Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
ZuluServer2021_x64_ru.msi
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ZuluServer2021_x64_ru.msi
Resource
win10v2004-20231215-en
General
-
Target
ZuluServer2021_x64_ru.msi
-
Size
212.7MB
-
MD5
c4d1896ce7d1ac189043a3d77a132b69
-
SHA1
199055124ef5e364d42069e4aae56f93ff5cab55
-
SHA256
ed676bd32b29b05d3f31ae4dcda6a5c4a9fab54f3f5d328b3f5fa80182a9cd0e
-
SHA512
9db7fdf1c673e5cbb8f02e410c15928ca3a8b1ac07e9887e9154b7972259ea8e519199fa7a3f05fee54d27b96aa580440d9bba979c31bab15b22fd76b16e1c63
-
SSDEEP
6291456:pNTMlW/Gj6p6abkU19CdRKGmUkiptV1rXAxn6fNy:pQ6p6aZ19oNm5I9rXZV
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
ZuluServ.exedescription ioc process Key opened \REGISTRY\MACHINE\Software\Wine ZuluServ.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZuluServer Monitor = "\"C:\\Program Files\\ZuluGIS\\ZuluSrvm.exe\" /h" msiexec.exe -
Blocklisted process makes network request 3 IoCs
Processes:
msiexec.exemsiexec.exeflow pid process 3 1676 msiexec.exe 5 1676 msiexec.exe 7 1928 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Drops file in System32 directory 1 IoCs
Processes:
ZuluServ.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Zulu\RemoteConn.cfg ZuluServ.exe -
Drops file in Program Files directory 64 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files\ZuluGIS\Examples\Gaz\Gaz_n\Gaz.b08 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Gaz\Gaz_n\Gaz_nd.zmp msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Steam\SteamDevices\par.d04 msiexec.exe File created C:\Program Files\ZuluGIS\ReferenceAssemblies\Zulu.Interop.Zulu.dll msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Thermo\Magistral\Teplo\Teplo.b06 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\WaterHammer\Simple\Test.b06 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Hydro\Kvartal\voda_zt.tl msiexec.exe File created C:\Program Files\ZuluGIS\lang\zuluui.en.lang msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Building\TEPLO\ARM_T_UZ.d08 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Thermo\Magistral\Quart.zsx msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Thermo\Magistral\Teplo.b03 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Hydro\Sample1\water supply.b03 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Building\FLOOR\0001.b03 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Building\FLOOR\0001.zx msiexec.exe File created C:\Program Files\ZuluGIS\api-ms-win-core-string-l1-1-0.dll msiexec.exe File created C:\Program Files\ZuluGIS\ws\schemas\gml\3.1.1\base\datums.xsd msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Gaz\Gaz_v\Gaz.d04 msiexec.exe File created C:\Program Files\ZuluGIS\Data\OpenStreetMap\OpenCircleMap.zww msiexec.exe File created C:\Program Files\ZuluGIS\Examples\OSM\OpenStreetMap\poi-polygon.sqlite msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Thermo\Thermogram\teplo.b07 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Drain\Sample2\drain2.b00 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\OSM\OpenStreetMap\water-polygon.b05 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Building\FLOOR\0001.b02 msiexec.exe File created C:\Program Files\ZuluGIS\api-ms-win-core-file-l1-2-0.dll msiexec.exe File created C:\Program Files\ZuluGIS\api-ms-win-core-rtlsupport-l1-1-0.dll msiexec.exe File created C:\Program Files\ZuluGIS\api-ms-win-crt-stdio-l1-1-0.dll msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Building\TEPLO\ARM_T_UZ.b05 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Defect\defect.b03 msiexec.exe File created C:\Program Files\ZuluGIS\Preset\osm\MapQuest.zww msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Steam\SteamDevices\par.d00 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Thermo\Nasos\teploNS.b06 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Thermo\Kvartal\teplosam_rezerv.zx msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Building\FLOOR\0003.b02 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\OSM\OpenStreetMap\BOUNDARY-POLYGON.b08 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Drain\Sample1\drain.d01 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Gaz\Gaz_n\Gaz.b07 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\WaterHammer\Simple\Test_wt.wt msiexec.exe File created C:\Program Files\ZuluGIS\Examples\WaterHammer\Basic\VODA.d06 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Thermo\Nasos\Doma.b01 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Thermo\Kvartal\teplosam_rezerv.b05 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\WaterHammer\Append\append.zsx msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Thermo\Thermogram\out.b08 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Hydro\Sample1\water supply.b02 msiexec.exe File created C:\Program Files\ZuluGIS\ws\schemas\gml\3.1.1\base\gml.xsd msiexec.exe File created C:\Program Files\ZuluGIS\ws\schemas\gml\3.1.1\base\gmlBase.xsd msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Steam\SteamPipe\par.zsx msiexec.exe File created C:\Program Files\ZuluGIS\Qt5Gui.dll msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Thermo\Kvartal\QUART.zsx msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Thermo\Kvartal\teplosam.l02 msiexec.exe File created C:\Program Files\ZuluGIS\Preset\2gis\2gis.zww msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Drain\Sample3\drain.l02 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Gaz\Gaz_n\Gaz.d00 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\WaterHammer\Simple\Test.b07 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Thermo\Kvartal\TEXT.lnn msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Gaz\Gaz_n\Doma.b04 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Thermo\Kvartal\teplosam_rezerv.l00 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Thermo\Nasos\kvartal.b00 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Steam\SteamPipe\par.l00 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Building\TEPLO\TEKST.B04 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Thermo\Magistral\Teplo.b04 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Hydro\Kvartal\TEXT.lnn msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Hydro\Kvartal\voda.b08 msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Gaz\Gaz_v\Doma.lnn msiexec.exe File created C:\Program Files\ZuluGIS\Examples\Gaz\Gaz_v\Gaz.sqlite msiexec.exe -
Drops file in Windows directory 64 IoCs
