Overview
overview
10Static
static
101.exe
windows7-x64
31221.exe
windows7-x64
106b282d34fv2.exe
windows7-x64
1B000CEF.exe
windows7-x64
10Builder.exe
windows7-x64
1POVOFJYqCo...Iu.exe
windows7-x64
1Terracotta.exe
windows7-x64
1TerracottaGUI.exe
windows7-x64
1Zver.exe
windows7-x64
3a.exe
windows7-x64
10amdcontroller.exe
windows7-x64
10bg.exe
windows7-x64
1bin.exe
windows7-x64
10bin2.exe
windows7-x64
7ej.exe
windows7-x64
10fban4.exe
windows7-x64
7glash.exe
windows7-x64
1johngotovo (2).exe
windows7-x64
10johngotovo...al.exe
windows7-x64
10ktg.exe
windows7-x64
1otIXAOPqOV...LX.exe
windows7-x64
3scvsots.exe
windows7-x64
10setup.exe
windows7-x64
1shit.exe
windows7-x64
10ss.exe
windows7-x64
10stealedd517v2.exe
windows7-x64
1steel.exe
windows7-x64
1ted.exe
windows7-x64
1update_b.exe
windows7-x64
1update_z.exe
windows7-x64
1uyo.exe
windows7-x64
1v72d8z2.exe
windows7-x64
1Analysis
-
max time kernel
31s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
13-08-2023 18:33
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1221.exe
Resource
win7-20230712-en
Behavioral task
behavioral3
Sample
6b282d34fv2.exe
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
B000CEF.exe
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
Builder.exe
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
POVOFJYqCoZfOoPkWOsSBcVYWIu.exe
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
Terracotta.exe
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
TerracottaGUI.exe
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
Zver.exe
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
a.exe
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
amdcontroller.exe
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
bg.exe
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
bin.exe
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
bin2.exe
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
ej.exe
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
fban4.exe
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
glash.exe
Resource
win7-20230712-en
Behavioral task
behavioral18
Sample
johngotovo (2).exe
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
johngotovo (2)_original_original.exe
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
ktg.exe
Resource
win7-20230712-en
Behavioral task
behavioral21
Sample
otIXAOPqOVgvIKePlwFQLX.exe
Resource
win7-20230712-en
Behavioral task
behavioral22
Sample
scvsots.exe
Resource
win7-20230712-en
Behavioral task
behavioral23
Sample
setup.exe
Resource
win7-20230712-en
Behavioral task
behavioral24
Sample
shit.exe
Resource
win7-20230712-en
Behavioral task
behavioral25
Sample
ss.exe
Resource
win7-20230712-en
Behavioral task
behavioral26
Sample
stealedd517v2.exe
Resource
win7-20230712-en
Behavioral task
behavioral27
Sample
steel.exe
Resource
win7-20230712-en
Behavioral task
behavioral28
Sample
ted.exe
Resource
win7-20230712-en
Behavioral task
behavioral29
Sample
update_b.exe
Resource
win7-20230712-en
Behavioral task
behavioral30
Sample
update_z.exe
Resource
win7-20230712-en
Behavioral task
behavioral31
Sample
uyo.exe
Resource
win7-20230712-en
Behavioral task
behavioral32
Sample
v72d8z2.exe
Resource
win7-20230712-en
General
-
Target
scvsots.exe
-
Size
2.1MB
-
MD5
fd409d4d20e580215c1ec0803eed9725
-
SHA1
02f9cf94ed6ab9e780755215857c9ba0a3e25065
-
SHA256
483b9102b4ad847f5e96aa478792a613d2a51ef605c8224afe0a369d09a75e79
-
SHA512
253c22cf2895865c407055900617298a71ac9529769561fd0e0f7d373e0461b77db2b6b5b37d383560eca56b833b3e704130b5ade3f09569f369d3850e03fa38
-
SSDEEP
49152:Sq6zl3M9b5H5RB4jyVzsb0cUgq0EtlR3vOtNhHduFYq4sTm:Sq6zMrSyNsb0fP0yitNh5qNS
Malware Config
Signatures
-
XMRig Miner payload 29 IoCs
Processes:
resource yara_rule behavioral22/memory/2556-58-0x0000000000400000-0x00000000007D8000-memory.dmp xmrig \Windows\Temp\Networks\taskmgr.exe xmrig C:\Windows\Temp\Networks\taskmgr.exe xmrig behavioral22/memory/2180-65-0x0000000000400000-0x00000000007D8000-memory.dmp xmrig behavioral22/memory/2180-66-0x0000000000400000-0x00000000007D8000-memory.dmp xmrig \Windows\Temp\Networks\taskmgr.exe xmrig C:\Windows\Temp\Networks\taskmgr.exe xmrig \Windows\Temp\Networks\taskmgr.exe xmrig C:\Windows\Temp\Networks\taskmgr.exe xmrig \Windows\Temp\Networks\taskmgr.exe xmrig C:\Windows\Temp\Networks\taskmgr.exe xmrig C:\Windows\Temp\Networks\taskmgr.exe xmrig \Windows\Temp\Networks\taskmgr.exe xmrig C:\Windows\Temp\Networks\taskmgr.exe xmrig \Windows\Temp\Networks\taskmgr.exe xmrig C:\Windows\Temp\Networks\taskmgr.exe xmrig \Windows\Temp\Networks\taskmgr.exe xmrig C:\Windows\Temp\Networks\taskmgr.exe xmrig behavioral22/memory/2180-237-0x0000000000400000-0x00000000007D8000-memory.dmp xmrig \Windows\Temp\Networks\taskmgr.exe xmrig C:\Windows\Temp\Networks\taskmgr.exe xmrig C:\Windows\TEMP\Networks\taskmgr.exe xmrig behavioral22/memory/2960-247-0x0000000000400000-0x00000000007D8000-memory.dmp xmrig C:\Windows\Temp\Networks\taskmgr.exe xmrig \Windows\Temp\Networks\taskmgr.exe xmrig C:\Windows\Temp\Networks\taskmgr.exe xmrig \Windows\Temp\Networks\taskmgr.exe xmrig \Windows\Temp\Networks\taskmgr.exe xmrig C:\Windows\Temp\Networks\taskmgr.exe xmrig -
