Analysis

  • max time kernel
    154s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    15-04-2022 04:53

General

  • Target

    9e53945f65d0528540a52741bde298a2626582e684f56ddd0f4e534e13491c12.exe

  • Size

    6.2MB

  • MD5

    ab92d1376a186f27c4e5440843173020

  • SHA1

    9aebb2a37972d52c671985f9833c820934fa96d3

  • SHA256

    9e53945f65d0528540a52741bde298a2626582e684f56ddd0f4e534e13491c12

  • SHA512

    f7e05d9c1723446e31bed30ffd22563dc03880aabdc8fbe37b70e7fcba68dba933ad1bd5f44a0d6a66df01519178bcee653b0273d1c55fdedb273a1fa85f0a48

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Registers COM server for autorun 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 24 IoCs
  • Sets file execution options in registry 2 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 39 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 18 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 59 IoCs
  • Modifies registry class 64 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e53945f65d0528540a52741bde298a2626582e684f56ddd0f4e534e13491c12.exe
    "C:\Users\Admin\AppData\Local\Temp\9e53945f65d0528540a52741bde298a2626582e684f56ddd0f4e534e13491c12.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.ya.ru/
      2⤵
      • Adds Run key to start application
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3932
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe140f46f8,0x7ffe140f4708,0x7ffe140f4718
        3⤵
          PID:3428
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,7305166214270585135,8418397542105676115,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:2
          3⤵
            PID:1592
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,7305166214270585135,8418397542105676115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4152
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,7305166214270585135,8418397542105676115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:8
            3⤵
              PID:232
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7305166214270585135,8418397542105676115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:1
              3⤵
                PID:3700
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7305166214270585135,8418397542105676115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
                3⤵
                  PID:3128
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,7305166214270585135,8418397542105676115,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4932 /prefetch:8
                  3⤵
                    PID:1456
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,7305166214270585135,8418397542105676115,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6176 /prefetch:8
                    3⤵
                      PID:4808
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7305166214270585135,8418397542105676115,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:1
                      3⤵
                        PID:544
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7305166214270585135,8418397542105676115,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:1
                        3⤵
                          PID:2632
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,7305166214270585135,8418397542105676115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3116 /prefetch:8
                          3⤵
                            PID:4340
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                            3⤵
                            • Drops file in Program Files directory
                            PID:1744
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff621d65460,0x7ff621d65470,0x7ff621d65480
                              4⤵
                                PID:4200
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,7305166214270585135,8418397542105676115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3116 /prefetch:8
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4620
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2132,7305166214270585135,8418397542105676115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5520 /prefetch:8
                              3⤵
                                PID:1096
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,7305166214270585135,8418397542105676115,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5632 /prefetch:2
                                3⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3164
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\install.cmd" "
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3800
                              • C:\Windows\SysWOW64\chcp.com
                                chcp 1251
                                3⤵
                                  PID:4036
                                • C:\Windows\SysWOW64\msiexec.exe
                                  MsiExec /x {61FFA475-24D5-44FB-A51F-39B699E3D82C} /passive REBOOT=ReallySuppress
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:60
                                • C:\Windows\SysWOW64\msiexec.exe
                                  MsiExec /x {AB7AA605-500F-4153-8207-FB5563419112} /passive REBOOT=ReallySuppress
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:4792
                                • C:\Windows\SysWOW64\PING.EXE
                                  ping 127.0.0.1
                                  3⤵
                                  • Runs ping.exe
                                  PID:2588
                                • C:\Windows\SysWOW64\msiexec.exe
                                  MsiExec /I "rms5.2.1_server.msi" /qn
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3192
                            • C:\Windows\system32\msiexec.exe
                              C:\Windows\system32\msiexec.exe /V
                              1⤵
                              • Enumerates connected drives
                              • Drops file in System32 directory
                              • Drops file in Windows directory
                              • Modifies data under HKEY_USERS
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4892
                              • C:\Windows\syswow64\MsiExec.exe
                                C:\Windows\syswow64\MsiExec.exe -Embedding CD9E9F54FBF1809B545C983D6992869C
                                2⤵
                                • Loads dropped DLL
                                PID:4296
                              • C:\Windows\SysWOW64\sysfiles\rfusclient.exe
                                "C:\Windows\SysWOW64\sysfiles\rfusclient.exe" /server /silentinstall
                                2⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Modifies data under HKEY_USERS
                                PID:1744
                                • C:\Windows\SysWOW64\sysfiles\rutserv.exe
                                  "C:\Windows\SysWOW64\sysfiles\rutserv.exe" /silentinstall
                                  3⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Drops file in System32 directory
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5056
                              • C:\Windows\SysWOW64\sysfiles\rfusclient.exe
                                "C:\Windows\SysWOW64\sysfiles\rfusclient.exe" /server /firewall
                                2⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Modifies data under HKEY_USERS
                                PID:3872
                                • C:\Windows\SysWOW64\sysfiles\rutserv.exe
                                  "C:\Windows\SysWOW64\sysfiles\rutserv.exe" /firewall
                                  3⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4468
                              • C:\Windows\SysWOW64\sysfiles\rfusclient.exe