Processes:
msiexec.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\Installer\MSI7711.tmp msiexec.exe File created C:\Windows\assembly\tmp\II4G888T\Zulu.Interop.zuluui.dll msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfcm140u.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\MSI89D0.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\msvcp140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\assembly\tmp\FK73SEOY\Zulu.Interop.Zulu.dll msiexec.exe File opened for modification C:\Windows\Installer\f766f67.ipi msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140cht.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\vcruntime140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\{4621229A-99DF-4127-AAE3-D22ADE50B218}\Company.ico msiexec.exe File opened for modification C:\Windows\Installer\{4621229A-99DF-4127-AAE3-D22ADE50B218}\Company.ico msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140cht.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\msvcp140_1.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\MSI8903.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI915F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7946.tmp msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140enu.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140enu.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\msvcp140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140rus.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfcm140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\vccorlib140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\vccorlib140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\Installer\MSI7790.tmp msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\concrt140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140jpn.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\vcruntime140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\f766f69.msi msiexec.exe File created C:\Windows\Installer\f766f67.ipi msiexec.exe File created C:\Windows\assembly\GACLock.dat msiexec.exe File created C:\Windows\assembly\tmp\BD9BGZE5\Zulu.Interop.ZuluLib.dll msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140deu.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfcm140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\f766f66.msi msiexec.exe File created C:\Windows\assembly\tmp\J9WG70QJ\Zulu.Interop.Zb.dll msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140rus.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\assembly\tmp\J5DSNXFB\Zulu.Interop.ZuluComNetOcx.dll msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140fra.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\msvcp140_1.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\MSI7957.tmp msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140chs.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140deu.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfcm140u.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\f766f66.msi msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140esn.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140ita.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\msvcp140_2.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI76F1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7741.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7936.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140jpn.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140kor.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\MSI7B5B.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\concrt140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\A9221264FD997214AA3E2DA2ED052B81\10.0.8803\mfc140esn.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe -
Executes dropped EXE 4 IoCs
Processes:
ZuluServ.exezssetup.exezssetup.exeZuluSrvm.exepid process 1224 ZuluServ.exe 1288 zssetup.exe 1748 zssetup.exe 2776 ZuluSrvm.exe -
Loads dropped DLL 64 IoCs
Processes:
MsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exemsiexec.exeMsiExec.exeZuluServ.exezssetup.exepid process 2840 MsiExec.exe 2840 MsiExec.exe 2216 MsiExec.exe 2404 MsiExec.exe 2404 MsiExec.exe 2404 MsiExec.exe 2404 MsiExec.exe 2404 MsiExec.exe 2216 MsiExec.exe 1240 MsiExec.exe 1240 MsiExec.exe 1240 MsiExec.exe 752 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 2824 MsiExec.exe 476 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1224 ZuluServ.exe 1928 msiexec.exe 1288 zssetup.exe 1288 zssetup.exe 1288 zssetup.exe 1288 zssetup.exe 1288 zssetup.exe 1288 zssetup.exe 1288 zssetup.exe 1288 zssetup.exe 1288 zssetup.exe 1288 zssetup.exe 1288 zssetup.exe 1288 zssetup.exe 1288 zssetup.exe 1288 zssetup.exe 1288 zssetup.exe 1288 zssetup.exe 1288 zssetup.exe 1288 zssetup.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{125070A8-0B01-11D2-B55D-444553540000}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{125070D0-0B01-11D2-B55D-444553540000}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluLib.dll" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{125073A3-0B01-11D2-B55D-444553540000}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{30C0B722-873C-11D3-BF56-D212EB700DCD}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507025-0B01-11D2-B55D-444553540000}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluLib.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507387-0B01-11D2-B55D-444553540000}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\Zb.dll" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{30C0B928-873C-11D3-BF56-D212EB700DCD}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507518-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{125ED014-16FE-4E3D-90B0-195EFCF6E174}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\Steam.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{125ED010-16FE-4E3D-90B0-195EFCF6E174}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{30C0B959-873C-11D3-BF56-D212EB700DCD}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507094-0B01-11D2-B55D-444553540000}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507448-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{125073B8-0B01-11D2-B55D-444553540000}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507126-0B01-11D2-B55D-444553540000}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507522-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{30C0B72F-873C-11D3-BF56-D212EB700DCD}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{1250751E-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{125070E5-0B01-11D2-B55D-444553540000}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{125074C9-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507349-0B01-11D2-B55D-444553540000}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{125073A3-0B01-11D2-B55D-444553540000}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507223-0B01-11D2-B55D-444553540000}\LocalServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507123-0B01-11D2-B55D-444553540000}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{125070B2-0B01-11D2-B55D-444553540000}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluLib.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{125070D8-0B01-11D2-B55D-444553540000}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluLib.dll" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{125ED014-16FE-4E3D-90B0-195EFCF6E174}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{125073B1-0B01-11D2-B55D-444553540000}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1250748A-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluLib.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{30C0B730-873C-11D3-BF56-D212EB700DCD}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluChrt.dll" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507504-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507522-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluComNetCtrl.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{125ED015-16FE-4E3D-90B0-195EFCF6E174}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\Gaz.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{30C0B928-873C-11D3-BF56-D212EB700DCD}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\zuluui.dll" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507096-0B01-11D2-B55D-444553540000}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507418-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{30C0C937-873C-11D3-BF56-D212EB700DCD}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{30C0B712-873C-11D3-BF56-D212EB700DCD}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507516-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluComNetCtrl.dll" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{125070A0-0B01-11D2-B55D-444553540000}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{1250746E-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{125074DD-0B01-11D2-B55D-444553540000}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluLib.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507126-0B01-11D2-B55D-444553540000}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluCtrl.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507133-0B01-11D2-B55D-444553540000}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{30C0B93C-873C-11D3-BF56-D212EB700DCD}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507511-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluComNetCtrl.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1250713C-0B01-11D2-B55D-444553540000}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluCtrl.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507129-0B01-11D2-B55D-444553540000}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluCtrl.dll" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{30C0B730-873C-11D3-BF56-D212EB700DCD}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{30C0B92C-873C-11D3-BF56-D212EB700DCD}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\zuluui.dll" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{125074C6-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{30C0C937-873C-11D3-BF56-D212EB700DCD}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\zulurep.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{125ED014-16FE-4E3D-90B0-195EFCF6E174}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507136-0B01-11D2-B55D-444553540000}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluCtrl.dll" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507129-0B01-11D2-B55D-444553540000}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507435-11DD-4DDC-AFDA-3007DB024F4D}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluCtrl.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507436-11DD-4DDC-AFDA-3007DB024F4D}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E50D21A-0813-4E66-8D1D-009AA4FEA791}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507098-0B01-11D2-B55D-444553540000}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluLib.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507415-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluLib.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{30C0B928-873C-11D3-BF56-D212EB700DCD}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507418-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluLib.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507479-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\ZuluLib.dll" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507349-0B01-11D2-B55D-444553540000}\InprocServer32 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
ZuluServ.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ZuluServ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ZuluServ.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
ZuluServ.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ZuluServ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ZuluServ.exe -
Modifies data under HKEY_USERS 53 IoCs
Processes:
DrvInst.exeZuluServ.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Zulu\5.0\Zulu ZuluServ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Zulu\5.0 ZuluServ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Zulu ZuluServ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Zulu\5.0\Zulu\lang ZuluServ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Zulu\5.0\Zulu\Hasp ZuluServ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Zulu\5.0\Zulu\MapWindow ZuluServ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Zulu\5.0\Zulu\Settings ZuluServ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe -
Modifies registry class 64 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{125070E7-0B01-11D2-B55D-444553540000} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Zb.AsciiFormat\CLSID msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{125074D3-0B01-11D2-B55D-444553540000}\ = "IBoundingBoxes" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{125070B8-0B01-11D2-B55D-444553540000} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{1250712A-0B01-11D2-B55D-444553540000} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30C0B724-873C-11D3-BF56-D212EB700DCD}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1250709D-0B01-11D2-B55D-444553540000}\ = "IChangedElementKeys" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{125070C0-0B01-11D2-B55D-444553540000}\ProgID msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{12507478-11DD-4DDC-AFDA-3007DB025F4D}\TypeLib\ = "{12507020-0B01-11D2-B55D-444553540000}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Zulu.Report.Legend\ = "Zulu.Report.Legend" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{125074DD-0B01-11D2-B55D-444553540000} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\.zrg msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{125073BA-0B01-11D2-B55D-444553540000}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{125074C1-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{30C0C930-873C-11D3-BF56-D212EB700DCD}\ProxyStubClsid32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507435-11DD-4DDC-AFDA-3007DB024F4D}\ProgID msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Zulu.Chart.PpgChartGrid msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507522-11DD-4DDC-AFDA-3007DB025F4D}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E50D21A-0813-4E66-8D1D-009AA4FEA791}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507413-11DD-4DDC-AFDA-3007DB025F4D}\ProgID msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30C0B721-873C-11D3-BF56-D212EB700DCD}\TypeLib\Version = "8.0" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{1250742C-11DD-4DDC-AFDA-3007DB025F4D}\ProxyStubClsid32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\zulu.zttfile\DefaultIcon msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{12507134-0B01-11D2-B55D-444553540000}\TypeLib\ = "{12507120-0B01-11D2-B55D-444553540000}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\ZuluComNetOcx.TaskSteam msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507415-11DD-4DDC-AFDA-3007DB025F4D}\ = "ZuluLib.ZsConnection" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507023-0B01-11D2-B55D-444553540000}\AuxUserType\2 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\ZuluOcx.PpgMapToolBarButtons\CLSID msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\F4A8E33E4390CC5468CBD92287697BA2 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{30C0B930-873C-11D3-BF56-D212EB700DCD}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\zuluui.dll" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{30C0B720-873C-11D3-BF56-D212EB700DCD}\ProxyStubClsid32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30C0B724-873C-11D3-BF56-D212EB700DCD}\TypeLib\Version = "8.0" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507520-11DD-4DDC-AFDA-3007DB025F4D}\ProgID msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A9221264FD997214AA3E2DA2ED052B81\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\ZuluLib.HighlightParams msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1250713F-0B01-11D2-B55D-444553540000} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{1250713C-0B01-11D2-B55D-444553540000}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{30C0B710-873C-11D3-BF56-D212EB700DCD}\8.0\0 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{12507059-0B01-11D2-B55D-444553540000}\ = "IObjectModes" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{125073B1-0B01-11D2-B55D-444553540000}\ = "Zb.ZbSqlParams" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{12507125-0B01-11D2-B55D-444553540000}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30C0B92B-873C-11D3-BF56-D212EB700DCD}\ = "ILineComboBoxEvents" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{12507508-11DD-4DDC-AFDA-3007DB025F4D}\TypeLib\ = "{12507500-11DD-4DDC-AFDA-3007DB025F4D}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507439-11DD-4DDC-AFDA-3007DB024F4D}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\ZuluLib.ZGps\CLSID msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{30C0C938-873C-11D3-BF56-D212EB700DCD}\ProxyStubClsid32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12507139-0B01-11D2-B55D-444553540000}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\ZuluComNetOcx.TaskGazCtrl.1 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8F4CF551-8493-44C9-8D44-32B1DB8877BC}\a.0\0 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{12507073-0B01-11D2-B55D-444553540000}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507098-0B01-11D2-B55D-444553540000}\ = "ZuluLib.PolyLine" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1250736C-0B01-11D2-B55D-444553540000}\ = "IZbQueryInfo" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{12507456-11DD-4DDC-AFDA-3007DB025F4D}\ = "ICommandBar" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ZuluOcx.MapAerialCtrl.1\ = "Zulu Aerial View Control" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Zulu.Piezo.TaskSolver\CLSID msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{12507443-11DD-4DDC-AFDA-3007DB025F4D}\ = "IRasterObject" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{12507503-11DD-4DDC-AFDA-3007DB025F4D} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Zulu.Voda.TaskSolver\ = "Zulu.Voda.TaskSolver" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12507223-0B01-11D2-B55D-444553540000}\ = "Zulu" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{12507073-0B01-11D2-B55D-444553540000}\TypeLib\ = "{12507020-0B01-11D2-B55D-444553540000}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ZuluLib.LineStyleDef\ = "ZuluLib.LineStyleDef" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{30C0C928-873C-11D3-BF56-D212EB700DCD}\Control msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{1250713F-0B01-11D2-B55D-444553540000}\Implemented Categories msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{30C0B93C-873C-11D3-BF56-D212EB700DCD}\InprocServer32\ = "C:\\Program Files\\ZuluGIS\\zuluui.dll" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msiexec.exepid process 1928 msiexec.exe 1928 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
msiexec.exezssetup.exepid process 1676 msiexec.exe 1748 zssetup.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 1676 msiexec.exe Token: SeIncreaseQuotaPrivilege 1676 msiexec.exe Token: SeRestorePrivilege 1928 msiexec.exe Token: SeTakeOwnershipPrivilege 1928 msiexec.exe Token: SeSecurityPrivilege 1928 msiexec.exe Token: SeCreateTokenPrivilege 1676 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1676 msiexec.exe Token: SeLockMemoryPrivilege 1676 msiexec.exe Token: SeIncreaseQuotaPrivilege 1676 msiexec.exe Token: SeMachineAccountPrivilege 1676 msiexec.exe Token: SeTcbPrivilege 1676 msiexec.exe Token: SeSecurityPrivilege 1676 msiexec.exe Token: SeTakeOwnershipPrivilege 1676 msiexec.exe Token: SeLoadDriverPrivilege 1676 msiexec.exe Token: SeSystemProfilePrivilege 1676 msiexec.exe Token: SeSystemtimePrivilege 1676 msiexec.exe Token: SeProfSingleProcessPrivilege 1676 msiexec.exe Token: SeIncBasePriorityPrivilege 1676 msiexec.exe Token: SeCreatePagefilePrivilege 1676 msiexec.exe Token: SeCreatePermanentPrivilege 1676 msiexec.exe Token: SeBackupPrivilege 1676 msiexec.exe Token: SeRestorePrivilege 1676 msiexec.exe Token: SeShutdownPrivilege 1676 msiexec.exe Token: SeDebugPrivilege 1676 msiexec.exe Token: SeAuditPrivilege 1676 msiexec.exe Token: SeSystemEnvironmentPrivilege 1676 msiexec.exe Token: SeChangeNotifyPrivilege 1676 msiexec.exe Token: SeRemoteShutdownPrivilege 1676 msiexec.exe Token: SeUndockPrivilege 1676 msiexec.exe Token: SeSyncAgentPrivilege 1676 msiexec.exe Token: SeEnableDelegationPrivilege 1676 msiexec.exe Token: SeManageVolumePrivilege 1676 msiexec.exe Token: SeImpersonatePrivilege 1676 msiexec.exe Token: SeCreateGlobalPrivilege 1676 msiexec.exe Token: SeCreateTokenPrivilege 1676 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1676 msiexec.exe Token: SeLockMemoryPrivilege 1676 msiexec.exe Token: SeIncreaseQuotaPrivilege 1676 msiexec.exe Token: SeMachineAccountPrivilege 1676 msiexec.exe Token: SeTcbPrivilege 1676 msiexec.exe Token: SeSecurityPrivilege 1676 msiexec.exe Token: SeTakeOwnershipPrivilege 1676 msiexec.exe Token: SeLoadDriverPrivilege 1676 msiexec.exe Token: SeSystemProfilePrivilege 1676 msiexec.exe Token: SeSystemtimePrivilege 1676 msiexec.exe Token: SeProfSingleProcessPrivilege 1676 msiexec.exe Token: SeIncBasePriorityPrivilege 1676 msiexec.exe Token: SeCreatePagefilePrivilege 1676 msiexec.exe Token: SeCreatePermanentPrivilege 1676 msiexec.exe Token: SeBackupPrivilege 1676 msiexec.exe Token: SeRestorePrivilege 1676 msiexec.exe Token: SeShutdownPrivilege 1676 msiexec.exe Token: SeDebugPrivilege 1676 msiexec.exe Token: SeAuditPrivilege 1676 msiexec.exe Token: SeSystemEnvironmentPrivilege 1676 msiexec.exe Token: SeChangeNotifyPrivilege 1676 msiexec.exe Token: SeRemoteShutdownPrivilege 1676 msiexec.exe Token: SeUndockPrivilege 1676 msiexec.exe Token: SeSyncAgentPrivilege 1676 msiexec.exe Token: SeEnableDelegationPrivilege 1676 msiexec.exe Token: SeManageVolumePrivilege 1676 msiexec.exe Token: SeImpersonatePrivilege 1676 msiexec.exe Token: SeCreateGlobalPrivilege 1676 msiexec.exe Token: SeCreateTokenPrivilege 1676 msiexec.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msiexec.exeZuluSrvm.exepid process 1676 msiexec.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
ZuluSrvm.exepid process 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
ZuluServ.exezssetup.exezssetup.exeZuluSrvm.exepid process 1224 ZuluServ.exe 1288 zssetup.exe 1748 zssetup.exe 1748 zssetup.exe 2776 ZuluSrvm.exe 2776 ZuluSrvm.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
msiexec.exeMsiExec.exewevtutil.exezssetup.exedescription pid process target process PID 1928 wrote to memory of 2840 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2840 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2840 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2840 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2840 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2840 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2840 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2216 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2216 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2216 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2216 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2216 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2404 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2404 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2404 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2404 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2404 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2404 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2404 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 1240 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 1240 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 1240 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 1240 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 1240 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 1240 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 1240 1928 msiexec.exe MsiExec.exe PID 1240 wrote to memory of 2768 1240 MsiExec.exe wevtutil.exe PID 1240 wrote to memory of 2768 1240 MsiExec.exe wevtutil.exe PID 1240 wrote to memory of 2768 1240 MsiExec.exe wevtutil.exe PID 1240 wrote to memory of 2768 1240 MsiExec.exe wevtutil.exe PID 2768 wrote to memory of 2760 2768 wevtutil.exe wevtutil.exe PID 2768 wrote to memory of 2760 2768 wevtutil.exe wevtutil.exe PID 2768 wrote to memory of 2760 2768 wevtutil.exe wevtutil.exe PID 2768 wrote to memory of 2760 2768 wevtutil.exe wevtutil.exe PID 1928 wrote to memory of 2824 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2824 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2824 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2824 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 2824 1928 msiexec.exe MsiExec.exe PID 1928 wrote to memory of 1288 1928 msiexec.exe zssetup.exe PID 1928 wrote to memory of 1288 1928 msiexec.exe zssetup.exe PID 1928 wrote to memory of 1288 1928 msiexec.exe zssetup.exe PID 1288 wrote to memory of 1748 1288 zssetup.exe zssetup.exe PID 1288 wrote to memory of 1748 1288 zssetup.exe zssetup.exe PID 1288 wrote to memory of 1748 1288 zssetup.exe zssetup.exe PID 1928 wrote to memory of 2776 1928 msiexec.exe ZuluSrvm.exe PID 1928 wrote to memory of 2776 1928 msiexec.exe ZuluSrvm.exe PID 1928 wrote to memory of 2776 1928 msiexec.exe ZuluSrvm.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ZuluServer2021_x64_ru.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1676
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Adds Run key to start application
