Analysis
-
max time kernel
169s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 23:38
Static task
static1
Behavioral task
behavioral1
Sample
fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3.exe
Resource
win10v2004-20220812-en
General
-
Target
fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3.exe
-
Size
7.3MB
-
MD5
6b6702acef95453426afa2f1d2520bb2
-
SHA1
47293a57769289aa4070f04f22f7d9fcc77c9682
-
SHA256
fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3
-
SHA512
e93652d097c7cb45c46acb5926cf59ad87741ee9a795c4294d4bbed43827aecde27e34520102da717073d4a197b6c5d4addd581ee2ae7c4020f5415cb93f9c5c
-
SSDEEP
196608:W15XKNCDOtv1BCkrxlpJ8EAnOsjnkrciwzSQ2Y:WrXov6sxDiEAOsjo2X2Y
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 7 2780 msiexec.exe 9 2780 msiexec.exe -
Executes dropped EXE 15 IoCs
pid Process 1876 rutserv.exe 1764 rutserv.exe 1856 rutserv.exe 2240 srvinst_x64.exe 2448 srvinst_x64.exe 4656 setupdrv.exe 3972 setupdrv.exe 4928 srvinst_x64.exe 1080 VPDAgent_x64.exe 2188 srvinst_x64.exe 3560 rutserv.exe 3428 rutserv.exe 4612 rfusclient.exe 4384 rfusclient.exe 3828 rfusclient.exe -
Registers new Print Monitor 2 TTPs 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint\OfflinePorts spoolsv.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\rmsm\Driver = "rmspm.dll" spoolsv.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\rmsm\Ports\rms spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Local Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\rmsm\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Microsoft Shared Fax Monitor spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\rmsm spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\IPP spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\USB Monitor spoolsv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3.exe -
Loads dropped DLL 36 IoCs
pid Process 1796 MsiExec.exe 1876 rutserv.exe 1764 rutserv.exe 1856 rutserv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3560 rutserv.exe 3428 rutserv.exe 4384 rfusclient.exe 4612 rfusclient.exe 3828 rfusclient.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\system32\spool\DRIVERS\x64\3\New\unires_vpd.dll spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\rmsui2.exe spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\rms.gpd spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\unidrv_rms.dll setupdrv.exe File created C:\Windows\system32\spool\DRIVERS\x64\stdnames_vpd.gpd setupdrv.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\rms.lng spoolsv.exe File created C:\Windows\system32\rmspm.dll setupdrv.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\unidrv_rms.dll spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\rmsui2.exe spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\rmsui.dll spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\unidrv_rms.dll spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\unidrv_rms.hlp setupdrv.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\unidrvui_rms.dll spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\stdnames_vpd.gpd spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\rmsui.dll spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\rmsui.dll setupdrv.exe File created C:\Windows\system32\spool\DRIVERS\x64\rmsui2.exe setupdrv.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\unidrv_rms.hlp spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\rms.ini setupdrv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\unidrv_rms.hlp spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\rms.lng spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\unidrvui_rms.dll spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\rms.BUD spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\unidrvui_rms.dll setupdrv.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\rms.ini spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\stdnames_vpd.gpd spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\unires_vpd.dll spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\rms.ini spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\unires_vpd.dll setupdrv.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\rms.gpd spoolsv.exe File opened for modification C:\Windows\system32\rmspm.dll setupdrv.exe File created C:\Windows\system32\spool\DRIVERS\x64\rms.gpd setupdrv.exe File created C:\Windows\system32\spool\DRIVERS\x64\rms.lng setupdrv.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\rms_s.lng attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\dsfVorbisEncoder.dll attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\winmm.dll attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\stdnames_vpd.gpd attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rms_s.lng msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\gdiplus.dll msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\install.cmd attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rms_s.lng attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rms.lng msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\progress.exe msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\rms_s.lng msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Microsoft.VC90.CRT.manifest attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\English.lg attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\English.lg msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\progress.exe attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rms.ini attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\fwproc.exe msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\rmsui.dll msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\unidrv_rms.hlp attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\unires_vpd.dll attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\stdnames_vpd.gpd attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\progress.exe attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\VPDAgent_x64.exe attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\msvcr90.dll attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\srvinst.exe msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\unidrv_rms.hlp msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\uninstall.cmd attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\msvcp90.dll attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rms.ini msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rms.ini attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\winmm.dll attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64 attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\winmm.dll cmd.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\EULA.rtf msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\rmspm.dll attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rmsui2.exe attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\SampleClient.exe attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\msvcr90.dll attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\fwproc.exe attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\fwproc.exe msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\ntprint.inf msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\stdnames_vpd.gpd attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rmsui2.exe attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\winmm.dll cmd.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\ntprint.inf attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\rms.lng attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\unidrv_rms.dll attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rmsui.dll attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\RIPCServer.dll attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\install.cmd msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\unidrv_rms.dll attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\install.cmd attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\unidrv_rms.hlp attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86 attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\setupdrv.exe attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\unires_vpd.dll msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\dsfVorbisEncoder.dll msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\setupdrv.exe msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rms_s.lng attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\uninstall.cmd attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\RIPCServer.dll attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\rmsui.dll attrib.exe -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\Installer\{C2AD926E-45DC-4C5F-88A0-63AEE6A3262A}\UNINST_Uninstall_R_3B1E3C8B7D0945898DA82CEEED02F0C7.exe msiexec.exe File created C:\Windows\Installer\{C2AD926E-45DC-4C5F-88A0-63AEE6A3262A}\server_stop_27D7873393984316BEA10FB36BB4D2F9.exe msiexec.exe File opened for modification C:\Windows\Installer\{C2AD926E-45DC-4C5F-88A0-63AEE6A3262A}\server_start_C00864331B9D4391A8A26292A601EBE2.exe msiexec.exe File created C:\Windows\VPDAgent_x64.exe srvinst_x64.exe File opened for modification C:\Windows\Installer\e56f64b.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI21E0.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C2AD926E-45DC-4C5F-88A0-63AEE6A3262A} msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\{C2AD926E-45DC-4C5F-88A0-63AEE6A3262A}\ARPPRODUCTICON.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI23C5.tmp msiexec.exe File created C:\Windows\Installer\{C2AD926E-45DC-4C5F-88A0-63AEE6A3262A}\ARPPRODUCTICON.exe msiexec.exe File created C:\Windows\Installer\{C2AD926E-45DC-4C5F-88A0-63AEE6A3262A}\server_config_C8E9A92497A149D695F92E4E3AE550F0.exe msiexec.exe File created C:\Windows\Installer\e56f64b.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\{C2AD926E-45DC-4C5F-88A0-63AEE6A3262A}\server_config_C8E9A92497A149D695F92E4E3AE550F0.exe msiexec.exe File created C:\Windows\Installer\{C2AD926E-45DC-4C5F-88A0-63AEE6A3262A}\server_start_C00864331B9D4391A8A26292A601EBE2.exe msiexec.exe File opened for modification C:\Windows\VPDAgent_x64.exe srvinst_x64.exe File created C:\Windows\Installer\e56f64e.msi msiexec.exe File opened for modification C:\Windows\Installer\{C2AD926E-45DC-4C5F-88A0-63AEE6A3262A}\UNINST_Uninstall_R_3B1E3C8B7D0945898DA82CEEED02F0C7.exe msiexec.exe File opened for modification C:\Windows\Installer\{C2AD926E-45DC-4C5F-88A0-63AEE6A3262A}\server_stop_27D7873393984316BEA10FB36BB4D2F9.exe msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 16 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{f01fac5d-e5f6-485f-a8c6-27446425998c}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{f01fac5d-e5f6-485f-a8c6-27446425998c}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{f01fac5d-e5f6-485f-a8c6-27446425998c}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{f01fac5d-e5f6-485f-a8c6-27446425998c}\0002 spoolsv.exe -