                                "C:\Windows\SysWOW64\sysfiles\rfusclient.exe" /server /start
                                2⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Modifies data under HKEY_USERS
                                PID:2968
                                • C:\Windows\SysWOW64\sysfiles\rutserv.exe
                                  "C:\Windows\SysWOW64\sysfiles\rutserv.exe" /start
                                  3⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3640
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3772
                              • C:\Windows\SysWOW64\sysfiles\rutserv.exe
                                C:\Windows\SysWOW64\sysfiles\rutserv.exe
                                1⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Drops file in System32 directory
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1316
                                • C:\Windows\SysWOW64\sysfiles\rfusclient.exe
                                  C:\Windows\SysWOW64\sysfiles\rfusclient.exe
                                  2⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4416
                                  • C:\Windows\SysWOW64\sysfiles\rfusclient.exe
                                    C:\Windows\SysWOW64\sysfiles\rfusclient.exe /tray
                                    3⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious behavior: SetClipboardViewer
                                    PID:976
                                • C:\Windows\SysWOW64\sysfiles\rfusclient.exe
                                  C:\Windows\SysWOW64\sysfiles\rfusclient.exe /tray
                                  2⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  PID:404
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                1⤵
                                  PID:1792
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
                                  1⤵
                                  • Drops file in Program Files directory
                                  PID:1472
                                  • C:\Program Files (x86)\Microsoft\Edge\MSEdgeRecovery\scoped_dir1472_1439348383\msedgerecovery.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\MSEdgeRecovery\scoped_dir1472_1439348383\msedgerecovery.exe" --appguid={56EB18F8-B008-4CBD-B6D2-8C97FE7E9062} --browser-version=92.0.902.67 --sessionid={deb87008-ba05-4406-bf9f-0739dc8c886c} --system
                                    2⤵
                                    • Executes dropped EXE
                                    PID:4728
                                    • C:\Program Files (x86)\Microsoft\Edge\MSEdgeRecovery\scoped_dir1472_1439348383\MicrosoftEdgeUpdateSetup.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\MSEdgeRecovery\scoped_dir1472_1439348383\MicrosoftEdgeUpdateSetup.exe" /install "runtime=true&needsadmin=true" /installsource chromerecovery /silent
                                      3⤵
                                      • Executes dropped EXE
                                      • Drops file in Program Files directory
                                      PID:100
                                      • C:\Program Files (x86)\Microsoft\Temp\EU4D31.tmp\MicrosoftEdgeUpdate.exe
                                        "C:\Program Files (x86)\Microsoft\Temp\EU4D31.tmp\MicrosoftEdgeUpdate.exe" /install "runtime=true&needsadmin=true" /installsource chromerecovery /silent
                                        4⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:4212
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                                          5⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Modifies registry class
                                          PID:4972
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                                          5⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Modifies registry class
                                          PID:3440
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                            6⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            PID:408
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                            6⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            PID:2196
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                            6⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            PID:1224
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNTUuNzciIHNoZWxsX3ZlcnNpb249IjEuMy4xNTUuNzciIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RjM4MjIwQ0EtRTZBMS00NDA3LUE1N0QtMTdEMTU0MzBGRTgxfSIgdXNlcmlkPSJ7Rjk5MkMyNkUtRTNGRC00RTA1LTlCMTctREVFNjM3Qzg1NzIyfSIgaW5zdGFsbHNvdXJjZT0iY2hyb21lcmVjb3ZlcnkiIHJlcXVlc3RpZD0ie0RDNkRFRDY0LTI5MjAtNEMzNi05NkU4LUI4MjQ5REJERDdCNH0iIGRlZHVwPSJjciIgZG9tYWluam9pbmVkPSIwIj48aHcgbG9naWNhbF9jcHVzPSIyIiBwaHlzbWVtb3J5PSI0IiBkaXNrX3R5cGU9IjIiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEuMy4xNTUuNzciIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIGluc3RhbGxfdGltZV9tcz0iNzA5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
                                          5⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          PID:1856
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /machine /installsource chromerecovery
                                      3⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:3176
                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
                                  1⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Modifies data under HKEY_USERS
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4748
                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249Ijg5LjAuNDM4OS4xMTQiIG5leHR2ZXJzaW9uPSI4OS4wLjQzODkuMTE0IiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIwIiBpbnN0YWxsZGF0ZT0iLTQiIGluc3RhbGxkYXRldGltZT0iMTY0OTk2MTgyOSI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjUiLz48L2FwcD48L3JlcXVlc3Q-
                                    2⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:2192
                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{6E78FF5A-63DE-40C6-9E4F-F8860A20F951}\MicrosoftEdgeUpdateSetup_X86_1.3.157.61.exe
                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{6E78FF5A-63DE-40C6-9E4F-F8860A20F951}\MicrosoftEdgeUpdateSetup_X86_1.3.157.61.exe" /update /sessionid "{348C6994-2B5B-46EF-A1E1-A69200A259F1}"
                                    2⤵
                                    • Executes dropped EXE
                                    • Drops file in Program Files directory
                                    PID:3200
                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNTUuNzciIG5leHR2ZXJzaW9uPSIxLjMuMTU3LjYxIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNocm9tZXJlYzM9MjAyMjE1UiIgaW5zdGFsbGFnZT0iMCI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSIxMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjEzIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvd25sb2FkZXI9ImJpdHMiIHVybD0iaHR0cDovL21zZWRnZS5iLnRsdS5kbC5kZWxpdmVyeS5tcC5taWNyb3NvZnQuY29tL2ZpbGVzdHJlYW1pbmdzZXJ2aWNlL2ZpbGVzLzliMTNkYzZhLTE3OTgtNGNlYy1hNDFlLTBkNzU0M2QwMTNkYj9QMT0xNjUwNjA3NDgxJmFtcDtQMj00MDQmYW1wO1AzPTImYW1wO1A0PWJvTEw1S3RTdzk0cGduTUdsWGlFb0N2MGFjaUR4dkNLa0tWdnAlMmJCbVAwb1dta0tTY0JQUWYlMmIlMmY1cEQzb3FoeXZQRlNkNyUyZk05eWpSQ3picDc4Nnd2cHclM2QlM2QiIHNlcnZlcl9pcF9oaW50PSIiIGNkbl9jaWQ9Ii0xIiBjZG5fY2NjPSIiIGRvd25sb2FkZWQ9IjE4MjMxNTIiIHRvdGFsPSIxODIzMTUyIiBkb3dubG9hZF90aW1lX21zPSIxMTE5Ii8-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-PHBpbmcgYWN0aXZlPSIxIiBhPSItMSIgYWQ9Ii0xIiByZD0iNTU4MyIgcGluZ19mcmVzaG5lc3M9IntBOENDQUQ4Ny01RTdDLTQ4NzAtODE5NS1CM0E1MTJGNDhBRUR9Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
                                    2⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:3384

