Resubmissions
19/02/2024, 12:51
240219-p3xzdadd3x 719/02/2024, 12:40
240219-pwk18sdc4w 719/02/2024, 12:31
240219-pqkhhsdb6s 719/02/2024, 12:30
240219-pptd2ade75 319/02/2024, 12:29
240219-ppalxsdb5s 319/02/2024, 12:16
240219-pft9zade22 719/02/2024, 12:01
240219-n62ajada51 719/02/2024, 12:00
240219-n6fntsdd62 319/02/2024, 11:55
240219-n3vnksda4v 719/02/2024, 11:41
240219-nthmnach4s 7Analysis
-
max time kernel
293s -
max time network
191s -
platform
windows10-1703_x64 -
resource
win10-20240214-es -
resource tags
arch:x64arch:x86image:win10-20240214-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
19/02/2024, 12:01
Static task
static1
Behavioral task
behavioral1
Sample
topview_setup_v2302 (1).exe
Resource
win10-20240214-es
General
-
Target
topview_setup_v2302 (1).exe
-
Size
149.7MB
-
MD5
dbfbcb338c254d794113ffd1693eb7f2
-
SHA1
920454130f60c959586f0dc770de0d12bb6cd3f6
-
SHA256
4f0add2c70d79065abe79c366e624f06d6ebce80cd04adf5288a026fba4761e5
-
SHA512
4cfafc90fc5b8feb9146c8f268a001fcd567741249ddc3d0bcc60c75ea7da0656c46d4b8e64bc05df02ce89fd720e941731ef34e46f8989af64ed289bb97a391
-
SSDEEP
3145728:bgJ9HibHaebRmBNRVBIbzQe3u7KYrCDS9299OJnoDNFLDYKCrHsNfekZaZIIQDep:bgb+UVwzQUPND7GnWDVCrHsNfekZaZI4
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 4100 topview_setup_v2302 (1).tmp 2452 tskill.exe 3188 tskill.exe 4080 FTDI.exe 3624 dp-chooser.exe 3920 dpinst-amd64.exe -
Loads dropped DLL 4 IoCs
pid Process 4100 topview_setup_v2302 (1).tmp 4100 topview_setup_v2302 (1).tmp 4100 topview_setup_v2302 (1).tmp 4100 topview_setup_v2302 (1).tmp -
Drops file in System32 directory 61 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\amd64\SET4ABD.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ftdibus.inf_amd64_27ad3b85ed46c2a0\i386\ftd2xx.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ftdiport.inf_amd64_02e6e8b10f1ee812\ftdiport.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\SET4B3C.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ftdibus.inf_amd64_27ad3b85ed46c2a0\amd64\ftdibus.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d}\amd64\SET4F50.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d}\amd64\ftcserco.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\i386\SET4B3E.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ftdibus.inf_amd64_27ad3b85ed46c2a0\amd64\ftd2xx64.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ftdibus.inf_amd64_27ad3b85ed46c2a0\amd64\FTLang.dll DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\amd64\SET4ACE.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d}\ftdiport.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d} DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\i386\SET4B3E.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d}\amd64\SET4F4F.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\ftdiport.inf_amd64_02e6e8b10f1ee812\ftdiport.PNF dpinst-amd64.exe File created C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\amd64\SET4A3E.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\i386\ftd2xx.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ftdibus.inf_amd64_27ad3b85ed46c2a0\amd64\ftbusui.dll DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d}\amd64\SET4F51.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d}\SET4F52.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\amd64\SET4A6E.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\SET4B3D.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\ftdibus.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d}\SET4F91.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ftdiport.inf_amd64_02e6e8b10f1ee812\amd64\ftcserco.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d}\amd64\ftser2k.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\amd64\ftbusui.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\amd64\ftdibus.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\amd64\SET4ACE.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\SET4B3D.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\amd64\SET4A3E.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\amd64\FTLang.dll DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d}\amd64\SET4F4F.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d}\SET4F52.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ftdibus.inf_amd64_27ad3b85ed46c2a0\ftdibus.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d}\amd64\SET4F51.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d}\SET4F91.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d}\ftdiport.inf DrvInst.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL topview_setup_v2302 (1).tmp File opened for modification C:\Windows\System32\DriverStore\FileRepository\ftdibus.inf_amd64_27ad3b85ed46c2a0\ftdibus.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c} DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d}\amd64\SET4F50.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\i386 DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d}\amd64 DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\amd64 DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ftdiport.inf_amd64_02e6e8b10f1ee812\amd64\ftser2k.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\amd64\ftd2xx64.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\amd64\SET4A6E.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\SET4B3C.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\ftdibus.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ftdiport.inf_amd64_02e6e8b10f1ee812\ftdiport.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{9d551698-26a9-8946-b046-80870041e02c}\amd64\SET4ABD.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\ftdibus.inf_amd64_27ad3b85ed46c2a0\ftdibus.PNF dpinst-amd64.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt dpinst-amd64.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{965c554b-5e7f-bd4f-b592-03686f901e4d}\amd64\ftserui2.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ftdiport.inf_amd64_02e6e8b10f1ee812\amd64\ftserui2.dll DrvInst.exe -
Drops file in Program Files directory 42 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Topview\Interop.MSDAOSP.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Interop.GDATA_DLL.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\C1.Win.C1FlexGrid.2.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\AxInterop.WMPLib.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Helps\NewTopView_nb-NO.chm topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Helps\NewTopView_pl-PL.chm topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\TVLUpd.exe topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Interop.WMPLib.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\C1.C1Pdf.2.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Upgrade\Upload15400.exe topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Helps\NewTopView_da-DK.chm topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Helps\NewTopView_hu-HU.chm topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Topview.exe topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\C1.Win.C1PrintPreview.Classic.2.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Helps\NewTopView_it-IT.chm topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Helps\NewTopView_es-ES.chm topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Helps\NewTopView_nl-NL.chm topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Helps\NewTopView_.chm topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\HTRecordings.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\C1.Win.C1TrueDBGrid.