Modifies data under HKEY_USERS 32 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" rutserv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" spoolsv.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\RMS Printer = "winspool,rms,15,45" spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" spoolsv.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ rutserv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Printers\DevModePerUser spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Printers\ConvertUserDevModesCount spoolsv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" rutserv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\RMS Printer = "winspool,rms,15,45" spoolsv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" rutserv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" rutserv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\RMS Printer = "winspool,rms" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\RMS Printer = "winspool,rms" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" spoolsv.exe -
Modifies registry class 44 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\PackageName = "rms.host5.5ru.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\Media\DiskPrompt = "[1]" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\AdvertiseFlags = "388" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\PackageCode = "CA621BAB2625C4F47B0824566FC192D8" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\ProductIcon = "C:\\Windows\\Installer\\{C2AD926E-45DC-4C5F-88A0-63AEE6A3262A}\\ARPPRODUCTICON.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\PackageName = "rms.host5.5ru.msi" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\E629DA2CCD54F5C4880A36EA6E3A62A2 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\509B38EF4554FFD4794F292971C81B17 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\Assignment = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\DeploymentFlags = "3" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\Media regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\ProductIcon = "C:\\Windows\\Installer\\{C2AD926E-45DC-4C5F-88A0-63AEE6A3262A}\\ARPPRODUCTICON.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\509B38EF4554FFD4794F292971C81B17\E629DA2CCD54F5C4880A36EA6E3A62A2 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\E629DA2CCD54F5C4880A36EA6E3A62A2\RMS msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\Language = "1049" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7ZipSfx.000\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\Version = "100603060" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\AuthorizedLUAApp = "0" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\LastUsedSource = "n;1;C:\\Users\\836D~1\\AppData\\Local\\Temp\\7ZipSfx.003\\" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\ProductName = "Remote Manipulator System - Host" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\7ZipSfx.000\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\InstanceType = "0" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\Net\1 = "C:\\Users\\836D~1\\AppData\\Local\\Temp\\7ZipSfx.003\\" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\Version = "100603060" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\PackageCode = "CA621BAB2625C4F47B0824566FC192D8" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2 regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\ProductName regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\Language = "1049" regedit.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\Clients = 3a0000000000 regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\Media\1 = "DISK1;1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\AdvertiseFlags = "388" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\Media\1 = "DISK1;1" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\Net regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\Assignment = "1" msiexec.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2568 regedit.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1444 PING.EXE 680 PING.EXE 4164 PING.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2780 msiexec.exe 2780 msiexec.exe 1876 rutserv.exe 1876 rutserv.exe 1876 rutserv.exe 1876 rutserv.exe 1876 rutserv.exe 1876 rutserv.exe 1764 rutserv.exe 1764 rutserv.exe 1856 rutserv.exe 1856 rutserv.exe 1856 rutserv.exe 1856 rutserv.exe 3560 rutserv.exe 3560 rutserv.exe 3428 rutserv.exe 3428 rutserv.exe 3428 rutserv.exe 3428 rutserv.exe 3428 rutserv.exe 3428 rutserv.exe 4384 rfusclient.exe 4384 rfusclient.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 3828 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4940 msiexec.exe Token: SeIncreaseQuotaPrivilege 4940 msiexec.exe Token: SeSecurityPrivilege 2780 msiexec.exe Token: SeCreateTokenPrivilege 4940 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4940 msiexec.exe Token: SeLockMemoryPrivilege 4940 msiexec.exe Token: SeIncreaseQuotaPrivilege 4940 msiexec.exe Token: SeMachineAccountPrivilege 4940 msiexec.exe Token: SeTcbPrivilege 4940 msiexec.exe Token: SeSecurityPrivilege 4940 msiexec.exe Token: SeTakeOwnershipPrivilege 4940 msiexec.exe Token: SeLoadDriverPrivilege 4940 msiexec.exe Token: SeSystemProfilePrivilege 4940 msiexec.exe Token: SeSystemtimePrivilege 4940 msiexec.exe Token: SeProfSingleProcessPrivilege 4940 msiexec.exe Token: SeIncBasePriorityPrivilege 4940 msiexec.exe Token: SeCreatePagefilePrivilege 4940 msiexec.exe Token: SeCreatePermanentPrivilege 4940 msiexec.exe Token: SeBackupPrivilege 4940 msiexec.exe Token: SeRestorePrivilege 4940 msiexec.exe Token: SeShutdownPrivilege 4940 msiexec.exe Token: SeDebugPrivilege 4940 msiexec.exe Token: SeAuditPrivilege 4940 msiexec.exe Token: SeSystemEnvironmentPrivilege 4940 msiexec.exe Token: SeChangeNotifyPrivilege 4940 msiexec.exe Token: SeRemoteShutdownPrivilege 4940 msiexec.exe Token: SeUndockPrivilege 4940 msiexec.exe Token: SeSyncAgentPrivilege 4940 msiexec.exe Token: SeEnableDelegationPrivilege 4940 msiexec.exe Token: SeManageVolumePrivilege 4940 msiexec.exe Token: SeImpersonatePrivilege 4940 msiexec.exe Token: SeCreateGlobalPrivilege 4940 msiexec.exe Token: SeShutdownPrivilege 384 msiexec.exe Token: SeIncreaseQuotaPrivilege 384 msiexec.exe Token: SeCreateTokenPrivilege 384 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 384 msiexec.exe Token: SeLockMemoryPrivilege 384 msiexec.exe Token: SeIncreaseQuotaPrivilege 384 msiexec.exe Token: SeMachineAccountPrivilege 384 msiexec.exe Token: SeTcbPrivilege 384 msiexec.exe Token: SeSecurityPrivilege 384 msiexec.exe Token: SeTakeOwnershipPrivilege 384 msiexec.exe Token: SeLoadDriverPrivilege 384 msiexec.exe Token: SeSystemProfilePrivilege 384 msiexec.exe Token: SeSystemtimePrivilege 384 msiexec.exe Token: SeProfSingleProcessPrivilege 384 msiexec.exe Token: SeIncBasePriorityPrivilege 384 msiexec.exe Token: SeCreatePagefilePrivilege 384 msiexec.exe Token: SeCreatePermanentPrivilege 384 msiexec.exe Token: SeBackupPrivilege 384 msiexec.exe Token: SeRestorePrivilege 384 msiexec.exe Token: SeShutdownPrivilege 384 msiexec.exe Token: SeDebugPrivilege 384 msiexec.exe Token: SeAuditPrivilege 384 msiexec.exe Token: SeSystemEnvironmentPrivilege 384 msiexec.exe Token: SeChangeNotifyPrivilege 384 msiexec.exe Token: SeRemoteShutdownPrivilege 384 msiexec.exe Token: SeUndockPrivilege 384 msiexec.exe Token: SeSyncAgentPrivilege 384 msiexec.exe Token: SeEnableDelegationPrivilege 384 msiexec.exe Token: SeManageVolumePrivilege 384 msiexec.exe Token: SeImpersonatePrivilege 384 msiexec.exe Token: SeCreateGlobalPrivilege 384 msiexec.exe Token: SeShutdownPrivilege 684 msiexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2244 wrote to memory of 4500 2244 fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3.exe 82 PID 2244 wrote to memory of 4500 2244 fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3.exe 82 PID 2244 wrote to memory of 4500 2244 fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3.exe 82 PID 4500 wrote to memory of 5012 4500 cmd.exe 84 PID 4500 wrote to memory of 5012 4500 cmd.exe 84 PID 4500 wrote to memory of 5012 4500 cmd.exe 84 PID 4500 wrote to memory of 4940 4500 cmd.exe 85 PID 4500 wrote to memory of 4940 4500 cmd.exe 85 PID 4500 wrote to memory of 4940 4500 cmd.exe 85 PID 4500 wrote to memory of 384 4500 cmd.exe 87 PID 4500 wrote to memory of 384 4500 cmd.exe 87 PID 4500 wrote to memory of 384 4500 cmd.exe 87 PID 4500 wrote to memory of 1444 4500 cmd.exe 88 PID 4500 wrote to memory of 1444 4500 cmd.exe 88 PID 4500 wrote to memory of 1444 4500 cmd.exe 88 PID 4500 wrote to memory of 684 4500 cmd.exe 89 PID 4500 wrote to memory of 684 4500 cmd.exe 89 PID 4500 wrote to memory of 684 4500 cmd.exe 89 PID 2780 wrote to memory of 1796 2780 msiexec.exe 92 PID 2780 wrote to memory of 1796 2780 msiexec.exe 92 PID 2780 wrote to memory of 1796 2780 msiexec.exe 92 PID 2780 wrote to memory of 1876 2780 msiexec.exe 93 PID 2780 wrote to memory of 1876 2780 msiexec.exe 93 PID 2780 wrote to memory of 1876 2780 msiexec.exe 93 PID 2780 wrote to memory of 1764 2780 msiexec.exe 94 PID 2780 wrote to memory of 1764 2780 msiexec.exe 94 PID 2780 wrote to memory of 1764 2780 msiexec.exe 94 PID 2780 wrote to memory of 1856 2780 msiexec.exe 95 PID 2780 wrote to memory of 1856 2780 msiexec.exe 95 PID 2780 wrote to memory of 1856 2780 msiexec.exe 95 PID 1856 wrote to memory of 4636 1856 rutserv.exe 96 PID 1856 wrote to memory of 4636 1856 rutserv.exe 96 PID 1856 wrote to memory of 4636 1856 rutserv.exe 96 PID 4636 wrote to memory of 2240 4636 cmd.exe 98 PID 4636 wrote to memory of 2240 4636 cmd.exe 98 PID 4636 wrote to memory of 680 4636 cmd.exe 99 PID 4636 wrote to memory of 680 4636 cmd.exe 99 PID 4636 wrote to memory of 680 4636 cmd.exe 99 PID 4636 wrote to memory of 2448 4636 cmd.exe 103 PID 4636 wrote to memory of 2448 4636 cmd.exe 103 PID 4636 wrote to memory of 4656 4636 cmd.exe 104 PID 4636 wrote to memory of 4656 4636 cmd.exe 104 PID 1856 wrote to memory of 2960 1856 rutserv.exe 106 PID 1856 wrote to memory of 2960 1856 rutserv.exe 106 PID 1856 wrote to memory of 2960 1856 rutserv.exe 106 PID 2960 wrote to memory of 3972 2960 cmd.exe 108 PID 2960 wrote to memory of 3972 2960 cmd.exe 108 PID 2960 wrote to memory of 4928 2960 cmd.exe 114 PID 2960 wrote to memory of 4928 2960 cmd.exe 114 PID 2960 wrote to memory of 2188 2960 cmd.exe 116 PID 2960 wrote to memory of 2188 2960 cmd.exe 116 PID 2780 wrote to memory of 3560 2780 msiexec.exe 117 PID 2780 wrote to memory of 3560 2780 msiexec.exe 117 PID 2780 wrote to memory of 3560 2780 msiexec.exe 117 PID 4500 wrote to memory of 4164 4500 cmd.exe 119 PID 4500 wrote to memory of 4164 4500 cmd.exe 119 PID 4500 wrote to memory of 4164 4500 cmd.exe 119 PID 3428 wrote to memory of 4384 3428 rutserv.exe 121 PID 3428 wrote to memory of 4384 3428 rutserv.exe 121 PID 3428 wrote to memory of 4384 3428 rutserv.exe 121 PID 3428 wrote to memory of 4612 3428 rutserv.exe 120 PID 3428 wrote to memory of 4612 3428 rutserv.exe 120 PID 3428 wrote to memory of 4612 3428 rutserv.exe 120 PID 4500 wrote to memory of 2568 4500 cmd.exe 122 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 4160 attrib.exe 3836 attrib.exe 3984 attrib.exe 4200 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3.exe"C:\Users\Admin\AppData\Local\Temp\fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\install.cmd" "2⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:5012
-
-