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RecoveryImproved\1.3.155.77\recovery-component-inner.crx

                                  Filesize

                                  2.5MB

                                  MD5

                                  c9e3d5ad23d207d201266b67031c96e9

                                  SHA1

                                  686e4c71067c014a3f4fb0746fd1fec4e0821530

                                  SHA256

                                  ddfc8d951d4060171da2eb3b5e3681f894ad898ebc5179930ad13987a2c0b605

                                  SHA512

                                  9e9972784ca2c40bd1356405073be66e3ed1896b77bf5396ec80f2e1e1746dde08274828cf998b9ce0fa46a4f564fa801abe75222f8e458ed26798c525219a86

                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\install.cmd

                                  Filesize

                                  234B

                                  MD5

                                  e68ce62a8f6eb00ef26f304f5cd22976

                                  SHA1

                                  54eca93b59e74f03e767c1e49737e831c755c36b

                                  SHA256

                                  1b8d2d2b6a4fbd789c21b1ed0ea00a3fd704d368e1ab869673b265bd74221356

                                  SHA512

                                  3c32a3b2c11fdc3439ef0f5d5e9061e9ce1a8aaf4b06e0036288296cd9deb3fe95a2c759264422b2f0894afe4914af102e450ed3328e78b13115b5ca1a89f574

                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\rms5.2.1_server.msi

                                  Filesize

                                  6.5MB

                                  MD5

                                  2625e0e4874b1e37014dda1406bd4167

                                  SHA1

                                  7cf55914b8b1eecbf404d63bdc5f0764f8d98ead

                                  SHA256

                                  c78b25acc17b401d511359faf60c56d5d7cbe564058d58a3d7ccdf320e99edd1

                                  SHA512

                                  8b17e16d99b0be6dbbe60292c4be304b51e279fd023acc1c65a39acb55e0be1a53e6f84de44d87bac8c3ac9f4a7a504a110fa08b16ee0c28125d9c0ba097ac7d

                                • C:\Windows\Installer\MSID229.tmp

                                  Filesize

                                  125KB

                                  MD5

                                  b0bcc622f1fff0eec99e487fa1a4ddd9

                                  SHA1

                                  49aa392454bd5869fa23794196aedc38e8eea6f5

                                  SHA256

                                  b32687eaaad888410718875dcbff9f6a552e29c4d76af33e06e59859e1054081

                                  SHA512

                                  1572c1d07df2e9262d05a915d69ec4ebeb92eab50b89ce27dd290fb5a8e1de2c97d9320a3bb006834c98b3f6afcd7d2c29f039d9ca9afaa09c714406dedbc3c7

                                • C:\Windows\Installer\MSID229.tmp

                                  Filesize

                                  125KB

                                  MD5

                                  b0bcc622f1fff0eec99e487fa1a4ddd9

                                  SHA1

                                  49aa392454bd5869fa23794196aedc38e8eea6f5

                                  SHA256

                                  b32687eaaad888410718875dcbff9f6a552e29c4d76af33e06e59859e1054081

                                  SHA512

                                  1572c1d07df2e9262d05a915d69ec4ebeb92eab50b89ce27dd290fb5a8e1de2c97d9320a3bb006834c98b3f6afcd7d2c29f039d9ca9afaa09c714406dedbc3c7

                                • C:\Windows\SysWOW64\sysfiles\RWLN.dll

                                  Filesize

                                  357KB

                                  MD5

                                  bb1f3e716d12734d1d2d9219a3979a62

                                  SHA1

                                  0ef66eed2f2ae45ec2d478902833b830334109cb

                                  SHA256

                                  d7e9c9043ed7df2af800d9b2a33e3efddf68b70f043e9717afc4b7dd4e13e077

                                  SHA512

                                  bbc90747dd45a01b05f5c0b6fa58ffe18af894b05363267ac1cc9fe3262f5e65c8ae4e08dfd82d89b9112e86e42d24a12784b79f5ea30b6443015c19b6792c9c

                                • C:\Windows\SysWOW64\sysfiles\dsfvorbisdecoder.dll

                                  Filesize

                                  234KB

                                  MD5

                                  8e3f59b8c9dfc933fca30edefeb76186

                                  SHA1

                                  37a78089d5936d1bc3b60915971604c611a94dbd

                                  SHA256

                                  528c0656751b336c10cb4c49b703eae9c3863f7f416d0e09b198b082cc54aeb8

                                  SHA512

                                  3224c20c30556774fd4bed78909f451b9a5a46aa59271b5e88b1e0e60145d217802a8f1fda3d3fabcd8546ca7783e0c70f0c419a28efe6c5160a102553a3c91d

                                • C:\Windows\SysWOW64\sysfiles\dsfvorbisencoder.dll

                                  Filesize

                                  1.6MB

                                  MD5

                                  ff622a8812d8b1eff8f8d1a32087f9d2

                                  SHA1

                                  910615c9374b8734794ac885707ff5370db42ef1

                                  SHA256

                                  1b8fe11c0bdcbf1f4503c478843de02177c606912c89e655e482adec787c2ebf

                                  SHA512

                                  1a7c49f172691bf071df0d47d6ee270afbfa889afb8d5bd893496277fd816630ecd7b50c978b53d88228922ba6070f382b959ffc389394e0f08daab107369931