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\skybound.visualstyles.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Helps\NewTopView_en-US.chm topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\C1.Common.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\C1.Win.C1Preview.2.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Helps\NewTopView.chm topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\key64s.exe topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\C1.C1Zip.2.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Helps\HelpMisure_it-IT.chm topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\C1LicUpdater1.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\GDATA_DLL.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\C1.C1PrintDocument.Classic.2.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\TriStateTreeView.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\C1.Win.C1Input.2.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\C1.Win.C1Report.2.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Helps\NewTopView_de-DE.chm topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Helps\NewTopView_fr-FR.chm topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\C1.C1Preview.2.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\C1.C1Excel.2.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\C1.Win.C1Chart.2.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Helps\NewTopView_sv-SE.chm topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\stdole.dll topview_setup_v2302 (1).tmp File opened for modification C:\Program Files (x86)\Topview\Helps\NewTopView_pt-PT.chm topview_setup_v2302 (1).tmp -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\inf\oem4.inf DrvInst.exe File created C:\Windows\inf\oem4.inf DrvInst.exe File opened for modification C:\Windows\DPINST.LOG dpinst-amd64.exe File opened for modification C:\Windows\INF\setupapi.dev.log dpinst-amd64.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 50 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dpinst-amd64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dpinst-amd64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs dpinst-amd64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\ConfigFlags DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dpinst-amd64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dpinst-amd64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\ConfigFlags DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs dpinst-amd64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID dpinst-amd64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\ConfigFlags DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom dpinst-amd64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dpinst-amd64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dpinst-amd64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID dpinst-amd64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 dpinst-amd64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs dpinst-amd64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs dpinst-amd64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\ConfigFlags DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 dpinst-amd64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom dpinst-amd64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4100 topview_setup_v2302 (1).tmp 4100 topview_setup_v2302 (1).tmp 2452 tskill.exe 2452 tskill.exe 3188 tskill.exe 3188 tskill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3920 dpinst-amd64.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeAuditPrivilege 2752 svchost.exe Token: SeSecurityPrivilege 2752 svchost.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4100 topview_setup_v2302 (1).tmp 4100 topview_setup_v2302 (1).tmp 3920 dpinst-amd64.