Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3Installer(...up.exe
windows7-x64
7Installer(...up.exe
windows10-2004-x64
7Surveillan...em.msi
windows7-x64
7Surveillan...em.msi
windows10-2004-x64
7Surveillan...al.pdf
windows7-x64
1Surveillan...al.pdf
windows10-2004-x64
1Surveillan...up.exe
windows7-x64
7Surveillan...up.exe
windows10-2004-x64
7Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
08/10/2023, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
Installer(1.5)_2005-09-27/setup.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Installer(1.5)_2005-09-27/setup.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Surveillance System(1.1.00052)_2005-09-28/Surveillance System.msi
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Surveillance System(1.1.00052)_2005-09-28/Surveillance System.msi
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
Surveillance System(1.1.00052)_2005-09-28/UserManual.pdf
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Surveillance System(1.1.00052)_2005-09-28/UserManual.pdf
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
Surveillance System(1.1.00052)_2005-09-28/setup.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Surveillance System(1.1.00052)_2005-09-28/setup.exe
Resource
win10v2004-20230915-en
General
-
Target
Surveillance System(1.1.00052)_2005-09-28/setup.exe
-
Size
4.2MB
-
MD5
54a28f6c3ed2532ef77a173a67c43ecf
-
SHA1
284d3423cacc3ddc66c4dfdf703c23e0fd0a8f78
-
SHA256
170f2f2e690e933713d22edd6527b9b5aff81466ac6b01aa4427dfd0b6b34c8f
-
SHA512
294e2e7bdd16a8724bf1c0861482eaa1b172972c89ab68b9ce613be9df6d4c0b30a9cf5eae19fbd0ed48ff293d011994852366861d31b06975baf445b080e4fb
-
SSDEEP
98304:ZS6pGb1FLqQF6dWry//DthQiooP2qDAN0mVgSxa872avkRu4t4JQ:s6pA1oMuWr45hrr2imVf72aL4t/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2248 IDriver.exe 664 IDriver.exe -
Loads dropped DLL 31 IoCs
pid Process 2548 MsiExec.exe 2548 MsiExec.exe 2548 MsiExec.exe 2548 MsiExec.exe 2548 MsiExec.exe 2548 MsiExec.exe 2548 MsiExec.exe 2548 MsiExec.exe 2548 MsiExec.exe 2548 MsiExec.exe 2548 MsiExec.exe 2548 MsiExec.exe 2248 IDriver.exe 2248 IDriver.exe 2248 IDriver.exe 2548 MsiExec.exe 2548 MsiExec.exe 2548 MsiExec.exe 664 IDriver.exe 664 IDriver.exe 664 IDriver.exe 1440 MsiExec.exe 1440 MsiExec.exe 1440 MsiExec.exe 664 IDriver.exe 664 IDriver.exe 664 IDriver.exe 664 IDriver.exe 664 IDriver.exe 664 IDriver.exe 664 IDriver.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2720 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: IDriver.exe File opened (read-only) \??\V: IDriver.exe File opened (read-only) \??\R: IDriver.exe File opened (read-only) \??\T: IDriver.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: IDriver.exe File opened (read-only) \??\P: IDriver.exe File opened (read-only) \??\Y: IDriver.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\O: IDriver.exe File opened (read-only) \??\J: IDriver.exe File opened (read-only) \??\M: IDriver.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: IDriver.exe File opened (read-only) \??\H: IDriver.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\B: IDriver.exe File opened (read-only) \??\S: IDriver.exe File opened (read-only) \??\W: IDriver.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Q: IDriver.exe File opened (read-only) \??\X: IDriver.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: IDriver.exe File opened (read-only) \??\E: IDriver.exe File opened (read-only) \??\N: IDriver.exe File opened (read-only) \??\U: IDriver.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: IDriver.exe File opened (read-only) \??\Z: IDriver.