Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/10/2023, 11:43
Static task
static1
Behavioral task
behavioral1
Sample
6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe
Resource
win10v2004-20230915-en
General
-
Target
6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe
-
Size
5.5MB
-
MD5
ab206dcce113ca527871527e27a5c164
-
SHA1
b70ccf9bdf2109475c5067ee60806f537aceb87b
-
SHA256
6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e
-
SHA512
0529b6c39392e8cf48537cae5ef6222abf2cb350adc37ee68a4f80c6ef04c4c7ec2e887512359bded7bd78f3dc164fa58ec42617cf141abe381d03a8f7de56ea
-
SSDEEP
98304:ZS+yGb1FLqQF6dWry//DthQiooP2qDAN0mVgSxa872avkRu4t4JfvbNcP:s+yA1oMuWr45hrr2imVf72aL4t6Zi
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2556 msiexec.exe -
Executes dropped EXE 2 IoCs
pid Process 1440 IDriver.exe 1520 IDriver.exe -
Loads dropped DLL 28 IoCs
pid Process 2792 MsiExec.exe 2792 MsiExec.exe 2792 MsiExec.exe 2792 MsiExec.exe 2792 MsiExec.exe 2792 MsiExec.exe 2792 MsiExec.exe 2792 MsiExec.exe 2792 MsiExec.exe 2792 MsiExec.exe 2792 MsiExec.exe 2792 MsiExec.exe 1440 IDriver.exe 1440 IDriver.exe 1440 IDriver.exe 2792 MsiExec.exe 2792 MsiExec.exe 2792 MsiExec.exe 1520 IDriver.exe 1520 IDriver.exe 1520 IDriver.exe 2536 MsiExec.exe 1520 IDriver.exe 1520 IDriver.exe 1520 IDriver.exe 1520 IDriver.exe 1520 IDriver.exe 1520 IDriver.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\S: IDriver.exe File opened (read-only) \??\Y: IDriver.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: IDriver.exe File opened (read-only) \??\L: IDriver.exe File opened (read-only) \??\W: IDriver.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: IDriver.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\K: IDriver.exe File opened (read-only) \??\M: IDriver.exe File opened (read-only) \??\Q: IDriver.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: IDriver.exe File opened (read-only) \??\N: IDriver.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: IDriver.exe File opened (read-only) \??\G: IDriver.exe File opened (read-only) \??\H: IDriver.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: IDriver.exe File opened (read-only) \??\R: IDriver.exe File opened (read-only) \??\T: IDriver.exe File opened (read-only) \??\Z: IDriver.exe File opened (read-only) \??\U: IDriver.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: IDriver.exe File opened (read-only) \??\O: IDriver.exe File opened (read-only) \??\V: IDriver.exe File opened (read-only) \??\X: IDriver.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\InstallShield\Driver\7\Intel 32\ISRT.dll msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\7\Intel 32\_ISRES1033.dll msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\7\Intel 32\IDriver.exe msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\7\Intel 32\objps7.dll msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\7\Intel 32\IUser7.dll msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\7\Intel 32\IScript7.dll msiexec.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File opened for modification C:\Windows\Installer\f767bc5.