Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    23-09-2023 01:11

General

  • Target

    182593310607f0f7b47ad80cbf5fbe74.exe

  • Size

    7.5MB

  • MD5

    182593310607f0f7b47ad80cbf5fbe74

  • SHA1

    f74bdec42f5bb2dbbde3898e9e0bc2d16eb0fe99

  • SHA256

    393b4de1154e2b1164c0db18643ed0accc95efe44687cd41af730422ed6bbccf

  • SHA512

    dfb88e5b7de63e4a79df542c4d47f7d5b288e0f88fbe30d59284d8f275acb29bb93c776edc16c649a1daf511ffb302980ee19175c9f4ee4aae38db679dcc71e8

  • SSDEEP

    196608:V7iFSsOfzkZj1Cwx8fMZYe+1ClL4oQ0utRkNk:V7Rza1dxAMZmVdtWNk

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • UAC bypass 3 TTPs 2 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 6 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\182593310607f0f7b47ad80cbf5fbe74.exe
    "C:\Users\Admin\AppData\Local\Temp\182593310607f0f7b47ad80cbf5fbe74.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Builder.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\Builder.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1044
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\msg.vbs"
          4⤵
            PID:2268
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
            4⤵
            • UAC bypass
            • Modifies registry key
            PID:2712
          • C:\Users\Admin\AppData\Local\Temp\Builder.exe
            Builder.exe -p77854785474654654648787878876453354890332223456
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2624
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Builder505345\233.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2640
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\Builder505345\233.bat" "
                6⤵
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:2464
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                  7⤵
                  • UAC bypass
                  • Modifies registry key
                  PID:2536
                • C:\Users\Admin\AppData\Local\Temp\Builder505345\stcm.exe
                  "stcm.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:2548
                  • C:\Users\Admin\AppData\Local\Temp\Builder505345\Builder.exe
                    Builder.exe
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2884
                  • C:\Users\Admin\AppData\Local\Temp\Builder505345\Winlock-Builder.exe
                    Winlock-Builder.exe
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Adds Run key to start application
                    PID:1936
                    • C:\ProgramData\Windows64\smss.exe
                      "C:\ProgramData\Windows64\smss.exe"
                      9⤵
                      • Executes dropped EXE
                      PID:812
                    • C:\ProgramData\Windows64\svchost.exe
                      "C:\ProgramData\Windows64\svchost.exe"
                      9⤵
                      • Executes dropped EXE
                      PID:572
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c ""C:\ProgramData\Windows64\register.bat" "
                      9⤵
                      • Loads dropped DLL
                      PID:692
                      • C:\Windows\SysWOW64\attrib.exe
                        attrib +s +h "C:\ProgramData\Windows64"
                        10⤵
                        • Sets file to hidden
                        • Views/modifies file attributes
                        PID:1744
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /im rfusclient.exe /f
                        10⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1712
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /im rutserv.exe /f
                        10⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1104
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /im dwmhost.exe /f
                        10⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:240
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /im forderhost.exe /f
                        10⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2336
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /im cutsent.exe /f
                        10⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1136
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /im MSASCuiCom.exe /f
                        10⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1004
                      • C:\Windows\SysWOW64\reg.exe
                        reg delete "HKLM\SYSTEM\Remote Manipulator System" /f
                        10⤵
                          PID:864
                        • C:\Windows\SysWOW64\regedit.exe
                          regedit /s C:\ProgramData\Windows64\settings_default.reg
                          10⤵
                          • Runs .reg file with regedit
                          PID:1360
                        • C:\ProgramData\Windows64\cutsent.exe
                          "C:\ProgramData\Windows64\cutsent.exe" /silentinstall
                          10⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of SetWindowsHookEx
                          PID:2148
                        • C:\ProgramData\Windows64\cutsent.exe
                          "C:\ProgramData\Windows64\cutsent.exe" /firewall
                          10⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of SetWindowsHookEx
                          PID:2860
                        • C:\Windows\SysWOW64\regedit.exe
                          regedit /s C:\ProgramData\Windows64\settings_default.reg
                          10⤵
                          • Runs .reg file with regedit
                          PID:2552
                        • C:\Windows\SysWOW64\sc.exe
                          sc failure RmanService reset= 0 actions= restart/5000/restart/5000/restart/5000
                          10⤵
                          • Launches sc.exe
                          PID:824
                        • C:\Windows\SysWOW64\sc.exe
                          sc config RmanService obj= LocalSystem type= interact type= own
                          10⤵
                          • Launches sc.exe
                          PID:1036
                        • C:\Windows\SysWOW64\sc.exe
                          sc config RManService DisplayName= "Windows Defender v6.3"
                          10⤵
                          • Launches sc.exe
                          PID:2804
                        • C:\ProgramData\Windows64\cutsent.exe
                          "C:\ProgramData\Windows64\cutsent.exe" /start
                          10⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of SetWindowsHookEx
                          PID:2136
                        • C:\Windows\SysWOW64\attrib.exe
                          attrib +s +h "C:\ProgramData\Windows64\*.*"
                          10⤵
                          • Sets file to hidden
                          • Views/modifies file attributes
                          PID:2128
      • C:\ProgramData\Windows64\cutsent.exe
        C:\ProgramData\Windows64\cutsent.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1132
        • C:\ProgramData\Windows64\MSASCuiCom.exe
          C:\ProgramData\Windows64\MSASCuiCom.exe
          2⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2100
          • C:\ProgramData\Windows64\MSASCuiCom.exe
            C:\ProgramData\Windows64\MSASCuiCom.exe /tray
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: SetClipboardViewer
            PID:2524
        • C:\ProgramData\Windows64\MSASCuiCom.exe
          C:\ProgramData\Windows64\MSASCuiCom.exe /tray
          2⤵
          • Executes dropped EXE
          PID:1972