C:\Windows\SysWOW64\msiexec.exeMsiExec /x {61FFA475-24D5-44FB-A51F-39B699E3D82C} /qn REBOOT=ReallySuppress3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\SysWOW64\msiexec.exeMsiExec /x {54067864-C0E7-47DB-A0C1-D6C874CE6BD8} /qn REBOOT=ReallySuppress3⤵
- Suspicious use of AdjustPrivilegeToken
PID:384
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1444
-
-
C:\Windows\SysWOW64\msiexec.exeMsiExec /I "rms.host5.5ru.msi" /qn3⤵
- Suspicious use of AdjustPrivilegeToken
PID:684
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4164
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s 28.reg3⤵
- Modifies registry class
- Runs .reg file with regedit
PID:2568
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s +r "C:\Program Files (x86)\Remote Manipulator System - Host"3⤵
- Views/modifies file attributes
PID:3836
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s +r "C:\Program Files (x86)\Remote Manipulator System - Host"3⤵
- Views/modifies file attributes
PID:3984
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s +r /d /s "C:\Program Files (x86)\Remote Manipulator System - Host\*.*"3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:4200
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s +r /d /s "C:\Program Files (x86)\Remote Manipulator System - Host\*.*"3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:4160
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2D1133906B1975F5F6BDE22C91A9C9A62⤵
- Loads dropped DLL
PID:1796
-
-
C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /silentinstall2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /firewall2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1764
-
-
C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /printerinstall2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\uninstall.cmd" "3⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\srvinst_x64.exesrvinst_x64.exe stop4⤵
- Executes dropped EXE
PID:2240
-
-
C:\Windows\SysWOW64\PING.EXEping localhost4⤵
- Runs ping.exe
PID:680
-
-
C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\srvinst_x64.exesrvinst_x64.exe uninstall4⤵
- Executes dropped EXE
PID:2448
-
-
C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\setupdrv.exesetupdrv.exe uninstall4⤵
- Executes dropped EXE
PID:4656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\install.cmd" "3⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\setupdrv.exesetupdrv.exe install4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3972
-
-
C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\srvinst_x64.exesrvinst_x64.exe install4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4928
-
-
C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\srvinst_x64.exesrvinst_x64.exe start4⤵
- Executes dropped EXE
PID:2188
-
-
-
-
C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /start2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
- Registers new Print Monitor
- Loads dropped DLL
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:3272
-
C:\Windows\VPDAgent_x64.exeC:\Windows\VPDAgent_x64.exe1⤵
- Executes dropped EXE
PID:1080
-
C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" /tray2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4612
-
-
C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4384 -
C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" /tray3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: SetClipboardViewer
PID:3828
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68B
MD5921adb25b2323226764ccface8bc087a
SHA10e657a741ec92704fe2e9b19f7eb0890cba02b1c
SHA256e71036db28270fff2f386049abcd8b1340f66871c3c6cc64195c4de30d886464
SHA512b91cc962438e4a7afd4324b81d84b3721dc44a49e9c674fa92a5363f8e393ba64bf99aca852b375620d7a4e84a09a8af591df4531346cc936559f80a91cdc999
-
Filesize
14KB
MD5151f3af412abd6bf05d160a70f8873d8
SHA10efcf48401d546ce101920496dcbbf3ab252ee87
SHA2564c21b9663120b494d0f5112eb5f9e0aab4b659a5bf5d5301ee4d5a98abb20f25
SHA51258513727d12cc915cd8445a078beb238aa3df28cc49b3733d487b0d3100f1c519b39f5b809ace618536e2d8951c1b3a58c0763a893bbd92a98c8e06575d92a4f
-
Filesize
40B
MD558ded3cb7ca70a6975c5419c62fdb51d
SHA1274040c32983b7fbf01f65e41b375f255a78547d
SHA256425dbedfc4a8a0672478b0b97e28568e5007e9813bba650fe727b252f43a0dfc
SHA512c9f3b324adc89be54ccace827c0b0b759f8658a63a6c9689c2bc5f01388daa25b8ea80f8c3b624403a2cae784af5cf0e5a94919795263a31ab9769969fd08a42
-
Filesize
25KB
MD5de5b0b40318ceabef85c04260141b039
SHA1450df0a73f682425f631af1bd8b1960490498427
SHA2567633ce5b3d2f8fea91207cdc1b2252b81606be1b5ffafedd56220cfd07f36c49
SHA5122afdbce31039b77761173a3d8a87970a99b152a97048a8710b0d5b4876bd7602dbbf8b5315fe5f4da69d093871ee59c626198371ccdea6180d7e651b871ac91b
-
Filesize
59KB
MD53267b05b305aa1bfc9d3add46da6ebbe
SHA1711d959cb570a5243a06edb07cf783265bc67417
SHA256f07014732aff3213213202bfcb78f42f3f66548f56d15ba4c3ccff2df023e778
SHA5126912c03e0083d95d763da058a97e9b5e2824241f4fc8035a47b3e1eec91a75e6be6dc17a6b743dbc461a853c0ae2cda8345188e53792e88948fc7af8bc345460
-
Filesize
24KB
MD58718dd01693b356a499867fe306cf5cb
SHA136306f92254a04865bb6e966e1b96b3beaf28fdd
SHA25612e39d57030dfc7cc7fa6f1c20e3d6fb1e7e999a73b42604b34664ccfb13c559
SHA512f185a722e779c9196f70c572666b9ee1b32e6e2c212bb88b79502fb0f3056cfb671639210d0e6e04fe36256701467825ea58d9ffdfc1dd020b0fec26548d9948
-
Filesize
214KB
MD5fcf05cb13f2f941de9301158fd8846bd
SHA11014ad4c0f2fc498b398ce56c4613e8f48de7018
SHA256925183e95087fa76e231b3fbafb924f771497b31140e502484aaf67f0b48861f
SHA5121868f0efecddb4db28489194d8ac021f40e79997be51cb2ae1e3232eb1386859a5d2dc8647bfcf473bc089ef8cbd9b2711405bb9da5eb6bddaa6c18cf64243f4
-
Filesize
64KB
MD53e2d738baf89f2df0f677453b641b00f