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Loads dropped DLL
- Registers COM server for autorun
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C7E1C229C1B7D00EC1ADB2813C03FC86 C2⤵
- Loads dropped DLL
PID:2840 -
C:\Windows\system32\MsiExec.exeC:\Windows\system32\MsiExec.exe -Embedding 9953F485DF63F1DD0FA4B6DEDB85D0B72⤵
- Loads dropped DLL
PID:2216 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2EE77D0475D7C4273484AD38DCDC1B332⤵
- Loads dropped DLL
PID:2404 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A31BDB9FC974D79627C04EF571B6D71D M Global\MSI00002⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\syswow64\wevtutil.exe"wevtutil.exe" im "C:\Program Files\ZuluGIS\ZSWinEvtProv.man"3⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\System32\wevtutil.exe"wevtutil.exe" im "C:\Program Files\ZuluGIS\ZSWinEvtProv.man" /fromwow644⤵PID:2760
-
C:\Windows\system32\MsiExec.exeC:\Windows\system32\MsiExec.exe -Embedding 89A846A15F47DE48AA2E78A449A7FC86 M Global\MSI00002⤵
- Loads dropped DLL
PID:2824 -
C:\Program Files\ZuluGIS\zssetup.exe"C:\Program Files\ZuluGIS\zssetup.exe" -i2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files\ZuluGIS\zssetup.exe"C:\Program Files\ZuluGIS\zssetup.exe" /e3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1748 -
C:\Program Files\ZuluGIS\ZuluSrvm.exe"C:\Program Files\ZuluGIS\ZuluSrvm.exe" /h2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2776
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1520
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005B0" "000000000000059C"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2500
-
C:\Program Files\ZuluGIS\ZuluServ.exe"C:\Program Files\ZuluGIS\ZuluServ.exe" /s1⤵
- Identifies Wine through registry keys
- Drops file in System32 directory
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
699KB
MD5c342fb050eb26c4a1af73558ba33a5d5
SHA1fb4e856916eed1e6c61d58d5972c0df034936082
SHA256190d4c0de0254476bc8edbf3c2570717bba019b87c509ed8ff74a52debdfdd4b
SHA512e95f6f37a1fcdca393586e5b8ee06364a411eae5cec54c9cfc4e40f2d9497a17ddd5ac3dd5a1049ef5a409b021eb4f18e0196b1479e43ac9c0b993e4f60b735c
-
Filesize
47B
MD598bc96f6de8b583491a9ad031a5a469f
SHA16a7fa6b0ff75c1d59a35774ee8c0c63927ff7917
SHA256406775f689483383d788bf0a18da263e4c9232a497f3e10f4a57bb3209ac048d
SHA512969976349510f7cd3369b426700b5cc337977242e5ba653aa2708cd5dc177380a32efeb8c8165d7a847abe5e0c73c04d82a4642f1b115281f4eb877baf49e455
-
Filesize
39KB
MD58f924984bf71b53c6484126cda120161
SHA15be1a4f51df83be07d63f3da42ec89215b0c4737
SHA256c368d64fec5c84c19268962bb74e3a73990d65bf414a201f5a82a9070884ed58
SHA512243fba284176012edaf10cd0a77a4de4ce6445e2aa7412a68be3cb7d0ce5c81a35ab9a57a1d42f9543c5f64ddcd588629a75004b136e74a5e4d23ccc1a75dd66
-
Filesize
49B
MD575bbafd4bfcb9fc1b2775b5ab681ba1e
SHA16f7a0df8271588c392ef5cb14bedc63098a24f6e
SHA256b737eab782bf9b8d4de404aa8221b7d27cec5a1230d20d87ef795355ebff426b
SHA512d64bea19aa4c78e096009ed15d01021e22b8ea0bba3bf4a9045ecfc464273ef5cc34ea014c85d1cde6598f3969821f55d67895fd577522e5d66e82299c5067b2
-
Filesize
50B
MD5945aefd597c4bdc505b53872804300e5
SHA16a55c40df1feee85757986fc8f108f604cb3847f
SHA256bdf20db250694d50b529b2207364545c2cefa64160f7ccb99f6a3bd9c962763f
SHA512710b4e271b0b7892af274be019920ff57bf1e92dc7cc0d76a136fb62b7c17a431bf9992e08fee43d2b1d066aa1d118046b5e900ab7939e2e2d0277a9a25a3ba7
-
Filesize
49B
MD5aad43f43c9f4079e9929924a6565e326
SHA1935e0c47f7ba1bf00c7c762fd5a4c15ab836bf67
SHA2569f98f9095228930844d3d2eacae86ec71ef4e2b438a53ed82fa9f6a3fdd7e785
SHA5123a560f8f3332c0a8eaf730075849a320e7c8df1b4026f686053d111e0357179f50f54b17e719619abe188a564b2642e6665ab2f667bd45cb9c8344e4174fb37f
-
Filesize
43B
MD53e34b5499a4340e53fbddfd7d85e197c
SHA1bbfe9e8b559fa67a10e6a4426422c8eb98c26d2a
SHA256c035fe584b3c6aed1034a49fc9dc2a85fd46c7f35684672f834d471068fddbc4
SHA51267b399dd08a64c833d509f2729eb19923807f8984b65c7cecd79558fd83b1f7e84bc5c0facda2237e76c584a119ab6fcb2fd67fa1f3f6d1178916dc2370b1f55
-
Filesize
53B
MD58fd15bfde334e5162aa628328e3285bb
SHA1be8be2ee8a6b2c1ae5add3285fd9489dc0e6e0b6
SHA2565e5ec6afbfbca60c1790a529a9de1452d5888848bda724f007e30561bb805188
SHA5127a993000665e8c11dbaccca6f13ed37ee6fadf99b6b71f0a01e2884f8e5c3eea4dc66176c50288cd5c420e86d84ee198a8c7fe4e42912c223f45f0d1e54431b6
-
Filesize
48B
MD56ad145d624f1e9cc0fc68e5d5c8e3b7c
SHA1dad0683b3550d40222852a6a2f6dea3384be71a0
SHA256d34f8c47333d98940d1e5c45638f030b8346f8e6b1412cd58f7796bf5db772bb
SHA5129487d73cfea8a9d1572fcfb721b6aa5797aa1a555089adf5a5d3bc0319496b03d3cd01a899cd64957929b082629ffe1bb7cc028f17b53725a28fc86cad3eb892
-
Filesize
28B
MD5c69770a7516d4e5cacc2ae53aacead41
SHA1647ac416636ee535eddce384cf6380259172dc99
SHA25612ccaa61ef6010f541e7d146aacc40f5e45ec3772ec03802eef129ae8bde08d9
SHA512833aa259b5f3f888ff2f380b73383cb31a004114812162d58ccde5f0a7915373439105a1c8c80a019e64a8bb2def4818929c1055c51470454560adc8a8fe2bb3
-
Filesize
295B
MD52cc8f54814b9b9c96ae0ed9a14e9f1d6
SHA1371f9fcf8e593db73a02f440969baa3d73029951
SHA256cf1bd484ac2043a15844112ca47b8396bfee44a5142b76c201c8017b61caa60e
SHA512007e9c5f64830ebfb2836984f7ad0f98e9adbfb2c8b06b5437d94f851be243af7c46f4f1905a0b9af0b2c2468647c439a8b8f8c1a6065b2a59ec90764deb6102
-
Filesize
19B
MD53b161bbc60954a14355c78b279365363
SHA1e58107f2559c5578bd9bd122136563d23bf1968d
SHA2565e85cf9f2ce483b838d3a6201ac8c8ad7b4664c2b62f49dd278e7c28cb05303c
SHA512d9517cdda847ca1102188ff196e608db7127145dde04a488b9c389a9c025637d9e697bcfc432834b759d800476ea9265351edd0c0648d64edb901e493d5cf0f2
-
Filesize
213B
MD518ab5a82a4b8cb2b7ce55af1f64e4256
SHA154d9a0e34b7f4609aa72f033af47b89506d948da
SHA25683a7105a945ab629bf2af013f20c1e80fd29b69bed7a44ed03c7f6bc43facd33
SHA512a74aa6399835670a87d25643746da64fdf4da3e0bbf11575e7188d882f3d9be21f1fe78faad7fc8cc672be0e9ef3d257968bb552ae6a2488cb62bbe897b4ef48
-
Filesize
22B
MD5f94083c052902ca530f64d28ebcab822
SHA165157c849e3309b8e09d836348d6f5f5b14b1c16
SHA256d7cd5d9cb950de7072e54160a49f9c9f0dee5424e1922c9cbe38635f170cf6b9
SHA5123243780c5b8d563a87f2dc9571d58a79f9a5d5097f565c129ecd1703442b96afd014f59c9b82b9b8725a87dc86261a68823e429aca67846a2ad874d1eda6d5c2
-
Filesize
207B
MD5bbb0921e596db881b797a11ff18e88ce
SHA1aae4e12999decb4d9e6bb32df725c4a03d9c5cf3
SHA256e3a54a1dc24461ab46fac2f89152e9e5d97e228b43b6780a3e3d47b622161904
SHA5127e0427a0ab9a7c4088fd700a77a3bcf8829c2edbd9a44821d34237c9da57d60021cfe2ec253f680fcdbcb267b00681e8f4ca71894b7f32bf0ebbc2cff819f2ef
-
Filesize
24B
MD520783a496d4b1f5e138887a354ed31d4
SHA109d8691995695855cfbd0567da0f67eff0427566
SHA2568c9914cdc0bc0293860558eaab6ce4f9d9f886f65a9d9a246022d988dba89a27
