Overview
overview
8Static
static
3StarVPN-FR...st.exe
windows10-2004-x64
8$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows10-2004-x64
1StarVPN.exe
windows10-2004-x64
5d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows10-2004-x64
1resources/...ce.cmd
windows10-2004-x64
7resources/app.js
windows10-2004-x64
3resources/elevate.exe
windows10-2004-x64
1resources/...64.dll
windows10-2004-x64
1resources/...-1.dll
windows10-2004-x64
1resources/...64.dll
windows10-2004-x64
1resources/...pn.exe
windows10-2004-x64
1resources/...tl.exe
windows10-2004-x64
1resources/...40.dll
windows10-2004-x64
1resources/...al.exe
windows10-2004-x64
1resources/...st.exe
windows10-2004-x64
1resources/...wg.exe
windows10-2004-x64
1resources/...rd.exe
windows10-2004-x64
5resources/...tn.msi
windows10-2004-x64
6vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3$R0/Uninst...PN.exe
windows10-2004-x64
4Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 05:20
Static task
static1
Behavioral task
behavioral1
Sample
StarVPN-FR1-x64-latest.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
LICENSES.chromium.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
StarVPN.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
ffmpeg.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
libEGL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
libGLESv2.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
resources/StarVPNService.cmd
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
resources/app.js
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
resources/elevate.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
resources/openvpn/x64/libcrypto-3-x64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
resources/openvpn/x64/libpkcs11-helper-1.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
resources/openvpn/x64/libssl-3-x64.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
resources/openvpn/x64/openvpn.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
resources/openvpn/x64/tctl.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
resources/openvpn/x64/vcruntime140.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
resources/shadowsocks/x64/sslocal.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
resources/wireguard/fastlist.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
resources/wireguard/x64/wg.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral24
Sample
resources/wireguard/x64/wireguard.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
resources/wireguard/x64/wntn.msi
Resource
win10v2004-20240426-en
Behavioral task
behavioral26
Sample
vk_swiftshader.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
vulkan-1.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral32
Sample
$R0/Uninstall StarVPN.exe
Resource
win10v2004-20240508-en
General
-
Target
StarVPN-FR1-x64-latest.exe
-
Size
67.4MB
-
MD5
e32e41f43336f6482a7169f757835e18
-
SHA1
d531987df3dc3aa38ebe1aeebd622e3ba879e190
-
SHA256
b018a82f87820638783ed4b5201a70d34e09758fb092dd791641931d55d023e6
-
SHA512
a05da0392cb742382c2bba7ee3635efbb3754a60b9dcc3381b892834bdf637237c7ce542e6ef5470e2c6b1481741a0a54b7f2331725777347f392ca4bf60e8a8
-
SSDEEP
1572864:x2513yfYHlkNeGEZ8sQcTe/FEd67As/ph6/WaOjZhAD88qy:xW1QYHqMDQcTeOd60shqfOlWKy
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\System32\drivers\SET7FFD.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\wintun.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\SET7FFD.tmp DrvInst.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation StarVPN.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation StarVPN.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\nete1g3e.inf_amd64_af58b4e19562a3f9\nete1g3e.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netvf63a.inf_amd64_a090e6cfaf18cb5c\netvf63a.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netax88772.inf_amd64_5d1c92f42d958529\netax88772.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\net7500-x64-n650f.inf_amd64_cc87c915f33d1c27\net7500-x64-n650f.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\wceisvista.inf_amd64_07ad61d07466a58a\wceisvista.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netl1c63x64.inf_amd64_4d6630ce07a4fb42\netl1c63x64.PNF MsiExec.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtwlane_13.inf_amd64_992f4f46e65f30d4\netrtwlane_13.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\net8192se64.inf_amd64_167684f9283b4eca\net8192se64.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\usbnet.inf_amd64_9e6bb7a4b7338267\usbnet.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\ykinx64.inf_amd64_0bbd8466b526ef26\ykinx64.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\ipoib6x.inf_amd64_ef71073a5867971f\ipoib6x.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netwlv64.inf_amd64_0b9818131664d91e\netwlv64.