                                • C:\Windows\SysWOW64\sysfiles\gdiplus.dll

                                  Filesize

                                  1.6MB

                                  MD5

                                  871c903a90c45ca08a9d42803916c3f7

                                  SHA1

                                  d962a12bc15bfb4c505bb63f603ca211588958db

                                  SHA256

                                  f1da32183b3da19f75fa4ef0974a64895266b16d119bbb1da9fe63867dba0645

                                  SHA512

                                  985b0b8b5e3d96acfd0514676d9f0c5d2d8f11e31f01acfa0f7da9af3568e12343ca77f541f55edda6a0e5c14fe733bda5dc1c10bb170d40d15b7a60ad000145

                                • C:\Windows\SysWOW64\sysfiles\msimg32.dll

                                  Filesize

                                  3KB

                                  MD5

                                  51af730a69ae4d520bed1ef9b658e0f8

                                  SHA1

                                  d2fbeac55b43bc4503154c465a99e91f57f9cbd3

                                  SHA256

                                  1a1b2ae21c9ecd0d2fcf1098b9906b39d8c440dbb1165d2e5c3b1a8b03b071fe

                                  SHA512

                                  348803eeb31ecf767474bdc5831c0a89d0fbf5b35913ab40f673ef5c5ccc2e02fe823ee596b8ab7a0beca40d07d0841426064a42fc0ef5d91d12ae9869d07685

                                • C:\Windows\SysWOW64\sysfiles\msimg32.dll

                                  Filesize

                                  3KB

                                  MD5

                                  51af730a69ae4d520bed1ef9b658e0f8

                                  SHA1

                                  d2fbeac55b43bc4503154c465a99e91f57f9cbd3

                                  SHA256

                                  1a1b2ae21c9ecd0d2fcf1098b9906b39d8c440dbb1165d2e5c3b1a8b03b071fe

                                  SHA512

                                  348803eeb31ecf767474bdc5831c0a89d0fbf5b35913ab40f673ef5c5ccc2e02fe823ee596b8ab7a0beca40d07d0841426064a42fc0ef5d91d12ae9869d07685

                                • C:\Windows\SysWOW64\sysfiles\msimg32.dll

                                  Filesize

                                  3KB

                                  MD5

                                  51af730a69ae4d520bed1ef9b658e0f8

                                  SHA1

                                  d2fbeac55b43bc4503154c465a99e91f57f9cbd3

                                  SHA256

                                  1a1b2ae21c9ecd0d2fcf1098b9906b39d8c440dbb1165d2e5c3b1a8b03b071fe

                                  SHA512

                                  348803eeb31ecf767474bdc5831c0a89d0fbf5b35913ab40f673ef5c5ccc2e02fe823ee596b8ab7a0beca40d07d0841426064a42fc0ef5d91d12ae9869d07685

                                • C:\Windows\SysWOW64\sysfiles\msimg32.dll

                                  Filesize

                                  3KB

                                  MD5

                                  51af730a69ae4d520bed1ef9b658e0f8

                                  SHA1

                                  d2fbeac55b43bc4503154c465a99e91f57f9cbd3

                                  SHA256

                                  1a1b2ae21c9ecd0d2fcf1098b9906b39d8c440dbb1165d2e5c3b1a8b03b071fe

                                  SHA512

                                  348803eeb31ecf767474bdc5831c0a89d0fbf5b35913ab40f673ef5c5ccc2e02fe823ee596b8ab7a0beca40d07d0841426064a42fc0ef5d91d12ae9869d07685

                                • C:\Windows\SysWOW64\sysfiles\msimg32.dll

                                  Filesize

                                  3KB

                                  MD5

                                  51af730a69ae4d520bed1ef9b658e0f8

                                  SHA1

                                  d2fbeac55b43bc4503154c465a99e91f57f9cbd3

                                  SHA256

                                  1a1b2ae21c9ecd0d2fcf1098b9906b39d8c440dbb1165d2e5c3b1a8b03b071fe

                                  SHA512

                                  348803eeb31ecf767474bdc5831c0a89d0fbf5b35913ab40f673ef5c5ccc2e02fe823ee596b8ab7a0beca40d07d0841426064a42fc0ef5d91d12ae9869d07685

                                • C:\Windows\SysWOW64\sysfiles\msimg32.dll

                                  Filesize

                                  3KB

                                  MD5

                                  51af730a69ae4d520bed1ef9b658e0f8

                                  SHA1

                                  d2fbeac55b43bc4503154c465a99e91f57f9cbd3

                                  SHA256

                                  1a1b2ae21c9ecd0d2fcf1098b9906b39d8c440dbb1165d2e5c3b1a8b03b071fe

                                  SHA512

                                  348803eeb31ecf767474bdc5831c0a89d0fbf5b35913ab40f673ef5c5ccc2e02fe823ee596b8ab7a0beca40d07d0841426064a42fc0ef5d91d12ae9869d07685

                                • C:\Windows\SysWOW64\sysfiles\msimg32.dll

                                  Filesize

                                  3KB

                                  MD5

                                  51af730a69ae4d520bed1ef9b658e0f8

                                  SHA1

                                  d2fbeac55b43bc4503154c465a99e91f57f9cbd3

                                  SHA256

                                  1a1b2ae21c9ecd0d2fcf1098b9906b39d8c440dbb1165d2e5c3b1a8b03b071fe

                                  SHA512

                                  348803eeb31ecf767474bdc5831c0a89d0fbf5b35913ab40f673ef5c5ccc2e02fe823ee596b8ab7a0beca40d07d0841426064a42fc0ef5d91d12ae9869d07685

