Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\] 'tvncontrol' = '"C:\RMC9\RMC9.exe" -controlservice -slave'
- [<HKLM>\System\CurrentControlSet\Services\W_OfficeService] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\W_OfficeService] 'ImagePath' = '%WINDIR%\OfficeService.exe'
- [<HKLM>\System\CurrentControlSet\Services\rmcserver] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\rmcserver] 'ImagePath' = '"C:\RMC9\RMC9.exe" -service'
- '%WINDIR%\syswow64\taskkill.exe' /F /IM OfficeAgent.exe
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall add rule name="StarCat Agent" dir=in action=allow program="%WINDIR%\vistamnt.exe" profile=Any
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall add rule name="StarCat Agent" dir=in program="%WINDIR%\OfficeAgent.exe" action=allow profile=Any
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall add rule name="STARCAT UDP" dir=in action=allow protocol=UDP localport=25000,25001,26000
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall add rule name="STARCAT TCP" dir=in action=allow protocol=TCP localport=25001-25006
- '%WINDIR%\syswow64\net.exe' stop rmc7
- '%WINDIR%\syswow64\net.exe' stop rmc8
- '%WINDIR%\syswow64\net.exe' stop rmc9
- '%WINDIR%\syswow64\net.exe' stop rmcserver
- '%WINDIR%\syswow64\taskkill.exe' /F /IM RMC8.exe
- '%WINDIR%\syswow64\taskkill.exe' /F /IM RMC7.exe
- '%WINDIR%\syswow64\taskkill.exe' /F /IM RMC9.exe
- '%WINDIR%\syswow64\taskkill.exe' /F /IM sysmnt.exe
- '%WINDIR%\syswow64\taskkill.exe' /F /IM vistamnt.exe
- '%WINDIR%\syswow64\taskkill.exe' /F /IM Officetools.exe
- '%WINDIR%\syswow64\taskkill.exe' /F /IM OfficeService.exe
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall add rule name="StarCat Agent" dir=in action=allow program="%WINDIR%\sysmnt.exe" profile=Any
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall add rule name="StarCat Officetools" dir=in action=allow program="%WINDIR%\OfficeTools.exe" profile=Any
- %TEMP%\installagent\displayinfo.bat
- %WINDIR%\moscii\taskfiletempxml\downloads.xml
- %WINDIR%\moscii\dotnet\log\2019-07-19.log
- %WINDIR%\syswow64\config\systemprofile\appdata\local\gdipfontcachev1.dat
- %WINDIR%\moscii\logs\agent.log
- %WINDIR%\syswow64\sysmnt.exe
- %WINDIR%\moscii\inventory\e99f0766-410c-4e21-b4b5-5b11913adf1e_swinv.xml
- %TEMP%\installagent\rmc9_x86\screenhooks32.dll
- C:\rmc9\license.txt
- C:\rmc9\screenhooks64.dll
- %TEMP%\installagent\nu
- %WINDIR%\moscii\inventory\e99f0766-410c-4e21-b4b5-5b11913adf1e_hwinv.xml
- %WINDIR%\moscii\inventory\e99f0766-410c-4e21-b4b5-5b11913adf1e_info.xml
- %WINDIR%\temp\tmp_43665.1262857292
- %WINDIR%\temp\tmp_43665.1263707176
- %WINDIR%\temp\tmp_43665.126083912
- %WINDIR%\vistamnt.exe
- %WINDIR%\moscii\logs\officeservice.log
- %WINDIR%\officetools.exe
- %WINDIR%\officeagent.exe
- %TEMP%\installagent\install.bat
- %TEMP%\installagent\officeservice.exe
- %TEMP%\installagent\rmc9_x64\license.txt
- %TEMP%\installagent\rmc9_x64\rmc9.exe
- %TEMP%\installagent\rmc9_x64\screenhooks64.dll
- %TEMP%\installagent\rmc9_x86\license.txt
- %WINDIR%\temp\tmp_43665.1264044213
- C:\rmc9\rmc9.exe
- %TEMP%\installagent\rmc9_x86\rmc9.exe
- %TEMP%\installagent\officeagent.exe
- %TEMP%\installagent\net2\officetools.exe
- %TEMP%\installagent\net4\officetools.exe
- nul
- %WINDIR%\moscii\dotnet\dotnetagentconfig.config
- %WINDIR%\officeservice.exe
- %TEMP%\installagent\dotnetagentconfig.config
- %TEMP%\installagent\xp\officeagent.exe
- %WINDIR%\temp\tmp_43665.126439537
- %WINDIR%\temp\tmp_43665.126083912
- %WINDIR%\temp\tmp_43665.1262857292
- %WINDIR%\temp\tmp_43665.1263707176
- %WINDIR%\temp\tmp_43665.1264044213
- %WINDIR%\temp\tmp_43665.126439537
- 'localhost':33333
- 'localhost':3822
- '<LOCALNET>.70.7':25000
- ClassName: 'EDIT' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'TrayNotifyWnd' WindowName: ''
- ClassName: 'SysPager' WindowName: ''
- ClassName: 'ToolbarWindow32' WindowName: 'Notification Area'
- ClassName: 'ToolbarWindow32' WindowName: 'User Promoted Notification Area'
- ClassName: 'NotifyIconOverflowWindow' WindowName: ''
- ClassName: 'ToolbarWindow32' WindowName: 'Overflow Notification Area'
- ClassName: 'MouseZ' WindowName: 'Magellan MSWHEEL'
- '%WINDIR%\officeservice.exe' /install /silent