SHA1ba3db6e032a2a9ca7197459c9485ae05a31e6214
SHA256ea746fa2f55af75aea2f476a5a8371e2446b4c993b668468566734ca4172e98b
SHA5121a721f3a4bca6c32dbcbbc408c41bb52bd42f9d4abea4a663daf5d8553cba7b3907b4ef147cdf3d4725eab6410218c587383192a640a89738a781978b59e3896
-
Filesize
64KB
MD53e2d738baf89f2df0f677453b641b00f
SHA1ba3db6e032a2a9ca7197459c9485ae05a31e6214
SHA256ea746fa2f55af75aea2f476a5a8371e2446b4c993b668468566734ca4172e98b
SHA5121a721f3a4bca6c32dbcbbc408c41bb52bd42f9d4abea4a663daf5d8553cba7b3907b4ef147cdf3d4725eab6410218c587383192a640a89738a781978b59e3896
-
Filesize
64KB
MD53e2d738baf89f2df0f677453b641b00f
SHA1ba3db6e032a2a9ca7197459c9485ae05a31e6214
SHA256ea746fa2f55af75aea2f476a5a8371e2446b4c993b668468566734ca4172e98b
SHA5121a721f3a4bca6c32dbcbbc408c41bb52bd42f9d4abea4a663daf5d8553cba7b3907b4ef147cdf3d4725eab6410218c587383192a640a89738a781978b59e3896
-
Filesize
39KB
MD58d5c6130f1ac7bbc63a5ca7bfdbe0b86
SHA165c5870581d5ecccda95e8cd7988ed296e1b13bf
SHA25600dbd31fb64d0c908f174c7f028e7beb287f2ac25e2ddf6109df910cf2900205
SHA512dcaf1d6d3e6d87f7f6eed0ecb2b16156048589a37c0528d3dc1d0f691e831cfe6d82a7122d52429e94b694802ec8b50893eb86d25ea660d6b397d47cdcd761c9
-
Filesize
39KB
MD58d5c6130f1ac7bbc63a5ca7bfdbe0b86
SHA165c5870581d5ecccda95e8cd7988ed296e1b13bf
SHA25600dbd31fb64d0c908f174c7f028e7beb287f2ac25e2ddf6109df910cf2900205
SHA512dcaf1d6d3e6d87f7f6eed0ecb2b16156048589a37c0528d3dc1d0f691e831cfe6d82a7122d52429e94b694802ec8b50893eb86d25ea660d6b397d47cdcd761c9
-
Filesize
39KB
MD58d5c6130f1ac7bbc63a5ca7bfdbe0b86
SHA165c5870581d5ecccda95e8cd7988ed296e1b13bf
SHA25600dbd31fb64d0c908f174c7f028e7beb287f2ac25e2ddf6109df910cf2900205
SHA512dcaf1d6d3e6d87f7f6eed0ecb2b16156048589a37c0528d3dc1d0f691e831cfe6d82a7122d52429e94b694802ec8b50893eb86d25ea660d6b397d47cdcd761c9
-
Filesize
14KB
MD57162d8977515a446d2c1e139da59ded5
SHA1952f696c463b8410b1fa93a3b2b6dae416a81867
SHA2562835a439c6ae22074bc3372491cb71e6c2b72d0c87ae3eee6065c6caadf1e5c8
SHA512508f7ca3d4bc298534ab058f182755851051684f8d53306011f03875804c95e427428bd425dd13633eec79748bb64e78aad43e75b70cc5a3f0f4e6696dbb6d8e
-
Filesize
474KB
MD5560c86ed0a2434c4b78dd177b89cfd82
SHA16f0f56f17191b65798296259b7a820a2a20c1f4a
SHA2566f7cbe19b28b054b0d15699566e431eb064192096bfb86ebf3f2f0fe6356d2e9
SHA512726d837a1accbd9b27414ca0e81ebef6d6654dfe4739617bfe3188af0fe7959ea0a38aec0a647e640ca6d23d422c140c929695caafb615a3e1e8e58ced9e154b
-
Filesize
20KB
MD56798f64959c913673bd66cd4e47f4a65
SHA1c50faa64c8267ac7106401e69da5c15fc3f2034c
SHA2560c02b226be4e7397f8c98799e58b0a512515e462ccdaac04edc10e3e1091c011
SHA5128d208306b6d0f892a2f16f8070a89d8edb968589896cb70cf46f43bf4befb7c4ca6a278c35fe8a2685cc784505efb77c32b0aabf80d13bcc0d10a39ae8afb55a
-
Filesize
869KB
MD5cdb62f7518a33636bbbf45b8373ab3ee
SHA17715bbaab16aedcf1c716ed7e62a1acc98e7ded7
SHA256c604bb8550b9019e8e88db5d40eb14801db6b802e2598b971cf474150c54b62b
SHA51250e00a3b4a042cbfc925189c2716a2b7384ba43c029a9a103d9b42f8ef8d6c78b5f70bc4080b2e6133883868d5985132c1440496726504a22784df121b158d0f
-
Filesize
87B
MD524837286ab8b5537ea3967e0a7905238
SHA14f3dc09d2f0c9ede72577154b9954621dd30604b
SHA256f6ebaa2bc59841b72aaf3c03c7bfea91c75ec1f982f497d6b3d7fb7271cacdf6
SHA5126b0cfd707fbab7034ef45b4864329a9ad01f649216fe13aede6bf6488b50020da65f8a3776c1b125eebe08aef6a848d04a33de8277a2ad3827c8869af1368c00
-
Filesize
750KB
MD503f5e58d189f1c1e19971ac6cafd7130
SHA1f396baa66428f7f7b36f09e5a82a81887bc936a0
SHA2563fdb60c1b232395a5e5c662ef2c89c6b8b68859834d69db40621f5974b1d2f4d
SHA512cf57afb85c1084d0e87d71324520294a1d051458a74e2d264005a0529da7245a7057649a6f56d60edc4c3f56568c9a330d1b0c51b671ecaebb9c7b5eaaeca886
-
Filesize
5.7MB
MD584abcb8cc5427479c3e4ebe66300c78a
SHA14227f7850eaebf08f18aa6a2769a600a05bfbf70
SHA256a0487ebd599580d2364bafcd8990970436e40e4979021e02866d0652067d6dbd
SHA5122f3c5dcba1ea204e7abe9dcc47c40097a2d3ddd52b979a8bdd773977e64195a3b71cb5bd2bdb196e5c55071a918326bed34dadc48f1927067b9011bb3633039a
-
Filesize
5.7MB
MD584abcb8cc5427479c3e4ebe66300c78a
SHA14227f7850eaebf08f18aa6a2769a600a05bfbf70
SHA256a0487ebd599580d2364bafcd8990970436e40e4979021e02866d0652067d6dbd
SHA5122f3c5dcba1ea204e7abe9dcc47c40097a2d3ddd52b979a8bdd773977e64195a3b71cb5bd2bdb196e5c55071a918326bed34dadc48f1927067b9011bb3633039a
-
Filesize
5.7MB
MD584abcb8cc5427479c3e4ebe66300c78a
SHA14227f7850eaebf08f18aa6a2769a600a05bfbf70
SHA256a0487ebd599580d2364bafcd8990970436e40e4979021e02866d0652067d6dbd
SHA5122f3c5dcba1ea204e7abe9dcc47c40097a2d3ddd52b979a8bdd773977e64195a3b71cb5bd2bdb196e5c55071a918326bed34dadc48f1927067b9011bb3633039a
-
Filesize
5.7MB
MD584abcb8cc5427479c3e4ebe66300c78a
SHA14227f7850eaebf08f18aa6a2769a600a05bfbf70
SHA256a0487ebd599580d2364bafcd8990970436e40e4979021e02866d0652067d6dbd
SHA5122f3c5dcba1ea204e7abe9dcc47c40097a2d3ddd52b979a8bdd773977e64195a3b71cb5bd2bdb196e5c55071a918326bed34dadc48f1927067b9011bb3633039a
-
Filesize
21KB
MD591b769ba7d48157f452bd26be72160ec
SHA1b61e2369084235ebc0bc277c16d3a56ac20a95b9
SHA25658e401bfbd9387d65571afda2ffc28d290d9d21843aa06a6ceca4f9457d357e9
SHA5121c1a87690486d22007f6f0e5c101575a78f1a17255d4cf6a79df7f5c5b2b4c3e8ec01bf5df33515ea888df12d52a5cd959bd7df6dfb0acceb34b411e97f8f0c2
-
Filesize
21KB
MD591b769ba7d48157f452bd26be72160ec
SHA1b61e2369084235ebc0bc277c16d3a56ac20a95b9
SHA25658e401bfbd9387d65571afda2ffc28d290d9d21843aa06a6ceca4f9457d357e9
SHA5121c1a87690486d22007f6f0e5c101575a78f1a17255d4cf6a79df7f5c5b2b4c3e8ec01bf5df33515ea888df12d52a5cd959bd7df6dfb0acceb34b411e97f8f0c2
-
Filesize
21KB
MD591b769ba7d48157f452bd26be72160ec
SHA1b61e2369084235ebc0bc277c16d3a56ac20a95b9
SHA25658e401bfbd9387d65571afda2ffc28d290d9d21843aa06a6ceca4f9457d357e9
SHA5121c1a87690486d22007f6f0e5c101575a78f1a17255d4cf6a79df7f5c5b2b4c3e8ec01bf5df33515ea888df12d52a5cd959bd7df6dfb0acceb34b411e97f8f0c2
