Analysis

  • max time kernel
    136s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    31-08-2022 02:36

General

  • Target

    officedeploymenttool_15330-20230.exe

  • Size

    4.4MB

  • MD5

    ad65a509881ef712234bb07cb1165a46

  • SHA1

    519a968fe267b9bf77f7ff2ba1074e8e20202d60

  • SHA256

    98abbdc3e858ec0647826f9ea66624a15424e4b9c7e6a026341b41f0668f4423

  • SHA512

    eb584be09f95f292b9cf4197685ad8762f84e39c4308eb0dfbfde2b82482cb58f13cbbde6bd49d3ad5d52bf96a8fea068de3d960a06242f25eb85d933ca322fd

  • SSDEEP

    98304:HXz+89bq0C+fRXzclLI6bei3yTu8HsXwKcuj:3K8Bq0DfaN/3yTSAUj

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\officedeploymenttool_15330-20230.exe
    "C:\Users\Admin\AppData\Local\Temp\officedeploymenttool_15330-20230.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\microsoft360.vbs"
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1776
      • C:\ProgramData\Start.exe
        "C:\ProgramData\Start.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\ProgramData\Immunity\bitcoin.cmd" "
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1560
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "bitcoin" /t REG_SZ /d "c:\ProgramData\Immunity\rutserv.exe"
            5⤵
            • Adds Run key to start application
            PID:600
          • C:\ProgramData\Immunity\rutserv.exe
            "C:\ProgramData\Immunity\rutserv.exe"
            5⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:108
            • C:\ProgramData\Immunity\rutserv.exe
              C:\ProgramData\Immunity\rutserv.exe -second
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:900
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1600
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1804
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1088
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:360
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1984
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1876
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1568
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1176
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1464
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1680
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1716
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1580
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1308
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1840
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1472
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1160
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1204
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:656
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2016
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1484
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1976
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1568
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:864
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:536
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1060
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1380
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1576
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1956
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:568
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:844
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1404
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1376
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1964
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:960
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1664
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1156
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1732
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:536
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1060
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1380
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1172
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1144
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:568
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:844
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1404
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1376
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1964
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1648
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1664
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1696
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1568
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1532
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1000
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:676
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1840
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1800
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2004
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1204
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1764
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:980
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1312
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            PID:648
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            PID:960
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
            • Kills process with taskkill
            PID:520
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im "rundll32.exe"
            5⤵
              PID:1316
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              5⤵
              • Kills process with taskkill
              PID:864
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              5⤵
              • Kills process with taskkill
              PID:1080
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              5⤵
                PID:1288
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /f /im "rundll32.exe"
                5⤵
                • Kills process with taskkill
                PID:1652
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /f /im "rundll32.exe"
                5⤵
                • Kills process with taskkill
                PID:1060
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /f /im "rundll32.exe"
                5⤵
                  PID:676
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /f /im "rundll32.exe"
                  5⤵
                    PID:1644
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im "rundll32.exe"
                    5⤵
                    • Kills process with taskkill
                    PID:816
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im "rundll32.exe"
                    5⤵
                    • Kills process with taskkill
                    PID:1144
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im "rundll32.exe"
                    5⤵
                      PID:1352
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /f /im "rundll32.exe"
                      5⤵
                        PID:360
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /f /im "rundll32.exe"
                        5⤵
                        • Kills process with taskkill
                        PID:1992
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /f /im "rundll32.exe"
                        5⤵
                        • Kills process with taskkill
                        PID:1376
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /f /im "rundll32.exe"
                        5⤵
                          PID:648
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /f /im "rundll32.exe"
                          5⤵
                          • Kills process with taskkill
                          PID:960
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /f /im "rundll32.exe"
                          5⤵
                          • Kills process with taskkill
                          PID:520
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /f /im "rundll32.exe"
                          5⤵
                          • Kills process with taskkill
                          PID:1732
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /f /im "rundll32.exe"
                          5⤵
                          • Kills process with taskkill
                          PID:536
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /f /im "rundll32.exe"
                          5⤵
                            PID:1616
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /f /im "rundll32.exe"
                            5⤵
                            • Kills process with taskkill
                            PID:2008
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /f /im "rundll32.exe"
                            5⤵
                            • Kills process with taskkill
                            PID:1956
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /f /im "rundll32.exe"
                            5⤵
                            • Kills process with taskkill
                            PID:1600
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /f /im "rundll32.exe"
                            5⤵
                            • Kills process with taskkill
                            PID:1816
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /f /im "rundll32.exe"
                            5⤵
                            • Kills process with taskkill
                            PID:636
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /f /im "rundll32.exe"
                            5⤵
                              PID:1204
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /f /im "rundll32.exe"
                              5⤵
                                PID:1984
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /f /im "rundll32.exe"
                                5⤵
                                • Kills process with taskkill
                                PID:1744
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /f /im "rundll32.exe"
                                5⤵
                                  PID:1972
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /f /im "rundll32.exe"
                                  5⤵
                                  • Kills process with taskkill
                                  PID:1712
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /f /im "rundll32.exe"
                                  5⤵
                                    PID:964
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    5⤵
                                      PID:1776
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /f /im "rundll32.exe"
                                      5⤵
                                      • Kills process with taskkill
                                      PID:976
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /f /im "rundll32.exe"
                                      5⤵
                                      • Kills process with taskkill
                                      PID:1196
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /f /im "rundll32.exe"
                                      5⤵
                                        PID:600
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /f /im "rundll32.exe"
                                        5⤵
                                        • Kills process with taskkill
                                        PID:544
                                • C:\Users\Admin\AppData\Roaming\officedeploymenttool_15330-20230.exe
                                  "C:\Users\Admin\AppData\Roaming\officedeploymenttool_15330-20230.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  PID:1612