SHA5123137589b69d7e545d77158841541b8843841542af76ba67017969bd642ebdc549b6d6c3d12913b20512885841344a439205ba936b91141d39aafc51fbb858b77
-
Filesize
207B
MD565ca4e75f483e1478943c6e2431cd506
SHA1eb58b7327b25f4e2537023750fca1f8b119dc0c0
SHA2563d8f35da2e7c285103ced12ece6c8a18ca6a0c0c24f92e61586e6005307303f9
SHA512b14ef461ec887b844feb255c3ef22eae980d31f263e1a1e30f7053435f40656c05034b44243d6414d07465c154fa3a8aaeeef6794c6f1a9e289dfcf79d1e91a0
-
Filesize
24B
MD5842eea4891289127b49bbf15f880de6b
SHA1694980b211c407d8f5bfce13e4f523ac436b68d5
SHA2564818ef3010be7a0a3b38c38340885c27b8aa3d4e42017d46a980a66a0299d26b
SHA5123633784e9655adc05423fd3ba6b7b5d66a01c2aa1108a5a0f8bfb16b673d5c376781d73cb0c2ae44c461f2325e8cd26b5449832c05c576c79801caf6623b6c3f
-
Filesize
200B
MD56d8dc403598bb5fb2cb223468a3af5f5
SHA1ab20261cc8de02b15d9bb3b3be78e61ab90a3524
SHA2565fecd6034f376bf6c59bbe54a25081acf3038327d76bd7337e969992cf1b0b6d
SHA512b2aeb1f8a20cd3739f791b8695b44ca96eb7cb1951b08c5d6d7b62d36ca97468434590f1f2d582c69a47a30f9db0a9873070748d81e620eee943aa58fbadba8f
-
Filesize
23B
MD5a1a0a197b20fed959aa42bc83c5b66dc
SHA164c0d71e393d33dd5a2a3c38f48dce66017e43a4
SHA256af332fbafe02c24f595f6988dc539cbe187d54d181ae96982edbac9695433f9d
SHA5128571c34d2b5a80f24bb6ee69f1d255a510dcf0bde6cc14607547e9582f84ffd874025209a60233a04be2c0c19cd18710e5b1554b45e014b56925bfb0902cd4bb
-
Filesize
212B
MD5ec850f1d2b98084279c50d802225d52d
SHA1e546830488667f3fecbf5135d59ad4c295e3535f
SHA2567008f37b0e1d735ef750622ba8188260e9183ef54d8e92c3cc057fd3c01dd281
SHA5126bea9449004bb8f404b00db8af7f0959645ce593f0698c59f1275a41a1d80ca82c7d66c0273355f0c233034a596f7fd23217befc1741206104b8356317861a6c
-
Filesize
23B
MD59ff5c2fe7c30948e64da8b116af5fa26
SHA1012841f1367a652e9a751cb7493b901810944a5f
SHA256d4737d6d16ff2507b622742063e8d88b15ff85acf06d8054880a4c8efc9409e9
SHA5120749fe56cf4f7b266ceee5788b9a1e8a69cf63f1d6693ff1a0566b4906221714d9bffca170571ade0a3ab932390367f95e7bcf21701cf1c2353156838b5955ee
-
Filesize
213B
MD5752b0583b42103f473107955808ecc00
SHA17112b5d63ef29defa880f79895a2850313ca02ce
SHA256747f8160ebcf95faa6edb7ba5d428f855a49d84df58a2d5ed6763c82643b36a4
SHA512ea50d040f86c91a9a4dfe4b7b55f9e7813dc635d4f58c51e5a0c8cf472c20a7653787ae2d292212edcf86ecad6120d406db26cbb2d7fb99c82fcf7256187e608
-
Filesize
1KB
MD5770b47295299695fae4d794d87987d6b
SHA16ae95ba0a5d61206ee5c68e384f508437a3c598c
SHA256b8849cc460347c9793461e51fe05bce22bdac9e4078fbe367e2a11a87f97d4f1
SHA512ea27995cafd9ca7c58eeb43656fe7b9af7668578d656eaaf7417f6a20136942fa3e46a260680f621fff13d9bf918c9372081912a220baf66d40d34d517d8c6f4
-
Filesize
14KB
MD551099112deebf361202a630e11ed3604
SHA1fa6f1ea1e79e2337c38b50b302b67e3e4518a1e1
SHA2569c207e50a8089fbedb2efac349be873dfc384d6d1c4e48f28bc9979ff9824bbb
SHA512f50e9558291b0ca236b0e5620a156caa0e6eb336eaed73fb62379c978d39d81bb9ec70ef4acd731cfe247c71fd33420a7006c83de602b94024edb1551cc5e765
-
Filesize
457KB
MD5bacdcfc6cdeaf578bbb559db324f2872
SHA1843f504c83e34c176f2bb68678bd2665c050e230
SHA25654539c5b2259e5fe90c2371600abe4cd3b2e8057fb25ff52f6408e611ddf96c3
SHA5128098a21c133121cfa7a71b0e5b73da0d02f36c5db3fe117f96815763120890642307a2565ec0e15cad148898165bc4ba78346a0332ff75751c4e07a2120ff8b3
-
Filesize
55B
MD50ab8bac388159d1b920aeec7a49c93ef
SHA112205fcafdd935f4c71fcd90fffb50bad3d22565
SHA256b49d2a3d6714a9ce670ee76500f9d44b94e6b6d171150595eb8f285705f291ea
SHA5121e272123fe3dfcc3e7d30120d9f06688532a802b34faf14faed02a33d0eaf35d7a1163a3d94f7d6569e8b43e09ce92325c1785333f2eb96dea31caea110cdeba
-
Filesize
26KB
MD5cc9791ab71953156fdbe2b084a956527
SHA11acb05465f7ce00ea527920e262605fbbd8f3fc7
SHA2562c1e5a602d3223701a298d5b0773398764b5007c3c794fb112c5fee47953511d
SHA512b1cbf53dedab47496836f62267b0787e64288043bb9ee3f05f5885c0479a5899c5b63525d9e201793f87d572cbeddefcc512d309bad6dc9f08e95b1daaf2683c
-
Filesize
65KB
MD5cd315edd9ed6c69231c975b5951fe1fe
SHA10b6724cddf3e8e734342889c0114021f35e62210
SHA256d00fc04f0cef268395b1b70ead71fac3d5ab88dc2d0d4efa246459c1ea3532a2
SHA512a397d12eef734612f08b042650e4974de38c675dce29bb842acd76d3dcd2853e76543a86b3f5be14d5c126a73f1a826ca8ff5603bb01c462665ff0d2d80b1582
-
Filesize
4KB
MD5b7b2d5f279d00305be7272a4e0434b7d
SHA135f7b2211c92259a404ac7ceb0d7b9f032cd12c5
SHA2568ac5b6dc8133f93fd0dfa458c6900feda2d58ccfdb7620bfade5ae706e28ee84
SHA5125510173f8f6a8546c7a9b075482aba5dd0fff5e3d890deba0aa6884f3709969fa78b43b1bd309ab8b120847ce888126b04d8d300d666e5555834ac62212772c6
-
Filesize
22B
MD5ad4936d83feec0c4cd6ded31d0a38142
SHA10e7c4290874abff8f5227d4720d42ec6a84849b1
SHA256254735a72c65fb423e14f978a1b80f64b4c2497caedece0219a4b220a57acf65
SHA512860e57f9c88bff08cf91cafb4b8f31e232f9738c38f53ed0e0065c68e44a2a697c7e2ee0a2e616d709b8cf80f078c1870449e7f1bb555f0a6ce874fade57c721
-
Filesize
7KB
MD5cb5bb50c5e8a16fa17079b9cd9409f75
SHA1be552bcb35726224aa7a3a11b22b71df5acdb074
SHA256403a92f1a110c973518524cb7a047b23be2de7018abce701456284511847811e
SHA51260f12d56c3db2f354315f2e9562f642231311684db84508dc1e2848c50050a133da69643e0454b5ba8bd93cf7dea9b09ff4683a12899ca1f0c83200cfc8a22bf
-
Filesize
8KB
MD582abdb8a01f4597ffab920abac75df7a
SHA176ccf54430958cffe3e4b3bb1043ee6ccb1c373f
SHA25691e91b093b374d082562b709247d2037c99500d968d5a69d3f32c624b0592ec1
SHA5123a0e60a85451e891ab4e5b261a0550801cd8875889e6b4e0d3de78d955da1eedb57fd4d8d7bb969462ab7f6a14775c6573a541d8517bbb7aeeca78d2482d0726
-
Filesize
9KB
MD5335892f6297ba679f1f5897bc5336268
SHA1ebdf494dea51a5e18f3c635bdde14aae1a138857
SHA256776809926315999a63accb2dc4f64ffacaf210e0ba084ab1f2c93c282ce2fc1a
SHA51221c13482274f44cc8d811b7f264965fe4a1c6350bd12259b891fe8156ed8a1eb66b36ea45342d9d500e48c45bcedfb8204607135945aaada28c4ea1b0a334c31
-
Filesize
9KB
MD5a7293585ee6cc361284c1e807b72a271
SHA11403f49de9cfb062e109011dbd21535c12f35eda
SHA256351263e1ba68f4c0ac926fdc9cb210f537b299ae6022faa801d2a24edc9f22bb
SHA51274da1435b5118e21176c8751033d6d0fc0a2f22a7bf0c59120064c0ae0fb7e777f0ea01d0acdf213a4bbf334aef25d34cc0f6f9ff08c0b755baa81b61443e6b8
-
C:\ProgramData\SafeNet Sentinel\Sentinel LDK\a41499da-ad9b-bd03-74e3-514f3aa9e051\.434e4631\.flelgdg8
Filesize140B
MD5a88b59ee3481adf8c01cc29241958978
SHA15a5ab81568fa5c2af15894ddc63d7cdbdffbec59
SHA256ac768e0f67efb36ff4dbe9ab34342fad37628e9e082dcba160d3c4b5ec7df3dc
SHA5122ddb84bf2b07b594951c4f4da1692e294903632571be2c2cacd98656c8d0dd336a14a7cec8f4c42b8e20a7c0509c9aba8383914cdf152fe76efd66cee4cbfa80
-
Filesize
1KB
MD5e94fb54871208c00df70f708ac47085b
SHA14efc31460c619ecae59c1bce2c008036d94c84b8
SHA2567b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df86
