Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    23/09/2023, 01:11

General

  • Target

    182593310607f0f7b47ad80cbf5fbe74.exe

  • Size

    7.5MB

  • MD5

    182593310607f0f7b47ad80cbf5fbe74

  • SHA1

    f74bdec42f5bb2dbbde3898e9e0bc2d16eb0fe99

  • SHA256

    393b4de1154e2b1164c0db18643ed0accc95efe44687cd41af730422ed6bbccf

  • SHA512

    dfb88e5b7de63e4a79df542c4d47f7d5b288e0f88fbe30d59284d8f275acb29bb93c776edc16c649a1daf511ffb302980ee19175c9f4ee4aae38db679dcc71e8

  • SSDEEP

    196608:V7iFSsOfzkZj1Cwx8fMZYe+1ClL4oQ0utRkNk:V7Rza1dxAMZmVdtWNk

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • UAC bypass 3 TTPs 2 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 6 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\182593310607f0f7b47ad80cbf5fbe74.exe
    "C:\Users\Admin\AppData\Local\Temp\182593310607f0f7b47ad80cbf5fbe74.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Builder.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\Builder.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1044
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\msg.vbs"
          4⤵
            PID:2268
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
            4⤵
            • UAC bypass
            • Modifies registry key
            PID:2712
          • C:\Users\Admin\AppData\Local\Temp\Builder.exe
            Builder.exe -p77854785474654654648787878876453354890332223456
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2624
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Builder505345\233.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2640
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\Builder505345\233.bat" "
                6⤵
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:2464
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                  7⤵
                  • UAC bypass
                  • Modifies registry key
                  PID:2536
                • C:\Users\Admin\AppData\Local\Temp\Builder505345\stcm.exe
                  "stcm.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:2548
                  • C:\Users\Admin\AppData\Local\Temp\Builder505345\Builder.exe
                    Builder.exe
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2884
                  • C:\Users\Admin\AppData\Local\Temp\Builder505345\Winlock-Builder.exe
                    Winlock-Builder.exe
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Adds Run key to start application
                    PID:1936
                    • C:\ProgramData\Windows64\smss.exe
                      "C:\ProgramData\Windows64\smss.exe"
                      9⤵
                      • Executes dropped EXE
                      PID:812
                    • C:\ProgramData\Windows64\svchost.exe
                      "C:\ProgramData\Windows64\svchost.exe"
                      9⤵
                      • Executes dropped EXE
                      PID:572
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c ""C:\ProgramData\Windows64\register.bat" "
                      9⤵
                      • Loads dropped DLL
                      PID:692
                      • C:\Windows\SysWOW64\attrib.exe
                        attrib +s +h "C:\ProgramData\Windows64"
                        10⤵
                        • Sets file to hidden
                        • Views/modifies file attributes
                        PID:1744
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /im rfusclient.exe /f
                        10⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1712
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /im rutserv.exe /f
                        10⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1104
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /im dwmhost.exe /f
                        10⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:240
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /im forderhost.exe /f
                        10⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2336
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /im cutsent.exe /f
                        10⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1136
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /im MSASCuiCom.exe /f
                        10⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1004
                      • C:\Windows\SysWOW64\reg.exe
                        reg delete "HKLM\SYSTEM\Remote Manipulator System" /f
                        10⤵
                          PID:864
                        • C:\Windows\SysWOW64\regedit.exe
                          regedit /s C:\ProgramData\Windows64\settings_default.reg
                          10⤵
                          • Runs .reg file with regedit
                          PID:1360
                        • C:\ProgramData\Windows64\cutsent.exe
                          "C:\ProgramData\Windows64\cutsent.exe" /silentinstall
                          10⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of SetWindowsHookEx
                          PID:2148
                        • C:\ProgramData\Windows64\cutsent.exe
                          "C:\ProgramData\Windows64\cutsent.exe" /firewall
                          10⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of SetWindowsHookEx
                          PID:2860
                        • C:\Windows\SysWOW64\regedit.exe
                          regedit /s C:\ProgramData\Windows64\settings_default.reg
                          10⤵
                          • Runs .reg file with regedit
                          PID:2552
                        • C:\Windows\SysWOW64\sc.exe
                          sc failure RmanService reset= 0 actions= restart/5000/restart/5000/restart/5000
                          10⤵
                          • Launches sc.exe
                          PID:824
                        • C:\Windows\SysWOW64\sc.exe
                          sc config RmanService obj= LocalSystem type= interact type= own
                          10⤵
                          • Launches sc.exe
                          PID:1036
                        • C:\Windows\SysWOW64\sc.exe
                          sc config RManService DisplayName= "Windows Defender v6.3"
                          10⤵
                          • Launches sc.exe
                          PID:2804
                        • C:\ProgramData\Windows64\cutsent.exe
                          "C:\ProgramData\Windows64\cutsent.exe" /start
                          10⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of SetWindowsHookEx
                          PID:2136
                        • C:\Windows\SysWOW64\attrib.exe
                          attrib +s +h "C:\ProgramData\Windows64\*.*"
                          10⤵
                          • Sets file to hidden
                          • Views/modifies file attributes
                          PID:2128
      • C:\ProgramData\Windows64\cutsent.exe
        C:\ProgramData\Windows64\cutsent.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1132
        • C:\ProgramData\Windows64\MSASCuiCom.exe
          C:\ProgramData\Windows64\MSASCuiCom.exe
          2⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2100
          • C:\ProgramData\Windows64\MSASCuiCom.exe
            C:\ProgramData\Windows64\MSASCuiCom.exe /tray
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: SetClipboardViewer
            PID:2524
        • C:\ProgramData\Windows64\MSASCuiCom.exe
          C:\ProgramData\Windows64\MSASCuiCom.exe /tray
          2⤵
          • Executes dropped EXE
          PID:1972

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\Windows64\EULA.rtf

              Filesize

              118KB

              MD5

              4da4c145104e3d4081a17d4c8860b25e

              SHA1

              44567ae2b0a90b7ade24493255eb193f858448e9

              SHA256

              8f1c3af4e2d68ebb2d09c3620af27134fcb683b4cc329d2facf333e228be6565

              SHA512

              c2764b8db142d6484af33f95672fef8cb2e4a1faf15e29e0d1c7fe5cef6265571fb34c7bd843b8b0de965e7ad98e011e9b09caf7bceb265ea5b7d5c621ecba03

            • C:\ProgramData\Windows64\English.lg

              Filesize

              43KB

              MD5

              bc25377ade68750b834c81fa71c233b8

              SHA1

              84dbb465dd2125f47668e2508e18af9bd6db2fd8

              SHA256

              9a48a7ea7ba2c2f33280d1e1722ebbc59bf81bc6c5a1f97edca53ea641ffd8e3

              SHA512

              205ab195339d7108adbe6dfabd48e4e21c5956ded587d7213a44618f0d34a43f7b8abaa7765b9d31695efacfc44beeb69fbaa3cb27c141b6a653713fdf5ebce5

            • C:\ProgramData\Windows64\MSASCuiCom.exe

              Filesize

              5.1MB

              MD5

              9f01cda6b9945bc5bb8d52b4d233cf5a

              SHA1

              6b15fbbedbd681f6b63baf92898c7fc98283f668

              SHA256

              3bf1fa127d83ba65f27cb9f1b797b63d621eefc5ea1beb5803c0c2806b402c5b

              SHA512

              dd85e583dd408b81e326d55698812f5b365fe8fa78407af66151f1d403746438b0fe722080381750d255d4117d8b3d9e4e71eefbfb9829337feb6dcd2615c6c3

            • C:\ProgramData\Windows64\MSASCuiCom.exe

              Filesize

              5.1MB

              MD5

              9f01cda6b9945bc5bb8d52b4d233cf5a

              SHA1

              6b15fbbedbd681f6b63baf92898c7fc98283f668

              SHA256

              3bf1fa127d83ba65f27cb9f1b797b63d621eefc5ea1beb5803c0c2806b402c5b

              SHA512

              dd85e583dd408b81e326d55698812f5b365fe8fa78407af66151f1d403746438b0fe722080381750d255d4117d8b3d9e4e71eefbfb9829337feb6dcd2615c6c3

            • C:\ProgramData\Windows64\MSASCuiCom.exe

              Filesize

              5.1MB

              MD5

              9f01cda6b9945bc5bb8d52b4d233cf5a

              SHA1

              6b15fbbedbd681f6b63baf92898c7fc98283f668

              SHA256

              3bf1fa127d83ba65f27cb9f1b797b63d621eefc5ea1beb5803c0c2806b402c5b

              SHA512

              dd85e583dd408b81e326d55698812f5b365fe8fa78407af66151f1d403746438b0fe722080381750d255d4117d8b3d9e4e71eefbfb9829337feb6dcd2615c6c3

            • C:\ProgramData\Windows64\MSASCuiCom.exe

              Filesize

              5.1MB

              MD5

              9f01cda6b9945bc5bb8d52b4d233cf5a

              SHA1

              6b15fbbedbd681f6b63baf92898c7fc98283f668

              SHA256

              3bf1fa127d83ba65f27cb9f1b797b63d621eefc5ea1beb5803c0c2806b402c5b

              SHA512

              dd85e583dd408b81e326d55698812f5b365fe8fa78407af66151f1d403746438b0fe722080381750d255d4117d8b3d9e4e71eefbfb9829337feb6dcd2615c6c3

            • C:\ProgramData\Windows64\RIPCServer.dll

              Filesize

              144KB

              MD5

              2ddfa39f5c2fd3f00681ef2970617e4b

              SHA1

              8152aa18afbacf398b92168995ec8696d3fe3659

              SHA256

              f938bdc741ef1d2738b532aef001a160e3a3627ed8a27158b7017ee49fc65791

              SHA512

              f89f0f02cda650c138e4ebaef198f0762dfd571ef7d46a6b3710cd93d76bc52a79055c55afca46128a9a84a795a5cb946ca93c492e07cfb503c9b27d96211e20

            • C:\ProgramData\Windows64\RWLN.dll

              Filesize

              975KB

              MD5

              3d0b27b3f8aa22575aa0faf0b2d67216

              SHA1

              39fc787538849692ed7352418616f467b7a86a1d

              SHA256

              d7782488ef29bf0fd7e8faf0bd24414a6540bf7366434692a5a485d5ae2d7d44

              SHA512

              19f0785d3cecce0dbbb7da1be640bffebe4daedc65a513d1db0b5e533eb96aaa0588831de74c88e5013c00405e03ca4188c4b633e39e6c49ab5c1d1b42191ca8

            • C:\ProgramData\Windows64\Russian.lg

              Filesize

              48KB

              MD5

              e44e34bc285b709f08f967325d9c8be1

              SHA1

              e73f05c6a980ec9d006930c5343955f89579b409

              SHA256

              1d99a7b5f7b3daa61fa773972b1e335aa09b92411484f6ddc99d2b2894455a5b

              SHA512

              576b292b6e9cf022822443e050994462a6cbd9a3c60063bae9f54c78a84e75e17bb5eddf7e259a22a9d93f757cb6536c503762e2a30e75091e40c2756cde8727

            • C:\ProgramData\Windows64\cutsent.exe

              Filesize

              6.0MB

              MD5

              ff7174301073d0ec056641462f9a22b6

              SHA1

              f11a6746e51bc80c9771236b741d7c4ee503add3

              SHA256

              b1c59ad4a459860ba87b06c4189b958ae43dd6d53c5b1472b6d18daaf603736b

              SHA512

              e48fd01da90c934adfcb8f69cfe042ed6daeef42c6100713953db2da18e756ac369667f94cbdf8b8a3acac867ffcd2410e91d2cdfb966d7d9c2547f4fa8dcaf0

            • C:\ProgramData\Windows64\cutsent.exe

              Filesize

              6.0MB

              MD5

              ff7174301073d0ec056641462f9a22b6

              SHA1

              f11a6746e51bc80c9771236b741d7c4ee503add3

              SHA256

              b1c59ad4a459860ba87b06c4189b958ae43dd6d53c5b1472b6d18daaf603736b

              SHA512

              e48fd01da90c934adfcb8f69cfe042ed6daeef42c6100713953db2da18e756ac369667f94cbdf8b8a3acac867ffcd2410e91d2cdfb966d7d9c2547f4fa8dcaf0

            • C:\ProgramData\Windows64\cutsent.exe

              Filesize

              6.0MB

              MD5

              ff7174301073d0ec056641462f9a22b6

              SHA1

              f11a6746e51bc80c9771236b741d7c4ee503add3

              SHA256

              b1c59ad4a459860ba87b06c4189b958ae43dd6d53c5b1472b6d18daaf603736b

              SHA512

              e48fd01da90c934adfcb8f69cfe042ed6daeef42c6100713953db2da18e756ac369667f94cbdf8b8a3acac867ffcd2410e91d2cdfb966d7d9c2547f4fa8dcaf0

            • C:\ProgramData\Windows64\cutsent.exe

              Filesize

              6.0MB

              MD5

              ff7174301073d0ec056641462f9a22b6

              SHA1

              f11a6746e51bc80c9771236b741d7c4ee503add3

              SHA256

              b1c59ad4a459860ba87b06c4189b958ae43dd6d53c5b1472b6d18daaf603736b

              SHA512

              e48fd01da90c934adfcb8f69cfe042ed6daeef42c6100713953db2da18e756ac369667f94cbdf8b8a3acac867ffcd2410e91d2cdfb966d7d9c2547f4fa8dcaf0

            • C:\ProgramData\Windows64\cutsent.exe

              Filesize

              6.0MB

              MD5

              ff7174301073d0ec056641462f9a22b6

              SHA1

              f11a6746e51bc80c9771236b741d7c4ee503add3

              SHA256

              b1c59ad4a459860ba87b06c4189b958ae43dd6d53c5b1472b6d18daaf603736b

              SHA512

              e48fd01da90c934adfcb8f69cfe042ed6daeef42c6100713953db2da18e756ac369667f94cbdf8b8a3acac867ffcd2410e91d2cdfb966d7d9c2547f4fa8dcaf0

            • C:\ProgramData\Windows64\register.bat

              Filesize

              964B

              MD5

              8f85dcd35e93a2ea24c83be7b5701e0c

              SHA1

              047b292eb146402da32e6836dbe6fdba6a6471d1

              SHA256

              2aa3a5fa3e4c105ed4635cf0105020ebebb310ddc4d7460af96d1b3241738454

              SHA512

              15aa11a4f4a12ac75dd8ad3fb01eba1d205d493bca471cb59a9b5251f21df4572ccdaed4ee7467ebba09507e9496bf77c54b868f714a12f85a026af0718c93ce

            • C:\ProgramData\Windows64\register.bat

              Filesize

              964B

              MD5

              8f85dcd35e93a2ea24c83be7b5701e0c

              SHA1

              047b292eb146402da32e6836dbe6fdba6a6471d1

              SHA256

              2aa3a5fa3e4c105ed4635cf0105020ebebb310ddc4d7460af96d1b3241738454

              SHA512

              15aa11a4f4a12ac75dd8ad3fb01eba1d205d493bca471cb59a9b5251f21df4572ccdaed4ee7467ebba09507e9496bf77c54b868f714a12f85a026af0718c93ce

            • C:\ProgramData\Windows64\settings_default.reg

              Filesize

              25KB

              MD5

              d7cd6cbb169f1169bb75ed4677aa6db2

              SHA1

              ce11e912c0bbb0eed5502247fea5fb2bafc2d15a

              SHA256

              83880142ae9280a681ee215e03a090f3ff3fe575fc782950138b909bd51691c3

              SHA512

              e9b6549dc823933ad6fb89f366aa6c041e233b49983d016b5ce119da3555713949e74366a5d0390087910d4772d849751e060d3a00cf7b0d594952a831924796

            • C:\ProgramData\Windows64\smss.exe

              Filesize

              839KB

              MD5

              8ec3751b0c0211234b006ab19a1edabc

              SHA1

              e9e671f4dd1be888a88bbd842881df4e358d8811

              SHA256

              f49d328c68ff0a2e9a4ea957d01509a43729af2498cdb5e0309da37d1a051685

              SHA512

              320997c718442b5015d52d87a7225b642c2deb46438847d3f2ddb19acb67d0c8761c63c8c37f645ad25387d364e163d64a560da5d72b5ee493525bf364b18628

            • C:\ProgramData\Windows64\smss.exe

              Filesize

              839KB

              MD5

              8ec3751b0c0211234b006ab19a1edabc

              SHA1

              e9e671f4dd1be888a88bbd842881df4e358d8811

              SHA256

              f49d328c68ff0a2e9a4ea957d01509a43729af2498cdb5e0309da37d1a051685

              SHA512

              320997c718442b5015d52d87a7225b642c2deb46438847d3f2ddb19acb67d0c8761c63c8c37f645ad25387d364e163d64a560da5d72b5ee493525bf364b18628

            • C:\ProgramData\Windows64\smss.exe

              Filesize

              839KB

              MD5

              8ec3751b0c0211234b006ab19a1edabc

              SHA1

              e9e671f4dd1be888a88bbd842881df4e358d8811

              SHA256

              f49d328c68ff0a2e9a4ea957d01509a43729af2498cdb5e0309da37d1a051685

              SHA512

              320997c718442b5015d52d87a7225b642c2deb46438847d3f2ddb19acb67d0c8761c63c8c37f645ad25387d364e163d64a560da5d72b5ee493525bf364b18628

            • C:\ProgramData\Windows64\svchost.exe

              Filesize

              839KB

              MD5

              50ff7c66f3013fa020f0ce814d532a7a

              SHA1

              7337271380e9cf8f44c9c96cbe612702f504c33a

              SHA256

              f9f15d0e7121b578e63f6e9304e0aa5f8ced28d33eaf11871b2e831e5f10a645

              SHA512

              248221ada593ba240f4679269c288481534f80b0d3318c1471fc55656e6b78335c6d8fa096cfd0bf792a8ff48441d7c781ed0fee669f22f4ddc2fccd24fcc5dc

            • C:\ProgramData\Windows64\svchost.exe

              Filesize

              839KB

              MD5

              50ff7c66f3013fa020f0ce814d532a7a

              SHA1

              7337271380e9cf8f44c9c96cbe612702f504c33a

              SHA256

              f9f15d0e7121b578e63f6e9304e0aa5f8ced28d33eaf11871b2e831e5f10a645

              SHA512

              248221ada593ba240f4679269c288481534f80b0d3318c1471fc55656e6b78335c6d8fa096cfd0bf792a8ff48441d7c781ed0fee669f22f4ddc2fccd24fcc5dc

            • C:\ProgramData\Windows64\svchost.exe

              Filesize

              839KB

              MD5

              50ff7c66f3013fa020f0ce814d532a7a

              SHA1

              7337271380e9cf8f44c9c96cbe612702f504c33a

              SHA256

              f9f15d0e7121b578e63f6e9304e0aa5f8ced28d33eaf11871b2e831e5f10a645

              SHA512

              248221ada593ba240f4679269c288481534f80b0d3318c1471fc55656e6b78335c6d8fa096cfd0bf792a8ff48441d7c781ed0fee669f22f4ddc2fccd24fcc5dc

            • C:\ProgramData\Windows64\trial.vbs

              Filesize

              118B

              MD5

              841d3a8c1ad29f9f3b003798e6d126ea

              SHA1

              4a83f49a5c32b8d4a9f8ed04bc00c9fd3ee4a4e6

              SHA256

              2b439f541bb6f6f9368fea3317029762a05a376134143331859a7c02531ee386

              SHA512

              0ab6ef027ac59340f70df8c7cd3ec5edf966ce773fd5f3cd81b5524ca7964371a8a9f7800f6867ca042f812caf87a04b825f50b52c9b16c52a24a0a2c230bafa

            • C:\ProgramData\Windows64\vp8decoder.dll

              Filesize

              378KB

              MD5

              292a1748850d1fdc91d4ec23b02d6902

              SHA1

              8f15f1c24e11c0b45b19c82a78f7b79b1e7f932d

              SHA256

              acf354ad6ed94e876b29a60c5870dd91e7b3f76cc82c1a862c92024a12404a9f

              SHA512

              cf7579f1169ec21d9bf3c666d416d3fe2a4f9953d4d328b182452e40043f91055d301fd4b4a21454b847dbdb0af6a61c52657caded7d6fd7e88812aceeacf704

            • C:\ProgramData\Windows64\vp8encoder.dll

              Filesize

              1.6MB

              MD5

              4570f7a40357016c97afe0dd4faf749b

              SHA1

              ebc8a1660f1103c655559caab3a70ec23ca187f1

              SHA256

              a5f008bf852d4c73e001f840d6f8b233c7d9bc9570cee639d40c1c8723bf99f8

              SHA512

              6b16979d004adc04259f2ce043cde6f7b57f2ddf5f4cea7bb390fd6b9fb273d22355b837f1b5c2eae77ea7df792de8e6db43e31d7246f044935a8187dace493b

            • C:\ProgramData\Windows64\webmmux.dll

              Filesize

              258KB

              MD5

              038bf9f3a58560ad1130eeb85cdc1a87

              SHA1

              3571eb7293a2a3a5bf6eb21e1569cd151d995d1a

              SHA256

              d247afa3bd1ccc18e11eb099280802a61d3792a2018c476d95debf2091e9707d

              SHA512

              8ffa52b358841600b9122974079d22d4e11bc4214316cd85ac4d4af0e369112b6827029f74a9a9d3918db00c7fed3a9a1985e0b43da39783a748d78752ae2385

            • C:\ProgramData\Windows64\webmvorbisdecoder.dll

              Filesize

              363KB

              MD5

              eeb2c52abbc7eb1c029b7fec45a7f22e

              SHA1

              8bfeb412614e3db0a2bf0122f4d68cc27b8c3a61

              SHA256

              c0f0b84d587066af8f80f41a7be63b4c01547af3f1e011602ac1b6ee0ac54a2c

              SHA512

              0b5b83335c6f602b8397a3c2ae6d1e661d744eb27114463d53e344bf18774ccb38853d314ebe05536d4c28c29fe3fdaba041a6a46983789f064ca70881cfcb85

            • C:\ProgramData\Windows64\webmvorbisencoder.dll

              Filesize

              858KB

              MD5

              e38372f576d927f525ef8e1a34b54664

              SHA1

              26af9d1db0a3f91d7fe13147e55f06c302d59389

              SHA256

              4046bd0b93909a41d0fd96f0405a864c79a47f493165546569251c1f73db6b0b

              SHA512

              78b7477b000407990304ec37624b873514d4ed9daa1b42fd988707b7374ffab442ba28fe19884724867f3f0f7a5f12f7fc8c228c050115c902d1569e4a3b13c7

            • C:\Users\Admin\AppData\Local\Temp\Builder.bat

              Filesize

              178B

              MD5

              d86ba9964245f0e093af943af80cd22e

              SHA1

              c409a7e3df3f793fc9026345bd807b9b12cbe42a

              SHA256

              1cc08903216f1a56572ee1e18e97ca16b24a072bd40ad1763ff4b19d8fa76760

              SHA512

              9b70e66457d6b6139127f6ad768efa181257febade949950f79326694dc5fa552b713f82e7522a1e2e54fcdfcc55517913c93a08dcd19ab0d33456ff7fb24ee0

            • C:\Users\Admin\AppData\Local\Temp\Builder.exe

              Filesize

              7.4MB

              MD5

              b143dd2cd9be188249f7500d7f67e8b2

              SHA1

              b324251001bf4482d309962aec30afebc4b7c3c0

              SHA256

              f06691faca7a6ab26ca85f328839db2ad69f434a0de8ea7472937eb93a0479a5

              SHA512

              79c1cce8de0a91d843746a8b646ba489a00e84cccd74efcd85daf8aba09bbbd2c12cfb88d3567f88aa8d322b97bf2acf0fa1982d5d776ae83e819ba825cea260

            • C:\Users\Admin\AppData\Local\Temp\Builder.exe

              Filesize

              7.4MB

              MD5

              b143dd2cd9be188249f7500d7f67e8b2

              SHA1

              b324251001bf4482d309962aec30afebc4b7c3c0

              SHA256

              f06691faca7a6ab26ca85f328839db2ad69f434a0de8ea7472937eb93a0479a5

              SHA512

              79c1cce8de0a91d843746a8b646ba489a00e84cccd74efcd85daf8aba09bbbd2c12cfb88d3567f88aa8d322b97bf2acf0fa1982d5d776ae83e819ba825cea260

            • C:\Users\Admin\AppData\Local\Temp\Builder.vbs

              Filesize

              117B

              MD5

              f5b6bdc9f222af41d781114ff7a65cfb

              SHA1

              a1294e209a3a83749e26198517b6014d39b6be35

              SHA256

              d0047d954e637c8d35b33e9d0c5bb1da7d6659b4ecdd1466b694a6e4c90be884

              SHA512

              ba0493ee35fd5f4914e72c62b721dbf2f57a7e5b4283f4cf850b0463abfea70641aa18ff4d6ad619d10eb2aca08df73d5dd09f73dea0c4fe5e31f67d3b5c6b88

            • C:\Users\Admin\AppData\Local\Temp\Builder505345\233.bat

              Filesize

              116B

              MD5

              aae18ac617181ef2721b4a3dcaed048b

              SHA1

              7eff96ec14e65bcf9a4053bddca1cc500e73f660

              SHA256

              31e1b961e6244518e8a891f1c4ef447d370f60d0214b2bd5b69f95dd7ad20f5c

              SHA512

              b9f82369cfac4d5f627f7bd300ad3886bf785cd230a216546c9ab9f10d087ed3de9fb8e23559e63c6b913912ce22c1467e0e3b454c17ccfd0f350ff68ce03848