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\ProgramData\Immunity\bitcoin.cmd

                                Filesize

                                254B

                                MD5

                                5e5006b2a14020e2714d314846ba6371

                                SHA1

                                a23988ea442d700fee4e570283c4a63bc61cdd5c

                                SHA256

                                708bef0dccec5ba577f5cf95709bd774f72f612105c43f17ef9b1c9a3c30762a

                                SHA512

                                be7210d7eb79048460dbd142212a1eb05f2d6b781598ec397260592d46eb0c66d3305bedc687e79e024f4d1b66474c485d758f774093e7452b0b77ab23ba4302

                              • C:\ProgramData\Immunity\libeay32.dll

                                Filesize

                                1.3MB

                                MD5

                                4cb2e1b9294ddae1bf7dcaaf42b365d1

                                SHA1

                                a225f53a8403d9b73d77bcbb075194520cce5a14

                                SHA256

                                a8124500cae0aba3411428c2c6df2762ea11cc11c312abed415d3f3667eb6884

                                SHA512

                                46cf4abf9121c865c725ca159df71066e0662595915d653914e4ec047f94e2ab3823f85c9e0e0c1311304c460c90224bd3141da62091c733dcaa5dccf64c04bb

                              • C:\ProgramData\Immunity\rfusclient.exe

                                Filesize

                                337KB

                                MD5

                                5c268ca919854fc22d85f916d102ee7f

                                SHA1

                                0957cf86e0334673eb45945985b5c033b412be0e

                                SHA256

                                1f4b3efc919af1106f348662ee9ad95ab019058ff502e3d68e1b5f7abff91b56

                                SHA512

                                76d0abad1d7d0856ec1b8e598b05a2a6eece220ea39d74e7f6278a4219e22c75b7f618160ce41810daa57d5d4d534afd78f5cc1bd6de927dbb6a551aca2f8310

                              • C:\ProgramData\Immunity\russian.lg

                                Filesize

                                64KB

                                MD5

                                55a0b95a1d1b7e309f2c22af82a07cc0

                                SHA1

                                521c41e185e5b5e73cfc4e1b18646dc4ed171942

                                SHA256

                                704a1a83d11c21717c17e6a7eb264d94a98d45a7c1aba8ebb82fafc65f4f199d

                                SHA512

                                38e3a8392f84cd31b9eb12ce4fa7ed04db29f4fe4de95e52f18cdc6e7c74a0b2673d15ab40802bf289ed3a1e83526827b012ceddbb309f40c5302547ce39f5f9

                              • C:\ProgramData\Immunity\rutserv.exe

                                Filesize

                                13.2MB

                                MD5

                                990a46a46e2550c2f88fbde507b7e36d

                                SHA1

                                2797ed1bfcfe5909d2d63259e6d42760ad7f5520

                                SHA256

                                31efbec8319390cfc0cbcac3932ab71aa6ef5ea4f3e90e17da166a9a52f78c7e

                                SHA512

                                530cc7624c527713eacd9c7daf8d29ef5644bdf52088efb5a1e4e797a7506676c5a7a56f66656cef2ef51e83eede422f1ca859571b6a1a0e6822c709057a4838