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\InstallShield\Driver\7\Intel 32\_ISRES1033.dll msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\7\Intel 32\IDriver.exe msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\7\Intel 32\objps7.dll msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\7\Intel 32\IUser7.dll msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\7\Intel 32\IScript7.dll msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\7\Intel 32\ISRT.dll msiexec.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI7748.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI77B7.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\f766a95.msi msiexec.exe File created C:\Windows\Installer\f766a99.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\f766a99.ipi msiexec.exe File opened for modification C:\Windows\Installer\f766a95.msi msiexec.exe File created C:\Windows\Installer\f766a96.mst msiexec.exe File opened for modification C:\Windows\Installer\f766a96.mst msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 52 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2e\52C64B7E DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2E\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2E\52C64B7E\@%SystemRoot%\System32\fveui.dll,-843 = "BitLocker Drive Encryption" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2E\52C64B7E\@%SystemRoot%\system32\p2pcollab.dll,-8042 = "Peer to Peer Trust" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2E\52C64B7E\@%SystemRoot%\system32\qagentrt.dll,-10 = "System Health Authentication" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2E\52C64B7E\@%SystemRoot%\System32\fveui.dll,-844 = "BitLocker Data Recovery Agent" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2E\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B9F0-D11F-11D4-AB83-00B0D02332EB} IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9EC-D11F-11D4-AB83-00B0D02332EB} IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89FE-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\ = "{3147B9F7-D11F-11D4-AB83-00B0D02332EB}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89FF-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9A9-D11F-11D4-AB83-00B0D02332EB}\TypeLib\ = "{3147B9F7-D11F-11D4-AB83-00B0D02332EB}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5F13E632-D79E-11D4-AB87-00B0D02332EB}\ = "IInstallDriverStringTable" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{777C8A05-5C36-11D5-ABAF-00B0D02332EB}\InProcServer32\ThreadingModel = "Both" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89F1-5C36-11D5-ABAF-00B0D02332EB} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89F1-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32\ = "{777C8A05-5C36-11D5-ABAF-00B0D02332EB}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IPW.ScriptEngine\ = "InstallShield Script Engine" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ISInstallDriver.InstallDriver\CLSID\ = "{A52D1D8E-BCCA-11D4-AB7D-00B0D02332EB}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89F9-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\Version = "1.0" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F13E632-D79E-11D4-AB87-00B0D02332EB} IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C8A0E-5C36-11D5-ABAF-00B0D02332EB}\ = "ISetupMainWindow3" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89EE-5C36-11D5-ABAF-00B0D02332EB} IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89F8-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\ = "{777C8A14-5C36-11D5-ABAF-00B0D02332EB}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C8A02-5C36-11D5-ABAF-00B0D02332EB}\ = "ISetupTransferEvents2" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89FC-5C36-11D5-ABAF-00B0D02332EB} IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9B2-D11F-11D4-AB83-00B0D02332EB}\TypeLib IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B99D-D11F-11D4-AB83-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A0D-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C8A01-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\Version = "1.0" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89F9-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\ = "{3147B9F7-D11F-11D4-AB83-00B0D02332EB}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9E0-D11F-11D4-AB83-00B0D02332EB} IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89F6-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B984-D11F-11D4-AB83-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C8A10-5C36-11D5-ABAF-00B0D02332EB} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89FB-5C36-11D5-ABAF-00B0D02332EB}\ = "ISetupFeatures" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B9C1-D11F-11D4-AB83-00B0D02332EB}\ProxyStubClsid32 IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A01-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32 IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B9E6-D11F-11D4-AB83-00B0D02332EB}\TypeLib\Version = "1.0" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89F8-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32 IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A02-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\ = "{3147B9F7-D11F-11D4-AB83-00B0D02332EB}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B9A9-D11F-11D4-AB83-00B0D02332EB}\ProxyStubClsid32 IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F13E632-D79E-11D4-AB87-00B0D02332EB}\TypeLib\Version = "1.0" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89E2-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A0E-5C36-11D5-ABAF-00B0D02332EB} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C8A07-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\Version = "1.0" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9CA-D11F-11D4-AB83-00B0D02332EB}\ = "ISetupShell" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89E2-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\ = "{777C89DE-5C36-11D5-ABAF-00B0D02332EB}" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B9E6-D11F-11D4-AB83-00B0D02332EB}\TypeLib IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89F3-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\ = "{3147B9F7-D11F-11D4-AB83-00B0D02332EB}" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89FC-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A0C-5C36-11D5-ABAF-00B0D02332EB} MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A0F-5C36-11D5-ABAF-00B0D02332EB}\TypeLib MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3147B9F7-D11F-11D4-AB83-00B0D02332EB}\1.0\ = "InstallShield Windows Installer Setup Kernel 1.0 Type Library" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B9B2-D11F-11D4-AB83-00B0D02332EB} IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9C1-D11F-11D4-AB83-00B0D02332EB}\TypeLib\Version = "1.0" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{777C89DE-5C36-11D5-ABAF-00B0D02332EB}\1.0 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C8A10-5C36-11D5-ABAF-00B0D02332EB} MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ISInstallDriver.InstallDriver.1\CLSID IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89ED-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32 IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9AE-D11F-11D4-AB83-00B0D02332EB}\ProxyStubClsid32 IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B9F0-D11F-11D4-AB83-00B0D02332EB}\TypeLib\Version = "1.0" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89FD-5C36-11D5-ABAF-00B0D02332EB} IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B989-D11F-11D4-AB83-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3147B9BC-D11F-11D4-AB83-00B0D02332EB}\TypeLib IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89E8-5C36-11D5-ABAF-00B0D02332EB}\TypeLib MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{99BDE2B6-D79E-11D4-AB87-00B0D02332EB}\ProgID\ = "ISInstallDriver.StringTable.1" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{777C89EB-5C36-11D5-ABAF-00B0D02332EB}\TypeLib\ = "{3147B9F7-D11F-11D4-AB83-00B0D02332EB}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IPW.ScriptEngine.1\CLSID MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B9B2-D11F-11D4-AB83-00B0D02332EB}\TypeLib\Version = "1.0" IDriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3147B984-D11F-11D4-AB83-00B0D02332EB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDriver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{777C89E9-5C36-11D5-ABAF-00B0D02332EB}\ProxyStubClsid32 IDriver.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2720 msiexec.exe 2720 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1248 setup.exe Token: SeIncreaseQuotaPrivilege 1248 setup.exe Token: SeRestorePrivilege 2720 msiexec.exe Token: SeTakeOwnershipPrivilege 2720 msiexec.exe Token: SeSecurityPrivilege 2720 msiexec.exe Token: SeCreateTokenPrivilege 1248 setup.exe Token: SeAssignPrimaryTokenPrivilege 1248 setup.exe Token: SeLockMemoryPrivilege 1248 setup.exe Token: SeIncreaseQuotaPrivilege 1248 setup.exe Token: SeMachineAccountPrivilege 1248 setup.exe Token: SeTcbPrivilege 1248 setup.exe Token: SeSecurityPrivilege 1248 setup.exe Token: SeTakeOwnershipPrivilege 1248 setup.exe Token: SeLoadDriverPrivilege 1248 setup.exe Token: SeSystemProfilePrivilege 1248 setup.exe Token: SeSystemtimePrivilege 1248 setup.exe Token: SeProfSingleProcessPrivilege 1248 setup.exe Token: SeIncBasePriorityPrivilege 1248 setup.exe Token: SeCreatePagefilePrivilege 1248 setup.exe Token: SeCreatePermanentPrivilege 1248 setup.exe Token: SeBackupPrivilege 1248 setup.exe Token: SeRestorePrivilege 1248 setup.exe Token: SeShutdownPrivilege 1248 setup.exe Token: SeDebugPrivilege 1248 setup.exe Token: SeAuditPrivilege 1248 setup.exe Token: SeSystemEnvironmentPrivilege 1248 setup.exe Token: SeChangeNotifyPrivilege 1248 setup.exe Token: SeRemoteShutdownPrivilege 1248 setup.exe Token: SeUndockPrivilege 1248 setup.exe Token: SeSyncAgentPrivilege 1248 setup.exe Token: SeEnableDelegationPrivilege 1248 setup.exe Token: SeManageVolumePrivilege 1248 setup.exe Token: SeImpersonatePrivilege 1248 setup.exe Token: SeCreateGlobalPrivilege 1248 setup.exe Token: SeRestorePrivilege 2720 msiexec.exe Token: SeTakeOwnershipPrivilege 2720 msiexec.exe Token: SeRestorePrivilege 2720 msiexec.exe Token: SeTakeOwnershipPrivilege 2720 msiexec.exe Token: SeRestorePrivilege 2720 msiexec.exe Token: SeTakeOwnershipPrivilege 2720 msiexec.exe Token: SeRestorePrivilege 2720 msiexec.exe Token: SeTakeOwnershipPrivilege 2720 msiexec.exe Token: SeRestorePrivilege 2720 msiexec.exe Token: SeTakeOwnershipPrivilege 2720 msiexec.exe Token: SeRestorePrivilege 2720 msiexec.exe Token: SeTakeOwnershipPrivilege 2720 msiexec.exe Token: SeCreateTokenPrivilege 664 IDriver.exe Token: SeAssignPrimaryTokenPrivilege 664 IDriver.exe Token: SeLockMemoryPrivilege 664 IDriver.exe Token: SeIncreaseQuotaPrivilege 664 IDriver.exe Token: SeMachineAccountPrivilege 664 IDriver.exe Token: SeTcbPrivilege 664 IDriver.exe Token: SeSecurityPrivilege 664 IDriver.exe Token: SeTakeOwnershipPrivilege 664 IDriver.exe Token: SeLoadDriverPrivilege 664 IDriver.exe Token: SeSystemProfilePrivilege 664 IDriver.exe Token: SeSystemtimePrivilege 664 IDriver.exe Token: SeProfSingleProcessPrivilege 664 IDriver.exe Token: SeIncBasePriorityPrivilege 664 IDriver.exe Token: SeCreatePagefilePrivilege 664 IDriver.exe Token: SeCreatePermanentPrivilege 664 IDriver.exe Token: SeBackupPrivilege 664 IDriver.exe Token: SeRestorePrivilege 664 IDriver.exe Token: SeShutdownPrivilege 664 IDriver.