Analysis Overview
SHA256
e380cf2a2bc3a80a0f6cdd2db06978fa30bdf535afbcda1e1b4434dd68fd8ebf
Threat Level: Known bad
The file e380cf2a2bc3a80a0f6cdd2db06978fa30bdf535afbcda1e1b4434dd68fd8ebf was found to be: Known bad.
Malicious Activity Summary
RMS
ACProtect 1.3x - 1.4x DLL software
Sets file to hidden
Modifies Windows Firewall
Executes dropped EXE
UPX packed file
Checks computer location settings
Loads dropped DLL
Adds Run key to start application
Drops file in Windows directory
Enumerates physical storage devices
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Views/modifies file attributes
Suspicious use of WriteProcessMemory
Enumerates processes with tasklist
Suspicious use of AdjustPrivilegeToken
Runs .reg file with regedit
Suspicious use of SetWindowsHookEx
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-02-13 09:23
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-02-13 09:23
Reported
2022-02-13 09:26
Platform
win7-en-20211208
Max time kernel
149s
Max time network
174s
Command Line
Signatures
RMS
ACProtect 1.3x - 1.4x DLL software
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Windows\build\data.exe | N/A |
| N/A | N/A | C:\Windows64\svchost.exe | N/A |
Modifies Windows Firewall
Sets file to hidden
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e380cf2a2bc3a80a0f6cdd2db06978fa30bdf535afbcda1e1b4434dd68fd8ebf.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e380cf2a2bc3a80a0f6cdd2db06978fa30bdf535afbcda1e1b4434dd68fd8ebf.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e380cf2a2bc3a80a0f6cdd2db06978fa30bdf535afbcda1e1b4434dd68fd8ebf.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\cmd.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\cmd.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Services = "C:Windows64\\svchost.exe" | C:\Windows\SysWOW64\reg.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\4w5tb68h7t987093f4trq893f4rw89etw.txt | C:\Windows\SysWOW64\wscript.exe | N/A |
Enumerates physical storage devices
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Enumerates processes with tasklist
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Runs .reg file with regedit
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regedit.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows64\svchost.exe | N/A |
| N/A | N/A | C:\Windows64\svchost.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows64\svchost.exe | N/A |
| Token: SeTcbPrivilege | N/A | C:\Windows64\svchost.exe | N/A |
| Token: SeTcbPrivilege | N/A | C:\Windows64\svchost.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows64\svchost.exe | N/A |
Suspicious use of WriteProcessMemory
Views/modifies file attributes
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\e380cf2a2bc3a80a0f6cdd2db06978fa30bdf535afbcda1e1b4434dd68fd8ebf.exe
"C:\Users\Admin\AppData\Local\Temp\e380cf2a2bc3a80a0f6cdd2db06978fa30bdf535afbcda1e1b4434dd68fd8ebf.exe"
C:\Users\Admin\AppData\Local\Temp\Windows\build\data.exe
"C:\Users\Admin\AppData\Local\Temp\Windows\build\data.exe" -p284579G45398T745398T
C:\Windows\SysWOW64\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Log\install.vbs"
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\wscript.exe" "C:\Log\install.vbs" Run
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\wscript.exe" "C:\Log\install.vbs" Run
C:\Windows\SysWOW64\cmd.exe
cmd /c ""C:\Log\Windows\hiscomponent\install.bat" "
C:\Windows\SysWOW64\attrib.exe
attrib +s +h "C:\Log"
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall set allprofiles state off
C:\Windows\SysWOW64\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Log\Windows\hiscomponent\msg.vbs"
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im rutserv.exe
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im rfusclient.exe
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im systemc.exe
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im drivemanag.exe