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Abuse Elevation Control Mechanism

      1
      T1548

      Bypass User Account Control

      1
      T1548.002

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Abuse Elevation Control Mechanism

      1
      T1548

      Bypass User Account Control

      1
      T1548.002

      Impair Defenses

      1
      T1562

      Disable or Modify Tools

      1
      T1562.001

      Modify Registry

      3
      T1112

      Hide Artifacts

      2
      T1564

      Hidden Files and Directories

      2
      T1564.001

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Windows64\EULA.rtf
        Filesize

        118KB

        MD5

        4da4c145104e3d4081a17d4c8860b25e

        SHA1

        44567ae2b0a90b7ade24493255eb193f858448e9

        SHA256

        8f1c3af4e2d68ebb2d09c3620af27134fcb683b4cc329d2facf333e228be6565

        SHA512

        c2764b8db142d6484af33f95672fef8cb2e4a1faf15e29e0d1c7fe5cef6265571fb34c7bd843b8b0de965e7ad98e011e9b09caf7bceb265ea5b7d5c621ecba03

      • C:\ProgramData\Windows64\English.lg
        Filesize

        43KB

        MD5

        bc25377ade68750b834c81fa71c233b8

        SHA1

        84dbb465dd2125f47668e2508e18af9bd6db2fd8

        SHA256

        9a48a7ea7ba2c2f33280d1e1722ebbc59bf81bc6c5a1f97edca53ea641ffd8e3

        SHA512

        205ab195339d7108adbe6dfabd48e4e21c5956ded587d7213a44618f0d34a43f7b8abaa7765b9d31695efacfc44beeb69fbaa3cb27c141b6a653713fdf5ebce5

      • C:\ProgramData\Windows64\MSASCuiCom.exe
        Filesize

        5.1MB

        MD5

        9f01cda6b9945bc5bb8d52b4d233cf5a

        SHA1

        6b15fbbedbd681f6b63baf92898c7fc98283f668

        SHA256

        3bf1fa127d83ba65f27cb9f1b797b63d621eefc5ea1beb5803c0c2806b402c5b

        SHA512

        dd85e583dd408b81e326d55698812f5b365fe8fa78407af66151f1d403746438b0fe722080381750d255d4117d8b3d9e4e71eefbfb9829337feb6dcd2615c6c3

      • C:\ProgramData\Windows64\MSASCuiCom.exe
        Filesize

        5.1MB

        MD5

        9f01cda6b9945bc5bb8d52b4d233cf5a

        SHA1

        6b15fbbedbd681f6b63baf92898c7fc98283f668

        SHA256

        3bf1fa127d83ba65f27cb9f1b797b63d621eefc5ea1beb5803c0c2806b402c5b

        SHA512

        dd85e583dd408b81e326d55698812f5b365fe8fa78407af66151f1d403746438b0fe722080381750d255d4117d8b3d9e4e71eefbfb9829337feb6dcd2615c6c3

      • C:\ProgramData\Windows64\MSASCuiCom.exe
        Filesize

        5.1MB

        MD5

        9f01cda6b9945bc5bb8d52b4d233cf5a

        SHA1

        6b15fbbedbd681f6b63baf92898c7fc98283f668

        SHA256

        3bf1fa127d83ba65f27cb9f1b797b63d621eefc5ea1beb5803c0c2806b402c5b

        SHA512

        dd85e583dd408b81e326d55698812f5b365fe8fa78407af66151f1d403746438b0fe722080381750d255d4117d8b3d9e4e71eefbfb9829337feb6dcd2615c6c3

      • C:\ProgramData\Windows64\MSASCuiCom.exe
        Filesize

        5.1MB

        MD5

        9f01cda6b9945bc5bb8d52b4d233cf5a

        SHA1

        6b15fbbedbd681f6b63baf92898c7fc98283f668

        SHA256

        3bf1fa127d83ba65f27cb9f1b797b63d621eefc5ea1beb5803c0c2806b402c5b

        SHA512

        dd85e583dd408b81e326d55698812f5b365fe8fa78407af66151f1d403746438b0fe722080381750d255d4117d8b3d9e4e71eefbfb9829337feb6dcd2615c6c3

      • C:\ProgramData\Windows64\RIPCServer.dll
        Filesize

        144KB

        MD5

        2ddfa39f5c2fd3f00681ef2970617e4b

        SHA1

        8152aa18afbacf398b92168995ec8696d3fe3659

        SHA256

        f938bdc741ef1d2738b532aef001a160e3a3627ed8a27158b7017ee49fc65791

        SHA512

        f89f0f02cda650c138e4ebaef198f0762dfd571ef7d46a6b3710cd93d76bc52a79055c55afca46128a9a84a795a5cb946ca93c492e07cfb503c9b27d96211e20

      • C:\ProgramData\Windows64\RWLN.dll
        Filesize

        975KB

        MD5

        3d0b27b3f8aa22575aa0faf0b2d67216

        SHA1

        39fc787538849692ed7352418616f467b7a86a1d

        SHA256

        d7782488ef29bf0fd7e8faf0bd24414a6540bf7366434692a5a485d5ae2d7d44

        SHA512

        19f0785d3cecce0dbbb7da1be640bffebe4daedc65a513d1db0b5e533eb96aaa0588831de74c88e5013c00405e03ca4188c4b633e39e6c49ab5c1d1b42191ca8

      • C:\ProgramData\Windows64\Russian.lg
        Filesize

        48KB

        MD5

        e44e34bc285b709f08f967325d9c8be1

        SHA1

        e73f05c6a980ec9d006930c5343955f89579b409

        SHA256

        1d99a7b5f7b3daa61fa773972b1e335aa09b92411484f6ddc99d2b2894455a5b

        SHA512

        576b292b6e9cf022822443e050994462a6cbd9a3c60063bae9f54c78a84e75e17bb5eddf7e259a22a9d93f757cb6536c503762e2a30e75091e40c2756cde8727

      • C:\ProgramData\Windows64\cutsent.exe
        Filesize

        6.0MB

        MD5

        ff7174301073d0ec056641462f9a22b6

        SHA1

        f11a6746e51bc80c9771236b741d7c4ee503add3

        SHA256

        b1c59ad4a459860ba87b06c4189b958ae43dd6d53c5b1472b6d18daaf603736b

        SHA512

        e48fd01da90c934adfcb8f69cfe042ed6daeef42c6100713953db2da18e756ac369667f94cbdf8b8a3acac867ffcd2410e91d2cdfb966d7d9c2547f4fa8dcaf0

      • C:\ProgramData\Windows64\cutsent.exe
        Filesize

        6.0MB

        MD5

        ff7174301073d0ec056641462f9a22b6

        SHA1

        f11a6746e51bc80c9771236b741d7c4ee503add3

        SHA256

        b1c59ad4a459860ba87b06c4189b958ae43dd6d53c5b1472b6d18daaf603736b

        SHA512

        e48fd01da90c934adfcb8f69cfe042ed6daeef42c6100713953db2da18e756ac369667f94cbdf8b8a3acac867ffcd2410e91d2cdfb966d7d9c2547f4fa8dcaf0

      • C:\ProgramData\Windows64\cutsent.exe
        Filesize

        6.0MB

        MD5

        ff7174301073d0ec056641462f9a22b6

        SHA1

        f11a6746e51bc80c9771236b741d7c4ee503add3

        SHA256

        b1c59ad4a459860ba87b06c4189b958ae43dd6d53c5b1472b6d18daaf603736b

        SHA512

        e48fd01da90c934adfcb8f69cfe042ed6daeef42c6100713953db2da18e756ac369667f94cbdf8b8a3acac867ffcd2410e91d2cdfb966d7d9c2547f4fa8dcaf0

      • C:\ProgramData\Windows64\cutsent.exe
        Filesize

        6.0MB

        MD5

        ff7174301073d0ec056641462f9a22b6

        SHA1

        f11a6746e51bc80c9771236b741d7c4ee503add3

        SHA256

        b1c59ad4a459860ba87b06c4189b958ae43dd6d53c5b1472b6d18daaf603736b

        SHA512

        e48fd01da90c934adfcb8f69cfe042ed6daeef42c6100713953db2da18e756ac369667f94cbdf8b8a3acac867ffcd2410e91d2cdfb966d7d9c2547f4fa8dcaf0

      • C:\ProgramData\Windows64\cutsent.exe
        Filesize

        6.0MB

        MD5

        ff7174301073d0ec056641462f9a22b6

        SHA1

        f11a6746e51bc80c9771236b741d7c4ee503add3

        SHA256

        b1c59ad4a459860ba87b06c4189b958ae43dd6d53c5b1472b6d18daaf603736b

        SHA512

        e48fd01da90c934adfcb8f69cfe042ed6daeef42c6100713953db2da18e756ac369667f94cbdf8b8a3acac867ffcd2410e91d2cdfb966d7d9c2547f4fa8dcaf0

      • C:\ProgramData\Windows64\register.bat
        Filesize

        964B

        MD5

        8f85dcd35e93a2ea24c83be7b5701e0c

        SHA1

        047b292eb146402da32e6836dbe6fdba6a6471d1

        SHA256

        2aa3a5fa3e4c105ed4635cf0105020ebebb310ddc4d7460af96d1b3241738454

        SHA512

        15aa11a4f4a12ac75dd8ad3fb01eba1d205d493bca471cb59a9b5251f21df4572ccdaed4ee7467ebba09507e9496bf77c54b868f714a12f85a026af0718c93ce

      • C:\ProgramData\Windows64\register.bat
        Filesize

        964B

        MD5

        8f85dcd35e93a2ea24c83be7b5701e0c

        SHA1

        047b292eb146402da32e6836dbe6fdba6a6471d1

        SHA256

        2aa3a5fa3e4c105ed4635cf0105020ebebb310ddc4d7460af96d1b3241738454

        SHA512

        15aa11a4f4a12ac75dd8ad3fb01eba1d205d493bca471cb59a9b5251f21df4572ccdaed4ee7467ebba09507e9496bf77c54b868f714a12f85a026af0718c93ce

      • C:\ProgramData\Windows64\settings_default.reg
        Filesize

        25KB

        MD5

        d7cd6cbb169f1169bb75ed4677aa6db2

        SHA1

        ce11e912c0bbb0eed5502247fea5fb2bafc2d15a

        SHA256

        83880142ae9280a681ee215e03a090f3ff3fe575fc782950138b909bd51691c3

        SHA512

        e9b6549dc823933ad6fb89f366aa6c041e233b49983d016b5ce119da3555713949e74366a5d0390087910d4772d849751e060d3a00cf7b0d594952a831924796

      • C:\ProgramData\Windows64\smss.exe
        Filesize

        839KB

        MD5

        8ec3751b0c0211234b006ab19a1edabc

        SHA1

        e9e671f4dd1be888a88bbd842881df4e358d8811

        SHA256

        f49d328c68ff0a2e9a4ea957d01509a43729af2498cdb5e0309da37d1a051685

        SHA512

        320997c718442b5015d52d87a7225b642c2deb46438847d3f2ddb19acb67d0c8761c63c8c37f645ad25387d364e163d64a560da5d72b5ee493525bf364b18628

      • C:\ProgramData\Windows64\smss.exe
        Filesize

        839KB

        MD5

        8ec3751b0c0211234b006ab19a1edabc

        SHA1

        e9e671f4dd1be888a88bbd842881df4e358d8811

        SHA256

        f49d328c68ff0a2e9a4ea957d01509a43729af2498cdb5e0309da37d1a051685

        SHA512

        320997c718442b5015d52d87a7225b642c2deb46438847d3f2ddb19acb67d0c8761c63c8c37f645ad25387d364e163d64a560da5d72b5ee493525bf364b18628

      • C:\ProgramData\Windows64\smss.exe
        Filesize

        839KB

        MD5

        8ec3751b0c0211234b006ab19a1edabc

        SHA1

        e9e671f4dd1be888a88bbd842881df4e358d8811

        SHA256

        f49d328c68ff0a2e9a4ea957d01509a43729af2498cdb5e0309da37d1a051685

        SHA512

        320997c718442b5015d52d87a7225b642c2deb46438847d3f2ddb19acb67d0c8761c63c8c37f645ad25387d364e163d64a560da5d72b5ee493525bf364b18628

      • C:\ProgramData\Windows64\svchost.exe
        Filesize

        839KB

        MD5

        50ff7c66f3013fa020f0ce814d532a7a

        SHA1

        7337271380e9cf8f44c9c96cbe612702f504c33a

        SHA256

        f9f15d0e7121b578e63f6e9304e0aa5f8ced28d33eaf11871b2e831e5f10a645

        SHA512

        248221ada593ba240f4679269c288481534f80b0d3318c1471fc55656e6b78335c6d8fa096cfd0bf792a8ff48441d7c781ed0fee669f22f4ddc2fccd24fcc5dc

      • C:\ProgramData\Windows64\svchost.exe
        Filesize

        839KB

        MD5

        50ff7c66f3013fa020f0ce814d532a7a

        SHA1

        7337271380e9cf8f44c9c96cbe612702f504c33a

        SHA256

        f9f15d0e7121b578e63f6e9304e0aa5f8ced28d33eaf11871b2e831e5f10a645

        SHA512

        248221ada593ba240f4679269c288481534f80b0d3318c1471fc55656e6b78335c6d8fa096cfd0bf792a8ff48441d7c781ed0fee669f22f4ddc2fccd24fcc5dc

      • C:\ProgramData\Windows64\svchost.exe
        Filesize

        839KB

        MD5

        50ff7c66f3013fa020f0ce814d532a7a

        SHA1

        7337271380e9cf8f44c9c96cbe612702f504c33a

        SHA256

        f9f15d0e7121b578e63f6e9304e0aa5f8ced28d33eaf11871b2e831e5f10a645

        SHA512

        248221ada593ba240f4679269c288481534f80b0d3318c1471fc55656e6b78335c6d8fa096cfd0bf792a8ff48441d7c781ed0fee669f22f4ddc2fccd24fcc5dc

      • C:\ProgramData\Windows64\trial.vbs
        Filesize

        118B

        MD5

        841d3a8c1ad29f9f3b003798e6d126ea

        SHA1

        4a83f49a5c32b8d4a9f8ed04bc00c9fd3ee4a4e6

        SHA256

        2b439f541bb6f6f9368fea3317029762a05a376134143331859a7c02531ee386

        SHA512

        0ab6ef027ac59340f70df8c7cd3ec5edf966ce773fd5f3cd81b5524ca7964371a8a9f7800f6867ca042f812caf87a04b825f50b52c9b16c52a24a0a2c230bafa

      • C:\ProgramData\Windows64\vp8decoder.dll
        Filesize

        378KB

        MD5

        292a1748850d1fdc91d4ec23b02d6902

        SHA1

        8f15f1c24e11c0b45b19c82a78f7b79b1e7f932d

        SHA256

        acf354ad6ed94e876b29a60c5870dd91e7b3f76cc82c1a862c92024a12404a9f

        SHA512

        cf7579f1169ec21d9bf3c666d416d3fe2a4f9953d4d328b182452e40043f91055d301fd4b4a21454b847dbdb0af6a61c52657caded7d6fd7e88812aceeacf704

      • C:\ProgramData\Windows64\vp8encoder.dll
        Filesize

        1.6MB

        MD5

        4570f7a40357016c97afe0dd4faf749b

        SHA1

        ebc8a1660f1103c655559caab3a70ec23ca187f1

        SHA256

        a5f008bf852d4c73e001f840d6f8b233c7d9bc9570cee639d40c1c8723bf99f8

        SHA512

        6b16979d004adc04259f2ce043cde6f7b57f2ddf5f4cea7bb390fd6b9fb273d22355b837f1b5c2eae77ea7df792de8e6db43e31d7246f044935a8187dace493b

      • C:\ProgramData\Windows64\webmmux.dll
        Filesize

        258KB

        MD5

        038bf9f3a58560ad1130eeb85cdc1a87

        SHA1

        3571eb7293a2a3a5bf6eb21e1569cd151d995d1a

        SHA256

        d247afa3bd1ccc18e11eb099280802a61d3792a2018c476d95debf2091e9707d

        SHA512

        8ffa52b358841600b9122974079d22d4e11bc4214316cd85ac4d4af0e369112b6827029f74a9a9d3918db00c7fed3a9a1985e0b43da39783a748d78752ae2385

      • C:\ProgramData\Windows64\webmvorbisdecoder.dll
        Filesize

        363KB

        MD5

        eeb2c52abbc7eb1c029b7fec45a7f22e

        SHA1

        8bfeb412614e3db0a2bf0122f4d68cc27b8c3a61

        SHA256

        c0f0b84d587066af8f80f41a7be63b4c01547af3f1e011602ac1b6ee0ac54a2c

        SHA512

        0b5b83335c6f602b8397a3c2ae6d1e661d744eb27114463d53e344bf18774ccb38853d314ebe05536d4c28c29fe3fdaba041a6a46983789f064ca70881cfcb85

      • C:\ProgramData\Windows64\webmvorbisencoder.dll
        Filesize

        858KB

        MD5

        e38372f576d927f525ef8e1a34b54664

        SHA1

        26af9d1db0a3f91d7fe13147e55f06c302d59389

        SHA256

        4046bd0b93909a41d0fd96f0405a864c79a47f493165546569251c1f73db6b0b

        SHA512

        78b7477b000407990304ec37624b873514d4ed9daa1b42fd988707b7374ffab442ba28fe19884724867f3f0f7a5f12f7fc8c228c050115c902d1569e4a3b13c7

      • C:\Users\Admin\AppData\Local\Temp\Builder.bat
        Filesize

        178B

        MD5

        d86ba9964245f0e093af943af80cd22e

        SHA1

        c409a7e3df3f793fc9026345bd807b9b12cbe42a

        SHA256

        1cc08903216f1a56572ee1e18e97ca16b24a072bd40ad1763ff4b19d8fa76760

        SHA512

        9b70e66457d6b6139127f6ad768efa181257febade949950f79326694dc5fa552b713f82e7522a1e2e54fcdfcc55517913c93a08dcd19ab0d33456ff7fb24ee0

      • C:\Users\Admin\AppData\Local\Temp\Builder.exe
        Filesize

        7.4MB

        MD5

        b143dd2cd9be188249f7500d7f67e8b2

        SHA1

        b324251001bf4482d309962aec30afebc4b7c3c0

        SHA256

        f06691faca7a6ab26ca85f328839db2ad69f434a0de8ea7472937eb93a0479a5

        SHA512

        79c1cce8de0a91d843746a8b646ba489a00e84cccd74efcd85daf8aba09bbbd2c12cfb88d3567f88aa8d322b97bf2acf0fa1982d5d776ae83e819ba825cea260

      • C:\Users\Admin\AppData\Local\Temp\Builder.exe
        Filesize

        7.4MB

        MD5

        b143dd2cd9be188249f7500d7f67e8b2

        SHA1

        b324251001bf4482d309962aec30afebc4b7c3c0

        SHA256

        f06691faca7a6ab26ca85f328839db2ad69f434a0de8ea7472937eb93a0479a5

        SHA512

        79c1cce8de0a91d843746a8b646ba489a00e84cccd74efcd85daf8aba09bbbd2c12cfb88d3567f88aa8d322b97bf2acf0fa1982d5d776ae83e819ba825cea260

      • C:\Users\Admin\AppData\Local\Temp\Builder.vbs
        Filesize

        117B

        MD5

        f5b6bdc9f222af41d781114ff7a65cfb

        SHA1

        a1294e209a3a83749e26198517b6014d39b6be35

        SHA256

        d0047d954e637c8d35b33e9d0c5bb1da7d6659b4ecdd1466b694a6e4c90be884

        SHA512

        ba0493ee35fd5f4914e72c62b721dbf2f57a7e5b4283f4cf850b0463abfea70641aa18ff4d6ad619d10eb2aca08df73d5dd09f73dea0c4fe5e31f67d3b5c6b88

      • C:\Users\Admin\AppData\Local\Temp\Builder505345\233.bat
        Filesize

        116B

        MD5

        aae18ac617181ef2721b4a3dcaed048b

        SHA1

        7eff96ec14e65bcf9a4053bddca1cc500e73f660

        SHA256

        31e1b961e6244518e8a891f1c4ef447d370f60d0214b2bd5b69f95dd7ad20f5c

        SHA512

        b9f82369cfac4d5f627f7bd300ad3886bf785cd230a216546c9ab9f10d087ed3de9fb8e23559e63c6b913912ce22c1467e0e3b454c17ccfd0f350ff68ce03848