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2548 2720 msiexec.exe 29 PID 2720 wrote to memory of 2548 2720 msiexec.exe 29 PID 2720 wrote to memory of 2548 2720 msiexec.exe 29 PID 2720 wrote to memory of 2548 2720 msiexec.exe 29 PID 2720 wrote to memory of 2548 2720 msiexec.exe 29 PID 2720 wrote to memory of 2548 2720 msiexec.exe 29 PID 2720 wrote to memory of 2548 2720 msiexec.exe 29 PID 2548 wrote to memory of 2248 2548 MsiExec.exe 30 PID 2548 wrote to memory of 2248 2548 MsiExec.exe 30 PID 2548 wrote to memory of 2248 2548 MsiExec.exe 30 PID 2548 wrote to memory of 2248 2548 MsiExec.exe 30 PID 2548 wrote to memory of 2248 2548 MsiExec.exe 30 PID 2548 wrote to memory of 2248 2548 MsiExec.exe 30 PID 2548 wrote to memory of 2248 2548 MsiExec.exe 30 PID 2720 wrote to memory of 1440 2720 msiexec.exe 32 PID 2720 wrote to memory of 1440 2720 msiexec.exe 32 PID 2720 wrote to memory of 1440 2720 msiexec.exe 32 PID 2720 wrote to memory of 1440 2720 msiexec.exe 32 PID 2720 wrote to memory of 1440 2720 msiexec.exe 32 PID 2720 wrote to memory of 1440 2720 msiexec.exe 32 PID 2720 wrote to memory of 1440 2720 msiexec.exe 32 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Surveillance System(1.1.00052)_2005-09-28\setup.exe"C:\Users\Admin\AppData\Local\Temp\Surveillance System(1.1.00052)_2005-09-28\setup.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DCA85F9FA199B2D0514E29D922DFA024 M Global\MSI00002⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Common Files\InstallShield\Driver\7\Intel 32\IDriver.exe"C:\Program Files (x86)\Common Files\InstallShield\Driver\7\Intel 32\IDriver.exe" /RegServer3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2248
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 241BD089C2E3D0C040341CF5265E5E6E C2⤵
- Loads dropped DLL
PID:1440
-
-
C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\7\INTEL3~1\IDriver.exeC:\PROGRA~2\COMMON~1\INSTAL~1\Driver\7\INTEL3~1\IDriver.exe -Embedding1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:664
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1252
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000494" "000000000000058C"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a2ce7729e6649e48761db712a76979f4
SHA1e297b746add2207ea5951b4a1d102d16e8d77d6e
SHA256b5ff83f9f4e71895e11f103baeba3f85b1d497cadddc83eceeb3d03446355ee1
SHA512397099af5437b72a3dd963665b2b09113431e5f7d9b7e3748eaef21b699c0c371e7a7158fa62f1e9c869cc10450a67e4ab1b330da6ee672d4d63cdc523f3f4c4
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
328KB
MD5fee39bef3dd34e9c431554b68642629b
SHA15e95ff87430f05774c89de9d3f454a92d5e06ffc
SHA2569965e3cca96e9ea21cd55d86ccb610a3ef2d6914be244b0afc4651268424bd54
SHA512b8963d022c9def0cd1125af0bea74184073becd840068b669cbc0142c61473be3f23b9d37bbab8f7db2c58d3036effe27131d35ad04e75017b0db9e6face4472
-
Filesize
228KB
MD57782d7254fe3e24955b096e1e1d13421
SHA1f80d998d8aa0668ec2b7b07dce1cb266560244fe
SHA25624009dae2ace697d4a67b1e98933da830655e9d3f9b3a668a4de920d2c5a8ae4
SHA51296900c0baea01c5e3609cc742887432b4b41be2554625b0afcc398bf5ce75d7a61e574a534f02773e12fbda30733379e288fb6c0bdcce764c5149a03e477682e
-
Filesize
184KB
MD5d3827ea8da241194a404bc77efe9d86d
SHA110863af02d955043e3fea69e93624962adb7e3ec
SHA2566fdf666c9dcf1dbb879c8629d6369fd5c07d17fdd367f91aa00039e8fecdb5e3