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im dumprep.exe
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im winlogs.exe
C:\Windows\SysWOW64\reg.exe
reg delete "HKLM\SYSTEM\Remote Manipulator System" /f
C:\Windows\SysWOW64\reg.exe
reg delete "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\DEVICEMAP" /f
C:\Windows\SysWOW64\reg.exe
reg delete "HKEY_CURRENT_USER\Software\TektonIT\Remote Manipulator System" /f
C:\Windows\SysWOW64\regedit.exe
regedit /s "Windows\hiscomponent\regedit.reg"
C:\Windows\SysWOW64\timeout.exe
timeout 1
C:\Windows64\svchost.exe
svchost.exe
C:\Windows\SysWOW64\reg.exe
Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Services" /t REG_SZ /d "C:Windows64\svchost.exe" /f
C:\Windows\SysWOW64\attrib.exe
attrib +s +h "C:\Windows64\*.*"
C:\Windows\SysWOW64\attrib.exe
attrib +s +h "C:\Windows64"
C:\Windows\SysWOW64\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Windows64\process.vbs"
C:\Windows\SysWOW64\cmd.exe
cmd /c ""C:\Windows64\process.bat" "
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | rmansys.ru | udp |
| RU | 31.31.198.18:80 | rmansys.ru | tcp |
| RU | 31.31.198.18:80 | rmansys.ru | tcp |
| US | 8.8.8.8:53 | rms-server.tektonit.ru | udp |
| RU | 95.213.205.83:5655 | rms-server.tektonit.ru | tcp |
Files
memory/1668-55-0x0000000075321000-0x0000000075323000-memory.dmp
\Users\Admin\AppData\Local\Temp\Windows\build\data.exe
| MD5 | dce7c20b5d07d242ac7a983a975eedbd |
| SHA1 | ee4285ec8b823aa36b634a26ae64b2c3665317d3 |
| SHA256 | 3edeea2573d126f89ced62f5473a68c4f1298fc2408ae8e0402209f45ad100d1 |
| SHA512 | a1b959406aefdba44dae69103006af61181da4698c138d3aff8768580812e7a2516c792185033602c6d8fbb3b4ab667751ac60a2435676e5b36af6d5cc3e1dcf |
\Users\Admin\AppData\Local\Temp\Windows\build\data.exe
| MD5 | dce7c20b5d07d242ac7a983a975eedbd |
| SHA1 | ee4285ec8b823aa36b634a26ae64b2c3665317d3 |
| SHA256 | 3edeea2573d126f89ced62f5473a68c4f1298fc2408ae8e0402209f45ad100d1 |
| SHA512 | a1b959406aefdba44dae69103006af61181da4698c138d3aff8768580812e7a2516c792185033602c6d8fbb3b4ab667751ac60a2435676e5b36af6d5cc3e1dcf |
\Users\Admin\AppData\Local\Temp\Windows\build\data.exe
| MD5 | dce7c20b5d07d242ac7a983a975eedbd |
| SHA1 | ee4285ec8b823aa36b634a26ae64b2c3665317d3 |
| SHA256 | 3edeea2573d126f89ced62f5473a68c4f1298fc2408ae8e0402209f45ad100d1 |
| SHA512 | a1b959406aefdba44dae69103006af61181da4698c138d3aff8768580812e7a2516c792185033602c6d8fbb3b4ab667751ac60a2435676e5b36af6d5cc3e1dcf |
C:\Users\Admin\AppData\Local\Temp\Windows\build\data.exe
| MD5 | dce7c20b5d07d242ac7a983a975eedbd |
| SHA1 | ee4285ec8b823aa36b634a26ae64b2c3665317d3 |
| SHA256 | 3edeea2573d126f89ced62f5473a68c4f1298fc2408ae8e0402209f45ad100d1 |
| SHA512 | a1b959406aefdba44dae69103006af61181da4698c138d3aff8768580812e7a2516c792185033602c6d8fbb3b4ab667751ac60a2435676e5b36af6d5cc3e1dcf |
C:\Users\Admin\AppData\Local\Temp\Windows\build\data.exe
| MD5 | dce7c20b5d07d242ac7a983a975eedbd |
| SHA1 | ee4285ec8b823aa36b634a26ae64b2c3665317d3 |
| SHA256 | 3edeea2573d126f89ced62f5473a68c4f1298fc2408ae8e0402209f45ad100d1 |
| SHA512 | a1b959406aefdba44dae69103006af61181da4698c138d3aff8768580812e7a2516c792185033602c6d8fbb3b4ab667751ac60a2435676e5b36af6d5cc3e1dcf |
C:\Log\install.vbs
| MD5 | 6cab561732bb524984d25e29b8e93414 |
| SHA1 | 73adabe3f5191ea01d8026b14285f0330f97fccc |
| SHA256 | 81d2721f8da28ab12ab7e6572dbfe39c78f1eb24b09ccd9ae816dbcb9f398e60 |
| SHA512 | 7f001fcdf73056fb688c62be0f68b1b1c54e3f0aff05b8e03e0947716e2cd771fa9e12314cb3b6efd9f971c889405d6eccb83a6ee48280e135fc6e14e216e45d |
C:\Log\Windows\hiscomponent\install.bat
| MD5 | 59f603335fcb2c257bdf97d89e3770e3 |
| SHA1 | cd1e2b97d6459977f08051fffd54c1f3eb3c33e6 |
| SHA256 | ea130cb436acfdddc9f65775ac282416c7da79c897d4e32ae5cb424b79689000 |
| SHA512 | 5ad8759c882f85b40375af2746d966ec5fb7c032ab53605bb7d592e9831698509dc1360e42f86bc25d66d9626f17d7ec5ae0c47ff3b34799381b777f32780fa6 |
C:\Log\Windows\hiscomponent\msg.vbs