      • C:\Users\Admin\AppData\Local\Temp\Builder505345\233.vbs
        Filesize

        113B

        MD5

        21123accbf74e2f57fad193bf43f0501

        SHA1

        6d8ecbb84f56ba9f7108947ec32f9290fef3e347

        SHA256

        f534233d0dfd038fd8dc6e3a7f47f83f014e4d7789fb5e08b8fe09c08bd08e81

        SHA512

        47820b7c8985808e7f67bc81a71b9f3b752deab8f28170771fc73250058bd1373a8846cf5d93b15c4ec6f59a29eb53771f46a54491970e56ac2597aa0a545b83

      • C:\Users\Admin\AppData\Local\Temp\Builder505345\Builder.exe
        Filesize

        8.4MB

        MD5

        ca93001ff5b2276f52c3b35fb43727e8

        SHA1

        00ff6783f36d5b9d2da53e03b5e88028d0bd2d16

        SHA256

        a4899661d4392c52da77e437461f3f31d624ae32c67b6d30bb89ab1e56566069

        SHA512

        a62796d9abf7577cd2273781a6d54b0bd45e1e340e0e1f56df6195195a87dc4a2245c8845e86d806b7307fa18c011d4be7a844e9c62519bb9ad1f01c3a635c72

      • C:\Users\Admin\AppData\Local\Temp\Builder505345\Builder.exe
        Filesize

        8.4MB

        MD5

        ca93001ff5b2276f52c3b35fb43727e8

        SHA1

        00ff6783f36d5b9d2da53e03b5e88028d0bd2d16

        SHA256

        a4899661d4392c52da77e437461f3f31d624ae32c67b6d30bb89ab1e56566069

        SHA512

        a62796d9abf7577cd2273781a6d54b0bd45e1e340e0e1f56df6195195a87dc4a2245c8845e86d806b7307fa18c011d4be7a844e9c62519bb9ad1f01c3a635c72

      • C:\Users\Admin\AppData\Local\Temp\Builder505345\Winlock-Builder.exe
        Filesize

        5.1MB

        MD5

        c077a47803a091cf742d442109a3b0ad

        SHA1

        1cc0dd52704309d3a991cd2698469d1e6af282fe

        SHA256

        6fdc2babc58ba676719e69ec9d92e2420044acad0482e93cf3f7cb901a385784

        SHA512

        d53cb6ae5f0046e6faa2cab9dbeb0568ca89870ec2a4a2d022bf14b34294588af69154ad098e91e0ad8bc77789216909f765a440c30e67e1d41e5cc1e2fd73d5

      • C:\Users\Admin\AppData\Local\Temp\Builder505345\Winlock-Builder.exe
        Filesize

        5.1MB

        MD5

        c077a47803a091cf742d442109a3b0ad

        SHA1

        1cc0dd52704309d3a991cd2698469d1e6af282fe

        SHA256

        6fdc2babc58ba676719e69ec9d92e2420044acad0482e93cf3f7cb901a385784

        SHA512

        d53cb6ae5f0046e6faa2cab9dbeb0568ca89870ec2a4a2d022bf14b34294588af69154ad098e91e0ad8bc77789216909f765a440c30e67e1d41e5cc1e2fd73d5

      • C:\Users\Admin\AppData\Local\Temp\Builder505345\stcm.exe
        Filesize

        360KB

        MD5

        573b8162fa32fc34b57b8b1985d21032

        SHA1

        5489f40ef212348724e61fecd5c20287e41f44cc

        SHA256

        0c904e4ad6c8a821e41efa7f49d802dccd4fe9d4bd6161301407c272f45887ab

        SHA512

        97064d8a9488ce69355ee99b86359f8a5bfd813e6e8b40a520490c71a086284ae67ff045653a5b9242fc320b29f7f81946915db3beda1316015a5dc20e3bc1fe

      • C:\Users\Admin\AppData\Local\Temp\Builder505345\stcm.exe
        Filesize

        360KB

        MD5

        573b8162fa32fc34b57b8b1985d21032

        SHA1

        5489f40ef212348724e61fecd5c20287e41f44cc

        SHA256

        0c904e4ad6c8a821e41efa7f49d802dccd4fe9d4bd6161301407c272f45887ab

        SHA512

        97064d8a9488ce69355ee99b86359f8a5bfd813e6e8b40a520490c71a086284ae67ff045653a5b9242fc320b29f7f81946915db3beda1316015a5dc20e3bc1fe

      • C:\Users\Admin\AppData\Local\Temp\msg.vbs
        Filesize

        338B

        MD5

        c5a300925aacc16fb34057808f16ddcd

        SHA1

        62934d65dfd0f22a40f82eece5cadf6167907845

        SHA256

        329d9926ef0968e3d3f23cc86125bba974827ca1e5b0ad70287ea77ae616d6f9

        SHA512

        c803c528f495f0d2d07d3e67df3794f8a42aa1f6716d5c41c8d897c9ad491c4a1476cf91e277c24697271fc22559507dc1c3e894eb6640c8267613a145ecf35d

      • \ProgramData\Windows64\MSASCuiCom.exe
        Filesize

        5.1MB

        MD5

        9f01cda6b9945bc5bb8d52b4d233cf5a

        SHA1

        6b15fbbedbd681f6b63baf92898c7fc98283f668

        SHA256

        3bf1fa127d83ba65f27cb9f1b797b63d621eefc5ea1beb5803c0c2806b402c5b

        SHA512

        dd85e583dd408b81e326d55698812f5b365fe8fa78407af66151f1d403746438b0fe722080381750d255d4117d8b3d9e4e71eefbfb9829337feb6dcd2615c6c3

