Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2022 04:27

General

  • Target

    ad65a509881ef712234bb07cb1165a46.exe

  • Size

    4.4MB

  • MD5

    ad65a509881ef712234bb07cb1165a46

  • SHA1

    519a968fe267b9bf77f7ff2ba1074e8e20202d60

  • SHA256

    98abbdc3e858ec0647826f9ea66624a15424e4b9c7e6a026341b41f0668f4423

  • SHA512

    eb584be09f95f292b9cf4197685ad8762f84e39c4308eb0dfbfde2b82482cb58f13cbbde6bd49d3ad5d52bf96a8fea068de3d960a06242f25eb85d933ca322fd

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad65a509881ef712234bb07cb1165a46.exe
    "C:\Users\Admin\AppData\Local\Temp\ad65a509881ef712234bb07cb1165a46.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\microsoft360.vbs"
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\ProgramData\Start.exe
        "C:\ProgramData\Start.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\ProgramData\Immunity\bitcoin.cmd" "
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:808
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "bitcoin" /t REG_SZ /d "c:\ProgramData\Immunity\rutserv.exe"
            5⤵
            • Adds Run key to start application
            PID:1568
          • C:\ProgramData\Immunity\rutserv.exe
            "C:\ProgramData\Immunity\rutserv.exe"
            5⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1344
            • C:\ProgramData\Immunity\rutserv.exe
              C:\ProgramData\Immunity\rutserv.exe -second
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1368
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:976
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:872
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2044
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1948
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1000
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:844
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1932
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:556
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1428
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1572
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1120
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2044
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1916
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2012
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:564
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:896
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:736
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1028
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1580
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1576
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1696
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1848
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1804
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1360
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1468
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1856
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1536
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:680
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1344
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1944
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:520
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1688
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1524
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1460
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1948
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1000
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:844
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:548
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:864
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1824
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:112
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1920
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1388
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:892
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:860
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1828
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1568
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1532
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1988
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1600
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:948
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1636
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2040
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1696
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1848
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:820
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1596
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1460
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1948
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:848
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            PID:324
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            PID:1356
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
              PID:680
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              5⤵
                PID:948
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /f /im "rundll32.exe"
                5⤵
                • Kills process with taskkill
                PID:1944
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /f /im "rundll32.exe"
                5⤵
                  PID:112
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /f /im "rundll32.exe"
                  5⤵
                    PID:840
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im "rundll32.exe"
                    5⤵
                    • Kills process with taskkill
                    PID:900
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im "rundll32.exe"
                    5⤵
                    • Kills process with taskkill
                    PID:1632
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im "rundll32.exe"
                    5⤵
                    • Kills process with taskkill
                    PID:1984
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im "rundll32.exe"
                    5⤵
                      PID:1596
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /f /im "rundll32.exe"
                      5⤵
                      • Kills process with taskkill
                      PID:2012
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /f /im "rundll32.exe"
                      5⤵
                        PID:564
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /f /im "rundll32.exe"
                        5⤵
                        • Kills process with taskkill
                        PID:1000
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /f /im "rundll32.exe"
                        5⤵
                        • Kills process with taskkill
                        PID:844
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /f /im "rundll32.exe"
                        5⤵
                          PID:1428
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /f /im "rundll32.exe"
                          5⤵
                            PID:1540
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /f /im "rundll32.exe"
                            5⤵
                              PID:1344
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /f /im "rundll32.exe"
                              5⤵
                              • Kills process with taskkill
                              PID:872
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /f /im "rundll32.exe"
                              5⤵
                              • Kills process with taskkill
                              PID:2040
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /f /im "rundll32.exe"
                              5⤵
                                PID:624
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /f /im "rundll32.exe"
                                5⤵
                                • Kills process with taskkill
                                PID:1388
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /f /im "rundll32.exe"
                                5⤵
                                • Kills process with taskkill
                                PID:268
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /f /im "rundll32.exe"
                                5⤵
                                  PID:968
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /f /im "rundll32.exe"
                                  5⤵
                                  • Kills process with taskkill
                                  PID:1604
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /f /im "rundll32.exe"
                                  5⤵
                                    PID:1460
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    5⤵
                                    • Kills process with taskkill
                                    PID:1948
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    5⤵
                                    • Kills process with taskkill
                                    PID:848
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    5⤵
                                    • Kills process with taskkill
                                    PID:324
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    5⤵
                                    • Kills process with taskkill
                                    PID:1356
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    5⤵
                                      PID:680
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /f /im "rundll32.exe"
                                      5⤵
                                        PID:468
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /f /im "rundll32.exe"
                                        5⤵
                                          PID:1688
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /f /im "rundll32.exe"
                                          5⤵
                                          • Kills process with taskkill
                                          PID:1980
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /f /im "rundll32.exe"
                                          5⤵
                                          • Kills process with taskkill
                                          PID:892
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /f /im "rundll32.exe"
                                          5⤵
                                          • Kills process with taskkill
                                          PID:2008
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /f /im "rundll32.exe"
                                          5⤵
                                          • Kills process with taskkill
                                          PID:960
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /f /im "rundll32.exe"
                                          5⤵
                                            PID:556
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /f /im "rundll32.exe"
                                            5⤵
                                              PID:1532
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /f /im "rundll32.exe"
                                              5⤵
                                                PID:1988
                                        • C:\Users\Admin\AppData\Roaming\officedeploymenttool_15330-20230.exe
                                          "C:\Users\Admin\AppData\Roaming\officedeploymenttool_15330-20230.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          PID:940

