Overview
overview
10Static
static
8install.bat
windows7_x64
10install.bat
windows10-2004_x64
10install.vbs
windows7_x64
10install.vbs
windows10-2004_x64
10mailsend.exe
windows7_x64
1mailsend.exe
windows10-2004_x64
1rfusclient.exe
windows7_x64
1rfusclient.exe
windows10-2004_x64
1rutserv.exe
windows7_x64
10rutserv.exe
windows10-2004_x64
10vp8decoder.dll
windows7_x64
1vp8decoder.dll
windows10-2004_x64
1vp8encoder.dll
windows7_x64
1vp8encoder.dll
windows10-2004_x64
1Analysis
-
max time kernel
4294148s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
17-03-2022 01:27
Static task
static1
Behavioral task
behavioral1
Sample
install.bat
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
install.bat
Resource
win10v2004-20220310-en
Behavioral task
behavioral3
Sample
install.vbs
Resource
win7-20220311-en
Behavioral task
behavioral4
Sample
install.vbs
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
mailsend.exe
Resource
win7-20220310-en
Behavioral task
behavioral6
Sample
mailsend.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
rfusclient.exe
Resource
win7-20220310-en
Behavioral task
behavioral8
Sample
rfusclient.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral9
Sample
rutserv.exe
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
rutserv.exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral11
Sample
vp8decoder.dll
Resource
win7-20220311-en
Behavioral task
behavioral12
Sample
vp8decoder.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral13
Sample
vp8encoder.dll
Resource
win7-20220311-en
Behavioral task
behavioral14
Sample
vp8encoder.dll
Resource
win10v2004-20220310-en
General
-
Target
install.bat
-
Size
1KB
-
MD5
125b0e626d1babc93c042cf84dd33c05
-
SHA1
d5f01d546be84337306306f71e6bc612442481d8
-
SHA256
8df26877285b0fb8dd52db09da874c24c02e9f1a4d6794752d6ac556e4f927b3
-
SHA512
e6213ef36cc70cc257b671f9dbf590c96e5bcd02196b1de90b2b7be019035f2a859c98003be963983a0f86cf6695aed1db3a3e26b22c1f49bca79d1af9cc6ca5
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\System attrib.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Delays execution with timeout.exe 2 IoCs
pid Process 1816 timeout.exe 528 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 772 taskkill.exe 1332 taskkill.exe 1936 taskkill.exe 1916 taskkill.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1952 regedit.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 3 IoCs
pid Process 1744 rutserv.exe 1280 rutserv.exe 1224 rutserv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1744 rutserv.exe 1744 rutserv.exe 1744 rutserv.exe 1744 rutserv.exe 1744 rutserv.exe 1744 rutserv.exe 1280 rutserv.exe 1280 rutserv.exe 1280 rutserv.exe 1280 rutserv.exe 1224 rutserv.exe 1224 rutserv.exe 1224 rutserv.exe 1224 rutserv.exe 1688 rutserv.exe 1688 rutserv.exe 1688 rutserv.exe 1688 rutserv.exe 1688 rutserv.exe 1688 rutserv.exe 1660 rfusclient.exe 1548 rutserv.exe 1548 rutserv.exe 1548 rutserv.exe 1548 rutserv.exe 1548 rutserv.exe 1548 rutserv.exe 1664 rfusclient.exe 1504 rutserv.exe 1504 rutserv.exe 1504 rutserv.exe 1504 rutserv.exe 1504 rutserv.exe 1504 rutserv.exe 2000 rfusclient.exe 1800 rutserv.exe 1800 rutserv.exe 1800 rutserv.exe 1800 rutserv.exe 1800 rutserv.exe 1800 rutserv.exe 1620 rfusclient.exe 1072 rutserv.exe 1072 rutserv.exe 1072 rutserv.exe 1072 rutserv.exe 1072 rutserv.exe 1072 rutserv.exe 1380 rfusclient.exe 1888 rutserv.exe 1888 rutserv.exe 1888 rutserv.exe 1888 rutserv.exe 1888 rutserv.exe 1888 rutserv.exe 1476 rfusclient.exe 972 rutserv.exe 972 rutserv.exe 972 rutserv.exe 972 rutserv.exe 972 rutserv.exe 972 rutserv.exe 1572 rfusclient.exe 928 rutserv.