                              • C:\ProgramData\Immunity\rutserv.exe

                                Filesize

                                13.2MB

                                MD5

                                990a46a46e2550c2f88fbde507b7e36d

                                SHA1

                                2797ed1bfcfe5909d2d63259e6d42760ad7f5520

                                SHA256

                                31efbec8319390cfc0cbcac3932ab71aa6ef5ea4f3e90e17da166a9a52f78c7e

                                SHA512

                                530cc7624c527713eacd9c7daf8d29ef5644bdf52088efb5a1e4e797a7506676c5a7a56f66656cef2ef51e83eede422f1ca859571b6a1a0e6822c709057a4838

                              • C:\ProgramData\Immunity\rutserv.exe

                                Filesize

                                13.2MB

                                MD5

                                990a46a46e2550c2f88fbde507b7e36d

                                SHA1

                                2797ed1bfcfe5909d2d63259e6d42760ad7f5520

                                SHA256

                                31efbec8319390cfc0cbcac3932ab71aa6ef5ea4f3e90e17da166a9a52f78c7e

                                SHA512

                                530cc7624c527713eacd9c7daf8d29ef5644bdf52088efb5a1e4e797a7506676c5a7a56f66656cef2ef51e83eede422f1ca859571b6a1a0e6822c709057a4838

                              • C:\ProgramData\Immunity\settings.dat

                                Filesize

                                6KB

                                MD5

                                6fd0f4d5c8079fc0878ee9231af53440

                                SHA1

                                7add89541e314d2e5e27eebdaf054a5083119bdd

                                SHA256

                                200555ea21bd554e0c16282d33fea73ccda37624aaffed63b14ced5ade3f033f

                                SHA512

                                38f306aaf33cb45591d4cfb22d9714fecc3dd349f3bc3e49578338ef8030b42cab42b730edfd2d5313771ca43a63531274bf458bbcc1c40c0665e8585b544983

                              • C:\ProgramData\Immunity\ssleay32.dll

                                Filesize

                                337KB

                                MD5

                                5c268ca919854fc22d85f916d102ee7f

                                SHA1

                                0957cf86e0334673eb45945985b5c033b412be0e

                                SHA256

                                1f4b3efc919af1106f348662ee9ad95ab019058ff502e3d68e1b5f7abff91b56

                                SHA512

                                76d0abad1d7d0856ec1b8e598b05a2a6eece220ea39d74e7f6278a4219e22c75b7f618160ce41810daa57d5d4d534afd78f5cc1bd6de927dbb6a551aca2f8310

                              • C:\ProgramData\Immunity\vp8decoder.dll

                                Filesize

                                380KB

                                MD5

                                1ea62293ac757a0c2b64e632f30db636

                                SHA1

                                8c8ac6f8f28f432a514c3a43ea50c90daf66bfba

                                SHA256

                                970cb3e00fa68daec266cd0aa6149d3604cb696853772f20ad67555a2114d5df

                                SHA512

                                857872a260cd590bd533b5d72e6e830bb0e4e037cb6749bb7d6e1239297f21606cdbe4a0fb1492cdead6f46c88dd9eb6fab5c6e17029f7df5231cefc21fa35ab

                              • C:\ProgramData\Immunity\vp8encoder.dll

                                Filesize

                                1.6MB

                                MD5

                                89770647609ac26c1bbd9cf6ed50954e

                                SHA1

                                349eed120070bab7e96272697b39e786423ac1d3

                                SHA256

                                7b4fc8e104914cdd6a7bf3f05c0d7197cfcd30a741cc0856155f2c74e62005a4

                                SHA512

                                a98688f1c80ca79ee8d15d680a61420ffb49f55607fa25711925735d0e8dbc21f3b13d470f22e0829c72a66a798eee163411b2f078113ad8153eed98ef37a2cc

                              • C:\ProgramData\Immunity\webmmux.dll

                                Filesize

                                260KB

                                MD5

                                d29f7070ee379544aeb19913621c88e6

                                SHA1

                                499dcdb39862fd8ff5cbc4b13da9c465bfd5f4be

                                SHA256

                                654f43108fbd56bd2a3c5a3a74a2ff3f19ea9e670613b92a624e86747a496caf

                                SHA512

                                4ead1c8e0d33f2a6c35163c42e8f0630954de67e63bcadca003691635ccf8bfe709363ec88edb387b956535fdb476bc0b5773ede5b19cacf4858fb50072bbef5