| MD5 | e51be1b21a598a28e372bffe499e9dfb |
| SHA1 | b525d448d813f0e6403992d83587d7d2e424a182 |
| SHA256 | 9504953239ed502a2b14cffebe05a6e938add0e226da751178484962924d2a38 |
| SHA512 | 1babc7cab573b81097f18edb190c7228be0f583726c54ed50aca45b2ab0c0b6179e0b78b577f54789e6b564af840a02fbdc02eb84274dae70bb43cb3c0cdbd78 |
C:\Log\Windows\hiscomponent\regedit.reg
| MD5 | 1dce30c8d875d6c66c815fd4a7b0bc13 |
| SHA1 | 33d3d1cdbd723c84ea94f953728d0e355aba9921 |
| SHA256 | ecbb060eea93bcbd7779786b154172f226101b7c5fdf314bb42b84b352119854 |
| SHA512 | a8e4d0c889c68074ae21edf2d6eceddf4496c8949a72b1167f14430120b819b7ba5d4edadac448b1c676c0bb341c66e8db91b8d8481137284dc94a8cd8e059b1 |
C:\Log\rutserv.exe
| MD5 | ba33d912e92e9640696163dca2dcd86e |
| SHA1 | c778da5fbbb87e85fc0ec41f9bff34a5212ebaf6 |
| SHA256 | 658d234e2d9115a1f510b628ff9f000318918037cf49d80d47ebea9dded3c218 |
| SHA512 | 2d590a07dc5e28cd3e227fc9276dbea60e8540d850464df79efa18af3e8cfe4817cc0846637cd1e7c566a4fabb771635030cdcc13722c77bc54c89981904747e |
C:\Log\Windows\hiscomponent\vp8encoder.dll
| MD5 | 6298c0af3d1d563834a218a9cc9f54bd |
| SHA1 | 0185cd591e454ed072e5a5077b25c612f6849dc9 |
| SHA256 | 81af82019d9f45a697a8ca1788f2c5c0205af9892efd94879dedf4bc06db4172 |
| SHA512 | 389d89053689537cdb582c0e8a7951a84549f0c36484db4346c31bdbe7cb93141f6a354069eb13e550297dc8ec35cd6899746e0c16abc876a0fe542cc450fffe |
C:\Log\RDPCheck.exe
| MD5 | 8f82226b2f24d470c02f6664f67f23f7 |
| SHA1 | 66f40824b406c748846ef11e6b022958f8cbe48b |
| SHA256 | 5603338a1f8dbb46efb8e0869db3491d5db92f362711d6680f91ecc5d18bfadf |
| SHA512 | 04bc1f785bddf264699fb6bf6fce9652af8c95872f8fef93540f0b86df2e93ced910f01dc54a76a5425d2f5446d587df6ad20d8976fc4be7e9ce3511eb4b00ee |
C:\Log\RDPConf.exe
| MD5 | 1e4537b75cad6288f68d595d9c9b13c1 |
| SHA1 | 9cc14ce3a3982376f454bd3833f4774d955d9bd3 |
| SHA256 | 8b266c0945d003f5d0b2d6f59239e9dffb41dbccd1659d2c05bbf472ba1f0ccf |
| SHA512 | 8caa7b17ed4ec760d4e665ec8ffb543fb3a2287dbe4ba4b08daf9a46819ec662e4e3105e0f9d7ad94edb2d477551d2ca0ebce870d489a0713f8676978b0cc3ec |
C:\Log\RDPWInst.exe
| MD5 | ce6a1d8fe9d16f4c4e2f41ef6cd3ad9b |
| SHA1 | 87a89f73faf22dbb6af94f0edbf4cf484673f572 |
| SHA256 | cb55b418cd219bcea3cb9dbfca4262d92affaabf34623e6f1e3ce8581c6cd5b2 |
| SHA512 | cea5f06d08bf5ee76aef21f05a1857dbfb240c02aff877df7a33b42d59571b4fc6358f0176e3e8ef53c8e06249e65c4e700a18e547c3071413591e4542ff0e9d |
C:\Log\install.bat
| MD5 | cce1e07cf18ea79cc9e87922e9f5609a |
| SHA1 | 6800e3e5d42fc0e1d5834214df1958112066a626 |
| SHA256 | 7afa7437b35cc7961ef51c3672e709f0aaf63b87badf1a884a6713e5749a9292 |
| SHA512 | b770d184fb371362fd6ba39e9c2462bb7fa8c7ffa4b1ffb55759fc37e5f06fb0f853e918dad5784d49cc33394c4f6295f5dda99f27304a5f0b34e9eb726fedf6 |
C:\Log\update.bat
| MD5 | 29ca1c35075247b035af75c11cab78f1 |
| SHA1 | 4f670d13d7532462f4b1e66d085ef8b9f065ff88 |
| SHA256 | 353f2dc17a4e80564caa175f7170dbedc1b40f704444520ae671f78a5d1f2b6d |
| SHA512 | 3970adc72020194f93935fad2c17790170da7f0f4444e2bfc402f9924fdceaa4b6443e9871c3b8cda24089b84cbdcf185f0d31238c0be93c58e280cf36ab71a7 |
C:\Log\Windows\hiscomponent\process.vbs
| MD5 | 7528d4ce3012284acc761d14650abc50 |
| SHA1 | cacddad01db6f784a1ee2c6163c5b801cd4b9f7f |
| SHA256 | e5dbdd95312fd15449273bc676dd6e9b1c0cd647689ff0ca558f70bc9b40ffb1 |
| SHA512 | b6ed0a28414b18fa04c9a92e3c36d7b4ec27895213e8fc4d51b41a3a80f9b5ea6261d1d5adf502ca619c7a4da325da29439fe25a11affe972486ebfff53aaa16 |
C:\Log\Windows\hiscomponent\process.bat
| MD5 | 0d38ea8f1d6989f6dfd08fa5188d95c6 |
| SHA1 | 8f4353a1054227b9c17489a379098a101156378a |
| SHA256 | 2d8f9fdfcfdd3f86d0a47edb73e8b14183534d3f670e537cc25b0f8432b34ee8 |
| SHA512 | 02b4ca8d66cbe1d0c6212ac810592d1e3a653db2ad5ea1d1c46e237b84ab4f4ac6824dcdf6918d76eab68593d8f0e791890a7c3958d731d79b11288d8b18b8dd |
\Windows64\svchost.exe
| MD5 | ba33d912e92e9640696163dca2dcd86e |
| SHA1 | c778da5fbbb87e85fc0ec41f9bff34a5212ebaf6 |
| SHA256 | 658d234e2d9115a1f510b628ff9f000318918037cf49d80d47ebea9dded3c218 |