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 1916 taskkill.exe Token: SeDebugPrivilege 772 taskkill.exe Token: SeDebugPrivilege 1332 taskkill.exe Token: SeDebugPrivilege 1936 taskkill.exe Token: SeDebugPrivilege 1744 rutserv.exe Token: SeDebugPrivilege 1224 rutserv.exe Token: SeTakeOwnershipPrivilege 1688 rutserv.exe Token: SeTcbPrivilege 1688 rutserv.exe Token: SeTcbPrivilege 1688 rutserv.exe Token: SeTakeOwnershipPrivilege 1548 rutserv.exe Token: SeTcbPrivilege 1548 rutserv.exe Token: SeTcbPrivilege 1548 rutserv.exe Token: SeTakeOwnershipPrivilege 1504 rutserv.exe Token: SeTcbPrivilege 1504 rutserv.exe Token: SeTcbPrivilege 1504 rutserv.exe Token: SeTakeOwnershipPrivilege 1800 rutserv.exe Token: SeTcbPrivilege 1800 rutserv.exe Token: SeTcbPrivilege 1800 rutserv.exe Token: SeTakeOwnershipPrivilege 1072 rutserv.exe Token: SeTcbPrivilege 1072 rutserv.exe Token: SeTcbPrivilege 1072 rutserv.exe Token: SeTakeOwnershipPrivilege 1888 rutserv.exe Token: SeTcbPrivilege 1888 rutserv.exe Token: SeTcbPrivilege 1888 rutserv.exe Token: SeTakeOwnershipPrivilege 972 rutserv.exe Token: SeTcbPrivilege 972 rutserv.exe Token: SeTcbPrivilege 972 rutserv.exe Token: SeTakeOwnershipPrivilege 928 rutserv.exe Token: SeTcbPrivilege 928 rutserv.exe Token: SeTcbPrivilege 928 rutserv.exe Token: SeTakeOwnershipPrivilege 1268 rutserv.exe Token: SeTcbPrivilege 1268 rutserv.exe Token: SeTcbPrivilege 1268 rutserv.exe Token: SeTakeOwnershipPrivilege 880 rutserv.exe Token: SeTcbPrivilege 880 rutserv.exe Token: SeTcbPrivilege 880 rutserv.exe Token: SeTakeOwnershipPrivilege 952 rutserv.exe Token: SeTcbPrivilege 952 rutserv.exe Token: SeTcbPrivilege 952 rutserv.exe Token: SeTakeOwnershipPrivilege 1464 rutserv.exe Token: SeTcbPrivilege 1464 rutserv.exe Token: SeTcbPrivilege 1464 rutserv.exe Token: SeTakeOwnershipPrivilege 756 rutserv.exe Token: SeTcbPrivilege 756 rutserv.exe Token: SeTcbPrivilege 756 rutserv.exe Token: SeTakeOwnershipPrivilege 472 rutserv.exe Token: SeTcbPrivilege 472 rutserv.exe Token: SeTcbPrivilege 472 rutserv.exe Token: SeTakeOwnershipPrivilege 1400 rutserv.exe Token: SeTcbPrivilege 1400 rutserv.exe Token: SeTcbPrivilege 1400 rutserv.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1744 rutserv.exe 1744 rutserv.exe 1744 rutserv.exe 1744 rutserv.exe 1280 rutserv.exe 1280 rutserv.exe 1280 rutserv.exe 1280 rutserv.exe 1224 rutserv.exe 1224 rutserv.exe 1224 rutserv.exe 1224 rutserv.exe 1688 rutserv.exe 1688 rutserv.exe 1688 rutserv.exe 1688 rutserv.exe 1548 rutserv.exe 1548 rutserv.exe 1548 rutserv.exe 1548 rutserv.exe 1504 rutserv.exe 1504 rutserv.exe 1504 rutserv.exe 1504 rutserv.exe 1800 rutserv.exe 1800 rutserv.exe 1800 rutserv.exe 1800 rutserv.exe 1072 rutserv.exe 1072 rutserv.exe 1072 rutserv.exe 1072 rutserv.exe 1888 rutserv.exe 1888 rutserv.exe 1888 rutserv.exe 1888 rutserv.exe 972 rutserv.exe 972 rutserv.exe 972 