      • \ProgramData\Windows64\cutsent.exe
        Filesize

        6.0MB

        MD5

        ff7174301073d0ec056641462f9a22b6

        SHA1

        f11a6746e51bc80c9771236b741d7c4ee503add3

        SHA256

        b1c59ad4a459860ba87b06c4189b958ae43dd6d53c5b1472b6d18daaf603736b

        SHA512

        e48fd01da90c934adfcb8f69cfe042ed6daeef42c6100713953db2da18e756ac369667f94cbdf8b8a3acac867ffcd2410e91d2cdfb966d7d9c2547f4fa8dcaf0

      • \ProgramData\Windows64\cutsent.exe
        Filesize

        6.0MB

        MD5

        ff7174301073d0ec056641462f9a22b6

        SHA1

        f11a6746e51bc80c9771236b741d7c4ee503add3

        SHA256

        b1c59ad4a459860ba87b06c4189b958ae43dd6d53c5b1472b6d18daaf603736b

        SHA512

        e48fd01da90c934adfcb8f69cfe042ed6daeef42c6100713953db2da18e756ac369667f94cbdf8b8a3acac867ffcd2410e91d2cdfb966d7d9c2547f4fa8dcaf0

      • \ProgramData\Windows64\cutsent.exe
        Filesize

        6.0MB

        MD5

        ff7174301073d0ec056641462f9a22b6

        SHA1

        f11a6746e51bc80c9771236b741d7c4ee503add3

        SHA256

        b1c59ad4a459860ba87b06c4189b958ae43dd6d53c5b1472b6d18daaf603736b

        SHA512

        e48fd01da90c934adfcb8f69cfe042ed6daeef42c6100713953db2da18e756ac369667f94cbdf8b8a3acac867ffcd2410e91d2cdfb966d7d9c2547f4fa8dcaf0

      • \ProgramData\Windows64\smss.exe
        Filesize

        839KB

        MD5

        8ec3751b0c0211234b006ab19a1edabc

        SHA1

        e9e671f4dd1be888a88bbd842881df4e358d8811

        SHA256

        f49d328c68ff0a2e9a4ea957d01509a43729af2498cdb5e0309da37d1a051685

        SHA512

        320997c718442b5015d52d87a7225b642c2deb46438847d3f2ddb19acb67d0c8761c63c8c37f645ad25387d364e163d64a560da5d72b5ee493525bf364b18628

      • \ProgramData\Windows64\svchost.exe
        Filesize

        839KB

        MD5

        50ff7c66f3013fa020f0ce814d532a7a

        SHA1

        7337271380e9cf8f44c9c96cbe612702f504c33a

        SHA256

        f9f15d0e7121b578e63f6e9304e0aa5f8ced28d33eaf11871b2e831e5f10a645

        SHA512

        248221ada593ba240f4679269c288481534f80b0d3318c1471fc55656e6b78335c6d8fa096cfd0bf792a8ff48441d7c781ed0fee669f22f4ddc2fccd24fcc5dc

      • \Users\Admin\AppData\Local\Temp\Builder.exe
        Filesize

        7.4MB

        MD5

        b143dd2cd9be188249f7500d7f67e8b2

        SHA1

        b324251001bf4482d309962aec30afebc4b7c3c0

        SHA256

        f06691faca7a6ab26ca85f328839db2ad69f434a0de8ea7472937eb93a0479a5

        SHA512

        79c1cce8de0a91d843746a8b646ba489a00e84cccd74efcd85daf8aba09bbbd2c12cfb88d3567f88aa8d322b97bf2acf0fa1982d5d776ae83e819ba825cea260

      • \Users\Admin\AppData\Local\Temp\Builder505345\Builder.exe
        Filesize

        8.4MB

        MD5

        ca93001ff5b2276f52c3b35fb43727e8

        SHA1

        00ff6783f36d5b9d2da53e03b5e88028d0bd2d16

        SHA256

        a4899661d4392c52da77e437461f3f31d624ae32c67b6d30bb89ab1e56566069

        SHA512

        a62796d9abf7577cd2273781a6d54b0bd45e1e340e0e1f56df6195195a87dc4a2245c8845e86d806b7307fa18c011d4be7a844e9c62519bb9ad1f01c3a635c72

      • \Users\Admin\AppData\Local\Temp\Builder505345\Builder.exe
        Filesize

        8.4MB

        MD5

        ca93001ff5b2276f52c3b35fb43727e8

        SHA1

        00ff6783f36d5b9d2da53e03b5e88028d0bd2d16

        SHA256

        a4899661d4392c52da77e437461f3f31d624ae32c67b6d30bb89ab1e56566069

        SHA512

        a62796d9abf7577cd2273781a6d54b0bd45e1e340e0e1f56df6195195a87dc4a2245c8845e86d806b7307fa18c011d4be7a844e9c62519bb9ad1f01c3a635c72

      • \Users\Admin\AppData\Local\Temp\Builder505345\Winlock-Builder.exe
        Filesize

        5.1MB

        MD5

        c077a47803a091cf742d442109a3b0ad

        SHA1

        1cc0dd52704309d3a991cd2698469d1e6af282fe

        SHA256

        6fdc2babc58ba676719e69ec9d92e2420044acad0482e93cf3f7cb901a385784

        SHA512

        d53cb6ae5f0046e6faa2cab9dbeb0568ca89870ec2a4a2d022bf14b34294588af69154ad098e91e0ad8bc77789216909f765a440c30e67e1d41e5cc1e2fd73d5