                                      Network

                                      MITRE ATT&CK Enterprise v6

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\ProgramData\Immunity\bitcoin.cmd

                                        Filesize

                                        254B

                                        MD5

                                        5e5006b2a14020e2714d314846ba6371

                                        SHA1

                                        a23988ea442d700fee4e570283c4a63bc61cdd5c

                                        SHA256

                                        708bef0dccec5ba577f5cf95709bd774f72f612105c43f17ef9b1c9a3c30762a

                                        SHA512

                                        be7210d7eb79048460dbd142212a1eb05f2d6b781598ec397260592d46eb0c66d3305bedc687e79e024f4d1b66474c485d758f774093e7452b0b77ab23ba4302

                                      • C:\ProgramData\Immunity\libeay32.dll

                                        Filesize

                                        1.3MB

                                        MD5

                                        4cb2e1b9294ddae1bf7dcaaf42b365d1

                                        SHA1

                                        a225f53a8403d9b73d77bcbb075194520cce5a14

                                        SHA256

                                        a8124500cae0aba3411428c2c6df2762ea11cc11c312abed415d3f3667eb6884

                                        SHA512

                                        46cf4abf9121c865c725ca159df71066e0662595915d653914e4ec047f94e2ab3823f85c9e0e0c1311304c460c90224bd3141da62091c733dcaa5dccf64c04bb

                                      • C:\ProgramData\Immunity\rfusclient.exe

                                        Filesize

                                        337KB

                                        MD5

                                        5c268ca919854fc22d85f916d102ee7f

                                        SHA1

                                        0957cf86e0334673eb45945985b5c033b412be0e

                                        SHA256

                                        1f4b3efc919af1106f348662ee9ad95ab019058ff502e3d68e1b5f7abff91b56

                                        SHA512

                                        76d0abad1d7d0856ec1b8e598b05a2a6eece220ea39d74e7f6278a4219e22c75b7f618160ce41810daa57d5d4d534afd78f5cc1bd6de927dbb6a551aca2f8310

                                      • C:\ProgramData\Immunity\russian.lg

                                        Filesize

                                        64KB

                                        MD5

                                        55a0b95a1d1b7e309f2c22af82a07cc0

                                        SHA1

                                        521c41e185e5b5e73cfc4e1b18646dc4ed171942

                                        SHA256

                                        704a1a83d11c21717c17e6a7eb264d94a98d45a7c1aba8ebb82fafc65f4f199d

                                        SHA512

                                        38e3a8392f84cd31b9eb12ce4fa7ed04db29f4fe4de95e52f18cdc6e7c74a0b2673d15ab40802bf289ed3a1e83526827b012ceddbb309f40c5302547ce39f5f9

                                      • C:\ProgramData\Immunity\rutserv.exe

                                        Filesize

                                        13.2MB

                                        MD5

                                        990a46a46e2550c2f88fbde507b7e36d

                                        SHA1

                                        2797ed1bfcfe5909d2d63259e6d42760ad7f5520

                                        SHA256

                                        31efbec8319390cfc0cbcac3932ab71aa6ef5ea4f3e90e17da166a9a52f78c7e

                                        SHA512

                                        530cc7624c527713eacd9c7daf8d29ef5644bdf52088efb5a1e4e797a7506676c5a7a56f66656cef2ef51e83eede422f1ca859571b6a1a0e6822c709057a4838

