9962c054e651caf4e49fa468d5892cb0bf88f4bbf3fd85b372a7d173c

        SHA512

        1d8631904aa2df5a90aef858d4369ed53d0075f97b42361a8e05c9a64f8e6a786897b625b1230d20415f3923db8aa5d8f5f619b7b9084202fecf4e7cead4366d

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        10ffe941ac3b45a1b27eaab090d03e3b

        SHA1

        4f72abac858bc7659692930176f0cd4f18e354f1

        SHA256

        b2a27182b84ccf59736264c5fc788f96d92a2d3a14fe7c964e0976af00956144

        SHA512

        638a48fe06a5e0c47e50ac67e0df2d6952e5e39620a585e5fb086d40ff61cff9bee6a6cfda6582c54e216f052dc6ba4ce5d742ae5174a987701701e67dc65544

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        5ba8c208c5700f7f25c2e24e00d50ac8

        SHA1

        9838a0ab093ed94bc85a80b1feee14b68e4df8d1

        SHA256

        213371c33e19f6f9e28f089e3206fe50c39b190548b0500f7ba8aff869a68cd6

        SHA512

        065e45ebe4197cdf7e13b799928dfb29e17d4a1741e3e103000b147288b34f16300b72874ec85aefa2c04cc939df115a9fb383d5c95982c1371e75605d1a9b17

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        c91530bbaec9815f2db19bd6645b8729

        SHA1

        ea901a28f06bfbfc1dc9c3391910a87bfaf07020

        SHA256

        7924a95b4fb309a069dcb92b65632f01f9db2560b224d4812ebb84130994ab8d

        SHA512

        7ebce2d0627561189c27073f3e43e84e6164c3c4a63fe4172d2c1214fe799795393573038fb3dd75359327e7cca4eec17889749411e289480580f568b02e6588

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        e5bba46683440caa1508061b6e638120

        SHA1

        538ff5b7cb3ca90cee3e60bae0b487f4b78912de

        SHA256

        9b324dbd185a14c0ebfd2cd2731f6bb32c501dfefa7aef4f65b137357502c65d

        SHA512

        466f00fee10e323273e5d1151062e9fcc36f5657a404c6dd3c0c9ecb56e5205930087e612b13a9c6d1a56df7e05a2bd9c14e95debd5e5aed96ad2ef867e8de4d

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        780c5b88f55c3463a252f361d53f98db

        SHA1

        244e739c7401ce41027d7786f4a48f4806a9939b

        SHA256

        d8b383df125f83a39c299a3134c88e981cf47755ddd6b44310f70231305c6bb0

        SHA512

        b12e3266edea4f9dff105ed8617c81a29f9873d646b6b326c5c29c0c590049dd85458b8ff7541957f9ab995896e7bfd08b171959e592ccc6edbedf998fdf1045

      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.1MB

        MD5

        d14e904b7c8416b4aa674f21eb5efde9

        SHA1

        4b5b28a13f4820d8ea7f35875ae3183e5fe9df06

        SHA256

        6a203556c331761d3e59336d3964a5daecad5e5ae047d7c92129c488c3790317

        SHA512

        5c16e9585016bb83f06c55753055f0f3acdaf2fb6ff588e18d03b9c4f249582030e703db46f3b20eebb9d5a8802a6aa5b262638972ffcae7221195583b23aca5

      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.1MB

        MD5

        2f96f8a94242c8e2de8b43bcca1104a8

        SHA1

        e967061bc8d3548930a953ca37c094d4a45c634e

        SHA256

        4cbdab05d7f7086d7825b92e1b331a5a58d4195d62dbc511f2f5b87298174858

        SHA512

        21713fd50fa2bc6183c540ab932b102731e615dd1288d0ad19815ceb30cae5550b83dd4278d162fcd8439409d9a950a8bdf1993c28a7d6dfe455315877ae5795

      • memory/560-163-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/560-157-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/688-74-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/688-81-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/820-168-0x0000000005A00000-0x0000000005B5F000-memory.dmp

        Filesize

        1.4MB

      • memory/928-213-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/992-51-0x0000000005BE0000-0x0000000005D3F000-memory.dmp

        Filesize

        1.4MB

      • memory/1108-71-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1108-63-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1260-62-0x00000000046A0000-0x00000000047FF000-memory.dmp

        Filesize

        1.4MB

      • memory/1312-180-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1312-178-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1448-172-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1448-170-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1476-171-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1560-55-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1560-59-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1620-48-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1620-44-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1860-203-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1860-200-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1876-175-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1876-169-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1960-132-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1960-128-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2084-195-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2084-188-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2120-94-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2120-86-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2192-179-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2240-204-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2240-211-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2332-176-0x0000000005DB0000-0x0000000005F0F000-memory.dmp

        Filesize

        1.4MB

      • memory/2332-177-0x0000000005DB0000-0x0000000005F0F000-memory.dmp

        Filesize

        1.4MB

      • memory/2348-99-0x0000000005E90000-0x0000000005FEF000-memory.dmp

        Filesize

        1.4MB

      • memory/2348-84-0x0000000005C10000-0x0000000005D6F000-memory.dmp

        Filesize

        1.4MB

      • memory/2392-9-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2392-0-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2452-32-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2452-37-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2556-187-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2576-138-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2576-142-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2596-113-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2596-121-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2600-112-0x0000000005CE0000-0x0000000005E3F000-memory.dmp

        Filesize

        1.4MB

      • memory/2652-212-0x0000000005AD0000-0x0000000005C2F000-memory.dmp

        Filesize

        1.4MB

      • memory/2676-19-0x0000000004840000-0x000000000499F000-memory.dmp

        Filesize

        1.4MB

      • memory/2676-14-0x0000000004840000-0x000000000499F000-memory.dmp

        Filesize

        1.4MB

      • memory/2848-25-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2848-20-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2920-108-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2920-100-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2936-149-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/2936-153-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB