Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe
Resource
win10v2004-20220901-en
General
-
Target
998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe
-
Size
428KB
-
MD5
fcb7d8886bb2bcad2a96bb489309ee70
-
SHA1
d3e3c19494a359d41f048c2de6e6c4bed191d198
-
SHA256
998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
-
SHA512
4e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
SSDEEP
6144:XWnU99gfZCgfRvd8mhd2FkVcAMNn18hhzdyeeaMblnh3X2mS5YeEoAsnH:G+8JvdB32FKcAOyJyJaSV2m27tH
Malware Config
Signatures
-
Executes dropped EXE 42 IoCs
pid Process 2416 Server.exe 1476 Server.exe 3260 Server.exe 3596 Server.exe 1828 Server.exe 1296 Server.exe 4868 Server.exe 3360 Server.exe 4692 Server.exe 3808 Server.exe 2940 Server.exe 4288 Server.exe 2436 Server.exe 4668 Server.exe 3024 Server.exe 4408 Server.exe 5028 Server.exe 4844 Server.exe 1444 Server.exe 1380 Server.exe 3168 Server.exe 3944 Server.exe 4324 Server.exe 1736 Server.exe 4644 Server.exe 1336 Server.exe 1560 Server.exe 2264 Server.exe 3136 Server.exe 2560 Server.exe 4272 Server.exe 3816 Server.exe 400 Server.exe 2436 Server.exe 768 Server.exe 4996 Server.exe 3616 Server.exe 4136 Server.exe 1036 Server.exe 3064 Server.exe 2040 Server.exe 868 Server.exe -
Modifies Installed Components in the registry 2 TTPs 32 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restart" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restart" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restart" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restart" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restart" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restart" Server.exe -
resource yara_rule behavioral2/memory/5032-137-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral2/memory/5032-138-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral2/memory/5032-139-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral2/memory/648-151-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral2/memory/648-152-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral2/memory/648-153-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral2/memory/64-157-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral2/memory/3260-182-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral2/memory/3260-183-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral2/memory/3260-184-0x0000000010000000-0x000000001031C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Local\\Temp\\998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe" 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe -
Suspicious use of SetThreadContext 30 IoCs
description pid Process procid_target PID 5060 set thread context of 4960 5060 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 82 PID 4960 set thread context of 648 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 85 PID 2416 set thread context of 1476 2416 Server.exe 88 PID 1476 set thread context of 3260 1476 Server.exe 91 PID 3596 set thread context of 1828 3596 Server.exe 96 PID 1828 set thread context of 1296 1828 Server.exe 99 PID 4868 set thread context of 3360 4868 Server.exe 104 PID 3360 set thread context of 4692 3360 Server.exe 107 PID 3808 set thread context of 2940 3808 Server.exe 109 PID 2940 set thread context of 4288 2940 Server.exe 112 PID 2436 set thread context of 4668 2436 Server.exe 115 PID 4668 set thread context of 3024 4668 Server.exe 118 PID 4408 set thread context of 5028 4408 Server.exe 120 PID 5028 set thread context of 4844 5028 Server.exe 123 PID 1444 set thread context of 1380 1444 Server.exe 125 PID 1380 set thread context of 3168 1380 Server.exe 128 PID 3944 set thread context of 4324 3944 Server.exe 130 PID 4324 set thread context of 1736 4324 Server.exe 133 PID 4644 set thread context of 1336 4644 Server.exe 135 PID 1336 set thread context of 1560 1336 Server.exe 138 PID 2264 set thread context of 3136 2264 Server.exe 140 PID 3136 set thread context of 2560 3136 Server.exe 143 PID 4272 set thread context of 3816 4272 Server.exe 145 PID 3816 set thread context of 400 3816 Server.exe 148 PID 2436 set thread context of 768 2436 Server.exe 150 PID 768 set thread context of 4996 768 Server.exe 153 PID 3616 set thread context of 4136 3616 Server.exe 155 PID 4136 set thread context of 1036 4136 Server.exe 158 PID 3064 set thread context of 2040 3064 Server.exe 160 PID 2040 set thread context of 868 2040 Server.exe 163 -
Drops file in Windows directory 16 IoCs
description ioc Process File created C:\Windows\InstallDir\Server.exe Server.exe File created C:\Windows\InstallDir\Server.exe Server.exe File created C:\Windows\InstallDir\Server.exe 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe File created C:\Windows\InstallDir\Server.exe Server.exe File created C:\Windows\InstallDir\Server.exe Server.exe File created C:\Windows\InstallDir\Server.exe Server.exe File created C:\Windows\InstallDir\Server.exe Server.exe File created C:\Windows\InstallDir\Server.exe Server.exe File created C:\Windows\InstallDir\Server.exe Server.exe File created C:\Windows\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\InstallDir\Server.exe 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe File created C:\Windows\InstallDir\Server.exe Server.exe File created C:\Windows\InstallDir\Server.exe Server.exe File created C:\Windows\InstallDir\Server.exe Server.exe File created C:\Windows\InstallDir\Server.exe Server.exe File created C:\Windows\InstallDir\Server.exe Server.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Server.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 1476 Server.exe 1476 Server.exe 1828 Server.exe 1828 Server.exe 3360 Server.exe 3360 Server.exe 2940 Server.exe 2940 Server.exe 4668 Server.exe 4668 Server.exe 5028 Server.exe 5028 Server.exe 1380 Server.exe 1380 Server.exe 4324 Server.exe 4324 Server.exe 1336 Server.exe 1336 Server.exe 3136 Server.exe 3136 Server.exe 3816 Server.exe 3816 Server.exe 768 Server.exe 768 Server.exe 4136 Server.exe 4136 Server.exe 2040 Server.exe 2040 Server.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 648 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 3260 Server.exe 1296 Server.exe 4692 Server.exe 4288 Server.exe 3024 Server.exe 4844 Server.exe 3168 Server.exe 1736 Server.exe 1560 Server.exe 2560 Server.exe 400 Server.exe 4996 Server.exe 1036 Server.exe 868 Server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4960 5060 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 82 PID 5060 wrote to memory of 4960 5060 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 82 PID 5060 wrote to memory of 4960 5060 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 82 PID 5060 wrote to memory of 4960 5060 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 82 PID 5060 wrote to memory of 4960 5060 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 82 PID 5060 wrote to memory of 4960 5060 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 82 PID 5060 wrote to memory of 4960 5060 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 82 PID 5060 wrote to memory of 4960 5060 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 82 PID 5060 wrote to memory of 4960 5060 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 82 PID 5060 wrote to memory of 4960 5060 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 82 PID 5060 wrote to memory of 4960 5060 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 82 PID 5060 wrote to memory of 4960 5060 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 82 PID 5060 wrote to memory of 4960 5060 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 82 PID 4960 wrote to memory of 5032 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 83 PID 4960 wrote to memory of 5032 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 83 PID 4960 wrote to memory of 5032 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 83 PID 4960 wrote to memory of 5032 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 83 PID 4960 wrote to memory of 5032 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 83 PID 4960 wrote to memory of 5032 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 83 PID 4960 wrote to memory of 444 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 84 PID 4960 wrote to memory of 444 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 84 PID 4960 wrote to memory of 444 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 84 PID 4960 wrote to memory of 444 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 84 PID 4960 wrote to memory of 444 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 84 PID 4960 wrote to memory of 444 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 84 PID 4960 wrote to memory of 648 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 85 PID 4960 wrote to memory of 648 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 85 PID 4960 wrote to memory of 648 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 85 PID 4960 wrote to memory of 648 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 85 PID 4960 wrote to memory of 648 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 85 PID 4960 wrote to memory of 648 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 85 PID 4960 wrote to memory of 648 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 85 PID 4960 wrote to memory of 648 4960 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 85 PID 648 wrote to memory of 64 648 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 86 PID 648 wrote to memory of 64 648 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 86 PID 648 wrote to memory of 64 648 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 86 PID 648 wrote to memory of 64 648 998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe 86 PID 64 wrote to memory of 2416 64 svchost.exe 87 PID 64 wrote to memory of 2416 64 svchost.exe 87 PID 64 wrote to memory of 2416 64 svchost.exe 87 PID 2416 wrote to memory of 1476 2416 Server.exe 88 PID 2416 wrote to memory of 1476 2416 Server.exe 88 PID 2416 wrote to memory of 1476 2416 Server.exe 88 PID 2416 wrote to memory of 1476 2416 Server.exe 88 PID 2416 wrote to memory of 1476 2416 Server.exe 88 PID 2416 wrote to memory of 1476 2416 Server.exe 88 PID 2416 wrote to memory of 1476 2416 Server.exe 88 PID 2416 wrote to memory of 1476 2416 Server.exe 88 PID 2416 wrote to memory of 1476 2416 Server.exe 88 PID 2416 wrote to memory of 1476 2416 Server.exe 88 PID 2416 wrote to memory of 1476 2416 Server.exe 88 PID 2416 wrote to memory of 1476 2416 Server.exe 88 PID 2416 wrote to memory of 1476 2416 Server.exe 88 PID 1476 wrote to memory of 1028 1476 Server.exe 89 PID 1476 wrote to memory of 1028 1476 Server.exe 89 PID 1476 wrote to memory of 1028 1476 Server.exe 89 PID 1476 wrote to memory of 1028 1476 Server.exe 89 PID 1476 wrote to memory of 1028 1476 Server.exe 89 PID 1476 wrote to memory of 1028 1476 Server.exe 89 PID 1476 wrote to memory of 3764 1476 Server.exe 90 PID 1476 wrote to memory of 3764 1476 Server.exe 90 PID 1476 wrote to memory of 3764 1476 Server.exe 90 PID 1476 wrote to memory of 3764 1476 Server.exe 90 PID 1476 wrote to memory of 3764 1476 Server.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe"C:\Users\Admin\AppData\Local\Temp\998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exeC:\Users\Admin\AppData\Local\Temp\998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:444
-
-
C:\Users\Admin\AppData\Local\Temp\998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exeC:\Users\Admin\AppData\Local\Temp\998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab.exe3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:3764
-
-
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:3260
-
-
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3596 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:480
-
-
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:1296
-
-
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4868 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:2992
-
-
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:4692
-
-
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3808 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:4672
-
-
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:4288
-
-
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2436 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:3224
-
-
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4408 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:4788
-
-
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:4844
-
-
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1444 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:2384
-
-
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:3168
-
-
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3944 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:4724
-
-
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:1736
-
-
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4644 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:1576
-
-
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:1560
-
-
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2264 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:4848
-
-
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4272 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:1360
-
-
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:400
-
-
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2436 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:4064
-
-
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:4996
-
-
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3616 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:952
-
-
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:1036
-
-
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3064 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:3656
-
-
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:868
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287
-
Filesize
428KB
MD5fcb7d8886bb2bcad2a96bb489309ee70
SHA1d3e3c19494a359d41f048c2de6e6c4bed191d198
SHA256998d3a52cc3f57d434281e266e6cd55d227a02921a23e3fdf214f7083ee72aab
SHA5124e3fb0ccc8985c74d30c7fdd31e2962856684bd31312cb0d0abc26d2fcd1291737de80540cf564cbee51034bda40bf5bf1df8f27804eafcca9fb10206f77e287