                                      • C:\ProgramData\Immunity\rutserv.exe

                                        Filesize

                                        13.2MB

                                        MD5

                                        990a46a46e2550c2f88fbde507b7e36d

                                        SHA1

                                        2797ed1bfcfe5909d2d63259e6d42760ad7f5520

                                        SHA256

                                        31efbec8319390cfc0cbcac3932ab71aa6ef5ea4f3e90e17da166a9a52f78c7e

                                        SHA512

                                        530cc7624c527713eacd9c7daf8d29ef5644bdf52088efb5a1e4e797a7506676c5a7a56f66656cef2ef51e83eede422f1ca859571b6a1a0e6822c709057a4838

                                      • C:\ProgramData\Immunity\rutserv.exe

                                        Filesize

                                        13.2MB

                                        MD5

                                        990a46a46e2550c2f88fbde507b7e36d

                                        SHA1

                                        2797ed1bfcfe5909d2d63259e6d42760ad7f5520

                                        SHA256

                                        31efbec8319390cfc0cbcac3932ab71aa6ef5ea4f3e90e17da166a9a52f78c7e

                                        SHA512

                                        530cc7624c527713eacd9c7daf8d29ef5644bdf52088efb5a1e4e797a7506676c5a7a56f66656cef2ef51e83eede422f1ca859571b6a1a0e6822c709057a4838

                                      • C:\ProgramData\Immunity\settings.dat

                                        Filesize

                                        6KB

                                        MD5

                                        6fd0f4d5c8079fc0878ee9231af53440

                                        SHA1

                                        7add89541e314d2e5e27eebdaf054a5083119bdd

                                        SHA256

                                        200555ea21bd554e0c16282d33fea73ccda37624aaffed63b14ced5ade3f033f

                                        SHA512

                                        38f306aaf33cb45591d4cfb22d9714fecc3dd349f3bc3e49578338ef8030b42cab42b730edfd2d5313771ca43a63531274bf458bbcc1c40c0665e8585b544983

                                      • C:\ProgramData\Immunity\ssleay32.dll

                                        Filesize

                                        337KB

                                        MD5

                                        5c268ca919854fc22d85f916d102ee7f

                                        SHA1

                                        0957cf86e0334673eb45945985b5c033b412be0e

                                        SHA256

                                        1f4b3efc919af1106f348662ee9ad95ab019058ff502e3d68e1b5f7abff91b56

                                        SHA512

                                        76d0abad1d7d0856ec1b8e598b05a2a6eece220ea39d74e7f6278a4219e22c75b7f618160ce41810daa57d5d4d534afd78f5cc1bd6de927dbb6a551aca2f8310

                                      • C:\ProgramData\Immunity\vp8decoder.dll

                                        Filesize

                                        380KB

                                        MD5

                                        1ea62293ac757a0c2b64e632f30db636

                                        SHA1

                                        8c8ac6f8f28f432a514c3a43ea50c90daf66bfba

                                        SHA256

                                        970cb3e00fa68daec266cd0aa6149d3604cb696853772f20ad67555a2114d5df

                                        SHA512

                                        857872a260cd590bd533b5d72e6e830bb0e4e037cb6749bb7d6e1239297f21606cdbe4a0fb1492cdead6f46c88dd9eb6fab5c6e17029f7df5231cefc21fa35ab

                                      • C:\ProgramData\Immunity\vp8encoder.dll

                                        Filesize

                                        1.6MB

                                        MD5

                                        89770647609ac26c1bbd9cf6ed50954e

                                        SHA1

                                        349eed120070bab7e96272697b39e786423ac1d3

                                        SHA256

                                        7b4fc8e104914cdd6a7bf3f05c0d7197cfcd30a741cc0856155f2c74e62005a4

                                        SHA512

                                        a98688f1c80ca79ee8d15d680a61420ffb49f55607fa25711925735d0e8dbc21f3b13d470f22e0829c72a66a798eee163411b2f078113ad8153eed98ef37a2cc

                                      • C:\ProgramData\Immunity\webmmux.dll

                                        Filesize

                                        260KB

                                        MD5

                                        d29f7070ee379544aeb19913621c88e6

                                        SHA1

                                        499dcdb39862fd8ff5cbc4b13da9c465bfd5f4be

                                        SHA256

                                        654f43108fbd56bd2a3c5a3a74a2ff3f19ea9e670613b92a624e86747a496caf

                                        SHA512

                                        4ead1c8e0d33f2a6c35163c42e8f0630954de67e63bcadca003691635ccf8bfe709363ec88edb387b956535fdb476bc0b5773ede5b19cacf4858fb50072bbef5