                                • C:\Windows\SysWOW64\sysfiles\msimg32.dll

                                  Filesize

                                  3KB

                                  MD5

                                  51af730a69ae4d520bed1ef9b658e0f8

                                  SHA1

                                  d2fbeac55b43bc4503154c465a99e91f57f9cbd3

                                  SHA256

                                  1a1b2ae21c9ecd0d2fcf1098b9906b39d8c440dbb1165d2e5c3b1a8b03b071fe

                                  SHA512

                                  348803eeb31ecf767474bdc5831c0a89d0fbf5b35913ab40f673ef5c5ccc2e02fe823ee596b8ab7a0beca40d07d0841426064a42fc0ef5d91d12ae9869d07685

                                • C:\Windows\SysWOW64\sysfiles\msimg32.dll

                                  Filesize

                                  3KB

                                  MD5

                                  51af730a69ae4d520bed1ef9b658e0f8

                                  SHA1

                                  d2fbeac55b43bc4503154c465a99e91f57f9cbd3

                                  SHA256

                                  1a1b2ae21c9ecd0d2fcf1098b9906b39d8c440dbb1165d2e5c3b1a8b03b071fe

                                  SHA512

                                  348803eeb31ecf767474bdc5831c0a89d0fbf5b35913ab40f673ef5c5ccc2e02fe823ee596b8ab7a0beca40d07d0841426064a42fc0ef5d91d12ae9869d07685

                                • C:\Windows\SysWOW64\sysfiles\msimg32.dll

                                  Filesize

                                  3KB

                                  MD5

                                  51af730a69ae4d520bed1ef9b658e0f8

                                  SHA1

                                  d2fbeac55b43bc4503154c465a99e91f57f9cbd3

                                  SHA256

                                  1a1b2ae21c9ecd0d2fcf1098b9906b39d8c440dbb1165d2e5c3b1a8b03b071fe

                                  SHA512

                                  348803eeb31ecf767474bdc5831c0a89d0fbf5b35913ab40f673ef5c5ccc2e02fe823ee596b8ab7a0beca40d07d0841426064a42fc0ef5d91d12ae9869d07685

                                • C:\Windows\SysWOW64\sysfiles\msimg32.dll

                                  Filesize

                                  3KB

                                  MD5

                                  51af730a69ae4d520bed1ef9b658e0f8

                                  SHA1

                                  d2fbeac55b43bc4503154c465a99e91f57f9cbd3

                                  SHA256

                                  1a1b2ae21c9ecd0d2fcf1098b9906b39d8c440dbb1165d2e5c3b1a8b03b071fe

                                  SHA512

                                  348803eeb31ecf767474bdc5831c0a89d0fbf5b35913ab40f673ef5c5ccc2e02fe823ee596b8ab7a0beca40d07d0841426064a42fc0ef5d91d12ae9869d07685

                                • C:\Windows\SysWOW64\sysfiles\msvcp90.dll

                                  Filesize

                                  556KB

                                  MD5

                                  b2eee3dee31f50e082e9c720a6d7757d

                                  SHA1

                                  3322840fef43c92fb55dc31e682d19970daf159d

                                  SHA256

                                  4608beedd8cf9c3fc5ab03716b4ab6f01c7b7d65a7c072af04f514ffb0e02d01

                                  SHA512

                                  8b1854e80045001e7ab3a978fb4aa1de19a3c9fc206013d7bc43aec919f45e46bb7555f667d9f7d7833ab8baa55c9098af8872006ff277fc364a5e6f99ee25d3

                                • C:\Windows\SysWOW64\sysfiles\msvcr90.dll

                                  Filesize

                                  637KB

                                  MD5

                                  7538050656fe5d63cb4b80349dd1cfe3

                                  SHA1

                                  f825c40fee87cc9952a61c8c34e9f6eee8da742d

                                  SHA256

                                  e16bc9b66642151de612ee045c2810ca6146975015bd9679a354567f56da2099

                                  SHA512

                                  843e22630254d222dfd12166c701f6cd1dca4a8dc216c7a8c9c0ab1afc90189cfa8b6499bbc46408008a1d985394eb8a660b1fa1991059a65c09e8d6481a3af8

                                • C:\Windows\SysWOW64\sysfiles\oledlg.dll

                                  Filesize

                                  4KB

                                  MD5

                                  d3f47f9ef1d3c358446c3680021e98ac

                                  SHA1

                                  5c50ab5a79d770a1e5ad43378d69d218de3ec4e6

                                  SHA256

                                  52fdc5181c9de91bfce282955f921b1938caf40a7d1528131b5155a367585ede

                                  SHA512

                                  eb55db05f167b4a49f2d586c446ac993463b3755e567d1e2e6024fbd8d2c683ea4c537c91978676de7f34aa20bcf86d9cb35072345e29bc8f94ebbc1bf894b8f

                                • C:\Windows\SysWOW64\sysfiles\oledlg.dll

                                  Filesize

                                  4KB

                                  MD5

                                  d3f47f9ef1d3c358446c3680021e98ac

                                  SHA1

                                  5c50ab5a79d770a1e5ad43378d69d218de3ec4e6

                                  SHA256

                                  52fdc5181c9de91bfce282955f921b1938caf40a7d1528131b5155a367585ede

                                  SHA512

                                  eb55db05f167b4a49f2d586c446ac993463b3755e567d1e2e6024fbd8d2c683ea4c537c91978676de7f34aa20bcf86d9cb35072345e29bc8f94ebbc1bf894b8f

                                • C:\Windows\SysWOW64\sysfiles\oledlg.dll

                                  Filesize

                                  4KB

                                  MD5

                                  d3f47f9ef1d3c358446c3680021e98ac

                                  SHA1

                                  5c50ab5a79d770a1e5ad43378d69d218de3ec4e6

                                  SHA256

                                  52fdc5181c9de91bfce282955f921b1938caf40a7d1528131b5155a367585ede

                                  SHA512

                                  eb55db05f167b4a49f2d586c446ac993463b3755e567d1e2e6024fbd8d2c683ea4c537c91978676de7f34aa20bcf86d9cb35072345e29bc8f94ebbc1bf894b8f