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3076 wrote to memory of 4100 3076 topview_setup_v2302 (1).exe 73 PID 3076 wrote to memory of 4100 3076 topview_setup_v2302 (1).exe 73 PID 3076 wrote to memory of 4100 3076 topview_setup_v2302 (1).exe 73 PID 4100 wrote to memory of 2452 4100 topview_setup_v2302 (1).tmp 74 PID 4100 wrote to memory of 2452 4100 topview_setup_v2302 (1).tmp 74 PID 4100 wrote to memory of 2452 4100 topview_setup_v2302 (1).tmp 74 PID 4100 wrote to memory of 3188 4100 topview_setup_v2302 (1).tmp 76 PID 4100 wrote to memory of 3188 4100 topview_setup_v2302 (1).tmp 76 PID 4100 wrote to memory of 3188 4100 topview_setup_v2302 (1).tmp 76 PID 4100 wrote to memory of 4380 4100 topview_setup_v2302 (1).tmp 78 PID 4100 wrote to memory of 4380 4100 topview_setup_v2302 (1).tmp 78 PID 4100 wrote to memory of 4380 4100 topview_setup_v2302 (1).tmp 78 PID 4380 wrote to memory of 4572 4380 cmd.exe 80 PID 4380 wrote to memory of 4572 4380 cmd.exe 80 PID 4380 wrote to memory of 4572 4380 cmd.exe 80 PID 4100 wrote to memory of 4080 4100 topview_setup_v2302 (1).tmp 81 PID 4100 wrote to memory of 4080 4100 topview_setup_v2302 (1).tmp 81 PID 4100 wrote to memory of 4080 4100 topview_setup_v2302 (1).tmp 81 PID 4080 wrote to memory of 3624 4080 FTDI.exe 82 PID 4080 wrote to memory of 3624 4080 FTDI.exe 82 PID 4080 wrote to memory of 3624 4080 FTDI.exe 82 PID 3624 wrote to memory of 3920 3624 dp-chooser.exe 83 PID 3624 wrote to memory of 3920 3624 dp-chooser.exe 83 PID 2752 wrote to memory of 3364 2752 svchost.exe 85 PID 2752 wrote to memory of 3364 2752 svchost.exe 85 PID 2752 wrote to memory of 1668 2752 svchost.exe 86 PID 2752 wrote to memory of 1668 2752 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\topview_setup_v2302 (1).exe"C:\Users\Admin\AppData\Local\Temp\topview_setup_v2302 (1).exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\is-R5FBF.tmp\topview_setup_v2302 (1).tmp"C:\Users\Admin\AppData\Local\Temp\is-R5FBF.tmp\topview_setup_v2302 (1).tmp" /SL5="$C004E,156653273,57856,C:\Users\Admin\AppData\Local\Temp\topview_setup_v2302 (1).exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\is-70FMF.tmp\tskill.exe"C:\Users\Admin\AppData\Local\Temp\is-70FMF.tmp\tskill" topview3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\is-70FMF.tmp\tskill.exe"C:\Users\Admin\AppData\Local\Temp\is-70FMF.tmp\tskill" TVLUpd3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3188
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-70FMF.tmp\VSRecover.bat" "C:\Users\Admin\AppData\Local\VirtualStore\Program Files (x86)\Topview\Data" "C:\Program Files (x86)\Topview\Data\""3⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\VirtualStore\Program Files (x86)\Topview\Data" "C:\Program Files (x86)\Topview\Data\" /s /q /c /y /h4⤵
- Enumerates system info in registry
PID:4572
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-70FMF.tmp\FTDI.exe"C:\Users\Admin\AppData\Local\Temp\is-70FMF.tmp\FTDI.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeC:\Users\Admin\AppData\Local\Temp\FTDI-Driver\dp-chooser.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeC:\Users\Admin\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe /sa5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3920
-
-
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{5cecbe84-c64d-d540-aa7f-528762756db9}\ftdibus.inf" "9" "4a9ba6403" "000000000000016C" "WinSta0\Default" "0000000000000168" "208" "c:\users\admin\appdata\local\temp\ftdi-driver"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:3364
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{be05ade0-9a99-ca47-8667-0e07b8898099}\ftdiport.inf" "9" "461a5a59f" "000000000000017C" "WinSta0\Default" "0000000000000178" "208" "c:\users\admin\appdata\local\temp\ftdi-driver"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275B