Sets file execution options in registry 2 TTPs 10 IoCs
Processes:
scvsots.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe scvsots.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe scvsots.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" scvsots.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" scvsots.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" scvsots.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" scvsots.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe scvsots.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" scvsots.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe scvsots.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe scvsots.exe -
Executes dropped EXE 17 IoCs
Processes:
scvsots.exetaskmgr.exetaskmgr.exetaskmgr.exetaskmgr.exewimnat.exeooaaya.exetaskmgr.exeopperce.exezmtrwm.exetaskmgr.exetaskmgr.exetaskmgr.exescvsots.exetaskmgr.exetaskmgr.exetaskmgr.exepid process 2180 scvsots.exe 2896 taskmgr.exe 2716 taskmgr.exe 2152 taskmgr.exe 2820 taskmgr.exe 2692 wimnat.exe 1808 ooaaya.exe 1672 taskmgr.exe 1080 opperce.exe 336 zmtrwm.exe 1936 taskmgr.exe 2468 taskmgr.exe 1920 taskmgr.exe 2960 scvsots.exe 2940 taskmgr.exe 2852 taskmgr.exe 2164 taskmgr.exe -
Loads dropped DLL 15 IoCs
Processes:
scvsots.exepid process 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe -
Processes:
resource yara_rule behavioral22/memory/2556-54-0x0000000000400000-0x00000000007D8000-memory.dmp upx C:\Windows\scvsots.exe upx behavioral22/memory/2180-57-0x0000000000400000-0x00000000007D8000-memory.dmp upx behavioral22/memory/2556-58-0x0000000000400000-0x00000000007D8000-memory.dmp upx behavioral22/memory/2180-65-0x0000000000400000-0x00000000007D8000-memory.dmp upx behavioral22/memory/2180-66-0x0000000000400000-0x00000000007D8000-memory.dmp upx C:\Windows\scvsots.exe upx behavioral22/memory/2180-237-0x0000000000400000-0x00000000007D8000-memory.dmp upx C:\Windows\ime\scvsots.exe upx C:\Windows\IME\scvsots.exe upx behavioral22/memory/2960-245-0x0000000000400000-0x00000000007D8000-memory.dmp upx behavioral22/memory/2960-247-0x0000000000400000-0x00000000007D8000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
scvsots.exedescription ioc process File opened (read-only) \??\P: scvsots.exe File opened (read-only) \??\R: scvsots.exe File opened (read-only) \??\V: scvsots.exe File opened (read-only) \??\B: scvsots.exe File opened (read-only) \??\S: scvsots.exe File opened (read-only) \??\Y: scvsots.exe File opened (read-only) \??\T: scvsots.exe File opened (read-only) \??\U: scvsots.exe File opened (read-only) \??\E: scvsots.exe File opened (read-only) \??\G: scvsots.exe File opened (read-only) \??\K: scvsots.exe File opened (read-only) \??\L: scvsots.exe File opened (read-only) \??\N: scvsots.exe File opened (read-only) \??\Q: scvsots.exe File opened (read-only) \??\W: scvsots.exe File opened (read-only) \??\X: scvsots.exe File opened (read-only) \??\Z: scvsots.exe File opened (read-only) \??\A: scvsots.exe File opened (read-only) \??\H: scvsots.exe File opened (read-only) \??\I: scvsots.exe File opened (read-only) \??\J: scvsots.exe File opened (read-only) \??\M: scvsots.exe File opened (read-only) \??\O: scvsots.exe -
Creates a Windows Service
-
Drops file in System32 directory 5 IoCs
Processes:
opperce.exescvsots.exewimnat.exedescription ioc process File created C:\Windows\SysWOW64\zmtrwm.exe opperce.exe File opened for modification C:\Windows\SysWOW64\zmtrwm.exe opperce.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat scvsots.exe File created C:\Windows\SysWOW64\ooaaya.exe wimnat.exe File opened for modification C:\Windows\SysWOW64\ooaaya.exe wimnat.exe -
Drops file in Windows directory 58 IoCs
Processes:
scvsots.exescvsots.exedescription ioc process File opened for modification C:\Windows\scvsots.exe scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\ssleay32.dll scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\cnli-1.dll scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\libeay32.dll scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\coli-0.dll scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\AppCapture_x64.dll scvsots.exe File created C:\Windows\spoolsrv.xml scvsots.exe File created C:\Windows\InfusedAppe\LocalService\AppCapture_x64.dll scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\crli-0.dll scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\trch-1.dll scvsots.exe File created C:\Windows\InfusedAppe\LocalService\spoolsrv.xml scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\svchost.xml scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\svchost.exe scvsots.exe File created C:\Windows\InfusedAppe\LocalService\svchost.xml scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\spoolsrv.xml scvsots.exe File opened for modification C:\Windows\svchost.xml scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\libeay32.dll scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\libxml2.dll scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\AppCapture_x32.dll scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\coli-0.dll scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\crli-0.dll scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\tibe-2.dll scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\tucl-1.dll scvsots.exe File opened for modification C:\Windows\spoolsrv.xml scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\tibe-2.dll scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\exma-1.dll scvsots.exe File opened for modification C:\Windows\InfusedAppe\Priess\ip.txt scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\svchost.xml scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\ucl.dll scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\spoolsrv.xml scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\ucl.dll scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\svchost.xml scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\exma-1.dll scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\posh-0.dll scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\spoolsrv.exe scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\trch-1.dll scvsots.exe File created C:\Windows\scvsots.exe scvsots.exe File created C:\Windows\InfusedAppe\Priess\GoogleCdoeUpdate.exe scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\cnli-1.dll scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\tucl-1.dll scvsots.exe File opened for modification C:\Windows\ime\scvsots.exe scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\libxml2.dll scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\ssleay32.dll scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\trfo-2.dll scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\svchost.exe scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\trfo-2.dll scvsots.exe File created C:\Windows\InfusedAppe\LocalService\AppCapture_x32.dll scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\xdvl-0.dll scvsots.exe File created C:\Windows\InfusedAppe\Corporate\scvhost.exe scvsots.exe File created C:\Windows\InfusedAppe\Priess\ip.txt scvsots.exe File created C:\Windows\ime\scvsots.exe scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\zlib1.dll scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\spoolsrv.xml scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\posh-0.dll scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\spoolsrv.exe scvsots.exe File created C:\Windows\InfusedAppe\UnattendGC\specials\xdvl-0.dll scvsots.exe File created C:\Windows\svchost.xml scvsots.exe File created C:\Windows\InfusedAppe\LocalService\specials\zlib1.dll scvsots.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1692 sc.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2488 schtasks.exe 2216 schtasks.exe 3020 schtasks.exe -
Modifies data under HKEY_USERS 30 IoCs
Processes:
ooaaya.exescvsots.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software ooaaya.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft ooaaya.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" scvsots.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" scvsots.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4FD475B9-6389-42D6-88EE-DC8230216890}\WpadDecision = "0" scvsots.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-77-e4-86-2b-a8\WpadDecisionTime = 4058a0ae14ced901 scvsots.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 scvsots.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4FD475B9-6389-42D6-88EE-DC8230216890}\WpadDecisionTime = 4058a0ae14ced901 scvsots.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad scvsots.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie ooaaya.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ scvsots.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" scvsots.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4FD475B9-6389-42D6-88EE-DC8230216890}\WpadDecisionReason = "1" scvsots.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections scvsots.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 scvsots.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4FD475B9-6389-42D6-88EE-DC8230216890}\26-77-e4-86-2b-a8 scvsots.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum ooaaya.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 scvsots.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4FD475B9-6389-42D6-88EE-DC8230216890}\WpadNetworkName = "Network 2" scvsots.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-77-e4-86-2b-a8\WpadDecisionReason = "1" scvsots.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" ooaaya.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" scvsots.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-77-e4-86-2b-a8 scvsots.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix scvsots.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-77-e4-86-2b-a8\WpadDecision = "0" scvsots.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings scvsots.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings scvsots.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum ooaaya.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" scvsots.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4FD475B9-6389-42D6-88EE-DC8230216890} scvsots.exe -
Modifies registry class 6 IoCs
Processes:
scvsots.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" scvsots.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" scvsots.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" scvsots.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" scvsots.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" scvsots.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" scvsots.exe -
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
scvsots.exepid process 2960 scvsots.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
Processes:
scvsots.exeooaaya.exepid process 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 1808 ooaaya.exe 2180 scvsots.exe 1808 ooaaya.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 1808 ooaaya.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 1808 ooaaya.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 1808 ooaaya.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 1808 ooaaya.exe 2180 scvsots.exe 1808 ooaaya.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 1808 ooaaya.exe 2180 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
scvsots.exepid process 2556 scvsots.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
Processes:
scvsots.exedescription pid process Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe Token: SeDebugPrivilege 2180 scvsots.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
scvsots.exescvsots.exewimnat.exeooaaya.exeopperce.exezmtrwm.exescvsots.exepid process 2556 scvsots.exe 2556 scvsots.exe 2180 scvsots.exe 2180 scvsots.exe 2692 wimnat.exe 1808 ooaaya.exe 1080 opperce.exe 336 zmtrwm.exe 2960 scvsots.exe 2960 scvsots.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
scvsots.execmd.execmd.execmd.exedescription pid process target process PID 2180 wrote to memory of 2896 2180 scvsots.exe taskmgr.exe PID 2180 wrote to memory of 2896 2180 scvsots.exe taskmgr.exe PID 2180 wrote to memory of 2896 2180 scvsots.exe taskmgr.exe PID 2180 wrote to memory of 2896 2180 scvsots.exe taskmgr.exe PID 2180 wrote to memory of 276 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 276 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 276 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 276 2180 scvsots.exe cmd.exe PID 276 wrote to memory of 2940 276 cmd.exe schtasks.exe PID 276 wrote to memory of 2940 276 cmd.exe schtasks.exe PID 276 wrote to memory of 2940 276 cmd.exe schtasks.exe PID 276 wrote to memory of 2940 276 cmd.exe schtasks.exe PID 2180 wrote to memory of 2716 2180 scvsots.exe taskmgr.exe PID 2180 wrote to memory of 2716 2180 scvsots.exe taskmgr.exe PID 2180 wrote to memory of 2716 2180 scvsots.exe taskmgr.exe