                                • C:\Windows\SysWOW64\sysfiles\oledlg.dll

                                  Filesize

                                  4KB

                                  MD5

                                  d3f47f9ef1d3c358446c3680021e98ac

                                  SHA1

                                  5c50ab5a79d770a1e5ad43378d69d218de3ec4e6

                                  SHA256

                                  52fdc5181c9de91bfce282955f921b1938caf40a7d1528131b5155a367585ede

                                  SHA512

                                  eb55db05f167b4a49f2d586c446ac993463b3755e567d1e2e6024fbd8d2c683ea4c537c91978676de7f34aa20bcf86d9cb35072345e29bc8f94ebbc1bf894b8f

                                • C:\Windows\SysWOW64\sysfiles\oledlg.dll

                                  Filesize

                                  4KB

                                  MD5

                                  d3f47f9ef1d3c358446c3680021e98ac

                                  SHA1

                                  5c50ab5a79d770a1e5ad43378d69d218de3ec4e6

                                  SHA256

                                  52fdc5181c9de91bfce282955f921b1938caf40a7d1528131b5155a367585ede

                                  SHA512

                                  eb55db05f167b4a49f2d586c446ac993463b3755e567d1e2e6024fbd8d2c683ea4c537c91978676de7f34aa20bcf86d9cb35072345e29bc8f94ebbc1bf894b8f

                                • C:\Windows\SysWOW64\sysfiles\oledlg.dll

                                  Filesize

                                  4KB

                                  MD5

                                  d3f47f9ef1d3c358446c3680021e98ac

                                  SHA1

                                  5c50ab5a79d770a1e5ad43378d69d218de3ec4e6

                                  SHA256

                                  52fdc5181c9de91bfce282955f921b1938caf40a7d1528131b5155a367585ede

                                  SHA512

                                  eb55db05f167b4a49f2d586c446ac993463b3755e567d1e2e6024fbd8d2c683ea4c537c91978676de7f34aa20bcf86d9cb35072345e29bc8f94ebbc1bf894b8f

                                • C:\Windows\SysWOW64\sysfiles\oledlg.dll

                                  Filesize

                                  4KB

                                  MD5

                                  d3f47f9ef1d3c358446c3680021e98ac

                                  SHA1

                                  5c50ab5a79d770a1e5ad43378d69d218de3ec4e6

                                  SHA256

                                  52fdc5181c9de91bfce282955f921b1938caf40a7d1528131b5155a367585ede

                                  SHA512

                                  eb55db05f167b4a49f2d586c446ac993463b3755e567d1e2e6024fbd8d2c683ea4c537c91978676de7f34aa20bcf86d9cb35072345e29bc8f94ebbc1bf894b8f

                                • C:\Windows\SysWOW64\sysfiles\oledlg.dll

                                  Filesize

                                  4KB

                                  MD5

                                  d3f47f9ef1d3c358446c3680021e98ac

                                  SHA1

                                  5c50ab5a79d770a1e5ad43378d69d218de3ec4e6

                                  SHA256

                                  52fdc5181c9de91bfce282955f921b1938caf40a7d1528131b5155a367585ede

                                  SHA512

                                  eb55db05f167b4a49f2d586c446ac993463b3755e567d1e2e6024fbd8d2c683ea4c537c91978676de7f34aa20bcf86d9cb35072345e29bc8f94ebbc1bf894b8f

                                • C:\Windows\SysWOW64\sysfiles\oledlg.dll

                                  Filesize

                                  4KB

                                  MD5

                                  d3f47f9ef1d3c358446c3680021e98ac

                                  SHA1

                                  5c50ab5a79d770a1e5ad43378d69d218de3ec4e6

                                  SHA256

                                  52fdc5181c9de91bfce282955f921b1938caf40a7d1528131b5155a367585ede

                                  SHA512

                                  eb55db05f167b4a49f2d586c446ac993463b3755e567d1e2e6024fbd8d2c683ea4c537c91978676de7f34aa20bcf86d9cb35072345e29bc8f94ebbc1bf894b8f

                                • C:\Windows\SysWOW64\sysfiles\oledlg.dll

                                  Filesize

                                  4KB

                                  MD5

                                  d3f47f9ef1d3c358446c3680021e98ac

                                  SHA1

                                  5c50ab5a79d770a1e5ad43378d69d218de3ec4e6

                                  SHA256

                                  52fdc5181c9de91bfce282955f921b1938caf40a7d1528131b5155a367585ede

                                  SHA512

                                  eb55db05f167b4a49f2d586c446ac993463b3755e567d1e2e6024fbd8d2c683ea4c537c91978676de7f34aa20bcf86d9cb35072345e29bc8f94ebbc1bf894b8f

                                • C:\Windows\SysWOW64\sysfiles\oledlg.dll

                                  Filesize

                                  4KB

                                  MD5

                                  d3f47f9ef1d3c358446c3680021e98ac

                                  SHA1

                                  5c50ab5a79d770a1e5ad43378d69d218de3ec4e6

                                  SHA256

                                  52fdc5181c9de91bfce282955f921b1938caf40a7d1528131b5155a367585ede

                                  SHA512

                                  eb55db05f167b4a49f2d586c446ac993463b3755e567d1e2e6024fbd8d2c683ea4c537c91978676de7f34aa20bcf86d9cb35072345e29bc8f94ebbc1bf894b8f

                                • C:\Windows\SysWOW64\sysfiles\oledlg.dll

                                  Filesize

                                  4KB

                                  MD5

                                  d3f47f9ef1d3c358446c3680021e98ac

                                  SHA1

                                  5c50ab5a79d770a1e5ad43378d69d218de3ec4e6

                                  SHA256

                                  52fdc5181c9de91bfce282955f921b1938caf40a7d1528131b5155a367585ede

                                  SHA512

                                  eb55db05f167b4a49f2d586c446ac993463b3755e567d1e2e6024fbd8d2c683ea4c537c91978676de7f34aa20bcf86d9cb35072345e29bc8f94ebbc1bf894b8f