MD550f2bbf24a14be4e408f94bc3849c38d
SHA1ca3512c6847a2b82a7db2e2599ef7e5f7d18423d
SHA256d99b9414e6b4c20127bd62bb105010bf980a5f1c2922b1d900629f498473095a
SHA5120c341554d7891424bd4b4e96667f879589a1e76fdc58627aa813419d5e5f2127a218dd26f6f0f3328798d761d01b62ca84a961eee112bcf124c9e6eff72c298e
-
Filesize
88KB
MD5461a3ce2e77143ec0e0015d80675911b
SHA13d39e3c12d1424cfbbdda20cce48f18cbeca1d06
SHA256003310b93a1a237fb022c7d7f40515daf25fa1b91690965d3b98c1829a92ed37
SHA51295b4f646fd655ed598360638d0a384e548f40c00b6fe8373c070719fd1f37bcc42522a7c0006ad33e63df9179a8e8302a962f40c81249476ba530d64b6f1ad3a
-
Filesize
1022KB
MD50e7e8820a977d3b4b81c5188fa841c52
SHA1a6d6831a4a097bd47af267727a4ad6b38b14cde3
SHA25665054d27c91c21af7c7f1838427a0ac64089dc51dd27eb220b589c26b94903a1
SHA5125a2d572b77d59a342ed997586cc7f7741dfb386a2c4243638f1c6933ab1722720953ac8aff3a8097bdc60e807ca51b9912a534d91c76d359e3d819d61235be3d
-
Filesize
19KB
MD5bbb46e3360f3fcabc5d03ca33dc10458
SHA1c442cab7ea74d8a1dd3bf97786bad844e8913b44
SHA25665e9bc1f59de53462ed2e6b002c0be26cd3f37b1e360938a0a32aa452ed58030
SHA5121594e0bd1ba7d9541ff5a44f65da6acdf1b27cfdd72f4a04c07be0f815f6d05d773d8980595da18ecc1ab1bc2587fc248e0997873b02c151dca096a741cd4d78
-
Filesize
8KB
MD55f2bd5bd92fb7740033159c59a8d1215
SHA1b8e38a2f4ebcc4dad9dd5e73cff82509f6043511
SHA2564097665303729e520334b2db9915dc3ef955e3518d08846af73d464bfdaea3a6
SHA51218b59c28af8ba6bab439fbdf32868e63aef6e8a6432847ce44b551f40ecb3c66f797c77d6ebd4e271563bcf71e7357a9301ff73ff0e5e70577584a91807c4e28
-
Filesize
2.2MB
MD50c97e7b5de1b46fb723bed38f0de28a2
SHA13ab353adb602908eddb884c8b2b587fcc0691bfa
SHA256835dd64b199190d20dc37c0cadeb064b7eaaaef271703781b2b259b7085437a4
SHA512534e698728462b5103263194b42619da560ed9547e8e9de0240190606097eff1f20d560cf7d320164d0609b474a3d3dceb788e3c2ff813ae8bccd629833ebee0
-
Filesize
42B
MD52bceb18491627891ab49b68e7163320a
SHA1cddd783b50b3e1b6cad966dedfddb16ecb482146
SHA25679d4cb5ea614b373096dd1e8aba1d2f060f05cf7878e5280254dd55811a0bda7
SHA512aa694a9a4afb0912339e2a60002375bf85b4f92bdb0a9b4c7a27ae8407b3f868131e3fd2ef2ab00d9ef22723b6f52c26f95b25757690bdda384114ede04173a3
-
Filesize
16KB
MD54450a1e461ef13fb38bac12b108883b3
SHA1483b2e60345dec1906294e52599e066058c91ace
SHA25634d3a23bb077dbbc0d93a46941c005d275573c988cabdb18e7d6e16ed0576a75
SHA512a45518c085ae675cefefdf163ad22246fc4b8d281d6324f9ff94af8157d3c62e5b3d7c2f85e8b101a60884b3d2c32043ecc789f8cda356c04c4910ad327951ff
-
Filesize
697KB
MD5832dab307e54aa08f4b6cdd9b9720361
SHA1ebd007fb7482040ecf34339e4bf917209c1018df
SHA256cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3
SHA512358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49
-
Filesize
181KB
MD5074bc40ae617f3676b666e4a70fdb33e
SHA18884430c9e58baa5ae33408f8a6f76c90bc3d3ee
SHA256a122545a4209aa47f538ddad6606fc128173b57a4707346710deaf979b20d28f
SHA512d9c79bd8ea695174a78eb8afcb348b48e33dc95cd1a4c8a724f572458bf6190ea4dd4ad8789acab49344b29871abae75487d8134f6a3507e4bf497cabafd237f
-
Filesize
181KB
MD52cac09a011db31f8152037e57ca598ba
SHA1c8f4b331eb90b42d4e88a73d6a658e8c000723de
SHA256bd6264007ace380aa3d4163c1c64b74dc6c7111da4d6338f4c98ee6268e9be2f
SHA51287957eea274377f4ec45ad87aea184f5f63a95660c9131dcffa89ae14608a944ca347b815850399f6799ed5dde90186a5675f77d2ac92a5261ac6e71c257cbc7
-
Filesize
181KB
MD5b6b0669a186c0204ed2b282f4a76bb4b
SHA1ff08fbe70329083ac5f8ab91f96bd6d3fe91bfb3
SHA256f8f33ab7a08f38ed392c2d125b512e05873d7c46ee84996d6b33b0bb9579cc12
SHA512818d37a6097f9c6e9a796ef34714017fde72582e7723cd0f1d61046e198d8f32e1c0a8f5cef0daa3f6d331e619cb1fd323aefbe5e043a64f1b65f2e3cbe8ea7a
-
Filesize
268KB
MD5662679682f491fbaf3d15953d13ec72e
SHA19ea41242f7945a6814d757da232359dfd7d421bd
SHA256c2729911c4b82d8f9e22e057a1570d0265d7a9eca44d6fe8dc0658f47263ce12