| SHA512 | 2d590a07dc5e28cd3e227fc9276dbea60e8540d850464df79efa18af3e8cfe4817cc0846637cd1e7c566a4fabb771635030cdcc13722c77bc54c89981904747e |
\Windows64\svchost.exe
| MD5 | ba33d912e92e9640696163dca2dcd86e |
| SHA1 | c778da5fbbb87e85fc0ec41f9bff34a5212ebaf6 |
| SHA256 | 658d234e2d9115a1f510b628ff9f000318918037cf49d80d47ebea9dded3c218 |
| SHA512 | 2d590a07dc5e28cd3e227fc9276dbea60e8540d850464df79efa18af3e8cfe4817cc0846637cd1e7c566a4fabb771635030cdcc13722c77bc54c89981904747e |
C:\Windows64\svchost.exe
| MD5 | ba33d912e92e9640696163dca2dcd86e |
| SHA1 | c778da5fbbb87e85fc0ec41f9bff34a5212ebaf6 |
| SHA256 | 658d234e2d9115a1f510b628ff9f000318918037cf49d80d47ebea9dded3c218 |
| SHA512 | 2d590a07dc5e28cd3e227fc9276dbea60e8540d850464df79efa18af3e8cfe4817cc0846637cd1e7c566a4fabb771635030cdcc13722c77bc54c89981904747e |
C:\Windows64\install.bat
| MD5 | cce1e07cf18ea79cc9e87922e9f5609a |
| SHA1 | 6800e3e5d42fc0e1d5834214df1958112066a626 |
| SHA256 | 7afa7437b35cc7961ef51c3672e709f0aaf63b87badf1a884a6713e5749a9292 |
| SHA512 | b770d184fb371362fd6ba39e9c2462bb7fa8c7ffa4b1ffb55759fc37e5f06fb0f853e918dad5784d49cc33394c4f6295f5dda99f27304a5f0b34e9eb726fedf6 |
C:\Windows64\process.bat
| MD5 | 0d38ea8f1d6989f6dfd08fa5188d95c6 |
| SHA1 | 8f4353a1054227b9c17489a379098a101156378a |
| SHA256 | 2d8f9fdfcfdd3f86d0a47edb73e8b14183534d3f670e537cc25b0f8432b34ee8 |
| SHA512 | 02b4ca8d66cbe1d0c6212ac810592d1e3a653db2ad5ea1d1c46e237b84ab4f4ac6824dcdf6918d76eab68593d8f0e791890a7c3958d731d79b11288d8b18b8dd |
C:\Windows64\process.vbs
| MD5 | 7528d4ce3012284acc761d14650abc50 |
| SHA1 | cacddad01db6f784a1ee2c6163c5b801cd4b9f7f |
| SHA256 | e5dbdd95312fd15449273bc676dd6e9b1c0cd647689ff0ca558f70bc9b40ffb1 |
| SHA512 | b6ed0a28414b18fa04c9a92e3c36d7b4ec27895213e8fc4d51b41a3a80f9b5ea6261d1d5adf502ca619c7a4da325da29439fe25a11affe972486ebfff53aaa16 |
C:\Windows64\RDPCheck.exe
| MD5 | 8f82226b2f24d470c02f6664f67f23f7 |
| SHA1 | 66f40824b406c748846ef11e6b022958f8cbe48b |
| SHA256 | 5603338a1f8dbb46efb8e0869db3491d5db92f362711d6680f91ecc5d18bfadf |
| SHA512 | 04bc1f785bddf264699fb6bf6fce9652af8c95872f8fef93540f0b86df2e93ced910f01dc54a76a5425d2f5446d587df6ad20d8976fc4be7e9ce3511eb4b00ee |
C:\Windows64\RDPConf.exe
| MD5 | 1e4537b75cad6288f68d595d9c9b13c1 |
| SHA1 | 9cc14ce3a3982376f454bd3833f4774d955d9bd3 |
| SHA256 | 8b266c0945d003f5d0b2d6f59239e9dffb41dbccd1659d2c05bbf472ba1f0ccf |
| SHA512 | 8caa7b17ed4ec760d4e665ec8ffb543fb3a2287dbe4ba4b08daf9a46819ec662e4e3105e0f9d7ad94edb2d477551d2ca0ebce870d489a0713f8676978b0cc3ec |
C:\Windows64\RDPWInst.exe
| MD5 | ce6a1d8fe9d16f4c4e2f41ef6cd3ad9b |
| SHA1 | 87a89f73faf22dbb6af94f0edbf4cf484673f572 |
| SHA256 | cb55b418cd219bcea3cb9dbfca4262d92affaabf34623e6f1e3ce8581c6cd5b2 |
| SHA512 | cea5f06d08bf5ee76aef21f05a1857dbfb240c02aff877df7a33b42d59571b4fc6358f0176e3e8ef53c8e06249e65c4e700a18e547c3071413591e4542ff0e9d |
C:\Windows64\svchost.exe
| MD5 | ba33d912e92e9640696163dca2dcd86e |
| SHA1 | c778da5fbbb87e85fc0ec41f9bff34a5212ebaf6 |
| SHA256 | 658d234e2d9115a1f510b628ff9f000318918037cf49d80d47ebea9dded3c218 |
| SHA512 | 2d590a07dc5e28cd3e227fc9276dbea60e8540d850464df79efa18af3e8cfe4817cc0846637cd1e7c566a4fabb771635030cdcc13722c77bc54c89981904747e |
C:\Windows64\update.bat
| MD5 | 29ca1c35075247b035af75c11cab78f1 |
| SHA1 | 4f670d13d7532462f4b1e66d085ef8b9f065ff88 |
| SHA256 | 353f2dc17a4e80564caa175f7170dbedc1b40f704444520ae671f78a5d1f2b6d |
| SHA512 | 3970adc72020194f93935fad2c17790170da7f0f4444e2bfc402f9924fdceaa4b6443e9871c3b8cda24089b84cbdcf185f0d31238c0be93c58e280cf36ab71a7 |
C:\Windows64\vp8encoder.dll
| MD5 | 6298c0af3d1d563834a218a9cc9f54bd |
| SHA1 | 0185cd591e454ed072e5a5077b25c612f6849dc9 |
| SHA256 | 81af82019d9f45a697a8ca1788f2c5c0205af9892efd94879dedf4bc06db4172 |
| SHA512 | 389d89053689537cdb582c0e8a7951a84549f0c36484db4346c31bdbe7cb93141f6a354069eb13e550297dc8ec35cd6899746e0c16abc876a0fe542cc450fffe |
C:\Log\uninstall.bat
| MD5 | eccb8a01d0427ef29c2380d7dda399f3 |