PID 2180 wrote to memory of 2716 2180 scvsots.exe taskmgr.exe PID 2180 wrote to memory of 2152 2180 scvsots.exe taskmgr.exe PID 2180 wrote to memory of 2152 2180 scvsots.exe taskmgr.exe PID 2180 wrote to memory of 2152 2180 scvsots.exe taskmgr.exe PID 2180 wrote to memory of 2152 2180 scvsots.exe taskmgr.exe PID 2180 wrote to memory of 2820 2180 scvsots.exe taskmgr.exe PID 2180 wrote to memory of 2820 2180 scvsots.exe taskmgr.exe PID 2180 wrote to memory of 2820 2180 scvsots.exe taskmgr.exe PID 2180 wrote to memory of 2820 2180 scvsots.exe taskmgr.exe PID 2180 wrote to memory of 2740 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2740 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2740 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2740 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2760 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2760 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2760 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2760 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2780 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2780 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2780 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2780 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2828 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2828 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2828 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2828 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2540 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2540 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2540 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2540 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 308 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 308 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 308 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 308 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2340 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2340 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2340 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2340 2180 scvsots.exe cmd.exe PID 2180 wrote to memory of 2692 2180 scvsots.exe wimnat.exe PID 2180 wrote to memory of 2692 2180 scvsots.exe wimnat.exe PID 2180 wrote to memory of 2692 2180 scvsots.exe wimnat.exe PID 2180 wrote to memory of 2692 2180 scvsots.exe wimnat.exe PID 2760 wrote to memory of 2488 2760 cmd.exe schtasks.exe PID 2760 wrote to memory of 2488 2760 cmd.exe schtasks.exe PID 2760 wrote to memory of 2488 2760 cmd.exe schtasks.exe PID 2760 wrote to memory of 2488 2760 cmd.exe schtasks.exe PID 308 wrote to memory of 2644 308 cmd.exe net.exe PID 308 wrote to memory of 2644 308 cmd.exe net.exe PID 308 wrote to memory of 2644 308 cmd.exe net.exe PID 308 wrote to memory of 2644 308 cmd.exe net.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\scvsots.exe"C:\Users\Admin\AppData\Local\Temp\scvsots.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
-
C:\Windows\scvsots.exeC:\Windows\scvsots.exe1⤵
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks /delete /tn * /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn * /f3⤵
-
C:\Windows\TEMP\Networks\taskmgr.exeC:\Windows\TEMP\Networks\taskmgr.exe2⤵
- Executes dropped EXE
-
C:\Windows\TEMP\Networks\taskmgr.exeC:\Windows\TEMP\Networks\taskmgr.exe2⤵
- Executes dropped EXE
-
C:\Windows\TEMP\Networks\taskmgr.exeC:\Windows\TEMP\Networks\taskmgr.exe2⤵
- Executes dropped EXE
-
C:\Windows\TEMP\Networks\taskmgr.exeC:\Windows\TEMP\Networks\taskmgr.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd /c sc config LanmanServer start= disabled2⤵
-
C:\Windows\SysWOW64\sc.exesc config LanmanServer start= disabled3⤵
- Launches sc.exe
-
C:\Windows\TEMP\wimnat.exeC:\Windows\TEMP\wimnat.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c net stop LanmanServer2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet stop LanmanServer3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop LanmanServer4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks /create /sc minute /mo 1 /tn "Flash" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\Networks\taskmgr.exe /p everyone:F"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Flash" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\Networks\taskmgr.exe /p everyone:F"3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks /create /sc minute /mo 1 /tn "Netframework" /ru system /tr "cmd /c echo Y|cacls C:\Windows\scvsots.exe /p everyone:F"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks /create /sc minute /mo 1 /tn "Miscfost" /ru system /tr "cmd /c C:\Windows\ime\scvsots.exe"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Miscfost" /ru system /tr "cmd /c C:\Windows\ime\scvsots.exe"3⤵