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI83D6.tmp msiexec.exe File created C:\Windows\Downloaded Installations\{87999005-D2C6-4ADA-8E83-28BAB087C917}\Installation Wizard.msi 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe File created C:\Windows\Downloaded Installations\{87999005-D2C6-4ADA-8E83-28BAB087C917}\0x0409.ini 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\f767bc6.mst msiexec.exe File created C:\Windows\Installer\f767bc9.ipi msiexec.exe File opened for modification C:\Windows\Installer\f767bc9.ipi msiexec.exe File opened for modification C:\Windows\Downloaded Installations\{87999005-D2C6-4ADA-8E83-28BAB087C917}\Installation Wizard.msi 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File created C:\Windows\Installer\f767bc5.msi msiexec.exe File opened for modification C:\Windows\Installer\f767bc6.mst msiexec.exe File opened for modification C:\Windows\Installer\MSI84E1.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 52 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E\52C64B7E\@%SystemRoot%\System32\fveui.dll,-843 = "BitLocker Drive Encryption" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E\52C64B7E\@%SystemRoot%\system32\p2pcollab.dll,-8042 = "Peer to Peer Trust" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E\52C64B7E\@%SystemRoot%\System32\fveui.dll,-844 = "BitLocker Data Recovery Agent" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E\52C64B7E\@%SystemRoot%\system32\qagentrt.dll,-10 = "System Health Authentication" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2e\52C64B7E DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A52D1D8E-BCCA-11D4-AB7D-00B0D02332EB}\ProgID\ = "ISInstallDriver.InstallDriver.1" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9A3-D11F-11D4-AB83-00B0D02332EB} IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A04-5C36-11D5-ABAF-00B0D02332EB} IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9CA-D11F-11D4-AB83-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B9C1-D11F-11D4-AB83-00B0D02332EB} IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B999-D11F-11D4-AB83-00B0D02332EB}\ = "ISetupTextSubstitution" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B989-D11F-11D4-AB83-00B0D02332EB} IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9BC-D11F-11D4-AB83-00B0D02332EB}\ = "ISetupRegistry2" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{777C89DF-5C36-11D5-ABAF-00B0D02332EB}\InprocServer32\ = "C:\\Program Files (x86)\\Common Files\\InstallShield\\Driver\\7\\Intel 32\\IScript7.dll" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A0D-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C8A04-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B9B2-D11F-11D4-AB83-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D72FDDC4-672E-4D49-A8A6-0CDD039B2FAE}\ProxyStubClsid32 IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9D9-D11F-11D4-AB83-00B0D02332EB}\TypeLib\ = "{3147B9F7-D11F-11D4-AB83-00B0D02332EB}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C8A00-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C8A00-5C36-11D5-ABAF-00B0D02332EB}\TypeLib IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89E2-5C36-11D5-ABAF-00B0D02332EB}\ = "ISetupScriptEngine2" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A09-5C36-11D5-ABAF-00B0D02332EB} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89EC-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\ = "{777C8A14-5C36-11D5-ABAF-00B0D02332EB}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89FF-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B989-D11F-11D4-AB83-00B0D02332EB}\ProxyStubClsid32 IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{777C8A05-5C36-11D5-ABAF-00B0D02332EB}\ = "PSFactoryBuffer" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C8A07-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9E0-D11F-11D4-AB83-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89F6-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\ = "{3147B9F7-D11F-11D4-AB83-00B0D02332EB}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89FF-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\ = "{3147B9F7-D11F-11D4-AB83-00B0D02332EB}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9CD-D11F-11D4-AB83-00B0D02332EB}\ProxyStubClsid32 IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A12-5C36-11D5-ABAF-00B0D02332EB} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89F7-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\ = "{777C8A14-5C36-11D5-ABAF-00B0D02332EB}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A04-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\Version = "1.0" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B9CA-D11F-11D4-AB83-00B0D02332EB}\TypeLib\Version = "1.0" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4EAEAA3C-FD20-11D4-AB92-00B0D02332EB}\ = "IMsiServer" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A0B-5C36-11D5-ABAF-00B0D02332EB}\TypeLib MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A02-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32 IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9F0-D11F-11D4-AB83-00B0D02332EB}\ = "ISetupObjectHolder" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A06-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\ = "{777C8A14-5C36-11D5-ABAF-00B0D02332EB}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C8A0D-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\Version = "1.0" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A13-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\Version = "1.0" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B9E6-D11F-11D4-AB83-00B0D02332EB}\TypeLib\Version = "1.0" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9A9-D11F-11D4-AB83-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B9C6-D11F-11D4-AB83-00B0D02332EB} IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9C6-D11F-11D4-AB83-00B0D02332EB}\ = "ISetupShellLink2" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4EAEAA3C-FD20-11D4-AB92-00B0D02332EB}\TypeLib\ = "{3147B9F7-D11F-11D4-AB83-00B0D02332EB}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89E1-5C36-11D5-ABAF-00B0D02332EB}\TypeLib MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89FF-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32 IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B989-D11F-11D4-AB83-00B0D02332EB}\TypeLib IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A11-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\Version = "1.0" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89EE-5C36-11D5-ABAF-00B0D02332EB}\ = "ISetupOpType" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9E0-D11F-11D4-AB83-00B0D02332EB}\ = "ISetupComponent" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C8A00-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\Version = "1.0" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C0E3CD3A-E8DA-11D4-84B0-00B0D023B209}\TypeLib\Version = "1.0" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89E3-5C36-11D5-ABAF-00B0D02332EB}\TypeLib MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89EE-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89EB-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32 IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9E6-D11F-11D4-AB83-00B0D02332EB}\TypeLib IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89F6-5C36-11D5-ABAF-00B0D02332EB} IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A00-5C36-11D5-ABAF-00B0D02332EB}\ = "ISetupFileErrors" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9BC-D11F-11D4-AB83-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89E9-5C36-11D5-ABAF-00B0D02332EB}\TypeLib IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4EAEAA3C-FD20-11D4-AB92-00B0D02332EB}\TypeLib\Version = "1.0" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C8A0D-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89EF-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\ = "{3147B9F7-D11F-11D4-AB83-00B0D02332EB}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D72FDDC4-672E-4D49-A8A6-0CDD039B2FAE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{777C8A16-5C36-11D5-ABAF-00B0D02332EB}\ProgID MsiExec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2556 msiexec.exe 2556 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeIncreaseQuotaPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeRestorePrivilege 2556 msiexec.exe Token: SeTakeOwnershipPrivilege 2556 msiexec.exe Token: SeSecurityPrivilege 2556 msiexec.exe Token: SeCreateTokenPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeAssignPrimaryTokenPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeLockMemoryPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeIncreaseQuotaPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeMachineAccountPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeTcbPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeSecurityPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeTakeOwnershipPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeLoadDriverPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeSystemProfilePrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeSystemtimePrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeProfSingleProcessPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeIncBasePriorityPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeCreatePagefilePrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeCreatePermanentPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeBackupPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeRestorePrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeShutdownPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeDebugPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeAuditPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeSystemEnvironmentPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeChangeNotifyPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeRemoteShutdownPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeUndockPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeSyncAgentPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeEnableDelegationPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeManageVolumePrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeImpersonatePrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeCreateGlobalPrivilege 3056 6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe Token: SeRestorePrivilege 2556 msiexec.exe Token: SeTakeOwnershipPrivilege 2556 msiexec.exe Token: SeRestorePrivilege 2556 msiexec.exe Token: SeTakeOwnershipPrivilege 2556 msiexec.exe Token: SeRestorePrivilege 2556 msiexec.exe Token: SeTakeOwnershipPrivilege 2556 msiexec.exe Token: SeRestorePrivilege 2556 msiexec.exe