      • \Users\Admin\AppData\Local\Temp\Builder505345\stcm.exe
        Filesize

        360KB

        MD5

        573b8162fa32fc34b57b8b1985d21032

        SHA1

        5489f40ef212348724e61fecd5c20287e41f44cc

        SHA256

        0c904e4ad6c8a821e41efa7f49d802dccd4fe9d4bd6161301407c272f45887ab

        SHA512

        97064d8a9488ce69355ee99b86359f8a5bfd813e6e8b40a520490c71a086284ae67ff045653a5b9242fc320b29f7f81946915db3beda1316015a5dc20e3bc1fe

      • \Users\Admin\AppData\Local\Temp\Builder505345\stcm.exe
        Filesize

        360KB

        MD5

        573b8162fa32fc34b57b8b1985d21032

        SHA1

        5489f40ef212348724e61fecd5c20287e41f44cc

        SHA256

        0c904e4ad6c8a821e41efa7f49d802dccd4fe9d4bd6161301407c272f45887ab

        SHA512

        97064d8a9488ce69355ee99b86359f8a5bfd813e6e8b40a520490c71a086284ae67ff045653a5b9242fc320b29f7f81946915db3beda1316015a5dc20e3bc1fe

      • memory/1132-182-0x00000000003B0000-0x00000000003B1000-memory.dmp
        Filesize

        4KB

      • memory/1132-220-0x0000000000400000-0x0000000000A9F000-memory.dmp
        Filesize

        6.6MB

      • memory/1132-205-0x00000000003B0000-0x00000000003B1000-memory.dmp
        Filesize

        4KB

      • memory/1132-206-0x0000000000400000-0x0000000000A9F000-memory.dmp
        Filesize

        6.6MB

      • memory/1132-224-0x0000000000400000-0x0000000000A9F000-memory.dmp
        Filesize

        6.6MB

      • memory/1132-215-0x0000000000400000-0x0000000000A9F000-memory.dmp
        Filesize

        6.6MB

      • memory/1132-229-0x0000000000400000-0x0000000000A9F000-memory.dmp
        Filesize

        6.6MB

      • memory/1936-162-0x0000000000400000-0x000000000043E000-memory.dmp
        Filesize

        248KB

      • memory/1936-141-0x0000000000400000-0x000000000043E000-memory.dmp
        Filesize

        248KB

      • memory/1972-218-0x0000000000400000-0x00000000009A8000-memory.dmp
        Filesize

        5.7MB

      • memory/1972-213-0x0000000000400000-0x00000000009A8000-memory.dmp
        Filesize

        5.7MB

      • memory/1972-198-0x00000000001C0000-0x00000000001C1000-memory.dmp
        Filesize

        4KB

      • memory/1972-223-0x0000000000400000-0x00000000009A8000-memory.dmp
        Filesize

        5.7MB

      • memory/1972-211-0x00000000001C0000-0x00000000001C1000-memory.dmp
        Filesize

        4KB

      • memory/2100-212-0x0000000000400000-0x00000000009A8000-memory.dmp
        Filesize

        5.7MB

      • memory/2100-214-0x00000000003C0000-0x00000000003C1000-memory.dmp
        Filesize

        4KB

      • memory/2100-199-0x00000000003C0000-0x00000000003C1000-memory.dmp
        Filesize

        4KB

      • memory/2136-197-0x0000000000400000-0x0000000000A9F000-memory.dmp
        Filesize

        6.6MB

      • memory/2136-180-0x0000000000250000-0x0000000000251000-memory.dmp
        Filesize

        4KB

      • memory/2148-173-0x0000000000400000-0x0000000000A9F000-memory.dmp
        Filesize

        6.6MB

      • memory/2148-172-0x0000000000240000-0x0000000000241000-memory.dmp
        Filesize

        4KB

      • memory/2524-210-0x0000000000400000-0x00000000009A8000-memory.dmp
        Filesize

        5.7MB

      • memory/2524-208-0x0000000000240000-0x0000000000241000-memory.dmp
        Filesize

        4KB

      • memory/2548-66-0x0000000000230000-0x0000000000231000-memory.dmp
        Filesize

        4KB

      • memory/2548-72-0x0000000000400000-0x0000000000460000-memory.dmp
        Filesize

        384KB

      • memory/2548-139-0x0000000000400000-0x0000000000460000-memory.dmp
        Filesize

        384KB

      • memory/2860-177-0x0000000000400000-0x0000000000A9F000-memory.dmp
        Filesize

        6.6MB

      • memory/2860-176-0x0000000000350000-0x0000000000351000-memory.dmp
        Filesize

        4KB

      • memory/2884-71-0x0000000000230000-0x0000000000231000-memory.dmp
        Filesize

        4KB

      • memory/2884-73-0x0000000000400000-0x0000000000C6D000-memory.dmp
        Filesize

        8.4MB

      • memory/2884-80-0x0000000000400000-0x0000000000C6D000-memory.dmp
        Filesize

        8.4MB

      • memory/2884-154-0x0000000000400000-0x0000000000C6D000-memory.dmp
        Filesize

        8.4MB

      • memory/2884-165-0x0000000000400000-0x0000000000C6D000-memory.dmp
        Filesize

        8.4MB