                              • C:\ProgramData\Immunity\webmvorbisdecoder.dll

                                Filesize

                                365KB

                                MD5

                                7a9eeac3ceaf7f95f44eb5c57b4db2e3

                                SHA1

                                be1048c254aa3114358f76d08c55667c4bf2d382

                                SHA256

                                b497d07ed995b16d1146209158d3b90d85c47a643fbf25a5158b26d75c478c88

                                SHA512

                                b68fa132c3588637d62a1c2bce8f8acc78e6e2f904a53644d732dc0f4e4fbc61a2829a1ac8f6b97fe4be4f3613ef92c43e6f2ab29c6abd968acc5acd635c990d

                              • C:\ProgramData\Immunity\webmvorbisencoder.dll

                                Filesize

                                860KB

                                MD5

                                5308b9945e348fbe3a480be06885434c

                                SHA1

                                5c3cb39686cca3e9586e4b405fc8e1853caaf8ff

                                SHA256

                                9dc30fb2118aad48f6a5e0a82504f365fe40abb3134f6cceeb65859f61ad939a

                                SHA512

                                4d7f08dc738a944bcee9b013b13d595e9c913b248c42a6c095cbdfc6059da7f04cca935841ff8a43687b75bdc5af05e888241e52ef594aa752ba9425cf966412

                              • C:\ProgramData\Start.exe

                                Filesize

                                6.0MB

                                MD5

                                7f4ee2df4db93ba993748531ae3fa241

                                SHA1

                                ed33ba6de8beb198f61a7f629828378eb90426c2

                                SHA256

                                ffda77db26e59f2a8a8e1db7615b94ed1e8b2c19b6ff89c0295ff3a744378911

                                SHA512

                                a4b8e5ecb2a015eb2bcf9e431add61c432d17fe5633d5d29c4d1c8268ab85f09aa40716bd2312d2459f783856671ec20de06053399d3cb41fba1932f7ac26028

                              • C:\ProgramData\Start.exe

                                Filesize

                                6.0MB

                                MD5

                                7f4ee2df4db93ba993748531ae3fa241

                                SHA1

                                ed33ba6de8beb198f61a7f629828378eb90426c2

                                SHA256

                                ffda77db26e59f2a8a8e1db7615b94ed1e8b2c19b6ff89c0295ff3a744378911

                                SHA512

                                a4b8e5ecb2a015eb2bcf9e431add61c432d17fe5633d5d29c4d1c8268ab85f09aa40716bd2312d2459f783856671ec20de06053399d3cb41fba1932f7ac26028

                              • C:\Users\Admin\AppData\Roaming\microsoft360.vbs

                                Filesize

                                465B

                                MD5

                                677ed1bfb1899a9ab007b959aa11eb24

                                SHA1

                                316ae82a87169610b12e1459b70e0d820c5f668f

                                SHA256

                                053808d02f04cbff21617dc84fb1419a9027872ea68d891c21fd4a7f121967cd

                                SHA512

                                c84e29f5aecd3c0730cf98a1961ded8ea6ac6d4db0cce5092c708c6c713d3d6cef26468b3048db2e98c618cd04fa68ab87efaa3ab5d3fd6daa0b31e9509eb933

                              • C:\Users\Admin\AppData\Roaming\officedeploymenttool_15330-20230.exe

                                Filesize

                                4.4MB

                                MD5

                                e000c22430d5ac93d05294b36f90e712

                                SHA1

                                a588d552aa400bfe41b14e6984e26e44efa49bd2

                                SHA256

                                69f75ce43b6ac08fa0ad6bc040cf43c58ee0f1e595b607016a63c2478772c2f9

                                SHA512

                                0213d16c35128fadd2c01117709202b6b121fd190f5836ac8ee0834f034bdc00f1d0655bcfaac795dd81eb9e3f0ef7a0c252906f664d877794ce2cfb2027718c

                              • C:\Users\Admin\AppData\Roaming\officedeploymenttool_15330-20230.exe

                                Filesize

                                4.4MB

                                MD5

                                e000c22430d5ac93d05294b36f90e712

                                SHA1

                                a588d552aa400bfe41b14e6984e26e44efa49bd2

                                SHA256

                                69f75ce43b6ac08fa0ad6bc040cf43c58ee0f1e595b607016a63c2478772c2f9

                                SHA512

                                0213d16c35128fadd2c01117709202b6b121fd190f5836ac8ee0834f034bdc00f1d0655bcfaac795dd81eb9e3f0ef7a0c252906f664d877794ce2cfb2027718c