Token: SeTakeOwnershipPrivilege 2556 msiexec.exe Token: SeRestorePrivilege 2556 msiexec.exe Token: SeTakeOwnershipPrivilege 2556 msiexec.exe Token: SeRestorePrivilege 2556 msiexec.exe Token: SeTakeOwnershipPrivilege 2556 msiexec.exe Token: SeCreateTokenPrivilege 1520 IDriver.exe Token: SeAssignPrimaryTokenPrivilege 1520 IDriver.exe Token: SeLockMemoryPrivilege 1520 IDriver.exe Token: SeIncreaseQuotaPrivilege 1520 IDriver.exe Token: SeMachineAccountPrivilege 1520 IDriver.exe Token: SeTcbPrivilege 1520 IDriver.exe Token: SeSecurityPrivilege 1520 IDriver.exe Token: SeTakeOwnershipPrivilege 1520 IDriver.exe Token: SeLoadDriverPrivilege 1520 IDriver.exe Token: SeSystemProfilePrivilege 1520 IDriver.exe Token: SeSystemtimePrivilege 1520 IDriver.exe Token: SeProfSingleProcessPrivilege 1520 IDriver.exe Token: SeIncBasePriorityPrivilege 1520 IDriver.exe Token: SeCreatePagefilePrivilege 1520 IDriver.exe Token: SeCreatePermanentPrivilege 1520 IDriver.exe Token: SeBackupPrivilege 1520 IDriver.exe Token: SeRestorePrivilege 1520 IDriver.exe Token: SeShutdownPrivilege 1520 IDriver.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2792 2556 msiexec.exe 29 PID 2556 wrote to memory of 2792 2556 msiexec.exe 29 PID 2556 wrote to memory of 2792 2556 msiexec.exe 29 PID 2556 wrote to memory of 2792 2556 msiexec.exe 29 PID 2556 wrote to memory of 2792 2556 msiexec.exe 29 PID 2556 wrote to memory of 2792 2556 msiexec.exe 29 PID 2556 wrote to memory of 2792 2556 msiexec.exe 29 PID 2792 wrote to memory of 1440 2792 MsiExec.exe 30 PID 2792 wrote to memory of 1440 2792 MsiExec.exe 30 PID 2792 wrote to memory of 1440 2792 MsiExec.exe 30 PID 2792 wrote to memory of 1440 2792 MsiExec.exe 30 PID 2792 wrote to memory of 1440 2792 MsiExec.exe 30 PID 2792 wrote to memory of 1440 2792 MsiExec.exe 30 PID 2792 wrote to memory of 1440 2792 MsiExec.exe 30 PID 2556 wrote to memory of 2536 2556 msiexec.exe 32 PID 2556 wrote to memory of 2536 2556 msiexec.exe 32 PID 2556 wrote to memory of 2536 2556 msiexec.exe 32 PID 2556 wrote to memory of 2536 2556 msiexec.exe 32 PID 2556 wrote to memory of 2536 2556 msiexec.exe 32 PID 2556 wrote to memory of 2536 2556 msiexec.exe 32 PID 2556 wrote to memory of 2536 2556 msiexec.exe 32 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe"C:\Users\Admin\AppData\Local\Temp\6730ef0a184a9d0e8d6e8cb866886832e5427e4a41f992b45f7cad1b7f77f15e.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 858EC0A0D9FC5E0E332ED400E991F59F M Global\MSI00002⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Common Files\InstallShield\Driver\7\Intel 32\IDriver.exe"C:\Program Files (x86)\Common Files\InstallShield\Driver\7\Intel 32\IDriver.exe" /RegServer3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1440
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D00355056E815474FC1B56A4D04DB9AD C2⤵
- Loads dropped DLL
PID:2536
-
-
C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\7\INTEL3~1\IDriver.exeC:\PROGRA~2\COMMON~1\INSTAL~1\Driver\7\INTEL3~1\IDriver.exe -Embedding1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2912
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000588" "00000000000003C0"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a3329463007143eee245dd255ed9b5bc
SHA19932dc9f98a29808e11c6cccb5e92c48c9320915
SHA25613795b233d41543ec199b21ffc22e0e2c45a983b024842679794252df484072e
SHA51258b151c163803f46af6ae353d6d17964a863fa3f02712436072d1c290c8e550964b810c55a26897ae94f2198338b448401fa9df852ffdc10586d94b113f80f24