| SHA1 | 302601e99d6b02e2e84a0de5c0dce3df139cba31 |
| SHA256 | 083cd340c800cc021d4a59388680ce0e7ab0f8b998e67def6a507070e7fa01b7 |
| SHA512 | 78d51882fe04cb64f9f6a82b604ef20e4324e5bc37701747fa55b3c153baa5942774daf737ff204f9e75e81a745ed95cc7ec115da91b9e27e646ed41d3f103f9 |
Analysis: behavioral2
Detonation Overview
Submitted
2022-02-13 09:23
Reported
2022-02-13 09:26
Platform
win10v2004-en-20220112
Max time kernel
171s
Max time network
179s
Command Line
Signatures
RMS
ACProtect 1.3x - 1.4x DLL software
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Windows\build\data.exe | N/A |
| N/A | N/A | C:\Windows64\svchost.exe | N/A |
Modifies Windows Firewall
Sets file to hidden
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\e380cf2a2bc3a80a0f6cdd2db06978fa30bdf535afbcda1e1b4434dd68fd8ebf.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\Windows\build\data.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation | C:\Windows\SysWOW64\WScript.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation | C:\Windows\SysWOW64\wscript.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation | C:\Windows\SysWOW64\WScript.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Services = "C:Windows64\\svchost.exe" | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run | C:\Windows\SysWOW64\reg.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\4w5tb68h7t987093f4trq893f4rw89etw.txt | C:\Windows\SysWOW64\wscript.exe | N/A |
| File opened for modification | C:\Windows\Logs\CBS\CBS.log | C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe | N/A |
| File opened for modification | C:\Windows\WinSxS\pending.xml | C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe | N/A |
| File opened for modification | C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat | C:\Windows\System32\svchost.exe | N/A |
Enumerates physical storage devices
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Enumerates processes with tasklist
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132893943279820880" | C:\Windows\System32\svchost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "1.666677" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4316" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" | C:\Windows\System32\svchost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config | C:\Windows\System32\svchost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" | C:\Windows\System32\svchost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.281350" | C:\Windows\System32\svchost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4144" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" | C:\Windows\System32\svchost.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\Windows\build\data.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings | C:\Windows\SysWOW64\cmd.exe | N/A |
Runs .reg file with regedit
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regedit.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows64\svchost.exe | N/A |
| N/A | N/A | C:\Windows64\svchost.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows64\svchost.exe | N/A |
Suspicious use of WriteProcessMemory
Views/modifies file attributes
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\e380cf2a2bc3a80a0f6cdd2db06978fa30bdf535afbcda1e1b4434dd68fd8ebf.exe
"C:\Users\Admin\AppData\Local\Temp\e380cf2a2bc3a80a0f6cdd2db06978fa30bdf535afbcda1e1b4434dd68fd8ebf.exe"
C:\Users\Admin\AppData\Local\Temp\Windows\build\data.exe
"C:\Users\Admin\AppData\Local\Temp\Windows\build\data.exe" -p284579G45398T745398T
C:\Windows\SysWOW64\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Log\install.vbs"
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\wscript.exe" "C:\Log\install.vbs" Run
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\wscript.exe" "C:\Log\install.vbs" Run
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\wscript.exe" "C:\Log\install.vbs" Run