SHA51207dce343e0468246e653d446741975aca1481244b5d17fea586cb29af1c15e7dffb90418adcbe045fe99f522163a0c3843988384eccc9481d245a73557317531
-
Filesize
284KB
MD5d95b37e3e9dc956905cdf45f960ad52b
SHA12c0de9197dc63069a647ed3d1c0efe688d194e1f
SHA25677644c32281d6d3090551683e74b84c8a7ac343a5da1659eef77514fb04d8697
SHA512cf26c2775c45927a1a8065aa7c5c8df9231b5dc6cbe1683c49a071b4d2c25b9a21bf63c6705b13df6a42686c661c76afd15c20f0a5bf51def05b02d80f85f161
-
Filesize
32KB
MD580705b6c3c2c2509ccc29e97b026ac53
SHA19334dea5aa0ef8bec4d8082995c11f1102bddee7
SHA256de5afc92b2e7c13edcfacdd8901bfd0cd15f92db0bc92e14a6e370bc49082e16
SHA5128c317ccd96d0fc7f80b40a72337aa5ad80c66ceb4ab4ab208ec93e36a433b816d947c925b46b6b0ee626bff53d052c43a5413290737300e7ea4aeecf9e8550c4
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
100KB
MD5e460051d690b8f6e40aeb45c70982c61
SHA194fb74bb1aadbda29538079cf13f1626123f6a4b
SHA2562cd0a82fdb3ea5e1021aafa71452ec9b03cc0976ea967fa88f0aba19dd2cb8db
SHA51281ff8c6cf6b90558afaa7d03e4a7281ec9575f610509a8f0bade0ff3375ae03863a9661d60dc4b062195414ecefa1445d5d7f1a7e857b6b2e0bf939bcef3f1c4
-
Filesize
48KB
MD5c209dd150a489095a8045713bac02e79
SHA18a52231cf700b5bd510a983247d14000ebb46db3
SHA2569abfb56f541ab153997cf4d99a7ec2be237c1a753e9b0a4b319fd262508b5211
SHA51273ee4b617a7dcb6f616ac115eb5037c16e462ef3dbe178c9ed3fa9091938b31c1c98606f659f882bae9eae53bdbe83298e4f4ec3f58b7a080d9b51ff52f41cd3
-
Filesize
48KB
MD5c209dd150a489095a8045713bac02e79
SHA18a52231cf700b5bd510a983247d14000ebb46db3
SHA2569abfb56f541ab153997cf4d99a7ec2be237c1a753e9b0a4b319fd262508b5211
SHA51273ee4b617a7dcb6f616ac115eb5037c16e462ef3dbe178c9ed3fa9091938b31c1c98606f659f882bae9eae53bdbe83298e4f4ec3f58b7a080d9b51ff52f41cd3
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
4KB
MD547b8151455bc54356bd8eab2d9656dff
SHA1077fce613856628b7144db497c38283d733ff0d1
SHA256ddc0262ecaf411329b7d6b0510696e934f7f15887a9b81084ef3b1d07c7f3824
SHA512fe78e017c856e5de346b781b745fbef32eb265bfe9d33c0d543f412fbc60261535ffb355cd3f52a15f17e235273f386c40d474ef8d40f404dffeb1fbfb610b6b
-
Filesize
1KB
MD5fb7456eabdf8f3b4f43fbddb0634e0e0
SHA102a138f44cac2d4503fe8fc032b053706a9db2cd
SHA25629e54e9f94761e1e3154be60017046b3bf633eca6bc12319d3ca39caf1e700f0
SHA512cc39d9df5b49cc56923767d995b4e2e3be1abc5c357becd4a6c4822c2d550cb1d5c333c29ab93e4a09baf3cd5e6ec3b1c705ac1ec7072d18cc82e5e9ee9e321d
-
Filesize
617KB
MD51c7aee2e6be910e59fb8edaa632bfc1c
SHA1be41b91512932cfa3eb46ff368e5ca8f26dfa674
SHA25621958cc7a87d9f022dbc1e09da0f93525f94f4fc8c5f686a840a2b28576fc347
SHA512d63b62699e88e6448c2e7eb33530abe004dd93e5ec3a4c933423cadbcb6cbfed33bfc9ae006c8753350e8d0490cb849df0b44403b6f44e5ad77696fbab842791
-
Filesize
128KB
MD5a87e0cf9a36428d638f6ef507f326622
SHA1bb801af37b0da0f5a901ec50c86c40e2af5c47d0
SHA256cef057742b36eb078c7520ce4345ab1632a8511ebf9d9c44fa27cf5d0b9c2b9a
SHA512b7691c4af2f3d678c4b65203c8316043d15885fbeb5c42e6de820748f14e1146ba2e1af740e011817f1fba0e5e8be8b8427ecbbf3e189409571cfcb3a665d27c
-
Filesize
44KB
MD531827282b83987bf9c8569a2f5876da4
SHA1ef9400e3febba86eaa98d44fb3996626b8ed0402
SHA256b80f269651826ce815cf8db5a9c6fcfd4318864d8dcf8b97902a59239d9c5b1b
SHA512fb66661b22d53ce8194deb6f602a469aa6a40e5ff02b3c30697051393acc8f1ae78259ef4601ae7e4efc6581fbcfb4bfcbfd654a1376752d2c7e688d092ace1d
-
Filesize
617KB
MD51c7aee2e6be910e59fb8edaa632bfc1c
SHA1be41b91512932cfa3eb46ff368e5ca8f26dfa674
SHA25621958cc7a87d9f022dbc1e09da0f93525f94f4fc8c5f686a840a2b28576fc347
SHA512d63b62699e88e6448c2e7eb33530abe004dd93e5ec3a4c933423cadbcb6cbfed33bfc9ae006c8753350e8d0490cb849df0b44403b6f44e5ad77696fbab842791
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
604KB
MD5039c11d10ccd52d30310a82f385c1357
SHA17add75a8aae843a2bb0d874a8438163b7d91e913
SHA256231a026cfed89765db7f37bd382e7fead8a66989395b1d00f434d1a4f598b04c
SHA512cb3291c3909f3dfc4066480d5f8db5ba82f64abaecedd06d33e153bffd237cdc2ae9976d8d452d4e97f88e15156266b866ab99355129239910c4c2a906f42875
-
Filesize
328KB
MD5fee39bef3dd34e9c431554b68642629b
SHA15e95ff87430f05774c89de9d3f454a92d5e06ffc
SHA2569965e3cca96e9ea21cd55d86ccb610a3ef2d6914be244b0afc4651268424bd54
SHA512b8963d022c9def0cd1125af0bea74184073becd840068b669cbc0142c61473be3f23b9d37bbab8f7db2c58d3036effe27131d35ad04e75017b0db9e6face4472
-
Filesize
328KB
MD5fee39bef3dd34e9c431554b68642629b
SHA15e95ff87430f05774c89de9d3f454a92d5e06ffc
SHA2569965e3cca96e9ea21cd55d86ccb610a3ef2d6914be244b0afc4651268424bd54
SHA512b8963d022c9def0cd1125af0bea74184073becd840068b669cbc0142c61473be3f23b9d37bbab8f7db2c58d3036effe27131d35ad04e75017b0db9e6face4472
-
Filesize
228KB
MD57782d7254fe3e24955b096e1e1d13421
SHA1f80d998d8aa0668ec2b7b07dce1cb266560244fe
SHA25624009dae2ace697d4a67b1e98933da830655e9d3f9b3a668a4de920d2c5a8ae4
SHA51296900c0baea01c5e3609cc742887432b4b41be2554625b0afcc398bf5ce75d7a61e574a534f02773e12fbda30733379e288fb6c0bdcce764c5149a03e477682e
-
Filesize
228KB
MD57782d7254fe3e24955b096e1e1d13421
SHA1f80d998d8aa0668ec2b7b07dce1cb266560244fe
SHA25624009dae2ace697d4a67b1e98933da830655e9d3f9b3a668a4de920d2c5a8ae4
SHA51296900c0baea01c5e3609cc742887432b4b41be2554625b0afcc398bf5ce75d7a61e574a534f02773e12fbda30733379e288fb6c0bdcce764c5149a03e477682e
-
Filesize
228KB
MD57782d7254fe3e24955b096e1e1d13421
SHA1f80d998d8aa0668ec2b7b07dce1cb266560244fe
SHA25624009dae2ace697d4a67b1e98933da830655e9d3f9b3a668a4de920d2c5a8ae4
SHA51296900c0baea01c5e3609cc742887432b4b41be2554625b0afcc398bf5ce75d7a61e574a534f02773e12fbda30733379e288fb6c0bdcce764c5149a03e477682e
-
Filesize
228KB
MD57782d7254fe3e24955b096e1e1d13421
SHA1f80d998d8aa0668ec2b7b07dce1cb266560244fe
SHA25624009dae2ace697d4a67b1e98933da830655e9d3f9b3a668a4de920d2c5a8ae4
SHA51296900c0baea01c5e3609cc742887432b4b41be2554625b0afcc398bf5ce75d7a61e574a534f02773e12fbda30733379e288fb6c0bdcce764c5149a03e477682e
-
Filesize
184KB
MD5d3827ea8da241194a404bc77efe9d86d
SHA110863af02d955043e3fea69e93624962adb7e3ec
SHA2566fdf666c9dcf1dbb879c8629d6369fd5c07d17fdd367f91aa00039e8fecdb5e3
SHA51207dce343e0468246e653d446741975aca1481244b5d17fea586cb29af1c15e7dffb90418adcbe045fe99f522163a0c3843988384eccc9481d245a73557317531
-
Filesize
184KB
MD5d3827ea8da241194a404bc77efe9d86d
SHA110863af02d955043e3fea69e93624962adb7e3ec
SHA2566fdf666c9dcf1dbb879c8629d6369fd5c07d17fdd367f91aa00039e8fecdb5e3
SHA51207dce343e0468246e653d446741975aca1481244b5d17fea586cb29af1c15e7dffb90418adcbe045fe99f522163a0c3843988384eccc9481d245a73557317531
-
Filesize
184KB
MD5d3827ea8da241194a404bc77efe9d86d
SHA110863af02d955043e3fea69e93624962adb7e3ec
SHA2566fdf666c9dcf1dbb879c8629d6369fd5c07d17fdd367f91aa00039e8fecdb5e3
SHA51207dce343e0468246e653d446741975aca1481244b5d17fea586cb29af1c15e7dffb90418adcbe045fe99f522163a0c3843988384eccc9481d245a73557317531
-
Filesize
184KB
MD5d3827ea8da241194a404bc77efe9d86d
SHA110863af02d955043e3fea69e93624962adb7e3ec
SHA2566fdf666c9dcf1dbb879c8629d6369fd5c07d17fdd367f91aa00039e8fecdb5e3
SHA51207dce343e0468246e653d446741975aca1481244b5d17fea586cb29af1c15e7dffb90418adcbe045fe99f522163a0c3843988384eccc9481d245a73557317531
-
Filesize
284KB
MD5d95b37e3e9dc956905cdf45f960ad52b
SHA12c0de9197dc63069a647ed3d1c0efe688d194e1f
SHA25677644c32281d6d3090551683e74b84c8a7ac343a5da1659eef77514fb04d8697
SHA512cf26c2775c45927a1a8065aa7c5c8df9231b5dc6cbe1683c49a071b4d2c25b9a21bf63c6705b13df6a42686c661c76afd15c20f0a5bf51def05b02d80f85f161
-
Filesize
284KB
MD5d95b37e3e9dc956905cdf45f960ad52b
SHA12c0de9197dc63069a647ed3d1c0efe688d194e1f
SHA25677644c32281d6d3090551683e74b84c8a7ac343a5da1659eef77514fb04d8697