rutserv.exe 972 rutserv.exe 928 rutserv.exe 928 rutserv.exe 928 rutserv.exe 928 rutserv.exe 1268 rutserv.exe 1268 rutserv.exe 1268 rutserv.exe 1268 rutserv.exe 880 rutserv.exe 880 rutserv.exe 880 rutserv.exe 880 rutserv.exe 952 rutserv.exe 952 rutserv.exe 952 rutserv.exe 952 rutserv.exe 1464 rutserv.exe 1464 rutserv.exe 1464 rutserv.exe 1464 rutserv.exe 756 rutserv.exe 756 rutserv.exe 756 rutserv.exe 756 rutserv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1896 2032 cmd.exe 30 PID 2032 wrote to memory of 1896 2032 cmd.exe 30 PID 2032 wrote to memory of 1896 2032 cmd.exe 30 PID 2032 wrote to memory of 1876 2032 cmd.exe 31 PID 2032 wrote to memory of 1876 2032 cmd.exe 31 PID 2032 wrote to memory of 1876 2032 cmd.exe 31 PID 2032 wrote to memory of 1916 2032 cmd.exe 32 PID 2032 wrote to memory of 1916 2032 cmd.exe 32 PID 2032 wrote to memory of 1916 2032 cmd.exe 32 PID 2032 wrote to memory of 772 2032 cmd.exe 34 PID 2032 wrote to memory of 772 2032 cmd.exe 34 PID 2032 wrote to memory of 772 2032 cmd.exe 34 PID 2032 wrote to memory of 1332 2032 cmd.exe 35 PID 2032 wrote to memory of 1332 2032 cmd.exe 35 PID 2032 wrote to memory of 1332 2032 cmd.exe 35 PID 2032 wrote to memory of 1936 2032 cmd.exe 36 PID 2032 wrote to memory of 1936 2032 cmd.exe 36 PID 2032 wrote to memory of 1936 2032 cmd.exe 36 PID 2032 wrote to memory of 1460 2032 cmd.exe 37 PID 2032 wrote to memory of 1460 2032 cmd.exe 37 PID 2032 wrote to memory of 1460 2032 cmd.exe 37 PID 2032 wrote to memory of 1952 2032 cmd.exe 38 PID 2032 wrote to memory of 1952 2032 cmd.exe 38 PID 2032 wrote to memory of 1952 2032 cmd.exe 38 PID 2032 wrote to memory of 1816 2032 cmd.exe 39 PID 2032 wrote to memory of 1816 2032 cmd.exe 39 PID 2032 wrote to memory of 1816 2032 cmd.exe 39 PID 2032 wrote to memory of 1744 2032 cmd.exe 40 PID 2032 wrote to memory of 1744 2032 cmd.exe 40 PID 2032 wrote to memory of 1744 2032 cmd.exe 40 PID 2032 wrote to memory of 1744 2032 cmd.exe 40 PID 2032 wrote to memory of 1280 2032 cmd.exe 41 PID 2032 wrote to memory of 1280 2032 cmd.exe 41 PID 2032 wrote to memory of 1280 2032 cmd.exe 41 PID 2032 wrote to memory of 1280 2032 cmd.exe 41 PID 2032 wrote to memory of 1224 2032 cmd.exe 42 PID 2032 wrote to memory of 1224 2032 cmd.exe 42 PID 2032 wrote to memory of 1224 2032 cmd.exe 42 PID 2032 wrote to memory of 1224 2032 cmd.exe 42 PID 1688 wrote to memory of 1660 1688 rutserv.exe 44 PID 1688 wrote to memory of 1660 1688 rutserv.exe 44 PID 1688 wrote to memory of 1660 1688 rutserv.exe 44 PID 1688 wrote to memory of 1660 1688 rutserv.exe 44 PID 1688 wrote to memory of 240 1688 rutserv.exe 45 PID 1688 wrote to memory of 240 1688 rutserv.exe 45 PID 1688 wrote to memory of 240 1688 rutserv.exe 45 PID 1688 wrote to memory of 240 1688 rutserv.exe 45 PID 2032 wrote to memory of 1616 2032 cmd.exe 46 PID 2032 wrote to memory of 1616 2032 cmd.exe 46 PID 2032 wrote to memory of 1616 2032 cmd.exe 46 PID 2032 wrote to memory of 1672 2032 cmd.exe 47 PID 2032 wrote to memory of 1672 2032 cmd.exe 47 PID 2032 wrote to memory of 1672 2032 cmd.exe 47 PID 2032 wrote to memory of 772 2032 cmd.exe 49 PID 2032 wrote to memory of 772 2032 cmd.exe 49 PID 2032 wrote to memory of 772 2032 cmd.exe 49 PID 1548 wrote to memory of 1664 1548 rutserv.exe 50 PID 1548 wrote to memory of 1664 1548 rutserv.exe 50 PID 1548 wrote to memory of 1664 1548 rutserv.exe 50 PID 1548 wrote to memory of 1664 1548 rutserv.exe 50 PID 1548 wrote to memory of 284 1548 rutserv.exe 51 PID 1548 wrote to memory of 284 1548 rutserv.exe 51 PID 1548 wrote to memory of 284 1548 rutserv.exe 51 PID 1548 wrote to memory of 284 1548 rutserv.exe 51 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1896 attrib.exe 1876 attrib.