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\wscript.exe" "C:\Log\install.vbs" Run
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Log\Windows\hiscomponent\install.bat" "
C:\Windows\SysWOW64\attrib.exe
attrib +s +h "C:\Log"
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall set allprofiles state off
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
C:\Windows\SysWOW64\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Log\Windows\hiscomponent\msg.vbs"
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im rutserv.exe
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im rfusclient.exe
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im systemc.exe
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im drivemanag.exe
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im dumprep.exe
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im winlogs.exe
C:\Windows\SysWOW64\reg.exe
reg delete "HKLM\SYSTEM\Remote Manipulator System" /f
C:\Windows\SysWOW64\reg.exe
reg delete "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\DEVICEMAP" /f
C:\Windows\SysWOW64\reg.exe
reg delete "HKEY_CURRENT_USER\Software\TektonIT\Remote Manipulator System" /f
C:\Windows\SysWOW64\regedit.exe
regedit /s "Windows\hiscomponent\regedit.reg"
C:\Windows\SysWOW64\timeout.exe
timeout 1
C:\Windows64\svchost.exe
svchost.exe
C:\Windows\SysWOW64\reg.exe
Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Services" /t REG_SZ /d "C:Windows64\svchost.exe" /f
C:\Windows\SysWOW64\attrib.exe
attrib +s +h "C:\Windows64\*.*"
C:\Windows\SysWOW64\attrib.exe
attrib +s +h "C:\Windows64"
C:\Windows\SysWOW64\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Windows64\process.vbs"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Windows64\process.bat" "
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\find.exe
find "svchost.exe"
Network
| Country | Destination | Domain | Proto |
| NL | 92.123.77.56:80 | tcp | |
| NL | 67.26.105.254:80 | tcp | |
| US | 8.8.8.8:53 | geo.prod.do.dsp.mp.microsoft.com | udp |
| US | 52.184.213.187:443 | geo.prod.do.dsp.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | kv801.prod.do.dsp.mp.microsoft.com | udp |
| NL | 184.29.205.60:443 | kv801.prod.do.dsp.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | kv801.prod.do.dsp.mp.microsoft.com | udp |
| NL | 184.29.205.60:443 | kv801.prod.do.dsp.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | cp801.prod.do.dsp.mp.microsoft.com | udp |
| NL | 184.29.205.60:443 | cp801.prod.do.dsp.mp.microsoft.com | tcp |
| NL | 184.29.205.60:443 | cp801.prod.do.dsp.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | rmansys.ru | udp |
| RU | 31.31.198.18:80 | rmansys.ru | tcp |
| RU | 31.31.198.18:80 | rmansys.ru | tcp |
| US | 8.8.8.8:53 | rms-server.tektonit.ru | udp |
| RU | 95.213.205.83:5655 | rms-server.tektonit.ru | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\Windows\build\data.exe
| MD5 | dce7c20b5d07d242ac7a983a975eedbd |
| SHA1 | ee4285ec8b823aa36b634a26ae64b2c3665317d3 |
| SHA256 | 3edeea2573d126f89ced62f5473a68c4f1298fc2408ae8e0402209f45ad100d1 |
| SHA512 | a1b959406aefdba44dae69103006af61181da4698c138d3aff8768580812e7a2516c792185033602c6d8fbb3b4ab667751ac60a2435676e5b36af6d5cc3e1dcf |
C:\Users\Admin\AppData\Local\Temp\Windows\build\data.exe
| MD5 | dce7c20b5d07d242ac7a983a975eedbd |
| SHA1 | ee4285ec8b823aa36b634a26ae64b2c3665317d3 |
| SHA256 | 3edeea2573d126f89ced62f5473a68c4f1298fc2408ae8e0402209f45ad100d1 |
| SHA512 | a1b959406aefdba44dae69103006af61181da4698c138d3aff8768580812e7a2516c792185033602c6d8fbb3b4ab667751ac60a2435676e5b36af6d5cc3e1dcf |
C:\Log\install.vbs
| MD5 | 6cab561732bb524984d25e29b8e93414 |
| SHA1 | 73adabe3f5191ea01d8026b14285f0330f97fccc |
| SHA256 | 81d2721f8da28ab12ab7e6572dbfe39c78f1eb24b09ccd9ae816dbcb9f398e60 |
| SHA512 | 7f001fcdf73056fb688c62be0f68b1b1c54e3f0aff05b8e03e0947716e2cd771fa9e12314cb3b6efd9f971c889405d6eccb83a6ee48280e135fc6e14e216e45d |