            • C:\Users\Admin\AppData\Local\Temp\Builder505345\233.vbs

              Filesize

              113B

              MD5

              21123accbf74e2f57fad193bf43f0501

              SHA1

              6d8ecbb84f56ba9f7108947ec32f9290fef3e347

              SHA256

              f534233d0dfd038fd8dc6e3a7f47f83f014e4d7789fb5e08b8fe09c08bd08e81

              SHA512

              47820b7c8985808e7f67bc81a71b9f3b752deab8f28170771fc73250058bd1373a8846cf5d93b15c4ec6f59a29eb53771f46a54491970e56ac2597aa0a545b83

            • C:\Users\Admin\AppData\Local\Temp\Builder505345\Builder.exe

              Filesize

              8.4MB

              MD5

              ca93001ff5b2276f52c3b35fb43727e8

              SHA1

              00ff6783f36d5b9d2da53e03b5e88028d0bd2d16

              SHA256

              a4899661d4392c52da77e437461f3f31d624ae32c67b6d30bb89ab1e56566069

              SHA512

              a62796d9abf7577cd2273781a6d54b0bd45e1e340e0e1f56df6195195a87dc4a2245c8845e86d806b7307fa18c011d4be7a844e9c62519bb9ad1f01c3a635c72

            • C:\Users\Admin\AppData\Local\Temp\Builder505345\Builder.exe

              Filesize

              8.4MB

              MD5

              ca93001ff5b2276f52c3b35fb43727e8

              SHA1

              00ff6783f36d5b9d2da53e03b5e88028d0bd2d16

              SHA256

              a4899661d4392c52da77e437461f3f31d624ae32c67b6d30bb89ab1e56566069

              SHA512

              a62796d9abf7577cd2273781a6d54b0bd45e1e340e0e1f56df6195195a87dc4a2245c8845e86d806b7307fa18c011d4be7a844e9c62519bb9ad1f01c3a635c72

            • C:\Users\Admin\AppData\Local\Temp\Builder505345\Winlock-Builder.exe

              Filesize

              5.1MB

              MD5

              c077a47803a091cf742d442109a3b0ad

              SHA1

              1cc0dd52704309d3a991cd2698469d1e6af282fe

              SHA256

              6fdc2babc58ba676719e69ec9d92e2420044acad0482e93cf3f7cb901a385784

              SHA512

              d53cb6ae5f0046e6faa2cab9dbeb0568ca89870ec2a4a2d022bf14b34294588af69154ad098e91e0ad8bc77789216909f765a440c30e67e1d41e5cc1e2fd73d5

            • C:\Users\Admin\AppData\Local\Temp\Builder505345\Winlock-Builder.exe

              Filesize

              5.1MB

              MD5

              c077a47803a091cf742d442109a3b0ad

              SHA1

              1cc0dd52704309d3a991cd2698469d1e6af282fe

              SHA256

              6fdc2babc58ba676719e69ec9d92e2420044acad0482e93cf3f7cb901a385784

              SHA512

              d53cb6ae5f0046e6faa2cab9dbeb0568ca89870ec2a4a2d022bf14b34294588af69154ad098e91e0ad8bc77789216909f765a440c30e67e1d41e5cc1e2fd73d5

            • C:\Users\Admin\AppData\Local\Temp\Builder505345\stcm.exe

              Filesize

              360KB

              MD5

              573b8162fa32fc34b57b8b1985d21032

              SHA1

              5489f40ef212348724e61fecd5c20287e41f44cc

              SHA256

              0c904e4ad6c8a821e41efa7f49d802dccd4fe9d4bd6161301407c272f45887ab

              SHA512

              97064d8a9488ce69355ee99b86359f8a5bfd813e6e8b40a520490c71a086284ae67ff045653a5b9242fc320b29f7f81946915db3beda1316015a5dc20e3bc1fe

            • C:\Users\Admin\AppData\Local\Temp\Builder505345\stcm.exe

              Filesize

              360KB

              MD5

              573b8162fa32fc34b57b8b1985d21032

              SHA1

              5489f40ef212348724e61fecd5c20287e41f44cc

              SHA256

              0c904e4ad6c8a821e41efa7f49d802dccd4fe9d4bd6161301407c272f45887ab

              SHA512

              97064d8a9488ce69355ee99b86359f8a5bfd813e6e8b40a520490c71a086284ae67ff045653a5b9242fc320b29f7f81946915db3beda1316015a5dc20e3bc1fe

            • C:\Users\Admin\AppData\Local\Temp\msg.vbs

              Filesize

              338B

              MD5

              c5a300925aacc16fb34057808f16ddcd

              SHA1

              62934d65dfd0f22a40f82eece5cadf6167907845

              SHA256

              329d9926ef0968e3d3f23cc86125bba974827ca1e5b0ad70287ea77ae616d6f9

              SHA512

              c803c528f495f0d2d07d3e67df3794f8a42aa1f6716d5c41c8d897c9ad491c4a1476cf91e277c24697271fc22559507dc1c3e894eb6640c8267613a145ecf35d