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netl1e64.inf_amd64_8d5ca5ab1472fc44\netl1e64.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netloop.inf_amd64_762588e32974f9e8\netloop.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\rtwlanu_oldic.inf_amd64_1a82423cc076e882\rtwlanu_oldic.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netr7364.inf_amd64_310ee0bc0af86ba3\netr7364.PNF MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\wintun.inf_amd64_def3401515466414\wintun.sys DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\netax88179_178a.inf_amd64_b6748bc8bb8ccf4d\netax88179_178a.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\net1yx64.inf_amd64_8604d8a50804b9c1\net1yx64.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netmyk64.inf_amd64_1f949c30555f4111\netmyk64.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netr28ux.inf_amd64_d5996f2a9d9aa9e3\netr28ux.PNF MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\wintun.inf_amd64_def3401515466414\wintun.cat DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\netl260a.inf_amd64_783312763f8749c7\netl260a.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\dc21x4vm.inf_amd64_3294fc34256dbb0e\dc21x4vm.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\nete1e3e.inf_amd64_895623810c19146a\nete1e3e.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netwtw08.inf_amd64_7c0c516fb22456cd\netwtw08.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netv1x64.inf_amd64_30040c3eb9d7ade4\netv1x64.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netnvm64.inf_amd64_35bbbe80dec15683\netnvm64.PNF MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{8716284a-69a6-0f45-9db5-a481823d800b}\SET7D1F.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\wintun.inf_amd64_def3401515466414\wintun.PNF tctl.exe File created C:\Windows\System32\DriverStore\FileRepository\netr28x.inf_amd64_5d63c7bcbf29107f\netr28x.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\ndisimplatformmp.inf_amd64_8de1181bfd1f1628\ndisimplatformmp.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netrasa.inf_amd64_1bdf7a435cb3580d\netrasa.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netwsw00.inf_amd64_24d55504ae3587aa\netwsw00.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netnvma.inf_amd64_7080f6b8ea1744fb\netnvma.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\msdri.inf_amd64_97bef65a8432edd4\msdri.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netvwifimp.inf_amd64_ec11d0ad3c5b262a\netvwifimp.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netmlx4eth63.inf_amd64_3809a4a3e7e07703\netmlx4eth63.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netk57a.inf_amd64_d823e3edc27ae17c\netk57a.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netimm.inf_amd64_8b2087393aaef952\netimm.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netwew00.inf_amd64_325c0bd6349ed81c\netwew00.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\net8192su64.inf_amd64_66c8bfc7a4b1feed\net8192su64.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\kdnic.inf_amd64_6649425cdcae9b5f\kdnic.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netbc64.inf_amd64_b96cdf411c43c00c\netbc64.PNF MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{8716284a-69a6-0f45-9db5-a481823d800b}\wintun.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{8716284a-69a6-0f45-9db5-a481823d800b} DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\net9500-x64-n650f.inf_amd64_e92c5a65e41993f9\net9500-x64-n650f.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netwtw02.inf_amd64_42e02bae858d0fbd\netwtw02.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\bcmwdidhdpcie.inf_amd64_977dcc915465b0e9\bcmwdidhdpcie.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netg664.inf_amd64_84cd7b2798e0a666\netg664.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netefe3e.inf_amd64_7830581a689ef40d\netefe3e.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netmlx5.inf_amd64_101a408e6cb1d8f8\netmlx5.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netvg63a.inf_amd64_9f5493180b1252cf\netvg63a.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netsstpa.inf_amd64_e76c5387d67e3fd6\netsstpa.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\c_net.inf_amd64_32a9ad23c1ecc42d\c_net.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netathrx.inf_amd64_220db23f5419ea8d\netathrx.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\mrvlpcie8897.inf_amd64_07fc330c5a5730ca\mrvlpcie8897.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netvchannel.inf_amd64_ba3e73aa330c95d6\netvchannel.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netl160a.inf_amd64_e4cbe375963a69e9\netl160a.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netbc63a.inf_amd64_7ba6c9cea77dd549\netbc63a.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netbxnda.inf_amd64_1fff3bc87a99b0f1\netbxnda.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netwbw02.inf_amd64_1c4077fa004e73b4\netwbw02.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\net8187bv64.inf_amd64_bc859d32f3e2f0d5\net8187bv64.PNF MsiExec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 42 IoCs