                                      • C:\ProgramData\Immunity\webmvorbisdecoder.dll

                                        Filesize

                                        365KB

                                        MD5

                                        7a9eeac3ceaf7f95f44eb5c57b4db2e3

                                        SHA1

                                        be1048c254aa3114358f76d08c55667c4bf2d382

                                        SHA256

                                        b497d07ed995b16d1146209158d3b90d85c47a643fbf25a5158b26d75c478c88

                                        SHA512

                                        b68fa132c3588637d62a1c2bce8f8acc78e6e2f904a53644d732dc0f4e4fbc61a2829a1ac8f6b97fe4be4f3613ef92c43e6f2ab29c6abd968acc5acd635c990d

                                      • C:\ProgramData\Immunity\webmvorbisencoder.dll

                                        Filesize

                                        860KB

                                        MD5

                                        5308b9945e348fbe3a480be06885434c

                                        SHA1

                                        5c3cb39686cca3e9586e4b405fc8e1853caaf8ff

                                        SHA256

                                        9dc30fb2118aad48f6a5e0a82504f365fe40abb3134f6cceeb65859f61ad939a

                                        SHA512

                                        4d7f08dc738a944bcee9b013b13d595e9c913b248c42a6c095cbdfc6059da7f04cca935841ff8a43687b75bdc5af05e888241e52ef594aa752ba9425cf966412

                                      • C:\ProgramData\Start.exe

                                        Filesize

                                        6.0MB

                                        MD5

                                        7f4ee2df4db93ba993748531ae3fa241

                                        SHA1

                                        ed33ba6de8beb198f61a7f629828378eb90426c2

                                        SHA256

                                        ffda77db26e59f2a8a8e1db7615b94ed1e8b2c19b6ff89c0295ff3a744378911

                                        SHA512

                                        a4b8e5ecb2a015eb2bcf9e431add61c432d17fe5633d5d29c4d1c8268ab85f09aa40716bd2312d2459f783856671ec20de06053399d3cb41fba1932f7ac26028

                                      • C:\ProgramData\Start.exe

                                        Filesize

                                        6.0MB

                                        MD5

                                        7f4ee2df4db93ba993748531ae3fa241

                                        SHA1

                                        ed33ba6de8beb198f61a7f629828378eb90426c2

                                        SHA256

                                        ffda77db26e59f2a8a8e1db7615b94ed1e8b2c19b6ff89c0295ff3a744378911

                                        SHA512

                                        a4b8e5ecb2a015eb2bcf9e431add61c432d17fe5633d5d29c4d1c8268ab85f09aa40716bd2312d2459f783856671ec20de06053399d3cb41fba1932f7ac26028

                                      • C:\Users\Admin\AppData\Roaming\microsoft360.vbs

                                        Filesize

                                        465B

                                        MD5

                                        677ed1bfb1899a9ab007b959aa11eb24

                                        SHA1

                                        316ae82a87169610b12e1459b70e0d820c5f668f

                                        SHA256

                                        053808d02f04cbff21617dc84fb1419a9027872ea68d891c21fd4a7f121967cd

                                        SHA512

                                        c84e29f5aecd3c0730cf98a1961ded8ea6ac6d4db0cce5092c708c6c713d3d6cef26468b3048db2e98c618cd04fa68ab87efaa3ab5d3fd6daa0b31e9509eb933

                                      • C:\Users\Admin\AppData\Roaming\officedeploymenttool_15330-20230.exe

                                        Filesize

                                        4.4MB

                                        MD5

                                        e000c22430d5ac93d05294b36f90e712

                                        SHA1

                                        a588d552aa400bfe41b14e6984e26e44efa49bd2

                                        SHA256

                                        69f75ce43b6ac08fa0ad6bc040cf43c58ee0f1e595b607016a63c2478772c2f9

                                        SHA512

                                        0213d16c35128fadd2c01117709202b6b121fd190f5836ac8ee0834f034bdc00f1d0655bcfaac795dd81eb9e3f0ef7a0c252906f664d877794ce2cfb2027718c

                                      • C:\Users\Admin\AppData\Roaming\officedeploymenttool_15330-20230.exe

                                        Filesize

                                        4.4MB

                                        MD5

                                        e000c22430d5ac93d05294b36f90e712

                                        SHA1

                                        a588d552aa400bfe41b14e6984e26e44efa49bd2

                                        SHA256

                                        69f75ce43b6ac08fa0ad6bc040cf43c58ee0f1e595b607016a63c2478772c2f9

                                        SHA512

                                        0213d16c35128fadd2c01117709202b6b121fd190f5836ac8ee0834f034bdc00f1d0655bcfaac795dd81eb9e3f0ef7a0c252906f664d877794ce2cfb2027718c