            • \ProgramData\Windows64\MSASCuiCom.exe

              Filesize

              5.1MB

              MD5

              9f01cda6b9945bc5bb8d52b4d233cf5a

              SHA1

              6b15fbbedbd681f6b63baf92898c7fc98283f668

              SHA256

              3bf1fa127d83ba65f27cb9f1b797b63d621eefc5ea1beb5803c0c2806b402c5b

              SHA512

              dd85e583dd408b81e326d55698812f5b365fe8fa78407af66151f1d403746438b0fe722080381750d255d4117d8b3d9e4e71eefbfb9829337feb6dcd2615c6c3

            • \ProgramData\Windows64\cutsent.exe

              Filesize

              6.0MB

              MD5

              ff7174301073d0ec056641462f9a22b6

              SHA1

              f11a6746e51bc80c9771236b741d7c4ee503add3

              SHA256

              b1c59ad4a459860ba87b06c4189b958ae43dd6d53c5b1472b6d18daaf603736b

              SHA512

              e48fd01da90c934adfcb8f69cfe042ed6daeef42c6100713953db2da18e756ac369667f94cbdf8b8a3acac867ffcd2410e91d2cdfb966d7d9c2547f4fa8dcaf0

            • \ProgramData\Windows64\cutsent.exe

              Filesize

              6.0MB

              MD5

              ff7174301073d0ec056641462f9a22b6

              SHA1

              f11a6746e51bc80c9771236b741d7c4ee503add3

              SHA256

              b1c59ad4a459860ba87b06c4189b958ae43dd6d53c5b1472b6d18daaf603736b

              SHA512

              e48fd01da90c934adfcb8f69cfe042ed6daeef42c6100713953db2da18e756ac369667f94cbdf8b8a3acac867ffcd2410e91d2cdfb966d7d9c2547f4fa8dcaf0

            • \ProgramData\Windows64\cutsent.exe

              Filesize

              6.0MB

              MD5

              ff7174301073d0ec056641462f9a22b6

              SHA1

              f11a6746e51bc80c9771236b741d7c4ee503add3

              SHA256

              b1c59ad4a459860ba87b06c4189b958ae43dd6d53c5b1472b6d18daaf603736b

              SHA512

              e48fd01da90c934adfcb8f69cfe042ed6daeef42c6100713953db2da18e756ac369667f94cbdf8b8a3acac867ffcd2410e91d2cdfb966d7d9c2547f4fa8dcaf0

            • \ProgramData\Windows64\smss.exe

              Filesize

              839KB

              MD5

              8ec3751b0c0211234b006ab19a1edabc

              SHA1

              e9e671f4dd1be888a88bbd842881df4e358d8811

              SHA256

              f49d328c68ff0a2e9a4ea957d01509a43729af2498cdb5e0309da37d1a051685

              SHA512

              320997c718442b5015d52d87a7225b642c2deb46438847d3f2ddb19acb67d0c8761c63c8c37f645ad25387d364e163d64a560da5d72b5ee493525bf364b18628

            • \ProgramData\Windows64\svchost.exe

              Filesize

              839KB

              MD5

              50ff7c66f3013fa020f0ce814d532a7a

              SHA1

              7337271380e9cf8f44c9c96cbe612702f504c33a

              SHA256

              f9f15d0e7121b578e63f6e9304e0aa5f8ced28d33eaf11871b2e831e5f10a645

              SHA512

              248221ada593ba240f4679269c288481534f80b0d3318c1471fc55656e6b78335c6d8fa096cfd0bf792a8ff48441d7c781ed0fee669f22f4ddc2fccd24fcc5dc

            • \Users\Admin\AppData\Local\Temp\Builder.exe

              Filesize

              7.4MB

              MD5

              b143dd2cd9be188249f7500d7f67e8b2

              SHA1

              b324251001bf4482d309962aec30afebc4b7c3c0

              SHA256

              f06691faca7a6ab26ca85f328839db2ad69f434a0de8ea7472937eb93a0479a5

              SHA512

              79c1cce8de0a91d843746a8b646ba489a00e84cccd74efcd85daf8aba09bbbd2c12cfb88d3567f88aa8d322b97bf2acf0fa1982d5d776ae83e819ba825cea260

            • \Users\Admin\AppData\Local\Temp\Builder505345\Builder.exe

              Filesize

              8.4MB

              MD5

              ca93001ff5b2276f52c3b35fb43727e8

              SHA1

              00ff6783f36d5b9d2da53e03b5e88028d0bd2d16

              SHA256

              a4899661d4392c52da77e437461f3f31d624ae32c67b6d30bb89ab1e56566069

              SHA512

              a62796d9abf7577cd2273781a6d54b0bd45e1e340e0e1f56df6195195a87dc4a2245c8845e86d806b7307fa18c011d4be7a844e9c62519bb9ad1f01c3a635c72

            • \Users\Admin\AppData\Local\Temp\Builder505345\Builder.exe

              Filesize

              8.4MB

              MD5

              ca93001ff5b2276f52c3b35fb43727e8

              SHA1

              00ff6783f36d5b9d2da53e03b5e88028d0bd2d16

              SHA256

              a4899661d4392c52da77e437461f3f31d624ae32c67b6d30bb89ab1e56566069

              SHA512

              a62796d9abf7577cd2273781a6d54b0bd45e1e340e0e1f56df6195195a87dc4a2245c8845e86d806b7307fa18c011d4be7a844e9c62519bb9ad1f01c3a635c72