                              • \ProgramData\Immunity\libeay32.dll

                                Filesize

                                1.3MB

                                MD5

                                4cb2e1b9294ddae1bf7dcaaf42b365d1

                                SHA1

                                a225f53a8403d9b73d77bcbb075194520cce5a14

                                SHA256

                                a8124500cae0aba3411428c2c6df2762ea11cc11c312abed415d3f3667eb6884

                                SHA512

                                46cf4abf9121c865c725ca159df71066e0662595915d653914e4ec047f94e2ab3823f85c9e0e0c1311304c460c90224bd3141da62091c733dcaa5dccf64c04bb

                              • \ProgramData\Immunity\libeay32.dll

                                Filesize

                                1.3MB

                                MD5

                                4cb2e1b9294ddae1bf7dcaaf42b365d1

                                SHA1

                                a225f53a8403d9b73d77bcbb075194520cce5a14

                                SHA256

                                a8124500cae0aba3411428c2c6df2762ea11cc11c312abed415d3f3667eb6884

                                SHA512

                                46cf4abf9121c865c725ca159df71066e0662595915d653914e4ec047f94e2ab3823f85c9e0e0c1311304c460c90224bd3141da62091c733dcaa5dccf64c04bb

                              • \ProgramData\Immunity\rutserv.exe

                                Filesize

                                13.2MB

                                MD5

                                990a46a46e2550c2f88fbde507b7e36d

                                SHA1

                                2797ed1bfcfe5909d2d63259e6d42760ad7f5520

                                SHA256

                                31efbec8319390cfc0cbcac3932ab71aa6ef5ea4f3e90e17da166a9a52f78c7e

                                SHA512

                                530cc7624c527713eacd9c7daf8d29ef5644bdf52088efb5a1e4e797a7506676c5a7a56f66656cef2ef51e83eede422f1ca859571b6a1a0e6822c709057a4838

                              • \ProgramData\Immunity\ssleay32.dll

                                Filesize

                                337KB

                                MD5

                                5c268ca919854fc22d85f916d102ee7f

                                SHA1

                                0957cf86e0334673eb45945985b5c033b412be0e

                                SHA256

                                1f4b3efc919af1106f348662ee9ad95ab019058ff502e3d68e1b5f7abff91b56

                                SHA512

                                76d0abad1d7d0856ec1b8e598b05a2a6eece220ea39d74e7f6278a4219e22c75b7f618160ce41810daa57d5d4d534afd78f5cc1bd6de927dbb6a551aca2f8310

                              • \ProgramData\Immunity\ssleay32.dll

                                Filesize

                                337KB

                                MD5

                                5c268ca919854fc22d85f916d102ee7f

                                SHA1

                                0957cf86e0334673eb45945985b5c033b412be0e

                                SHA256

                                1f4b3efc919af1106f348662ee9ad95ab019058ff502e3d68e1b5f7abff91b56

                                SHA512

                                76d0abad1d7d0856ec1b8e598b05a2a6eece220ea39d74e7f6278a4219e22c75b7f618160ce41810daa57d5d4d534afd78f5cc1bd6de927dbb6a551aca2f8310

                              • \ProgramData\Start.exe

                                Filesize

                                6.0MB

                                MD5

                                7f4ee2df4db93ba993748531ae3fa241

                                SHA1

                                ed33ba6de8beb198f61a7f629828378eb90426c2

                                SHA256

                                ffda77db26e59f2a8a8e1db7615b94ed1e8b2c19b6ff89c0295ff3a744378911

                                SHA512

                                a4b8e5ecb2a015eb2bcf9e431add61c432d17fe5633d5d29c4d1c8268ab85f09aa40716bd2312d2459f783856671ec20de06053399d3cb41fba1932f7ac26028

                              • \Users\Admin\AppData\Roaming\officedeploymenttool_15330-20230.exe

                                Filesize

                                4.4MB

                                MD5

                                e000c22430d5ac93d05294b36f90e712

                                SHA1

                                a588d552aa400bfe41b14e6984e26e44efa49bd2

                                SHA256

                                69f75ce43b6ac08fa0ad6bc040cf43c58ee0f1e595b607016a63c2478772c2f9

                                SHA512

                                0213d16c35128fadd2c01117709202b6b121fd190f5836ac8ee0834f034bdc00f1d0655bcfaac795dd81eb9e3f0ef7a0c252906f664d877794ce2cfb2027718c

                              • memory/1584-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

                                Filesize

                                8KB

                              • memory/1612-63-0x0000000073F31000-0x0000000073F33000-memory.dmp

                                Filesize

                                8KB