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\install.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\attrib.exeattrib "C:\Program Files (x86)\System" +H +S /S /D2⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:1896
-
-
C:\Windows\system32\attrib.exeattrib "C:\Program Files (x86)\System\*.*" +H +S /S /D2⤵
- Views/modifies file attributes
PID:1876
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im rutserv.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\Windows\system32\taskkill.exeTaskkill /f /im rutserv.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im rfusclient.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\system32\taskkill.exeTaskkill /f /im rfusclient.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f2⤵PID:1460
-
-
C:\Windows\regedit.exeregedit /s "regedit.reg"2⤵
- Runs .reg file with regedit
PID:1952
-
-
C:\Windows\system32\timeout.exetimeout 22⤵
- Delays execution with timeout.exe
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exerutserv.exe /silentinstall2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1744
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exerutserv.exe /firewall2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exerutserv.exe /start2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1224
-
-
C:\Windows\system32\sc.exesc failure RManService reset= 0 actions= restart/1000/restart/1000/restart/10002⤵PID:1616
-
-
C:\Windows\system32\sc.exesc config RManService obj= LocalSystem type= interact type= own2⤵PID:1672
-
-
C:\Windows\system32\sc.exesc config RManService DisplayName= "Windows_Defender v6.3"2⤵PID:772
-
-
C:\Windows\system32\timeout.exetimeout 1202⤵
- Delays execution with timeout.exe
PID:528
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:240
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray3⤵PID:1476
-
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:284
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:284
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:972 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:928 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:744
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:880 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:948
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1564
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:952 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1744
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:756 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1744
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:472 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:960
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:240
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:968
-