- Creates scheduled task(s)
-
C:\Windows\TEMP\Networks\taskmgr.exeC:\Windows\TEMP\Networks\taskmgr.exe2⤵
- Executes dropped EXE
-
C:\Windows\TEMP\opperce.exeC:\Windows\TEMP\opperce.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\TEMP\Networks\taskmgr.exeC:\Windows\TEMP\Networks\taskmgr.exe2⤵
- Executes dropped EXE
-
C:\Windows\TEMP\Networks\taskmgr.exeC:\Windows\TEMP\Networks\taskmgr.exe2⤵
- Executes dropped EXE
-
C:\Windows\TEMP\Networks\taskmgr.exeC:\Windows\TEMP\Networks\taskmgr.exe2⤵
- Executes dropped EXE
-
C:\Windows\TEMP\Networks\taskmgr.exeC:\Windows\TEMP\Networks\taskmgr.exe2⤵
- Executes dropped EXE
-
C:\Windows\TEMP\Networks\taskmgr.exeC:\Windows\TEMP\Networks\taskmgr.exe2⤵
- Executes dropped EXE
-
C:\Windows\TEMP\Networks\taskmgr.exeC:\Windows\TEMP\Networks\taskmgr.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Netframework" /ru system /tr "cmd /c echo Y|cacls C:\Windows\scvsots.exe /p everyone:F"1⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\ooaaya.exeC:\Windows\SysWOW64\ooaaya.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\zmtrwm.exeC:\Windows\SysWOW64\zmtrwm.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\taskeng.exetaskeng.exe {D1562A46-51A3-4022-A1A0-2D7E6427549E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\Networks\taskmgr.exe /p everyone:F2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\Networks\taskmgr.exe /p everyone:F3⤵
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\scvsots.exe2⤵
-
C:\Windows\ime\scvsots.exeC:\Windows\ime\scvsots.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\scvsots.exe /p everyone:F2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\system32\cacls.execacls C:\Windows\scvsots.exe /p everyone:F3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\IME\scvsots.exeFilesize
2.1MB
MD5fd409d4d20e580215c1ec0803eed9725
SHA102f9cf94ed6ab9e780755215857c9ba0a3e25065
SHA256483b9102b4ad847f5e96aa478792a613d2a51ef605c8224afe0a369d09a75e79
SHA512253c22cf2895865c407055900617298a71ac9529769561fd0e0f7d373e0461b77db2b6b5b37d383560eca56b833b3e704130b5ade3f09569f369d3850e03fa38
-
C:\Windows\InfusedAppe\LocalService\spoolsrv.xmlFilesize
7KB
MD5497080fed2000e8b49ee2e97e54036b1
SHA14af3fae881a80355dd09df6e736203c30c4faac5
SHA256756f44f1d667132b043bfd3da16b91c9f6681e5d778c5f07bb031d62ff00d380
SHA5124f8bd09f9d8d332c436beb8164eec90b0e260b69230f102565298beff0db37265be1ae5eb70acf60e77d5589c61c7ee7f01a02d2a30ac72d794a04efef6f25df
-
C:\Windows\InfusedAppe\LocalService\svchost.xmlFilesize
5KB
MD509d45ae26830115fd8d9cdc2aa640ca5
SHA141a6ad8d88b6999ac8a3ff00dd9641a37ee20933
SHA256cf33a92a05ba3c807447a5f6b7e45577ed53174699241da360876d4f4a2eb2de
SHA5121a97f62f76f6f5a7b668eadb55f08941b1d8dfed4a28c4d7a4f2494ff57e998407ec2d0fedaf7f670eb541b1fda40ca5e429d4d2a87007ec45ea5d10abd93aa5
-
C:\Windows\SysWOW64\ooaaya.exeFilesize
72KB
MD52334bb8baf5e062683d8ec67b7ac531e
SHA15419ddccabaa0a0b98fd6783c8341012c40db522
SHA2566c310b9829fe5fac50b0ea752242b456b3b86462dee46624337715831deb8b2e
SHA512ee0e3f619f0294e3e67e324cab582dd790ba2c15ae08365c0481fd07e32949428c9f4f4872572f52df02be3cd558c78be8af5696da4731b528019ad6706770f8
-
C:\Windows\SysWOW64\zmtrwm.exeFilesize
72KB
MD5a7195beae808ba6cd4e4e373f4b540ed
SHA116ee2c2da78116fe3a08aeef07b25df4455a5736
SHA256bc57aa3e6562468e09cc341cdeaae364b13a33aab9e75a7e11d1dabba1788614
SHA5126e9f15d2198d0ed8d8ef06866ee2d49293be0223034013922267123d6c8a8695e57c5bc9beb8939cbff905f5e5de2b58b99110aa17f2aa04176cd659679b87c3
-
C:\Windows\TEMP\Networks\config.jsonFilesize
623B
MD5490fb7bd62699dadef26dac8e88eefa3
SHA1e4bf283392140ab9c01fbb2fae68a078c17d78e5
SHA256f9f52693118dcf9028ff18bd821a9052f4cc09f919489ec9ba07d36b0612da04
SHA512911f9e6d323321709a3a34c7d3a093c7c00338145746fec1a020f6ef74cb3cd7b47205577aa6a26f06f2bd4c7db1102b486e49bb4b8a0fccdb5bd19e50d88936
-
C:\Windows\TEMP\Networks\config.jsonFilesize
623B
MD5490fb7bd62699dadef26dac8e88eefa3
SHA1e4bf283392140ab9c01fbb2fae68a078c17d78e5
SHA256f9f52693118dcf9028ff18bd821a9052f4cc09f919489ec9ba07d36b0612da04
SHA512911f9e6d323321709a3a34c7d3a093c7c00338145746fec1a020f6ef74cb3cd7b47205577aa6a26f06f2bd4c7db1102b486e49bb4b8a0fccdb5bd19e50d88936
-
C:\Windows\TEMP\Networks\config.jsonFilesize
623B
MD5490fb7bd62699dadef26dac8e88eefa3
SHA1e4bf283392140ab9c01fbb2fae68a078c17d78e5