                                • C:\Windows\SysWOW64\sysfiles\oledlg.dll

                                  Filesize

                                  4KB

                                  MD5

                                  d3f47f9ef1d3c358446c3680021e98ac

                                  SHA1

                                  5c50ab5a79d770a1e5ad43378d69d218de3ec4e6

                                  SHA256

                                  52fdc5181c9de91bfce282955f921b1938caf40a7d1528131b5155a367585ede

                                  SHA512

                                  eb55db05f167b4a49f2d586c446ac993463b3755e567d1e2e6024fbd8d2c683ea4c537c91978676de7f34aa20bcf86d9cb35072345e29bc8f94ebbc1bf894b8f

                                • C:\Windows\SysWOW64\sysfiles\rasadhlp.dll

                                  Filesize

                                  3KB

                                  MD5

                                  8679b09cc9600a1f11a3c09cec12637b

                                  SHA1

                                  cad5c92e561b64d1f4e1f70c7596dcf186304ecb

                                  SHA256

                                  7e840982833d4c4d68835003960762fa3982c899ac1c8b63e4fdbbb35448152f

                                  SHA512

                                  93a8d0e78932793ccd534c17c48af203665d7b3d326d7b21b2b4aa54925a853e674324774fa9a99194eca7a930d504568095529a6b6a2e63b73f0c719bc424e6

                                • C:\Windows\SysWOW64\sysfiles\rfusclient.exe

                                  Filesize

                                  3.9MB

                                  MD5

                                  fd73724d0268dafcefb8b4061e4045b0

                                  SHA1

                                  8205f76d796577817d5f9c1ef735a229c69a215f

                                  SHA256

                                  cef753b98d114554b8d9b44d7a0062904f7da3165e79aa346c445e3a0f7805f2

                                  SHA512

                                  8c135e80c2e70a5abb2975ca1c9ba77c9093ba0f8cab1e19d80ac0ab6b8049009ba7739f3a30f69bb4d5374f80fe3cf7e8735c2249927721595f380e5307d96e

                                • C:\Windows\SysWOW64\sysfiles\rfusclient.exe

                                  Filesize

                                  3.9MB

                                  MD5

                                  fd73724d0268dafcefb8b4061e4045b0

                                  SHA1

                                  8205f76d796577817d5f9c1ef735a229c69a215f

                                  SHA256

                                  cef753b98d114554b8d9b44d7a0062904f7da3165e79aa346c445e3a0f7805f2

                                  SHA512

                                  8c135e80c2e70a5abb2975ca1c9ba77c9093ba0f8cab1e19d80ac0ab6b8049009ba7739f3a30f69bb4d5374f80fe3cf7e8735c2249927721595f380e5307d96e

                                • C:\Windows\SysWOW64\sysfiles\rfusclient.exe

                                  Filesize

                                  3.9MB

                                  MD5

                                  fd73724d0268dafcefb8b4061e4045b0

                                  SHA1

                                  8205f76d796577817d5f9c1ef735a229c69a215f

                                  SHA256

                                  cef753b98d114554b8d9b44d7a0062904f7da3165e79aa346c445e3a0f7805f2

                                  SHA512

                                  8c135e80c2e70a5abb2975ca1c9ba77c9093ba0f8cab1e19d80ac0ab6b8049009ba7739f3a30f69bb4d5374f80fe3cf7e8735c2249927721595f380e5307d96e

                                • C:\Windows\SysWOW64\sysfiles\rfusclient.exe

                                  Filesize

                                  3.9MB

                                  MD5

                                  fd73724d0268dafcefb8b4061e4045b0

                                  SHA1

                                  8205f76d796577817d5f9c1ef735a229c69a215f

                                  SHA256

                                  cef753b98d114554b8d9b44d7a0062904f7da3165e79aa346c445e3a0f7805f2

                                  SHA512

                                  8c135e80c2e70a5abb2975ca1c9ba77c9093ba0f8cab1e19d80ac0ab6b8049009ba7739f3a30f69bb4d5374f80fe3cf7e8735c2249927721595f380e5307d96e

                                • C:\Windows\SysWOW64\sysfiles\rfusclient.exe

                                  Filesize

                                  3.9MB

                                  MD5

                                  fd73724d0268dafcefb8b4061e4045b0

                                  SHA1

                                  8205f76d796577817d5f9c1ef735a229c69a215f

                                  SHA256

                                  cef753b98d114554b8d9b44d7a0062904f7da3165e79aa346c445e3a0f7805f2

                                  SHA512

                                  8c135e80c2e70a5abb2975ca1c9ba77c9093ba0f8cab1e19d80ac0ab6b8049009ba7739f3a30f69bb4d5374f80fe3cf7e8735c2249927721595f380e5307d96e

                                • C:\Windows\SysWOW64\sysfiles\rfusclient.exe

                                  Filesize

                                  3.9MB

                                  MD5

                                  fd73724d0268dafcefb8b4061e4045b0

                                  SHA1

                                  8205f76d796577817d5f9c1ef735a229c69a215f

                                  SHA256

                                  cef753b98d114554b8d9b44d7a0062904f7da3165e79aa346c445e3a0f7805f2

                                  SHA512

                                  8c135e80c2e70a5abb2975ca1c9ba77c9093ba0f8cab1e19d80ac0ab6b8049009ba7739f3a30f69bb4d5374f80fe3cf7e8735c2249927721595f380e5307d96e