SHA512e5305020f3bc11342ee9073780baae37ff700434b7c695980345c7e9db56b03f8199ce0c278e549c4eb92b4294f1fc91a0dbbb1c033b13794648a24dc94837e5
-
Filesize
164KB
MD5d79a5e34f684b547fa2f963dfcc15a21
SHA181cca464d4c8773b00f0a6f170f402ffe2d6a9c8
SHA2564bbc0b301a7c5a6b1b73878ce3aeeb191f5fceac05835372142206d79ac81559
SHA512e199f40f06f674eb8ec0e599fff47a36d4495f4f2ffee96cadfd00aba9d5bb127f4461090322244ec973fcc2c8ae119fb12ce65ad585ccaa570115b7d957ea28
-
Filesize
73KB
MD5aa69bf96e10f463082a0664b7a2e9fae
SHA1d9cc34d613e8655fd7da5293093e050d4d24af5f
SHA256c0224b9ef14365f6dda96134cc77d978e69fbd61efdade6fd1eb676418c41023
SHA512778599eeee6c6f3f8c46e4bb774697e8528f03b30381be3ba06298e23d1514039cc926e89aadac2771074657a9478dcf60d4d92bdd69c7a5a094d59ed32f2993
-
Filesize
632KB
MD5befbc1a8f6c2b8e143ddd97ccb6561b5
SHA144b085c25026dabe6280c539f43dd0755fb28499
SHA256774af8b12c85d03562742acdf222af5e0432167bf107ba4b260757e4a5e36866
SHA512a41b29e0493ad8ed57f55b8aa557aed460794894a5a53b057eeef017a81f071a09dd298fb63eb0277344a9b69d790699131642106124320fb80ba87d1ad60dd4
-
Filesize
141KB
MD5ab7418c8dfbbb97befb4f0aded3d4663
SHA1b9a7a3fbba707ba52f8ac4339070473a486ce7b7
SHA2563bd5bb7e646e67469ec25a37caa5131cf992759703b0fc170df7af265b9f8e74
SHA512be19d2cfe8c9198ce43470fdb6b6030eb4bd1b4080887cb6f1d69c2b661bbd79ffa85b4b70fdbe97badadf2b75ce7fbe7b627fe08fb1df3104cc16842e609a40
-
Filesize
96KB
MD5b66678ff4e347e22146609b3d5b7b2c4
SHA1632a3b4365f9256b13ff0f671260463a8972070d
SHA2567a303aa880cc746d13f71e565874fb7c174747372ccf358b928a72219d2a50dd
SHA51207d73174638953074165eefb804394f21a1a115116459b96903fcb34a6656450bdcd2a9abd0590ec5a63d3df153301a8ddb527405d67dff3065bb5108c52f575
-
Filesize
64KB
MD53e5bcd980af8b20313005d9a492cec8a
SHA1060b9d1444327d3faa56e3b35fc2bb606b692dd7
SHA25655a23a2ac263e10b77d7e95601439f771062f2c248a8d93039a968d66100c39c
SHA512dc4ba803eb3eab0d5ba452aca2c57095a74b1b3dbd82078ed17bbc34c5db3f791eab4a418d4c822c170b4d561d36d0e47ba6a2da915a8b1797a88666b19c69f3
-
Filesize
22KB
MD5b392c785b9c2aa31187d1bd0a4f5eba5
SHA1bd80456eac30ae84b2a0e1ce9a4a364a01c68f39
SHA256b286055896dea79d4521368293deee801930f3fb503cc3076ac97716b338b0f7
SHA512a22007089580cf066ff30d405f607b88f499754f7859ea98915fa2f5e35d21e91bbe4c25271f8c62357f11c2469fd20556d805a52071b96e30fba8657c6338e6
-
Filesize
22KB
MD560238c00694f838eed4757d1ce167d8b
SHA10e39502d2cbd03ecf3973ad2f5f94ddb21c74b37
SHA256113a35e6161f3ae8bb9d0e0f31913872c4b32fd6211ece27dddeb238f601eb59
SHA512578a026793f2a30814a31bb9a63360bc2142e3263cb752b67cf8ffd3a65253d30e0bba5bbd5d57759ba3455ab8f2d766fc14f6d6b5085833ea44936a08b8c713
-
Filesize
382KB
MD56ffeb45e0137622ebbba8361107d304e
SHA101b3f848148a276f6317d6c98edbdb1133f458da
SHA25660bb0d6348b1eb0127401aa902f34c963d9196d2778c66f4008a6cf0c6f098a5
SHA512bc3d9ddcb1fc249cf1a3a11eefe9131280f18cb538c381c46b1818354e947690d52fd38b14674a7bb51ce5ff73f4b8721d19fd4960694b3442ecc90c58f75052
-
Filesize
29KB
MD5b404b591dcae1e28603479a7963cb6f6
SHA15d4ae8370fb8a05189b0ed9430459bcb97bb9e54
SHA256ff361cdd7c814db0bea98578a731ef5c03bf457e06bca9950fdbab57a4d3c7f6
SHA512f928fd950a1f57172dfdf2cc8d23a54381715ee79d492d3491eaeaf4adcc11241f87a00e91f03b504f78df1def4d7c4569a192d62e21088abd6dbfd721134b04
-
Filesize
17KB
MD5b16b75b545a296efc49805c94dfd334c
SHA188da6e6c3c9d94f6725d854cd866ea2cf305d67a
SHA25600627112cf622cc6fb99a6b5de24fcc61b6d0a211a6bd1e90b985bcf9950f6d9
SHA51218c2b08a06ae87f5f2eeb79dee4a3725fb5f8516d9c9f1ca60c5c96f06ba07493d4fb4199fbd67a042132201ec32c3e5b4331cf0671f787b3da7a2c5a7197357
-
Filesize
23KB
MD577d6d961f71a8c558513bed6fd0ad6f1
SHA1122bb9ed6704b72250e4e31b5d5fc2f0476c4b6a
SHA2565da7c8d33d3b7db46277012d92875c0b850c8abf1eb3c8c9c5b9532089a0bcf0
SHA512b0921e2442b4cdec8cc479ba3751a01c0646a4804e2f4a5d5632fa2dbf54cc45d4cccffa4d5b522d42afc2f6a622e07882ed7e663c8462333b082e82503f335a
-
Filesize
200KB
MD5d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df