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
328KB
MD5fee39bef3dd34e9c431554b68642629b
SHA15e95ff87430f05774c89de9d3f454a92d5e06ffc
SHA2569965e3cca96e9ea21cd55d86ccb610a3ef2d6914be244b0afc4651268424bd54
SHA512b8963d022c9def0cd1125af0bea74184073becd840068b669cbc0142c61473be3f23b9d37bbab8f7db2c58d3036effe27131d35ad04e75017b0db9e6face4472
-
Filesize
228KB
MD57782d7254fe3e24955b096e1e1d13421
SHA1f80d998d8aa0668ec2b7b07dce1cb266560244fe
SHA25624009dae2ace697d4a67b1e98933da830655e9d3f9b3a668a4de920d2c5a8ae4
SHA51296900c0baea01c5e3609cc742887432b4b41be2554625b0afcc398bf5ce75d7a61e574a534f02773e12fbda30733379e288fb6c0bdcce764c5149a03e477682e
-
Filesize
184KB
MD5d3827ea8da241194a404bc77efe9d86d
SHA110863af02d955043e3fea69e93624962adb7e3ec
SHA2566fdf666c9dcf1dbb879c8629d6369fd5c07d17fdd367f91aa00039e8fecdb5e3
SHA51207dce343e0468246e653d446741975aca1481244b5d17fea586cb29af1c15e7dffb90418adcbe045fe99f522163a0c3843988384eccc9481d245a73557317531
-
Filesize
284KB
MD5d95b37e3e9dc956905cdf45f960ad52b
SHA12c0de9197dc63069a647ed3d1c0efe688d194e1f
SHA25677644c32281d6d3090551683e74b84c8a7ac343a5da1659eef77514fb04d8697
SHA512cf26c2775c45927a1a8065aa7c5c8df9231b5dc6cbe1683c49a071b4d2c25b9a21bf63c6705b13df6a42686c661c76afd15c20f0a5bf51def05b02d80f85f161
-
Filesize
32KB
MD580705b6c3c2c2509ccc29e97b026ac53
SHA19334dea5aa0ef8bec4d8082995c11f1102bddee7
SHA256de5afc92b2e7c13edcfacdd8901bfd0cd15f92db0bc92e14a6e370bc49082e16
SHA5128c317ccd96d0fc7f80b40a72337aa5ad80c66ceb4ab4ab208ec93e36a433b816d947c925b46b6b0ee626bff53d052c43a5413290737300e7ea4aeecf9e8550c4
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
100KB
MD5e460051d690b8f6e40aeb45c70982c61
SHA194fb74bb1aadbda29538079cf13f1626123f6a4b
SHA2562cd0a82fdb3ea5e1021aafa71452ec9b03cc0976ea967fa88f0aba19dd2cb8db
SHA51281ff8c6cf6b90558afaa7d03e4a7281ec9575f610509a8f0bade0ff3375ae03863a9661d60dc4b062195414ecefa1445d5d7f1a7e857b6b2e0bf939bcef3f1c4
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
4KB
MD547b8151455bc54356bd8eab2d9656dff
SHA1077fce613856628b7144db497c38283d733ff0d1
SHA256ddc0262ecaf411329b7d6b0510696e934f7f15887a9b81084ef3b1d07c7f3824
SHA512fe78e017c856e5de346b781b745fbef32eb265bfe9d33c0d543f412fbc60261535ffb355cd3f52a15f17e235273f386c40d474ef8d40f404dffeb1fbfb610b6b
-
Filesize
1KB
MD5148408d121e247bd4e4cb261b9ccf500
SHA19fb721f9ee33632d54dcefff5a0dcdb6ed034c3a
SHA256de45aef0b31711f4e0975ba5a4e04fcdcbc523a17bc5a9e59f8d7dd7cafb407a
SHA512d5cb7caffecd5bf8e465574483b69c59cf3bf52f9c04bebe2e09bbe71adef237fd59661d7d3bc3d4fa0c9d39128742dde999a39c944ead3f6fb0359bbdcf069e
-
Filesize
617KB
MD51c7aee2e6be910e59fb8edaa632bfc1c
SHA1be41b91512932cfa3eb46ff368e5ca8f26dfa674
SHA25621958cc7a87d9f022dbc1e09da0f93525f94f4fc8c5f686a840a2b28576fc347
SHA512d63b62699e88e6448c2e7eb33530abe004dd93e5ec3a4c933423cadbcb6cbfed33bfc9ae006c8753350e8d0490cb849df0b44403b6f44e5ad77696fbab842791
-
Filesize
1.3MB
MD59bacb9555195a650974bc1eb043d70b3
SHA17b4945c690c05d99a3008f92ac08ff8cfe638d53
SHA25665d004ad52981acf07896e347779e335a438cc6e5be2fa15570050ee846bd457
SHA512bd93e60b295c00520fa3fe7c97cb59a3a1c1bce8b4bc77e8d2f2fa3e962970d3f2748db8dac9971c139d1873297ad491eac6ae9242ddd1abac08d6f3e199d416
-
Filesize
1.3MB
MD59bacb9555195a650974bc1eb043d70b3
SHA17b4945c690c05d99a3008f92ac08ff8cfe638d53
SHA25665d004ad52981acf07896e347779e335a438cc6e5be2fa15570050ee846bd457
SHA512bd93e60b295c00520fa3fe7c97cb59a3a1c1bce8b4bc77e8d2f2fa3e962970d3f2748db8dac9971c139d1873297ad491eac6ae9242ddd1abac08d6f3e199d416
-
Filesize
44KB
MD531827282b83987bf9c8569a2f5876da4