SHA512cf26c2775c45927a1a8065aa7c5c8df9231b5dc6cbe1683c49a071b4d2c25b9a21bf63c6705b13df6a42686c661c76afd15c20f0a5bf51def05b02d80f85f161
-
Filesize
32KB
MD580705b6c3c2c2509ccc29e97b026ac53
SHA19334dea5aa0ef8bec4d8082995c11f1102bddee7
SHA256de5afc92b2e7c13edcfacdd8901bfd0cd15f92db0bc92e14a6e370bc49082e16
SHA5128c317ccd96d0fc7f80b40a72337aa5ad80c66ceb4ab4ab208ec93e36a433b816d947c925b46b6b0ee626bff53d052c43a5413290737300e7ea4aeecf9e8550c4
-
Filesize
32KB
MD580705b6c3c2c2509ccc29e97b026ac53
SHA19334dea5aa0ef8bec4d8082995c11f1102bddee7
SHA256de5afc92b2e7c13edcfacdd8901bfd0cd15f92db0bc92e14a6e370bc49082e16
SHA5128c317ccd96d0fc7f80b40a72337aa5ad80c66ceb4ab4ab208ec93e36a433b816d947c925b46b6b0ee626bff53d052c43a5413290737300e7ea4aeecf9e8550c4
-
Filesize
32KB
MD580705b6c3c2c2509ccc29e97b026ac53
SHA19334dea5aa0ef8bec4d8082995c11f1102bddee7
SHA256de5afc92b2e7c13edcfacdd8901bfd0cd15f92db0bc92e14a6e370bc49082e16
SHA5128c317ccd96d0fc7f80b40a72337aa5ad80c66ceb4ab4ab208ec93e36a433b816d947c925b46b6b0ee626bff53d052c43a5413290737300e7ea4aeecf9e8550c4
-
Filesize
32KB
MD580705b6c3c2c2509ccc29e97b026ac53
SHA19334dea5aa0ef8bec4d8082995c11f1102bddee7
SHA256de5afc92b2e7c13edcfacdd8901bfd0cd15f92db0bc92e14a6e370bc49082e16
SHA5128c317ccd96d0fc7f80b40a72337aa5ad80c66ceb4ab4ab208ec93e36a433b816d947c925b46b6b0ee626bff53d052c43a5413290737300e7ea4aeecf9e8550c4
-
Filesize
100KB
MD5e460051d690b8f6e40aeb45c70982c61
SHA194fb74bb1aadbda29538079cf13f1626123f6a4b
SHA2562cd0a82fdb3ea5e1021aafa71452ec9b03cc0976ea967fa88f0aba19dd2cb8db
SHA51281ff8c6cf6b90558afaa7d03e4a7281ec9575f610509a8f0bade0ff3375ae03863a9661d60dc4b062195414ecefa1445d5d7f1a7e857b6b2e0bf939bcef3f1c4
-
Filesize
48KB
MD5c209dd150a489095a8045713bac02e79
SHA18a52231cf700b5bd510a983247d14000ebb46db3
SHA2569abfb56f541ab153997cf4d99a7ec2be237c1a753e9b0a4b319fd262508b5211
SHA51273ee4b617a7dcb6f616ac115eb5037c16e462ef3dbe178c9ed3fa9091938b31c1c98606f659f882bae9eae53bdbe83298e4f4ec3f58b7a080d9b51ff52f41cd3
-
Filesize
48KB
MD5c209dd150a489095a8045713bac02e79
SHA18a52231cf700b5bd510a983247d14000ebb46db3
SHA2569abfb56f541ab153997cf4d99a7ec2be237c1a753e9b0a4b319fd262508b5211
SHA51273ee4b617a7dcb6f616ac115eb5037c16e462ef3dbe178c9ed3fa9091938b31c1c98606f659f882bae9eae53bdbe83298e4f4ec3f58b7a080d9b51ff52f41cd3
-
Filesize
328KB
MD5fee39bef3dd34e9c431554b68642629b
SHA15e95ff87430f05774c89de9d3f454a92d5e06ffc
SHA2569965e3cca96e9ea21cd55d86ccb610a3ef2d6914be244b0afc4651268424bd54
SHA512b8963d022c9def0cd1125af0bea74184073becd840068b669cbc0142c61473be3f23b9d37bbab8f7db2c58d3036effe27131d35ad04e75017b0db9e6face4472
-
Filesize
128KB
MD5a87e0cf9a36428d638f6ef507f326622
SHA1bb801af37b0da0f5a901ec50c86c40e2af5c47d0
SHA256cef057742b36eb078c7520ce4345ab1632a8511ebf9d9c44fa27cf5d0b9c2b9a
SHA512b7691c4af2f3d678c4b65203c8316043d15885fbeb5c42e6de820748f14e1146ba2e1af740e011817f1fba0e5e8be8b8427ecbbf3e189409571cfcb3a665d27c
-
Filesize
284KB
MD5d95b37e3e9dc956905cdf45f960ad52b
SHA12c0de9197dc63069a647ed3d1c0efe688d194e1f
SHA25677644c32281d6d3090551683e74b84c8a7ac343a5da1659eef77514fb04d8697
SHA512cf26c2775c45927a1a8065aa7c5c8df9231b5dc6cbe1683c49a071b4d2c25b9a21bf63c6705b13df6a42686c661c76afd15c20f0a5bf51def05b02d80f85f161
-
Filesize
12KB
MD558d4b7377c738892aecbf934cecebfb5
SHA1da361698f14b7a295556edcc098decda568d2dcd
SHA256768cdb313a0b46ddc18487c1606f42d6fe5105b55a3eb5ab979be4305295d953
SHA5124e216306d4736db848ec75ed02b66fd7a85e4efd81b59820cc2cd5e5bf3e2313734dd687e7d23840ad26567d6800bdea82b0dee8ba59e2b6b6d1af1ac3f70cd6
-
Filesize
44KB
MD531827282b83987bf9c8569a2f5876da4
SHA1ef9400e3febba86eaa98d44fb3996626b8ed0402
SHA256b80f269651826ce815cf8db5a9c6fcfd4318864d8dcf8b97902a59239d9c5b1b
SHA512fb66661b22d53ce8194deb6f602a469aa6a40e5ff02b3c30697051393acc8f1ae78259ef4601ae7e4efc6581fbcfb4bfcbfd654a1376752d2c7e688d092ace1d