                                      • \ProgramData\Immunity\libeay32.dll

                                        Filesize

                                        1.3MB

                                        MD5

                                        4cb2e1b9294ddae1bf7dcaaf42b365d1

                                        SHA1

                                        a225f53a8403d9b73d77bcbb075194520cce5a14

                                        SHA256

                                        a8124500cae0aba3411428c2c6df2762ea11cc11c312abed415d3f3667eb6884

                                        SHA512

                                        46cf4abf9121c865c725ca159df71066e0662595915d653914e4ec047f94e2ab3823f85c9e0e0c1311304c460c90224bd3141da62091c733dcaa5dccf64c04bb

                                      • \ProgramData\Immunity\libeay32.dll

                                        Filesize

                                        1.3MB

                                        MD5

                                        4cb2e1b9294ddae1bf7dcaaf42b365d1

                                        SHA1

                                        a225f53a8403d9b73d77bcbb075194520cce5a14

                                        SHA256

                                        a8124500cae0aba3411428c2c6df2762ea11cc11c312abed415d3f3667eb6884

                                        SHA512

                                        46cf4abf9121c865c725ca159df71066e0662595915d653914e4ec047f94e2ab3823f85c9e0e0c1311304c460c90224bd3141da62091c733dcaa5dccf64c04bb

                                      • \ProgramData\Immunity\rutserv.exe

                                        Filesize

                                        13.2MB

                                        MD5

                                        990a46a46e2550c2f88fbde507b7e36d

                                        SHA1

                                        2797ed1bfcfe5909d2d63259e6d42760ad7f5520

                                        SHA256

                                        31efbec8319390cfc0cbcac3932ab71aa6ef5ea4f3e90e17da166a9a52f78c7e

                                        SHA512

                                        530cc7624c527713eacd9c7daf8d29ef5644bdf52088efb5a1e4e797a7506676c5a7a56f66656cef2ef51e83eede422f1ca859571b6a1a0e6822c709057a4838

                                      • \ProgramData\Immunity\ssleay32.dll

                                        Filesize

                                        337KB

                                        MD5

                                        5c268ca919854fc22d85f916d102ee7f

                                        SHA1

                                        0957cf86e0334673eb45945985b5c033b412be0e

                                        SHA256

                                        1f4b3efc919af1106f348662ee9ad95ab019058ff502e3d68e1b5f7abff91b56

                                        SHA512

                                        76d0abad1d7d0856ec1b8e598b05a2a6eece220ea39d74e7f6278a4219e22c75b7f618160ce41810daa57d5d4d534afd78f5cc1bd6de927dbb6a551aca2f8310

                                      • \ProgramData\Immunity\ssleay32.dll

                                        Filesize

                                        337KB

                                        MD5

                                        5c268ca919854fc22d85f916d102ee7f

                                        SHA1

                                        0957cf86e0334673eb45945985b5c033b412be0e

                                        SHA256

                                        1f4b3efc919af1106f348662ee9ad95ab019058ff502e3d68e1b5f7abff91b56

                                        SHA512

                                        76d0abad1d7d0856ec1b8e598b05a2a6eece220ea39d74e7f6278a4219e22c75b7f618160ce41810daa57d5d4d534afd78f5cc1bd6de927dbb6a551aca2f8310

                                      • \ProgramData\Start.exe

                                        Filesize

                                        6.0MB

                                        MD5

                                        7f4ee2df4db93ba993748531ae3fa241

                                        SHA1

                                        ed33ba6de8beb198f61a7f629828378eb90426c2

                                        SHA256

                                        ffda77db26e59f2a8a8e1db7615b94ed1e8b2c19b6ff89c0295ff3a744378911

                                        SHA512

                                        a4b8e5ecb2a015eb2bcf9e431add61c432d17fe5633d5d29c4d1c8268ab85f09aa40716bd2312d2459f783856671ec20de06053399d3cb41fba1932f7ac26028

                                      • \Users\Admin\AppData\Roaming\officedeploymenttool_15330-20230.exe

                                        Filesize

                                        4.4MB

                                        MD5

                                        e000c22430d5ac93d05294b36f90e712

                                        SHA1

                                        a588d552aa400bfe41b14e6984e26e44efa49bd2

                                        SHA256

                                        69f75ce43b6ac08fa0ad6bc040cf43c58ee0f1e595b607016a63c2478772c2f9

                                        SHA512

                                        0213d16c35128fadd2c01117709202b6b121fd190f5836ac8ee0834f034bdc00f1d0655bcfaac795dd81eb9e3f0ef7a0c252906f664d877794ce2cfb2027718c

                                      • memory/1588-54-0x0000000074E81000-0x0000000074E83000-memory.dmp

                                        Filesize

                                        8KB