SHA1ef9400e3febba86eaa98d44fb3996626b8ed0402
SHA256b80f269651826ce815cf8db5a9c6fcfd4318864d8dcf8b97902a59239d9c5b1b
SHA512fb66661b22d53ce8194deb6f602a469aa6a40e5ff02b3c30697051393acc8f1ae78259ef4601ae7e4efc6581fbcfb4bfcbfd654a1376752d2c7e688d092ace1d
-
Filesize
617KB
MD51c7aee2e6be910e59fb8edaa632bfc1c
SHA1be41b91512932cfa3eb46ff368e5ca8f26dfa674
SHA25621958cc7a87d9f022dbc1e09da0f93525f94f4fc8c5f686a840a2b28576fc347
SHA512d63b62699e88e6448c2e7eb33530abe004dd93e5ec3a4c933423cadbcb6cbfed33bfc9ae006c8753350e8d0490cb849df0b44403b6f44e5ad77696fbab842791
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
328KB
MD5fee39bef3dd34e9c431554b68642629b
SHA15e95ff87430f05774c89de9d3f454a92d5e06ffc
SHA2569965e3cca96e9ea21cd55d86ccb610a3ef2d6914be244b0afc4651268424bd54
SHA512b8963d022c9def0cd1125af0bea74184073becd840068b669cbc0142c61473be3f23b9d37bbab8f7db2c58d3036effe27131d35ad04e75017b0db9e6face4472
-
Filesize
328KB
MD5fee39bef3dd34e9c431554b68642629b
SHA15e95ff87430f05774c89de9d3f454a92d5e06ffc
SHA2569965e3cca96e9ea21cd55d86ccb610a3ef2d6914be244b0afc4651268424bd54
SHA512b8963d022c9def0cd1125af0bea74184073becd840068b669cbc0142c61473be3f23b9d37bbab8f7db2c58d3036effe27131d35ad04e75017b0db9e6face4472
-
Filesize
228KB
MD57782d7254fe3e24955b096e1e1d13421
SHA1f80d998d8aa0668ec2b7b07dce1cb266560244fe
SHA25624009dae2ace697d4a67b1e98933da830655e9d3f9b3a668a4de920d2c5a8ae4
SHA51296900c0baea01c5e3609cc742887432b4b41be2554625b0afcc398bf5ce75d7a61e574a534f02773e12fbda30733379e288fb6c0bdcce764c5149a03e477682e
-
Filesize
228KB
MD57782d7254fe3e24955b096e1e1d13421
SHA1f80d998d8aa0668ec2b7b07dce1cb266560244fe
SHA25624009dae2ace697d4a67b1e98933da830655e9d3f9b3a668a4de920d2c5a8ae4
SHA51296900c0baea01c5e3609cc742887432b4b41be2554625b0afcc398bf5ce75d7a61e574a534f02773e12fbda30733379e288fb6c0bdcce764c5149a03e477682e
-
Filesize
228KB
MD57782d7254fe3e24955b096e1e1d13421
SHA1f80d998d8aa0668ec2b7b07dce1cb266560244fe
SHA25624009dae2ace697d4a67b1e98933da830655e9d3f9b3a668a4de920d2c5a8ae4
SHA51296900c0baea01c5e3609cc742887432b4b41be2554625b0afcc398bf5ce75d7a61e574a534f02773e12fbda30733379e288fb6c0bdcce764c5149a03e477682e
-
Filesize
228KB
MD57782d7254fe3e24955b096e1e1d13421
SHA1f80d998d8aa0668ec2b7b07dce1cb266560244fe
SHA25624009dae2ace697d4a67b1e98933da830655e9d3f9b3a668a4de920d2c5a8ae4
SHA51296900c0baea01c5e3609cc742887432b4b41be2554625b0afcc398bf5ce75d7a61e574a534f02773e12fbda30733379e288fb6c0bdcce764c5149a03e477682e
-
Filesize
184KB
MD5d3827ea8da241194a404bc77efe9d86d
SHA110863af02d955043e3fea69e93624962adb7e3ec
SHA2566fdf666c9dcf1dbb879c8629d6369fd5c07d17fdd367f91aa00039e8fecdb5e3
SHA51207dce343e0468246e653d446741975aca1481244b5d17fea586cb29af1c15e7dffb90418adcbe045fe99f522163a0c3843988384eccc9481d245a73557317531
-
Filesize
184KB
MD5d3827ea8da241194a404bc77efe9d86d
SHA110863af02d955043e3fea69e93624962adb7e3ec
SHA2566fdf666c9dcf1dbb879c8629d6369fd5c07d17fdd367f91aa00039e8fecdb5e3
SHA51207dce343e0468246e653d446741975aca1481244b5d17fea586cb29af1c15e7dffb90418adcbe045fe99f522163a0c3843988384eccc9481d245a73557317531
-
Filesize
184KB
MD5d3827ea8da241194a404bc77efe9d86d
SHA110863af02d955043e3fea69e93624962adb7e3ec
SHA2566fdf666c9dcf1dbb879c8629d6369fd5c07d17fdd367f91aa00039e8fecdb5e3
SHA51207dce343e0468246e653d446741975aca1481244b5d17fea586cb29af1c15e7dffb90418adcbe045fe99f522163a0c3843988384eccc9481d245a73557317531
-
Filesize
184KB
MD5d3827ea8da241194a404bc77efe9d86d
SHA110863af02d955043e3fea69e93624962adb7e3ec
SHA2566fdf666c9dcf1dbb879c8629d6369fd5c07d17fdd367f91aa00039e8fecdb5e3