C:\Log\Windows\hiscomponent\install.bat
| MD5 | 59f603335fcb2c257bdf97d89e3770e3 |
| SHA1 | cd1e2b97d6459977f08051fffd54c1f3eb3c33e6 |
| SHA256 | ea130cb436acfdddc9f65775ac282416c7da79c897d4e32ae5cb424b79689000 |
| SHA512 | 5ad8759c882f85b40375af2746d966ec5fb7c032ab53605bb7d592e9831698509dc1360e42f86bc25d66d9626f17d7ec5ae0c47ff3b34799381b777f32780fa6 |
C:\Log\Windows\hiscomponent\msg.vbs
| MD5 | e51be1b21a598a28e372bffe499e9dfb |
| SHA1 | b525d448d813f0e6403992d83587d7d2e424a182 |
| SHA256 | 9504953239ed502a2b14cffebe05a6e938add0e226da751178484962924d2a38 |
| SHA512 | 1babc7cab573b81097f18edb190c7228be0f583726c54ed50aca45b2ab0c0b6179e0b78b577f54789e6b564af840a02fbdc02eb84274dae70bb43cb3c0cdbd78 |
C:\Log\Windows\hiscomponent\regedit.reg
| MD5 | 1dce30c8d875d6c66c815fd4a7b0bc13 |
| SHA1 | 33d3d1cdbd723c84ea94f953728d0e355aba9921 |
| SHA256 | ecbb060eea93bcbd7779786b154172f226101b7c5fdf314bb42b84b352119854 |
| SHA512 | a8e4d0c889c68074ae21edf2d6eceddf4496c8949a72b1167f14430120b819b7ba5d4edadac448b1c676c0bb341c66e8db91b8d8481137284dc94a8cd8e059b1 |
C:\Log\rutserv.exe
| MD5 | ba33d912e92e9640696163dca2dcd86e |
| SHA1 | c778da5fbbb87e85fc0ec41f9bff34a5212ebaf6 |
| SHA256 | 658d234e2d9115a1f510b628ff9f000318918037cf49d80d47ebea9dded3c218 |
| SHA512 | 2d590a07dc5e28cd3e227fc9276dbea60e8540d850464df79efa18af3e8cfe4817cc0846637cd1e7c566a4fabb771635030cdcc13722c77bc54c89981904747e |
C:\Log\RDPWInst.exe
| MD5 | ce6a1d8fe9d16f4c4e2f41ef6cd3ad9b |
| SHA1 | 87a89f73faf22dbb6af94f0edbf4cf484673f572 |
| SHA256 | cb55b418cd219bcea3cb9dbfca4262d92affaabf34623e6f1e3ce8581c6cd5b2 |
| SHA512 | cea5f06d08bf5ee76aef21f05a1857dbfb240c02aff877df7a33b42d59571b4fc6358f0176e3e8ef53c8e06249e65c4e700a18e547c3071413591e4542ff0e9d |
C:\Log\RDPConf.exe
| MD5 | 1e4537b75cad6288f68d595d9c9b13c1 |
| SHA1 | 9cc14ce3a3982376f454bd3833f4774d955d9bd3 |
| SHA256 | 8b266c0945d003f5d0b2d6f59239e9dffb41dbccd1659d2c05bbf472ba1f0ccf |
| SHA512 | 8caa7b17ed4ec760d4e665ec8ffb543fb3a2287dbe4ba4b08daf9a46819ec662e4e3105e0f9d7ad94edb2d477551d2ca0ebce870d489a0713f8676978b0cc3ec |
C:\Log\RDPCheck.exe
| MD5 | 8f82226b2f24d470c02f6664f67f23f7 |
| SHA1 | 66f40824b406c748846ef11e6b022958f8cbe48b |
| SHA256 | 5603338a1f8dbb46efb8e0869db3491d5db92f362711d6680f91ecc5d18bfadf |
| SHA512 | 04bc1f785bddf264699fb6bf6fce9652af8c95872f8fef93540f0b86df2e93ced910f01dc54a76a5425d2f5446d587df6ad20d8976fc4be7e9ce3511eb4b00ee |
C:\Log\Windows\hiscomponent\vp8encoder.dll
| MD5 | 6298c0af3d1d563834a218a9cc9f54bd |
| SHA1 | 0185cd591e454ed072e5a5077b25c612f6849dc9 |
| SHA256 | 81af82019d9f45a697a8ca1788f2c5c0205af9892efd94879dedf4bc06db4172 |
| SHA512 | 389d89053689537cdb582c0e8a7951a84549f0c36484db4346c31bdbe7cb93141f6a354069eb13e550297dc8ec35cd6899746e0c16abc876a0fe542cc450fffe |
C:\Log\update.bat
| MD5 | 29ca1c35075247b035af75c11cab78f1 |
| SHA1 | 4f670d13d7532462f4b1e66d085ef8b9f065ff88 |
| SHA256 | 353f2dc17a4e80564caa175f7170dbedc1b40f704444520ae671f78a5d1f2b6d |
| SHA512 | 3970adc72020194f93935fad2c17790170da7f0f4444e2bfc402f9924fdceaa4b6443e9871c3b8cda24089b84cbdcf185f0d31238c0be93c58e280cf36ab71a7 |
C:\Log\install.bat
| MD5 | cce1e07cf18ea79cc9e87922e9f5609a |
| SHA1 | 6800e3e5d42fc0e1d5834214df1958112066a626 |
| SHA256 | 7afa7437b35cc7961ef51c3672e709f0aaf63b87badf1a884a6713e5749a9292 |
| SHA512 | b770d184fb371362fd6ba39e9c2462bb7fa8c7ffa4b1ffb55759fc37e5f06fb0f853e918dad5784d49cc33394c4f6295f5dda99f27304a5f0b34e9eb726fedf6 |
C:\Log\Windows\hiscomponent\process.vbs
| MD5 | 7528d4ce3012284acc761d14650abc50 |
| SHA1 | cacddad01db6f784a1ee2c6163c5b801cd4b9f7f |
| SHA256 | e5dbdd95312fd15449273bc676dd6e9b1c0cd647689ff0ca558f70bc9b40ffb1 |
| SHA512 | b6ed0a28414b18fa04c9a92e3c36d7b4ec27895213e8fc4d51b41a3a80f9b5ea6261d1d5adf502ca619c7a4da325da29439fe25a11affe972486ebfff53aaa16 |
C:\Log\Windows\hiscomponent\process.bat
| MD5 | 0d38ea8f1d6989f6dfd08fa5188d95c6 |
| SHA1 | 8f4353a1054227b9c17489a379098a101156378a |