SHA5122e15b76e16264abb9f5ef417752a1cbb75f29c11f96ac7d73793172bd0864db65f2d2b7be0f16bbbe686068f0c368815525f1e39db5a0d6ca3ab18be6923b898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8c0be7441d276a4fd7f054283115e27
SHA19bf537c22dbfc55c2068f5ea578969774859a8c6
SHA256d22df693db6693e23b3acc9f7e4ca2ab1fd6ad8fb0e1f8da2dc3fb61e06e8f63
SHA5124d7744f3b5a11a8a37c2d18a1e66bb8dd8fd9ef3c10f95213213cf7f6ac9d47ab91a772e72a817dc8cbf07da317016844c2cb46527c6952b2f1accf530d984ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560
Filesize264B
MD572a7b8788c0ee32d256e79275297df6a
SHA1f9fad76201e5930c1e756c51e79a7647f0c71852
SHA2560de9e60842b9cff03b9885b29f4a1292aa1f224425301b302b51f46d45a859c6
SHA5120a4304b6a4238ff981228f32967942b2a2ca40b24daf239b2c467cd3654a3c9d01b560f52fa6861656cfb2237355d3da1027912d4f7f1d69b3127506b5ef626f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
113KB
MD54fdd16752561cf585fed1506914d73e0
SHA1f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424
SHA256aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7
SHA5123695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
154KB
MD5b2e2c24ebce4f188cf28b9e1470227f5
SHA19de61721326d8e88636f9633aa37fcb885a4babe
SHA256233f5e43325615710ca1aa580250530e06339def861811073912e8a16b058c69
SHA512343ea590c7f6b682b3b3e27fd4ab10ffeded788c08000c6dd1e796203f07bf9f8c65d64e9d4b17ce0da8eb17aaf1bd09c002359a89a7e5ab09cf2cb2960e7354
-
Filesize
297KB
MD57a86ce1a899262dd3c1df656bff3fb2c
SHA133dcbe66c0dc0a16bab852ed0a6ef71c2d9e0541
SHA256b8f2d0909d7c2934285a8be010d37c0609c7854a36562cbfcbce547f4f4c7b0c
SHA512421e8195c47381de4b3125ab6719eec9be7acd2c97ce9247f4b70a309d32377917c9686b245864e914448fe53df2694d5ee5f327838d029989ba7acafda302ec
-
Filesize
127KB
MD593394d2866590fb66759f5f0263453f2
SHA12f0903d4b21a0231add1b4cd02e25c7c4974da84
SHA2565c29b8255ace0cd94c066c528c8ad04f0f45eba12fcf94da7b9ca1b64ad4288b
SHA512f2033997b7622bd7cd6f30fca676ab02ecf6c732bd44e43358e4857b2cf5b227a5aa6bbbf2828c69dd902cbcc6ff983306787a46104ca000187f0cba3743c622
-
Filesize
6.0MB
MD5e9cf4e60606a1d7c32c2ce90cf42f2ea
SHA1939e754fe37edb601ccf877898d141aed147de3f
SHA2569ea516f8a7d468a6566cea21609094d64ee114ecd5cae98fb0c80a78f3e1fbe7
SHA5122d8ae90879d87ccb98c682f1f85c529c94fd11c688e92e5065045b56c34a0e27765bf74880736f5ea51fadfa3875c5b52bac3545c25cac51a76cd37201594651
-
Filesize
113KB
MD508c34e745029011b65301e1827566cf9
SHA1ce43726b12f6fd10b40f08a444f0440fb3e5884d
SHA256ec0d832f5cecee49d4fcc5e374a3e10744cc26ca90cc4a8cb3885c347313fda9
SHA51255974ba24595b1875fff8c7d50feb29a48cd722a924395b5f97f67224bcb609d29201deddbf0d9d18cd481d3d5d74b19ecb8403cea8f7744ebeb5b99047fc72f
-
Filesize
267KB
MD504845efffd461f1a302dff3d59a5c089
SHA182092d7fd4e03b454f7993f4e159d6801fc9456b
SHA256475760be4e9b6b0acb7ecd3b95e386883d7b496302ae33bd8409bb2c816ca503
SHA5123455c0a75eb7db05a84c1f8d81f574ba65ad33d6c3ae3c94f05911699c5d7f139545046489daaa33be287a90a896a32fcd3ceeca17cd7c38e69c0b7781cfa984
-
Filesize
32KB
MD59fc3abfd898dc4d3be166c4e3807f613
SHA1b293fc02308204301a4e31dba29a32da169c3632
SHA2566a4d0cd5e263d9e82d772ca2f2657ebde0d883834bf2cc966dc56edf8fc650ee
SHA512d8c2dc7fefdfcbc643c73660ba80da6358681fd9a8db695c78d066fda830124e427bae840a8c2b8fbe8219790d6f475b72ad7f67bdece62a4d143182155641f6
-
Filesize
66KB
MD56891050e2efe5a0e03aa1e7852373c9b
SHA16621b543beeb564fde6e0117a9db64c82a773e98
SHA256fc9e15b7d352578db2d4ac3a971805dc6eb666016a7609516d9a4e080b03427e
SHA512d415a8b0be9f874611eae54504f723096e1cf458779b206aad246e671da4918c45354f7abef217de26bb0be7c901390be45461b657256b5f7fe0e419d010df27
-
Filesize
83KB
MD584826423f1e5948eb8a3b94ceb7b8e00
SHA126a0f3dc6ded5f9906bad0e47206916812eb2e16
SHA25652a3aa95f22a40249d5bd5756784b4e00b31073516e839de5a856b5744cecbc4
SHA5129547bfa6985868a9571bc2cfd4afb81465bbdfc9a9def4fda07c2ebf8c9f87c75a76a9e0d539b7ee2cb392c42b498cc9326acab70009ca8e42b92ad5a7df1bfd
-
Filesize
76KB
MD55eeddddfb431b4462a6ee12c8d9fc919
SHA100d8889467270e0649b1cbf28d77d5116618d3ed
SHA2569965cad5a6c655f747afe56c6c88b63868f384ba385ca208a12cd18cfa60a47d
SHA5120b13ec7c8d1f653d545a359d74abad43e77c62c1b2d67cd7a2b3e0aef6d83c1c4ff2e05b5578ea22992d4bd300dd2b1e63a5922f2894f5c50e16c540bf3e7577
-
Filesize
154KB
MD54c169b811b613294e909647b82f094be
SHA1c18c44d7c36f412bee961a550df9884f4968dcd8
SHA256aea4ad8d0e62f8685dd039634dab1d8361b8b895299622059a1ed1bc34abcafd
SHA512c859c90b2ea6b10c4d52976515ad47124374a426c23f590e268c218f2e6ceb93cb7a4b1b70ba782b66b454a31d49d4bd69c95dd2f68edbb61d4264198ea7598f
-
Filesize
448KB
MD5057336796b5b25396fc097c4cc3a1cf9
SHA164b9333b5406108d1acf851e8d8c0df944c9224c
SHA256423d94ebe221a29ddff4aa4c6110903d6d0ea241a4eff6151d14f9f74b7323fd
SHA5121fd7d46428233aafb454313f73f7b1c0150db427a23322de1b104206005747b92bd5375927514c74463313e3c01b3c5d83ee5afe10baa902055987e5449e4022
-
Filesize
5.9MB
MD5850d39bebed1a825dcce08e6bb397ba3
SHA1c73ca5a6cd6959f47be23d518da5da609a2c40ae
SHA256dafbd45d4e5af498ab4dee3e99827460b89bca8e6327174dfc9892b9f3b1f4c3
SHA51228522eb6a54ddb819d15903c844b763bfff84e3f12f7cf7f044331040eba13c2d80aac48fa72ae3b8f1b3372b2ece1f348ac82a5af23e1de37fc98922d8ed01f
-
Filesize
181KB
MD54ed8c3e640701ca773bcb1c069fb4809
SHA12f07ddcffe1d9c9e31b779bc40248dc5b8cb6191
SHA256703e9b9f1fd65a0915fc17bf29f6d5e3c7e296da0d3cf74076c2dc6f19497a88
SHA512014156db94ed6d92ba2ca3776fae5d352925d8c90cb8c4d02bfcb24cbf9b97d42c44ef9592171c02bf4f65bb1f2c19a02b6b543ba4c5213434f7db4c3379cba9
-
Filesize
833KB
MD5be29a10a273c5cadc77fb3e3fb866f85
SHA184ba44bdbe702b93e001f2d92aadc65cb949c480
SHA256e0e99488a41d336c57ba43d05b764d940c4404659fc8f5f1a36325b22d087d5e
SHA512448d1d9b3e0aa911ddaf59b313e8db79569444a6e300ec6d0b4f9c886b055e65df842ec4b4459d3f09d2f38e82f1895d99c5f430dd481b49c3a9f5c31a36bc29
-
Filesize
7.5MB
MD5317690f6d4de05eecf2234cb2569b6e8
SHA1071474ed7eb145b85b11f5b7cc6f6a3a312b5cb6
SHA256c04c8998f28aa853cd0e040f070758701d4843da4e1e358c74534abd4e20dba3
SHA5121a60c1237c9e2faa19929dfcae0f0420951bc41a6247f2dbf569f9314d9984c91aa6cbf07296877e9e0ed9716045af74d6b8563fab169a3af6cce0f47b6ffd7e
-
Filesize
648KB
MD561e866d1ed299603fe7aa350ed7a765b
SHA1b332e4fa08bda000eeeed7633186f3aef56bbacb
SHA25610f6a6aaadf5ab620d84f8f08c807cc6211663451e63aaf36c966c6c6dbb09de
SHA512653e6405af8a8f8d67709fd1bd23bb95bae6c46476584bf05167d17dac746a0400d44052a0d68a29786fc41c9215cdd7e13f5e603b4a6dde5128e288e9177b63
-
Filesize
9KB
MD5d99a52cc8cd30a571e7e5297d9b8f29e
SHA1bef8f9be586e204b89580e0378ea175c14d495ae
SHA256087895661a084f0c58657e784d6d404ff0d7ccfc0ee1379fa1a557cbcd4e3e03
SHA5126b61e64841a9a5f9e01caae5920b403199e2758fbd44c3b84d2e00f775c9049a0992933b5e00175f6ccb27f50274a4c74bd4003dfbd99adf84898c7590742d17