- '%WINDIR%\officeservice.exe'
- '%WINDIR%\officeagent.exe'
- 'C:\rmc9\rmc9.exe' -service
- '%WINDIR%\vistamnt.exe'
- '%WINDIR%\officetools.exe'
- 'C:\rmc9\rmc9.exe' -install -silent
- '%WINDIR%\syswow64\sysmnt.exe'
- '%WINDIR%\syswow64\sysmnt.exe' ' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' ^/C netsh advfirewall firewall delete rule name="STARCAT TCP" >%WINDIR%\TEMP\\tmp_43665.1262857292' (with hidden window)
- '%WINDIR%\officetools.exe' ' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c net start officeservice' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' ^/C del %WINDIR%\TEMP\\tmp_*.* >%WINDIR%\TEMP\\tmp_43665.126083912' (with hidden window)
- '%WINDIR%\officeagent.exe' ' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' ^/C netsh advfirewall firewall add rule name="STARCAT TCP" dir=in action=allow protocol=TCP localport=25001-25006 >%WINDIR%\TEMP\\tmp_43665.1264044213' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' ^/C netsh advfirewall firewall delete rule name="STARCAT UDP" >%WINDIR%\TEMP\\tmp_43665.1263707176' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' ^/C netsh advfirewall firewall add rule name="STARCAT UDP" dir=in action=allow protocol=UDP localport=25000,25001,26000 >%WINDIR%\TEMP\\tmp_43665.126439537' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c ""%TEMP%\InstallAgent\install.bat" "
- '%WINDIR%\syswow64\reg.exe' ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v SoftwareSASgeneration /t REG_dword /d 1 /F
- '%WINDIR%\syswow64\reg.exe' ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v SoftwareSASgeneration /t REG_dword /d 1 /F reg:64
- '%WINDIR%\syswow64\net.exe' start rmcserver
- '%WINDIR%\syswow64\net1.exe' start rmcserver
- '%WINDIR%\syswow64\cmd.exe' ^/C netsh advfirewall firewall delete rule name="STARCAT TCP" >%WINDIR%\TEMP\\tmp_43665.1262857292
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall delete rule name="STARCAT TCP"
- '%WINDIR%\syswow64\net.exe' start rmc9
- '%WINDIR%\syswow64\sc.exe' delete "rmc7"
- '%WINDIR%\syswow64\net1.exe' start rmc9
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall delete rule name="StarCat Tools"
- '%WINDIR%\syswow64\cmd.exe' ^/C netsh advfirewall firewall delete rule name="STARCAT UDP" >%WINDIR%\TEMP\\tmp_43665.1263707176
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall delete rule name="STARCAT UDP"
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall delete rule name="StarCat Officetools"
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall delete rule name="RMC"
- '%WINDIR%\syswow64\cmd.exe' ^/C netsh advfirewall firewall add rule name="STARCAT TCP" dir=in action=allow protocol=TCP localport=25001-25006 >%WINDIR%\TEMP\\tmp_43665.1264044213
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall delete rule name="RMC9"
- '%WINDIR%\syswow64\cmd.exe' ^/C del %WINDIR%\TEMP\\tmp_*.* >%WINDIR%\TEMP\\tmp_43665.126083912
- '%WINDIR%\syswow64\ping.exe' 127.0.0.1 -n 3
- '%WINDIR%\syswow64\net1.exe' start officeservice
- '%WINDIR%\syswow64\net.exe' start officeservice
- '%WINDIR%\syswow64\cmd.exe' /c net start officeservice
- '%WINDIR%\syswow64\net1.exe' stop rmc9
- '%WINDIR%\syswow64\net1.exe' stop rmc8
- '%WINDIR%\syswow64\net1.exe' stop rmc7
- '%WINDIR%\syswow64\ping.exe' 127.0.0.1 -n 2
- '%WINDIR%\syswow64\sc.exe' delete "w_Officeservice"
- '%WINDIR%\syswow64\sc.exe' delete "rmcserver"
- '%WINDIR%\syswow64\sc.exe' delete "rmc9"
- '%WINDIR%\syswow64\cmd.exe' ^/C netsh advfirewall firewall add rule name="STARCAT UDP" dir=in action=allow protocol=UDP localport=25000,25001,26000 >%WINDIR%\TEMP\\tmp_43665.126439537
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall delete rule name="StarCat Agent"
- '%WINDIR%\syswow64\sc.exe' delete "rmc8"
- '%WINDIR%\syswow64\findstr.exe' /IL "5.0."
- '%WINDIR%\syswow64\findstr.exe' /IL "5.1."
- '%WINDIR%\syswow64\findstr.exe' /IL "5.2."
- '%WINDIR%\syswow64\findstr.exe' /IL "6.0."
- '%WINDIR%\syswow64\findstr.exe' /IL "6.1."
- '%WINDIR%\syswow64\ping.exe' 127.0.0.1 -n 5
- '%WINDIR%\syswow64\ping.exe' 127.0.0.1 -n 10
- '%WINDIR%\syswow64\net1.exe' stop rmcserver
- '%WINDIR%\syswow64\cmd.exe' /S /D /c" VER "
- '%WINDIR%\syswow64\sc.exe' config rmcserver start= delayed-auto