description ioc Process File created C:\Program Files\StarVPN\resources\openvpn\x64\openvpn.exe StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\resources\wireguard\x64\wntn.msi StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\locales\en-US.pak StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\libEGL.dll StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\resources.pak StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\snapshot_blob.bin StarVPN-FR1-x64-latest.exe File opened for modification C:\Program Files\StarVPN\resources\openvpn\x64 StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\resources\openvpn\x64\libpkcs11-helper-1.dll StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\ffmpeg.dll StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\d3dcompiler_47.dll StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\LICENSE.electron.txt StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\vk_swiftshader_icd.json StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\vulkan-1.dll StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\resources\app.asar StarVPN-FR1-x64-latest.exe File opened for modification C:\Program Files\StarVPN\resources\wireguard StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\service.log cmd.exe File created C:\Program Files\StarVPN\chrome_200_percent.pak StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\resources\openvpn\x64\libssl-3-x64.dll StarVPN-FR1-x64-latest.exe File opened for modification C:\Program Files\StarVPN\resources\shadowsocks StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\resources\shadowsocks\x64\sslocal.exe StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\LICENSES.chromium.html StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\vk_swiftshader.dll StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\resources\StarVPNService.cmd StarVPN-FR1-x64-latest.exe File opened for modification C:\Program Files\StarVPN\resources\openvpn StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\resources\openvpn\x64\vcruntime140.dll StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\v8_context_snapshot.bin StarVPN-FR1-x64-latest.exe File opened for modification C:\Program Files\StarVPN\resources\shadowsocks\x64 StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\resources\wireguard\x64\wireguard.exe StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\resources\openvpn\x64\tctl.exe StarVPN-FR1-x64-latest.exe File opened for modification C:\Program Files\StarVPN\chrome_100_percent.pak StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\libGLESv2.dll StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\StarVPN.exe StarVPN-FR1-x64-latest.exe File opened for modification C:\Program Files\StarVPN\resources StarVPN-FR1-x64-latest.exe File opened for modification C:\Program Files\StarVPN\resources\wireguard\x64 StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\chrome_100_percent.pak StarVPN-FR1-x64-latest.exe File opened for modification C:\Program Files\StarVPN\locales StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\resources\elevate.exe StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\resources\openvpn\x64\libcrypto-3-x64.dll StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\resources\wireguard\fastlist.exe StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\resources\wireguard\x64\wg.exe StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\Uninstall StarVPN.exe StarVPN-FR1-x64-latest.exe File created C:\Program Files\StarVPN\icudtl.dat StarVPN-FR1-x64-latest.exe -
Drops file in Windows directory 18 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI71D4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7204.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\Installer\e577004.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI737C.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log tctl.exe File created C:\Windows\Installer\e577000.msi msiexec.exe File opened for modification C:\Windows\Installer\e577000.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{92C3146C-FCA6-490F-A477-020C2BE6D5BF} msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log MsiExec.exe File created C:\Windows\INF\oem3.PNF tctl.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe -
Executes dropped EXE 6 IoCs
pid Process 1756 tctl.exe 1496 StarVPN.exe 4480 StarVPN.exe 4880 StarVPN.exe 3540 StarVPN.exe 424 StarVPN.exe -