SHA256f9f52693118dcf9028ff18bd821a9052f4cc09f919489ec9ba07d36b0612da04
SHA512911f9e6d323321709a3a34c7d3a093c7c00338145746fec1a020f6ef74cb3cd7b47205577aa6a26f06f2bd4c7db1102b486e49bb4b8a0fccdb5bd19e50d88936
-
C:\Windows\TEMP\Networks\config.jsonFilesize
623B
MD5490fb7bd62699dadef26dac8e88eefa3
SHA1e4bf283392140ab9c01fbb2fae68a078c17d78e5
SHA256f9f52693118dcf9028ff18bd821a9052f4cc09f919489ec9ba07d36b0612da04
SHA512911f9e6d323321709a3a34c7d3a093c7c00338145746fec1a020f6ef74cb3cd7b47205577aa6a26f06f2bd4c7db1102b486e49bb4b8a0fccdb5bd19e50d88936
-
C:\Windows\TEMP\Networks\config.jsonFilesize
623B
MD5490fb7bd62699dadef26dac8e88eefa3
SHA1e4bf283392140ab9c01fbb2fae68a078c17d78e5
SHA256f9f52693118dcf9028ff18bd821a9052f4cc09f919489ec9ba07d36b0612da04
SHA512911f9e6d323321709a3a34c7d3a093c7c00338145746fec1a020f6ef74cb3cd7b47205577aa6a26f06f2bd4c7db1102b486e49bb4b8a0fccdb5bd19e50d88936
-
C:\Windows\TEMP\Networks\config.jsonFilesize
623B
MD5490fb7bd62699dadef26dac8e88eefa3
SHA1e4bf283392140ab9c01fbb2fae68a078c17d78e5
SHA256f9f52693118dcf9028ff18bd821a9052f4cc09f919489ec9ba07d36b0612da04
SHA512911f9e6d323321709a3a34c7d3a093c7c00338145746fec1a020f6ef74cb3cd7b47205577aa6a26f06f2bd4c7db1102b486e49bb4b8a0fccdb5bd19e50d88936
-
C:\Windows\TEMP\Networks\config.jsonFilesize
623B
MD5490fb7bd62699dadef26dac8e88eefa3
SHA1e4bf283392140ab9c01fbb2fae68a078c17d78e5
SHA256f9f52693118dcf9028ff18bd821a9052f4cc09f919489ec9ba07d36b0612da04
SHA512911f9e6d323321709a3a34c7d3a093c7c00338145746fec1a020f6ef74cb3cd7b47205577aa6a26f06f2bd4c7db1102b486e49bb4b8a0fccdb5bd19e50d88936
-
C:\Windows\TEMP\Networks\config.jsonFilesize
623B
MD5490fb7bd62699dadef26dac8e88eefa3
SHA1e4bf283392140ab9c01fbb2fae68a078c17d78e5
SHA256f9f52693118dcf9028ff18bd821a9052f4cc09f919489ec9ba07d36b0612da04
SHA512911f9e6d323321709a3a34c7d3a093c7c00338145746fec1a020f6ef74cb3cd7b47205577aa6a26f06f2bd4c7db1102b486e49bb4b8a0fccdb5bd19e50d88936
-
C:\Windows\TEMP\Networks\config.jsonFilesize
623B
MD5490fb7bd62699dadef26dac8e88eefa3
SHA1e4bf283392140ab9c01fbb2fae68a078c17d78e5
SHA256f9f52693118dcf9028ff18bd821a9052f4cc09f919489ec9ba07d36b0612da04
SHA512911f9e6d323321709a3a34c7d3a093c7c00338145746fec1a020f6ef74cb3cd7b47205577aa6a26f06f2bd4c7db1102b486e49bb4b8a0fccdb5bd19e50d88936
-
C:\Windows\TEMP\Networks\config.jsonFilesize
623B
MD5490fb7bd62699dadef26dac8e88eefa3
SHA1e4bf283392140ab9c01fbb2fae68a078c17d78e5
SHA256f9f52693118dcf9028ff18bd821a9052f4cc09f919489ec9ba07d36b0612da04
SHA512911f9e6d323321709a3a34c7d3a093c7c00338145746fec1a020f6ef74cb3cd7b47205577aa6a26f06f2bd4c7db1102b486e49bb4b8a0fccdb5bd19e50d88936
-
C:\Windows\TEMP\Networks\config.jsonFilesize
623B
MD5490fb7bd62699dadef26dac8e88eefa3
SHA1e4bf283392140ab9c01fbb2fae68a078c17d78e5
SHA256f9f52693118dcf9028ff18bd821a9052f4cc09f919489ec9ba07d36b0612da04
SHA512911f9e6d323321709a3a34c7d3a093c7c00338145746fec1a020f6ef74cb3cd7b47205577aa6a26f06f2bd4c7db1102b486e49bb4b8a0fccdb5bd19e50d88936
-
C:\Windows\TEMP\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
C:\Windows\TEMP\opperce.exeFilesize
72KB
MD5a7195beae808ba6cd4e4e373f4b540ed
SHA116ee2c2da78116fe3a08aeef07b25df4455a5736
SHA256bc57aa3e6562468e09cc341cdeaae364b13a33aab9e75a7e11d1dabba1788614
SHA5126e9f15d2198d0ed8d8ef06866ee2d49293be0223034013922267123d6c8a8695e57c5bc9beb8939cbff905f5e5de2b58b99110aa17f2aa04176cd659679b87c3
-
C:\Windows\TEMP\wimnat.exeFilesize
72KB
MD52334bb8baf5e062683d8ec67b7ac531e
SHA15419ddccabaa0a0b98fd6783c8341012c40db522
SHA2566c310b9829fe5fac50b0ea752242b456b3b86462dee46624337715831deb8b2e
SHA512ee0e3f619f0294e3e67e324cab582dd790ba2c15ae08365c0481fd07e32949428c9f4f4872572f52df02be3cd558c78be8af5696da4731b528019ad6706770f8
-
C:\Windows\Temp\Networks\config.jsonFilesize
623B
MD5490fb7bd62699dadef26dac8e88eefa3
SHA1e4bf283392140ab9c01fbb2fae68a078c17d78e5
SHA256f9f52693118dcf9028ff18bd821a9052f4cc09f919489ec9ba07d36b0612da04
SHA512911f9e6d323321709a3a34c7d3a093c7c00338145746fec1a020f6ef74cb3cd7b47205577aa6a26f06f2bd4c7db1102b486e49bb4b8a0fccdb5bd19e50d88936
-
C:\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
C:\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
C:\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
C:\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
C:\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
C:\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
C:\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
C:\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
C:\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