                                • C:\Windows\SysWOW64\sysfiles\rfusclient.exe

                                  Filesize

                                  3.9MB

                                  MD5

                                  fd73724d0268dafcefb8b4061e4045b0

                                  SHA1

                                  8205f76d796577817d5f9c1ef735a229c69a215f

                                  SHA256

                                  cef753b98d114554b8d9b44d7a0062904f7da3165e79aa346c445e3a0f7805f2

                                  SHA512

                                  8c135e80c2e70a5abb2975ca1c9ba77c9093ba0f8cab1e19d80ac0ab6b8049009ba7739f3a30f69bb4d5374f80fe3cf7e8735c2249927721595f380e5307d96e

                                • C:\Windows\SysWOW64\sysfiles\ripcserver.dll

                                  Filesize

                                  144KB

                                  MD5

                                  30e269f850baf6ca25187815912e21c5

                                  SHA1

                                  eb160de97d12b4e96f350dd0d0126d41d658afb3

                                  SHA256

                                  379191bfd34d41e96760c7a539e2056a22be3d44bf0e8712b53e443f55aead90

                                  SHA512

                                  9b86a4eefdcae46e605f85e752ef61e39fd0212a19b7fd4c35eb3ab99851a0b906d048d12d1e1e985a340a67a64d405b8cf803555865137278f0c19d686df5e7

                                • C:\Windows\SysWOW64\sysfiles\rutserv.exe

                                  Filesize

                                  4.7MB

                                  MD5

                                  5cd22562ef246c66c255676937d33f0d

                                  SHA1

                                  1d44452f59a8cf755e7931c55f2f84d147400b8e

                                  SHA256

                                  a063ec7ae0beda06cec13706320f5a9d537e4f19755ce2761cbc2b25070e2246

                                  SHA512

                                  0da8af59ae88169947114a0fdca61106863faf7244072f011c68270f197945fb384a319ccb7bf99d460458500d8e6f88306006bb6d76d19a13ab67adec1b21cf

                                • C:\Windows\SysWOW64\sysfiles\rutserv.exe

                                  Filesize

                                  4.7MB

                                  MD5

                                  5cd22562ef246c66c255676937d33f0d

                                  SHA1

                                  1d44452f59a8cf755e7931c55f2f84d147400b8e

                                  SHA256

                                  a063ec7ae0beda06cec13706320f5a9d537e4f19755ce2761cbc2b25070e2246

                                  SHA512

                                  0da8af59ae88169947114a0fdca61106863faf7244072f011c68270f197945fb384a319ccb7bf99d460458500d8e6f88306006bb6d76d19a13ab67adec1b21cf

                                • C:\Windows\SysWOW64\sysfiles\rutserv.exe

                                  Filesize

                                  4.7MB

                                  MD5

                                  5cd22562ef246c66c255676937d33f0d

                                  SHA1

                                  1d44452f59a8cf755e7931c55f2f84d147400b8e

                                  SHA256

                                  a063ec7ae0beda06cec13706320f5a9d537e4f19755ce2761cbc2b25070e2246

                                  SHA512

                                  0da8af59ae88169947114a0fdca61106863faf7244072f011c68270f197945fb384a319ccb7bf99d460458500d8e6f88306006bb6d76d19a13ab67adec1b21cf

                                • C:\Windows\SysWOW64\sysfiles\rutserv.exe

                                  Filesize

                                  4.7MB

                                  MD5

                                  5cd22562ef246c66c255676937d33f0d

                                  SHA1

                                  1d44452f59a8cf755e7931c55f2f84d147400b8e

                                  SHA256

                                  a063ec7ae0beda06cec13706320f5a9d537e4f19755ce2761cbc2b25070e2246

                                  SHA512

                                  0da8af59ae88169947114a0fdca61106863faf7244072f011c68270f197945fb384a319ccb7bf99d460458500d8e6f88306006bb6d76d19a13ab67adec1b21cf

                                • C:\Windows\SysWOW64\sysfiles\rutserv.exe

                                  Filesize

                                  4.7MB

                                  MD5

                                  5cd22562ef246c66c255676937d33f0d

                                  SHA1

                                  1d44452f59a8cf755e7931c55f2f84d147400b8e

                                  SHA256

                                  a063ec7ae0beda06cec13706320f5a9d537e4f19755ce2761cbc2b25070e2246

                                  SHA512

                                  0da8af59ae88169947114a0fdca61106863faf7244072f011c68270f197945fb384a319ccb7bf99d460458500d8e6f88306006bb6d76d19a13ab67adec1b21cf

                                • C:\Windows\SysWOW64\sysfiles\vp8decoder.dll

                                  Filesize

                                  403KB

                                  MD5

                                  6f6bfe02e84a595a56b456f72debd4ee

                                  SHA1

                                  90bad3ae1746c7a45df2dbf44cd536eb1bf3c8e2

                                  SHA256

                                  5e59b566eda7bb36f3f5d6dd39858bc9d6cf2c8d81deca4ea3c409804247da51

                                  SHA512

                                  ed2a7402699a6d00d1eac52b0f2dea4475173be3320dfbad5ca58877f06638769533229bc12bce6650726d3166c0e5ebac2dad7171b77b29186d4d5e65818c50

                                • C:\Windows\SysWOW64\sysfiles\vp8encoder.dll

                                  Filesize

                                  685KB

                                  MD5

                                  c638bca1a67911af7f9ed67e7b501154

                                  SHA1

                                  0fd74d2f1bd78f678b897a776d8bce36742c39b7

                                  SHA256

                                  519078219f7f6db542f747702422f902a21bfc3aef8c6e6c3580e1c5e88162b8

                                  SHA512

                                  ca8133399f61a1f339a14e3fad3bfafc6fe3657801fd66df761c88c18b2dc23ceb02ba6faa536690986972933bec2808254ef143c2c22f881285facb4364659f

                                • memory/1592-141-0x00007FFE307F0000-0x00007FFE307F1000-memory.dmp

                                  Filesize

                                  4KB