SHA51207dce343e0468246e653d446741975aca1481244b5d17fea586cb29af1c15e7dffb90418adcbe045fe99f522163a0c3843988384eccc9481d245a73557317531
-
Filesize
284KB
MD5d95b37e3e9dc956905cdf45f960ad52b
SHA12c0de9197dc63069a647ed3d1c0efe688d194e1f
SHA25677644c32281d6d3090551683e74b84c8a7ac343a5da1659eef77514fb04d8697
SHA512cf26c2775c45927a1a8065aa7c5c8df9231b5dc6cbe1683c49a071b4d2c25b9a21bf63c6705b13df6a42686c661c76afd15c20f0a5bf51def05b02d80f85f161
-
Filesize
284KB
MD5d95b37e3e9dc956905cdf45f960ad52b
SHA12c0de9197dc63069a647ed3d1c0efe688d194e1f
SHA25677644c32281d6d3090551683e74b84c8a7ac343a5da1659eef77514fb04d8697
SHA512cf26c2775c45927a1a8065aa7c5c8df9231b5dc6cbe1683c49a071b4d2c25b9a21bf63c6705b13df6a42686c661c76afd15c20f0a5bf51def05b02d80f85f161
-
Filesize
32KB
MD580705b6c3c2c2509ccc29e97b026ac53
SHA19334dea5aa0ef8bec4d8082995c11f1102bddee7
SHA256de5afc92b2e7c13edcfacdd8901bfd0cd15f92db0bc92e14a6e370bc49082e16
SHA5128c317ccd96d0fc7f80b40a72337aa5ad80c66ceb4ab4ab208ec93e36a433b816d947c925b46b6b0ee626bff53d052c43a5413290737300e7ea4aeecf9e8550c4
-
Filesize
32KB
MD580705b6c3c2c2509ccc29e97b026ac53
SHA19334dea5aa0ef8bec4d8082995c11f1102bddee7
SHA256de5afc92b2e7c13edcfacdd8901bfd0cd15f92db0bc92e14a6e370bc49082e16
SHA5128c317ccd96d0fc7f80b40a72337aa5ad80c66ceb4ab4ab208ec93e36a433b816d947c925b46b6b0ee626bff53d052c43a5413290737300e7ea4aeecf9e8550c4
-
Filesize
32KB
MD580705b6c3c2c2509ccc29e97b026ac53
SHA19334dea5aa0ef8bec4d8082995c11f1102bddee7
SHA256de5afc92b2e7c13edcfacdd8901bfd0cd15f92db0bc92e14a6e370bc49082e16
SHA5128c317ccd96d0fc7f80b40a72337aa5ad80c66ceb4ab4ab208ec93e36a433b816d947c925b46b6b0ee626bff53d052c43a5413290737300e7ea4aeecf9e8550c4
-
Filesize
32KB
MD580705b6c3c2c2509ccc29e97b026ac53
SHA19334dea5aa0ef8bec4d8082995c11f1102bddee7
SHA256de5afc92b2e7c13edcfacdd8901bfd0cd15f92db0bc92e14a6e370bc49082e16
SHA5128c317ccd96d0fc7f80b40a72337aa5ad80c66ceb4ab4ab208ec93e36a433b816d947c925b46b6b0ee626bff53d052c43a5413290737300e7ea4aeecf9e8550c4
-
Filesize
100KB
MD5e460051d690b8f6e40aeb45c70982c61
SHA194fb74bb1aadbda29538079cf13f1626123f6a4b
SHA2562cd0a82fdb3ea5e1021aafa71452ec9b03cc0976ea967fa88f0aba19dd2cb8db
SHA51281ff8c6cf6b90558afaa7d03e4a7281ec9575f610509a8f0bade0ff3375ae03863a9661d60dc4b062195414ecefa1445d5d7f1a7e857b6b2e0bf939bcef3f1c4
-
Filesize
328KB
MD5fee39bef3dd34e9c431554b68642629b
SHA15e95ff87430f05774c89de9d3f454a92d5e06ffc
SHA2569965e3cca96e9ea21cd55d86ccb610a3ef2d6914be244b0afc4651268424bd54
SHA512b8963d022c9def0cd1125af0bea74184073becd840068b669cbc0142c61473be3f23b9d37bbab8f7db2c58d3036effe27131d35ad04e75017b0db9e6face4472
-
Filesize
284KB
MD5d95b37e3e9dc956905cdf45f960ad52b
SHA12c0de9197dc63069a647ed3d1c0efe688d194e1f
SHA25677644c32281d6d3090551683e74b84c8a7ac343a5da1659eef77514fb04d8697
SHA512cf26c2775c45927a1a8065aa7c5c8df9231b5dc6cbe1683c49a071b4d2c25b9a21bf63c6705b13df6a42686c661c76afd15c20f0a5bf51def05b02d80f85f161
-
Filesize
92KB
MD5e00c2f7efecd058b92bf6d35e4f2fc15
SHA19b83b10e3f0db4e3959aa242fc189e9a2c629a14
SHA2563ffa51c3f8f2d9dfc21e78fc0b3ade9b293ac2b0c5b396f9cb6fc2c03934e8af
SHA512a0edb221f63f106fea828c52b864a64aad13022f3a1d16441c41afb03e689ef0dce80743251fdcf9b87560c9ed72635f5c72674e22daa19717299f86bf5344b9
-
Filesize
44KB
MD531827282b83987bf9c8569a2f5876da4
SHA1ef9400e3febba86eaa98d44fb3996626b8ed0402
SHA256b80f269651826ce815cf8db5a9c6fcfd4318864d8dcf8b97902a59239d9c5b1b
SHA512fb66661b22d53ce8194deb6f602a469aa6a40e5ff02b3c30697051393acc8f1ae78259ef4601ae7e4efc6581fbcfb4bfcbfd654a1376752d2c7e688d092ace1d