            • \Users\Admin\AppData\Local\Temp\Builder505345\Winlock-Builder.exe

              Filesize

              5.1MB

              MD5

              c077a47803a091cf742d442109a3b0ad

              SHA1

              1cc0dd52704309d3a991cd2698469d1e6af282fe

              SHA256

              6fdc2babc58ba676719e69ec9d92e2420044acad0482e93cf3f7cb901a385784

              SHA512

              d53cb6ae5f0046e6faa2cab9dbeb0568ca89870ec2a4a2d022bf14b34294588af69154ad098e91e0ad8bc77789216909f765a440c30e67e1d41e5cc1e2fd73d5

            • \Users\Admin\AppData\Local\Temp\Builder505345\stcm.exe

              Filesize

              360KB

              MD5

              573b8162fa32fc34b57b8b1985d21032

              SHA1

              5489f40ef212348724e61fecd5c20287e41f44cc

              SHA256

              0c904e4ad6c8a821e41efa7f49d802dccd4fe9d4bd6161301407c272f45887ab

              SHA512

              97064d8a9488ce69355ee99b86359f8a5bfd813e6e8b40a520490c71a086284ae67ff045653a5b9242fc320b29f7f81946915db3beda1316015a5dc20e3bc1fe

            • \Users\Admin\AppData\Local\Temp\Builder505345\stcm.exe

              Filesize

              360KB

              MD5

              573b8162fa32fc34b57b8b1985d21032

              SHA1

              5489f40ef212348724e61fecd5c20287e41f44cc

              SHA256

              0c904e4ad6c8a821e41efa7f49d802dccd4fe9d4bd6161301407c272f45887ab

              SHA512

              97064d8a9488ce69355ee99b86359f8a5bfd813e6e8b40a520490c71a086284ae67ff045653a5b9242fc320b29f7f81946915db3beda1316015a5dc20e3bc1fe

            • memory/1132-182-0x00000000003B0000-0x00000000003B1000-memory.dmp

              Filesize

              4KB

            • memory/1132-220-0x0000000000400000-0x0000000000A9F000-memory.dmp

              Filesize

              6.6MB

            • memory/1132-205-0x00000000003B0000-0x00000000003B1000-memory.dmp

              Filesize

              4KB

            • memory/1132-206-0x0000000000400000-0x0000000000A9F000-memory.dmp

              Filesize

              6.6MB

            • memory/1132-224-0x0000000000400000-0x0000000000A9F000-memory.dmp

              Filesize

              6.6MB

            • memory/1132-215-0x0000000000400000-0x0000000000A9F000-memory.dmp

              Filesize

              6.6MB

            • memory/1132-229-0x0000000000400000-0x0000000000A9F000-memory.dmp

              Filesize

              6.6MB

            • memory/1936-162-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB

            • memory/1936-141-0x0000000000400000-0x000000000043E000-memory.dmp

              Filesize

              248KB

            • memory/1972-218-0x0000000000400000-0x00000000009A8000-memory.dmp

              Filesize

              5.7MB

            • memory/1972-213-0x0000000000400000-0x00000000009A8000-memory.dmp

              Filesize

              5.7MB

            • memory/1972-198-0x00000000001C0000-0x00000000001C1000-memory.dmp

              Filesize

              4KB

            • memory/1972-223-0x0000000000400000-0x00000000009A8000-memory.dmp

              Filesize

              5.7MB

            • memory/1972-211-0x00000000001C0000-0x00000000001C1000-memory.dmp

              Filesize

              4KB

            • memory/2100-212-0x0000000000400000-0x00000000009A8000-memory.dmp

              Filesize

              5.7MB

            • memory/2100-214-0x00000000003C0000-0x00000000003C1000-memory.dmp

              Filesize

              4KB

            • memory/2100-199-0x00000000003C0000-0x00000000003C1000-memory.dmp

              Filesize

              4KB

            • memory/2136-197-0x0000000000400000-0x0000000000A9F000-memory.dmp

              Filesize

              6.6MB

            • memory/2136-180-0x0000000000250000-0x0000000000251000-memory.dmp

              Filesize

              4KB

            • memory/2148-173-0x0000000000400000-0x0000000000A9F000-memory.dmp

              Filesize

              6.6MB

            • memory/2148-172-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/2524-210-0x0000000000400000-0x00000000009A8000-memory.dmp

              Filesize

              5.7MB

            • memory/2524-208-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/2548-66-0x0000000000230000-0x0000000000231000-memory.dmp

              Filesize

              4KB

            • memory/2548-72-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/2548-139-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/2860-177-0x0000000000400000-0x0000000000A9F000-memory.dmp

              Filesize

              6.6MB

            • memory/2860-176-0x0000000000350000-0x0000000000351000-memory.dmp

              Filesize

              4KB

            • memory/2884-71-0x0000000000230000-0x0000000000231000-memory.dmp

              Filesize

              4KB

            • memory/2884-73-0x0000000000400000-0x0000000000C6D000-memory.dmp

              Filesize

              8.4MB

            • memory/2884-80-0x0000000000400000-0x0000000000C6D000-memory.dmp

              Filesize

              8.4MB

            • memory/2884-154-0x0000000000400000-0x0000000000C6D000-memory.dmp

              Filesize

              8.4MB

            • memory/2884-165-0x0000000000400000-0x0000000000C6D000-memory.dmp

              Filesize

              8.4MB