-
Filesize
21KB
MD591b769ba7d48157f452bd26be72160ec
SHA1b61e2369084235ebc0bc277c16d3a56ac20a95b9
SHA25658e401bfbd9387d65571afda2ffc28d290d9d21843aa06a6ceca4f9457d357e9
SHA5121c1a87690486d22007f6f0e5c101575a78f1a17255d4cf6a79df7f5c5b2b4c3e8ec01bf5df33515ea888df12d52a5cd959bd7df6dfb0acceb34b411e97f8f0c2
-
Filesize
686B
MD571b49822e6941d131840c3902d61b940
SHA19bd095ae0ef802bae85f659a22c7f343814c9a9d
SHA256903cebb868adeea505be095cbc5bff92fa66ffd848a171d3b1208efa8ed6d66b
SHA512ce0a42fe81f21547cdf95f3141319c167449a81228ff50599f1e2483543f6c9291e0f1b60157fb495de64526d62a4499b07bedf218c73392b739bbef935322df
-
Filesize
7.9MB
MD5f63f70f82fa77f0e2f771c7fc10b3985
SHA1d6db70a31267811aa5553058a32f0382532f1b12
SHA2564e079967632c04b3981197fc54c925bab1a7b9a1edf9a3c282374563a481dfc2
SHA512792eb27d03d67574938429f3177e7b896d9ef96e2b24002f5a6d5a6c077451ec0f4dd8d0c88e09a625e4d04e516450739583c35a3377b8cc741bf3b33197d889
-
Filesize
21KB
MD591b769ba7d48157f452bd26be72160ec
SHA1b61e2369084235ebc0bc277c16d3a56ac20a95b9
SHA25658e401bfbd9387d65571afda2ffc28d290d9d21843aa06a6ceca4f9457d357e9
SHA5121c1a87690486d22007f6f0e5c101575a78f1a17255d4cf6a79df7f5c5b2b4c3e8ec01bf5df33515ea888df12d52a5cd959bd7df6dfb0acceb34b411e97f8f0c2
-
Filesize
125KB
MD5b0bcc622f1fff0eec99e487fa1a4ddd9
SHA149aa392454bd5869fa23794196aedc38e8eea6f5
SHA256b32687eaaad888410718875dcbff9f6a552e29c4d76af33e06e59859e1054081
SHA5121572c1d07df2e9262d05a915d69ec4ebeb92eab50b89ce27dd290fb5a8e1de2c97d9320a3bb006834c98b3f6afcd7d2c29f039d9ca9afaa09c714406dedbc3c7
-
Filesize
125KB
MD5b0bcc622f1fff0eec99e487fa1a4ddd9
SHA149aa392454bd5869fa23794196aedc38e8eea6f5
SHA256b32687eaaad888410718875dcbff9f6a552e29c4d76af33e06e59859e1054081
SHA5121572c1d07df2e9262d05a915d69ec4ebeb92eab50b89ce27dd290fb5a8e1de2c97d9320a3bb006834c98b3f6afcd7d2c29f039d9ca9afaa09c714406dedbc3c7
-
Filesize
59KB
MD53267b05b305aa1bfc9d3add46da6ebbe
SHA1711d959cb570a5243a06edb07cf783265bc67417
SHA256f07014732aff3213213202bfcb78f42f3f66548f56d15ba4c3ccff2df023e778
SHA5126912c03e0083d95d763da058a97e9b5e2824241f4fc8035a47b3e1eec91a75e6be6dc17a6b743dbc461a853c0ae2cda8345188e53792e88948fc7af8bc345460
-
Filesize
59KB
MD53267b05b305aa1bfc9d3add46da6ebbe
SHA1711d959cb570a5243a06edb07cf783265bc67417
SHA256f07014732aff3213213202bfcb78f42f3f66548f56d15ba4c3ccff2df023e778
SHA5126912c03e0083d95d763da058a97e9b5e2824241f4fc8035a47b3e1eec91a75e6be6dc17a6b743dbc461a853c0ae2cda8345188e53792e88948fc7af8bc345460
-
Filesize
24KB
MD58718dd01693b356a499867fe306cf5cb
SHA136306f92254a04865bb6e966e1b96b3beaf28fdd
SHA25612e39d57030dfc7cc7fa6f1c20e3d6fb1e7e999a73b42604b34664ccfb13c559
SHA512f185a722e779c9196f70c572666b9ee1b32e6e2c212bb88b79502fb0f3056cfb671639210d0e6e04fe36256701467825ea58d9ffdfc1dd020b0fec26548d9948
-
Filesize
24KB
MD58718dd01693b356a499867fe306cf5cb
SHA136306f92254a04865bb6e966e1b96b3beaf28fdd
SHA25612e39d57030dfc7cc7fa6f1c20e3d6fb1e7e999a73b42604b34664ccfb13c559
SHA512f185a722e779c9196f70c572666b9ee1b32e6e2c212bb88b79502fb0f3056cfb671639210d0e6e04fe36256701467825ea58d9ffdfc1dd020b0fec26548d9948
-
Filesize
24KB
MD58718dd01693b356a499867fe306cf5cb
SHA136306f92254a04865bb6e966e1b96b3beaf28fdd
SHA25612e39d57030dfc7cc7fa6f1c20e3d6fb1e7e999a73b42604b34664ccfb13c559
SHA512f185a722e779c9196f70c572666b9ee1b32e6e2c212bb88b79502fb0f3056cfb671639210d0e6e04fe36256701467825ea58d9ffdfc1dd020b0fec26548d9948
-
Filesize
24KB
MD58718dd01693b356a499867fe306cf5cb
SHA136306f92254a04865bb6e966e1b96b3beaf28fdd
SHA25612e39d57030dfc7cc7fa6f1c20e3d6fb1e7e999a73b42604b34664ccfb13c559
SHA512f185a722e779c9196f70c572666b9ee1b32e6e2c212bb88b79502fb0f3056cfb671639210d0e6e04fe36256701467825ea58d9ffdfc1dd020b0fec26548d9948
-
Filesize
474KB
MD5560c86ed0a2434c4b78dd177b89cfd82
SHA16f0f56f17191b65798296259b7a820a2a20c1f4a
SHA2566f7cbe19b28b054b0d15699566e431eb064192096bfb86ebf3f2f0fe6356d2e9
SHA512726d837a1accbd9b27414ca0e81ebef6d6654dfe4739617bfe3188af0fe7959ea0a38aec0a647e640ca6d23d422c140c929695caafb615a3e1e8e58ced9e154b
-
Filesize
869KB
MD5cdb62f7518a33636bbbf45b8373ab3ee
SHA17715bbaab16aedcf1c716ed7e62a1acc98e7ded7
SHA256c604bb8550b9019e8e88db5d40eb14801db6b802e2598b971cf474150c54b62b
SHA51250e00a3b4a042cbfc925189c2716a2b7384ba43c029a9a103d9b42f8ef8d6c78b5f70bc4080b2e6133883868d5985132c1440496726504a22784df121b158d0f
-
Filesize
750KB
MD503f5e58d189f1c1e19971ac6cafd7130
SHA1f396baa66428f7f7b36f09e5a82a81887bc936a0
SHA2563fdb60c1b232395a5e5c662ef2c89c6b8b68859834d69db40621f5974b1d2f4d
SHA512cf57afb85c1084d0e87d71324520294a1d051458a74e2d264005a0529da7245a7057649a6f56d60edc4c3f56568c9a330d1b0c51b671ecaebb9c7b5eaaeca886
-
Filesize
750KB
MD503f5e58d189f1c1e19971ac6cafd7130
SHA1f396baa66428f7f7b36f09e5a82a81887bc936a0
SHA2563fdb60c1b232395a5e5c662ef2c89c6b8b68859834d69db40621f5974b1d2f4d
SHA512cf57afb85c1084d0e87d71324520294a1d051458a74e2d264005a0529da7245a7057649a6f56d60edc4c3f56568c9a330d1b0c51b671ecaebb9c7b5eaaeca886
-
Filesize
750KB
MD503f5e58d189f1c1e19971ac6cafd7130
SHA1f396baa66428f7f7b36f09e5a82a81887bc936a0
SHA2563fdb60c1b232395a5e5c662ef2c89c6b8b68859834d69db40621f5974b1d2f4d
SHA512cf57afb85c1084d0e87d71324520294a1d051458a74e2d264005a0529da7245a7057649a6f56d60edc4c3f56568c9a330d1b0c51b671ecaebb9c7b5eaaeca886
-
Filesize
750KB
MD503f5e58d189f1c1e19971ac6cafd7130
SHA1f396baa66428f7f7b36f09e5a82a81887bc936a0
SHA2563fdb60c1b232395a5e5c662ef2c89c6b8b68859834d69db40621f5974b1d2f4d
SHA512cf57afb85c1084d0e87d71324520294a1d051458a74e2d264005a0529da7245a7057649a6f56d60edc4c3f56568c9a330d1b0c51b671ecaebb9c7b5eaaeca886
-
Filesize
750KB
MD503f5e58d189f1c1e19971ac6cafd7130
SHA1f396baa66428f7f7b36f09e5a82a81887bc936a0