C:\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
C:\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
C:\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
C:\Windows\Temp\opperce.exeFilesize
72KB
MD5a7195beae808ba6cd4e4e373f4b540ed
SHA116ee2c2da78116fe3a08aeef07b25df4455a5736
SHA256bc57aa3e6562468e09cc341cdeaae364b13a33aab9e75a7e11d1dabba1788614
SHA5126e9f15d2198d0ed8d8ef06866ee2d49293be0223034013922267123d6c8a8695e57c5bc9beb8939cbff905f5e5de2b58b99110aa17f2aa04176cd659679b87c3
-
C:\Windows\Temp\wimnat.exeFilesize
72KB
MD52334bb8baf5e062683d8ec67b7ac531e
SHA15419ddccabaa0a0b98fd6783c8341012c40db522
SHA2566c310b9829fe5fac50b0ea752242b456b3b86462dee46624337715831deb8b2e
SHA512ee0e3f619f0294e3e67e324cab582dd790ba2c15ae08365c0481fd07e32949428c9f4f4872572f52df02be3cd558c78be8af5696da4731b528019ad6706770f8
-
C:\Windows\Temp\wimnat.exeFilesize
72KB
MD52334bb8baf5e062683d8ec67b7ac531e
SHA15419ddccabaa0a0b98fd6783c8341012c40db522
SHA2566c310b9829fe5fac50b0ea752242b456b3b86462dee46624337715831deb8b2e
SHA512ee0e3f619f0294e3e67e324cab582dd790ba2c15ae08365c0481fd07e32949428c9f4f4872572f52df02be3cd558c78be8af5696da4731b528019ad6706770f8
-
C:\Windows\ime\scvsots.exeFilesize
2.1MB
MD5fd409d4d20e580215c1ec0803eed9725
SHA102f9cf94ed6ab9e780755215857c9ba0a3e25065
SHA256483b9102b4ad847f5e96aa478792a613d2a51ef605c8224afe0a369d09a75e79
SHA512253c22cf2895865c407055900617298a71ac9529769561fd0e0f7d373e0461b77db2b6b5b37d383560eca56b833b3e704130b5ade3f09569f369d3850e03fa38
-
C:\Windows\scvsots.exeFilesize
2.1MB
MD5fd409d4d20e580215c1ec0803eed9725
SHA102f9cf94ed6ab9e780755215857c9ba0a3e25065
SHA256483b9102b4ad847f5e96aa478792a613d2a51ef605c8224afe0a369d09a75e79
SHA512253c22cf2895865c407055900617298a71ac9529769561fd0e0f7d373e0461b77db2b6b5b37d383560eca56b833b3e704130b5ade3f09569f369d3850e03fa38
-
C:\Windows\scvsots.exeFilesize
2.1MB
MD5fd409d4d20e580215c1ec0803eed9725
SHA102f9cf94ed6ab9e780755215857c9ba0a3e25065
SHA256483b9102b4ad847f5e96aa478792a613d2a51ef605c8224afe0a369d09a75e79
SHA512253c22cf2895865c407055900617298a71ac9529769561fd0e0f7d373e0461b77db2b6b5b37d383560eca56b833b3e704130b5ade3f09569f369d3850e03fa38
-
\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
\Windows\Temp\Networks\taskmgr.exeFilesize
481KB
MD5458a2b86b2c610cc66b3aa081c45584b
SHA11771b2d47e29076ef9caaadc520cd3f73cbcbae2
SHA256ec616b6475f04802a385a5d1841843e48d7dc115eaf7bc6221ebe4f2d6803e7e
SHA5126d8758f4adc7c75e9daa84dea269c2d768e34644326fac8b836a4ee9eaf5ff7dbba23d0d4c1b424e2f1058e9c3ce0012d4acb7ed455d95c21581400fbf9355ac
-
\Windows\Temp\opperce.exeFilesize
72KB
MD5a7195beae808ba6cd4e4e373f4b540ed
SHA116ee2c2da78116fe3a08aeef07b25df4455a5736
SHA256bc57aa3e6562468e09cc341cdeaae364b13a33aab9e75a7e11d1dabba1788614
SHA5126e9f15d2198d0ed8d8ef06866ee2d49293be0223034013922267123d6c8a8695e57c5bc9beb8939cbff905f5e5de2b58b99110aa17f2aa04176cd659679b87c3
-
\Windows\Temp\opperce.exeFilesize
72KB
MD5a7195beae808ba6cd4e4e373f4b540ed
SHA116ee2c2da78116fe3a08aeef07b25df4455a5736
SHA256bc57aa3e6562468e09cc341cdeaae364b13a33aab9e75a7e11d1dabba1788614
SHA5126e9f15d2198d0ed8d8ef06866ee2d49293be0223034013922267123d6c8a8695e57c5bc9beb8939cbff905f5e5de2b58b99110aa17f2aa04176cd659679b87c3
-
\Windows\Temp\wimnat.exeFilesize
72KB
MD52334bb8baf5e062683d8ec67b7ac531e
SHA15419ddccabaa0a0b98fd6783c8341012c40db522
SHA2566c310b9829fe5fac50b0ea752242b456b3b86462dee46624337715831deb8b2e
SHA512ee0e3f619f0294e3e67e324cab582dd790ba2c15ae08365c0481fd07e32949428c9f4f4872572f52df02be3cd558c78be8af5696da4731b528019ad6706770f8
-
\Windows\Temp\wimnat.exeFilesize
72KB
MD52334bb8baf5e062683d8ec67b7ac531e
SHA15419ddccabaa0a0b98fd6783c8341012c40db522
SHA2566c310b9829fe5fac50b0ea752242b456b3b86462dee46624337715831deb8b2e
SHA512ee0e3f619f0294e3e67e324cab582dd790ba2c15ae08365c0481fd07e32949428c9f4f4872572f52df02be3cd558c78be8af5696da4731b528019ad6706770f8
-
memory/2180-57-0x0000000000400000-0x00000000007D8000-memory.dmpFilesize
3.8MB
-
memory/2180-237-0x0000000000400000-0x00000000007D8000-memory.dmpFilesize
3.8MB
-
memory/2180-66-0x0000000000400000-0x00000000007D8000-memory.dmpFilesize
3.8MB
-
memory/2180-65-0x0000000000400000-0x00000000007D8000-memory.dmpFilesize
3.8MB
-
memory/2556-58-0x0000000000400000-0x00000000007D8000-memory.dmpFilesize
3.8MB
-
memory/2556-54-0x0000000000400000-0x00000000007D8000-memory.dmpFilesize
3.8MB
-
memory/2692-92-0x0000000010000000-0x0000000010008000-memory.dmpFilesize
32KB
-
memory/2960-247-0x0000000000400000-0x00000000007D8000-memory.dmpFilesize
3.8MB
-
memory/2960-245-0x0000000000400000-0x00000000007D8000-memory.dmpFilesize
3.8MB