| SHA256 | 2d8f9fdfcfdd3f86d0a47edb73e8b14183534d3f670e537cc25b0f8432b34ee8 |
| SHA512 | 02b4ca8d66cbe1d0c6212ac810592d1e3a653db2ad5ea1d1c46e237b84ab4f4ac6824dcdf6918d76eab68593d8f0e791890a7c3958d731d79b11288d8b18b8dd |
C:\Windows64\svchost.exe
| MD5 | ba33d912e92e9640696163dca2dcd86e |
| SHA1 | c778da5fbbb87e85fc0ec41f9bff34a5212ebaf6 |
| SHA256 | 658d234e2d9115a1f510b628ff9f000318918037cf49d80d47ebea9dded3c218 |
| SHA512 | 2d590a07dc5e28cd3e227fc9276dbea60e8540d850464df79efa18af3e8cfe4817cc0846637cd1e7c566a4fabb771635030cdcc13722c77bc54c89981904747e |
C:\Windows64\svchost.exe
| MD5 | ba33d912e92e9640696163dca2dcd86e |
| SHA1 | c778da5fbbb87e85fc0ec41f9bff34a5212ebaf6 |
| SHA256 | 658d234e2d9115a1f510b628ff9f000318918037cf49d80d47ebea9dded3c218 |
| SHA512 | 2d590a07dc5e28cd3e227fc9276dbea60e8540d850464df79efa18af3e8cfe4817cc0846637cd1e7c566a4fabb771635030cdcc13722c77bc54c89981904747e |
C:\Windows64\install.bat
| MD5 | cce1e07cf18ea79cc9e87922e9f5609a |
| SHA1 | 6800e3e5d42fc0e1d5834214df1958112066a626 |
| SHA256 | 7afa7437b35cc7961ef51c3672e709f0aaf63b87badf1a884a6713e5749a9292 |
| SHA512 | b770d184fb371362fd6ba39e9c2462bb7fa8c7ffa4b1ffb55759fc37e5f06fb0f853e918dad5784d49cc33394c4f6295f5dda99f27304a5f0b34e9eb726fedf6 |
C:\Windows64\process.bat
| MD5 | 0d38ea8f1d6989f6dfd08fa5188d95c6 |
| SHA1 | 8f4353a1054227b9c17489a379098a101156378a |
| SHA256 | 2d8f9fdfcfdd3f86d0a47edb73e8b14183534d3f670e537cc25b0f8432b34ee8 |
| SHA512 | 02b4ca8d66cbe1d0c6212ac810592d1e3a653db2ad5ea1d1c46e237b84ab4f4ac6824dcdf6918d76eab68593d8f0e791890a7c3958d731d79b11288d8b18b8dd |
C:\Windows64\vp8encoder.dll
| MD5 | 6298c0af3d1d563834a218a9cc9f54bd |
| SHA1 | 0185cd591e454ed072e5a5077b25c612f6849dc9 |
| SHA256 | 81af82019d9f45a697a8ca1788f2c5c0205af9892efd94879dedf4bc06db4172 |
| SHA512 | 389d89053689537cdb582c0e8a7951a84549f0c36484db4346c31bdbe7cb93141f6a354069eb13e550297dc8ec35cd6899746e0c16abc876a0fe542cc450fffe |
C:\Windows64\update.bat
| MD5 | 29ca1c35075247b035af75c11cab78f1 |
| SHA1 | 4f670d13d7532462f4b1e66d085ef8b9f065ff88 |
| SHA256 | 353f2dc17a4e80564caa175f7170dbedc1b40f704444520ae671f78a5d1f2b6d |
| SHA512 | 3970adc72020194f93935fad2c17790170da7f0f4444e2bfc402f9924fdceaa4b6443e9871c3b8cda24089b84cbdcf185f0d31238c0be93c58e280cf36ab71a7 |
C:\Windows64\RDPWInst.exe
| MD5 | ce6a1d8fe9d16f4c4e2f41ef6cd3ad9b |
| SHA1 | 87a89f73faf22dbb6af94f0edbf4cf484673f572 |
| SHA256 | cb55b418cd219bcea3cb9dbfca4262d92affaabf34623e6f1e3ce8581c6cd5b2 |
| SHA512 | cea5f06d08bf5ee76aef21f05a1857dbfb240c02aff877df7a33b42d59571b4fc6358f0176e3e8ef53c8e06249e65c4e700a18e547c3071413591e4542ff0e9d |
C:\Windows64\RDPConf.exe
| MD5 | 1e4537b75cad6288f68d595d9c9b13c1 |
| SHA1 | 9cc14ce3a3982376f454bd3833f4774d955d9bd3 |
| SHA256 | 8b266c0945d003f5d0b2d6f59239e9dffb41dbccd1659d2c05bbf472ba1f0ccf |
| SHA512 | 8caa7b17ed4ec760d4e665ec8ffb543fb3a2287dbe4ba4b08daf9a46819ec662e4e3105e0f9d7ad94edb2d477551d2ca0ebce870d489a0713f8676978b0cc3ec |
C:\Windows64\RDPCheck.exe
| MD5 | 8f82226b2f24d470c02f6664f67f23f7 |
| SHA1 | 66f40824b406c748846ef11e6b022958f8cbe48b |
| SHA256 | 5603338a1f8dbb46efb8e0869db3491d5db92f362711d6680f91ecc5d18bfadf |
| SHA512 | 04bc1f785bddf264699fb6bf6fce9652af8c95872f8fef93540f0b86df2e93ced910f01dc54a76a5425d2f5446d587df6ad20d8976fc4be7e9ce3511eb4b00ee |
C:\Windows64\process.vbs
| MD5 | 7528d4ce3012284acc761d14650abc50 |
| SHA1 | cacddad01db6f784a1ee2c6163c5b801cd4b9f7f |
| SHA256 | e5dbdd95312fd15449273bc676dd6e9b1c0cd647689ff0ca558f70bc9b40ffb1 |
| SHA512 | b6ed0a28414b18fa04c9a92e3c36d7b4ec27895213e8fc4d51b41a3a80f9b5ea6261d1d5adf502ca619c7a4da325da29439fe25a11affe972486ebfff53aaa16 |
C:\Log\uninstall.bat
| MD5 | eccb8a01d0427ef29c2380d7dda399f3 |
| SHA1 | 302601e99d6b02e2e84a0de5c0dce3df139cba31 |
| SHA256 | 083cd340c800cc021d4a59388680ce0e7ab0f8b998e67def6a507070e7fa01b7 |
| SHA512 | 78d51882fe04cb64f9f6a82b604ef20e4324e5bc37701747fa55b3c153baa5942774daf737ff204f9e75e81a745ed95cc7ec115da91b9e27e646ed41d3f103f9 |