SHA2563fdb60c1b232395a5e5c662ef2c89c6b8b68859834d69db40621f5974b1d2f4d
SHA512cf57afb85c1084d0e87d71324520294a1d051458a74e2d264005a0529da7245a7057649a6f56d60edc4c3f56568c9a330d1b0c51b671ecaebb9c7b5eaaeca886
-
Filesize
750KB
MD503f5e58d189f1c1e19971ac6cafd7130
SHA1f396baa66428f7f7b36f09e5a82a81887bc936a0
SHA2563fdb60c1b232395a5e5c662ef2c89c6b8b68859834d69db40621f5974b1d2f4d
SHA512cf57afb85c1084d0e87d71324520294a1d051458a74e2d264005a0529da7245a7057649a6f56d60edc4c3f56568c9a330d1b0c51b671ecaebb9c7b5eaaeca886
-
Filesize
750KB
MD503f5e58d189f1c1e19971ac6cafd7130
SHA1f396baa66428f7f7b36f09e5a82a81887bc936a0
SHA2563fdb60c1b232395a5e5c662ef2c89c6b8b68859834d69db40621f5974b1d2f4d
SHA512cf57afb85c1084d0e87d71324520294a1d051458a74e2d264005a0529da7245a7057649a6f56d60edc4c3f56568c9a330d1b0c51b671ecaebb9c7b5eaaeca886
-
Filesize
750KB
MD503f5e58d189f1c1e19971ac6cafd7130
SHA1f396baa66428f7f7b36f09e5a82a81887bc936a0
SHA2563fdb60c1b232395a5e5c662ef2c89c6b8b68859834d69db40621f5974b1d2f4d
SHA512cf57afb85c1084d0e87d71324520294a1d051458a74e2d264005a0529da7245a7057649a6f56d60edc4c3f56568c9a330d1b0c51b671ecaebb9c7b5eaaeca886
-
Filesize
750KB
MD503f5e58d189f1c1e19971ac6cafd7130
SHA1f396baa66428f7f7b36f09e5a82a81887bc936a0
SHA2563fdb60c1b232395a5e5c662ef2c89c6b8b68859834d69db40621f5974b1d2f4d
SHA512cf57afb85c1084d0e87d71324520294a1d051458a74e2d264005a0529da7245a7057649a6f56d60edc4c3f56568c9a330d1b0c51b671ecaebb9c7b5eaaeca886
-
Filesize
750KB
MD503f5e58d189f1c1e19971ac6cafd7130
SHA1f396baa66428f7f7b36f09e5a82a81887bc936a0
SHA2563fdb60c1b232395a5e5c662ef2c89c6b8b68859834d69db40621f5974b1d2f4d
SHA512cf57afb85c1084d0e87d71324520294a1d051458a74e2d264005a0529da7245a7057649a6f56d60edc4c3f56568c9a330d1b0c51b671ecaebb9c7b5eaaeca886
-
Filesize
750KB
MD503f5e58d189f1c1e19971ac6cafd7130
SHA1f396baa66428f7f7b36f09e5a82a81887bc936a0
SHA2563fdb60c1b232395a5e5c662ef2c89c6b8b68859834d69db40621f5974b1d2f4d
SHA512cf57afb85c1084d0e87d71324520294a1d051458a74e2d264005a0529da7245a7057649a6f56d60edc4c3f56568c9a330d1b0c51b671ecaebb9c7b5eaaeca886
-
Filesize
750KB
MD503f5e58d189f1c1e19971ac6cafd7130
SHA1f396baa66428f7f7b36f09e5a82a81887bc936a0
SHA2563fdb60c1b232395a5e5c662ef2c89c6b8b68859834d69db40621f5974b1d2f4d
SHA512cf57afb85c1084d0e87d71324520294a1d051458a74e2d264005a0529da7245a7057649a6f56d60edc4c3f56568c9a330d1b0c51b671ecaebb9c7b5eaaeca886
-
Filesize
750KB
MD503f5e58d189f1c1e19971ac6cafd7130
SHA1f396baa66428f7f7b36f09e5a82a81887bc936a0
SHA2563fdb60c1b232395a5e5c662ef2c89c6b8b68859834d69db40621f5974b1d2f4d
SHA512cf57afb85c1084d0e87d71324520294a1d051458a74e2d264005a0529da7245a7057649a6f56d60edc4c3f56568c9a330d1b0c51b671ecaebb9c7b5eaaeca886
-
Filesize
14KB
MD5151f3af412abd6bf05d160a70f8873d8
SHA10efcf48401d546ce101920496dcbbf3ab252ee87
SHA2564c21b9663120b494d0f5112eb5f9e0aab4b659a5bf5d5301ee4d5a98abb20f25
SHA51258513727d12cc915cd8445a078beb238aa3df28cc49b3733d487b0d3100f1c519b39f5b809ace618536e2d8951c1b3a58c0763a893bbd92a98c8e06575d92a4f
-
Filesize
40B
MD558ded3cb7ca70a6975c5419c62fdb51d
SHA1274040c32983b7fbf01f65e41b375f255a78547d
SHA256425dbedfc4a8a0672478b0b97e28568e5007e9813bba650fe727b252f43a0dfc
SHA512c9f3b324adc89be54ccace827c0b0b759f8658a63a6c9689c2bc5f01388daa25b8ea80f8c3b624403a2cae784af5cf0e5a94919795263a31ab9769969fd08a42
-
Filesize
25KB
MD5de5b0b40318ceabef85c04260141b039
SHA1450df0a73f682425f631af1bd8b1960490498427
SHA2567633ce5b3d2f8fea91207cdc1b2252b81606be1b5ffafedd56220cfd07f36c49
SHA5122afdbce31039b77761173a3d8a87970a99b152a97048a8710b0d5b4876bd7602dbbf8b5315fe5f4da69d093871ee59c626198371ccdea6180d7e651b871ac91b
-
Filesize
24KB
MD58718dd01693b356a499867fe306cf5cb
SHA136306f92254a04865bb6e966e1b96b3beaf28fdd
SHA25612e39d57030dfc7cc7fa6f1c20e3d6fb1e7e999a73b42604b34664ccfb13c559
SHA512f185a722e779c9196f70c572666b9ee1b32e6e2c212bb88b79502fb0f3056cfb671639210d0e6e04fe36256701467825ea58d9ffdfc1dd020b0fec26548d9948
-
Filesize
214KB
MD5fcf05cb13f2f941de9301158fd8846bd
SHA11014ad4c0f2fc498b398ce56c4613e8f48de7018
SHA256925183e95087fa76e231b3fbafb924f771497b31140e502484aaf67f0b48861f
SHA5121868f0efecddb4db28489194d8ac021f40e79997be51cb2ae1e3232eb1386859a5d2dc8647bfcf473bc089ef8cbd9b2711405bb9da5eb6bddaa6c18cf64243f4
-
Filesize
14KB
MD57162d8977515a446d2c1e139da59ded5
SHA1952f696c463b8410b1fa93a3b2b6dae416a81867
SHA2562835a439c6ae22074bc3372491cb71e6c2b72d0c87ae3eee6065c6caadf1e5c8
SHA512508f7ca3d4bc298534ab058f182755851051684f8d53306011f03875804c95e427428bd425dd13633eec79748bb64e78aad43e75b70cc5a3f0f4e6696dbb6d8e
-
Filesize
474KB
MD5560c86ed0a2434c4b78dd177b89cfd82
SHA16f0f56f17191b65798296259b7a820a2a20c1f4a
SHA2566f7cbe19b28b054b0d15699566e431eb064192096bfb86ebf3f2f0fe6356d2e9
SHA512726d837a1accbd9b27414ca0e81ebef6d6654dfe4739617bfe3188af0fe7959ea0a38aec0a647e640ca6d23d422c140c929695caafb615a3e1e8e58ced9e154b
-
Filesize
20KB
MD56798f64959c913673bd66cd4e47f4a65
SHA1c50faa64c8267ac7106401e69da5c15fc3f2034c
SHA2560c02b226be4e7397f8c98799e58b0a512515e462ccdaac04edc10e3e1091c011
SHA5128d208306b6d0f892a2f16f8070a89d8edb968589896cb70cf46f43bf4befb7c4ca6a278c35fe8a2685cc784505efb77c32b0aabf80d13bcc0d10a39ae8afb55a
-
Filesize
869KB
MD5cdb62f7518a33636bbbf45b8373ab3ee
SHA17715bbaab16aedcf1c716ed7e62a1acc98e7ded7
SHA256c604bb8550b9019e8e88db5d40eb14801db6b802e2598b971cf474150c54b62b
SHA51250e00a3b4a042cbfc925189c2716a2b7384ba43c029a9a103d9b42f8ef8d6c78b5f70bc4080b2e6133883868d5985132c1440496726504a22784df121b158d0f
-
Filesize
750KB
MD503f5e58d189f1c1e19971ac6cafd7130
SHA1f396baa66428f7f7b36f09e5a82a81887bc936a0
SHA2563fdb60c1b232395a5e5c662ef2c89c6b8b68859834d69db40621f5974b1d2f4d
SHA512cf57afb85c1084d0e87d71324520294a1d051458a74e2d264005a0529da7245a7057649a6f56d60edc4c3f56568c9a330d1b0c51b671ecaebb9c7b5eaaeca886