Loads dropped DLL 29 IoCs
pid Process 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 1328 MsiExec.exe 4452 MsiExec.exe 4292 StarVPN-FR1-x64-latest.exe 1756 tctl.exe 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 1496 StarVPN.exe 1496 StarVPN.exe 4480 StarVPN.exe 4880 StarVPN.exe 4880 StarVPN.exe 4880 StarVPN.exe 4880 StarVPN.exe 4880 StarVPN.exe 4880 StarVPN.exe 3540 StarVPN.exe 424 StarVPN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 46 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Filters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3152 schtasks.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2b\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2b\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2b msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe -
Modifies registry class 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\PackageCode = "DAB071CEC621A8F42B293F5575AA1012" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\B5E7C9284D319724F83406AF9CDA21EA msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\SourceList msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\B5E7C9284D319724F83406AF9CDA21EA\C6413C296ACFF0944A7720C0B26E5DFB msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\SourceList\Media\1 = ";" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\SourceList\LastUsedSource = "n;1;C:\\Program Files\\StarVPN\\resources\\wireguard\\x64\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C6413C296ACFF0944A7720C0B26E5DFB msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C6413C296ACFF0944A7720C0B26E5DFB\WintunFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\SourceList\Net\1 = "C:\\Program Files\\StarVPN\\resources\\wireguard\\x64\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\ProductName = "Wintun" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\Version = "524289" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\SourceList\PackageName = "wntn.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C6413C296ACFF0944A7720C0B26E5DFB\SourceList\Net msiexec.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C StarVPN.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 StarVPN.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 StarVPN.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 4292 StarVPN-FR1-x64-latest.exe 2504 msiexec.exe 2504 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 4292 StarVPN-FR1-x64-latest.exe Token: SeShutdownPrivilege 4696 msiexec.exe Token: SeIncreaseQuotaPrivilege 4696 msiexec.exe Token: SeSecurityPrivilege 2504 msiexec.exe Token: SeCreateTokenPrivilege 4696 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4696 msiexec.exe Token: SeLockMemoryPrivilege 4696 msiexec.exe Token: SeIncreaseQuotaPrivilege 4696 msiexec.exe Token: SeMachineAccountPrivilege 4696 msiexec.exe Token: SeTcbPrivilege 4696 msiexec.exe Token: SeSecurityPrivilege 4696 msiexec.exe Token: SeTakeOwnershipPrivilege 4696 msiexec.exe Token: SeLoadDriverPrivilege 4696 msiexec.exe Token: SeSystemProfilePrivilege 4696 msiexec.exe Token: SeSystemtimePrivilege 4696 msiexec.exe Token: SeProfSingleProcessPrivilege 4696 msiexec.exe Token: SeIncBasePriorityPrivilege 4696 msiexec.exe Token: SeCreatePagefilePrivilege 4696 msiexec.exe Token: SeCreatePermanentPrivilege 4696 msiexec.exe Token: SeBackupPrivilege 4696 msiexec.exe Token: SeRestorePrivilege 4696 msiexec.exe Token: SeShutdownPrivilege 4696 msiexec.exe Token: SeDebugPrivilege 4696 msiexec.exe Token: SeAuditPrivilege 4696 msiexec.exe Token: SeSystemEnvironmentPrivilege 4696 msiexec.exe Token: SeChangeNotifyPrivilege 4696 msiexec.exe Token: SeRemoteShutdownPrivilege 4696 msiexec.exe Token: SeUndockPrivilege 4696 msiexec.exe Token: SeSyncAgentPrivilege 4696 msiexec.exe Token: SeEnableDelegationPrivilege 4696 msiexec.exe Token: SeManageVolumePrivilege 4696 msiexec.exe Token: SeImpersonatePrivilege 4696 msiexec.exe Token: SeCreateGlobalPrivilege 4696 msiexec.exe Token: SeRestorePrivilege 2504 msiexec.exe Token: SeTakeOwnershipPrivilege 2504 msiexec.exe Token: SeRestorePrivilege 2504 msiexec.exe Token: SeTakeOwnershipPrivilege 2504 msiexec.exe Token: SeRestorePrivilege 2504 msiexec.exe Token: SeTakeOwnershipPrivilege 2504 msiexec.exe Token: SeRestorePrivilege 2504 msiexec.exe Token: SeTakeOwnershipPrivilege 2504 msiexec.exe Token: SeAuditPrivilege 1488 svchost.exe Token: SeSecurityPrivilege 1488 svchost.exe Token: SeRestorePrivilege 2504 msiexec.exe Token: SeTakeOwnershipPrivilege 2504 msiexec.exe Token: SeRestorePrivilege 2504 msiexec.exe Token: SeTakeOwnershipPrivilege 2504 msiexec.exe Token: SeRestorePrivilege 2504 msiexec.exe Token: SeTakeOwnershipPrivilege 2504 msiexec.exe Token: SeRestorePrivilege 2504 msiexec.exe Token: SeTakeOwnershipPrivilege 2504 msiexec.exe Token: SeRestorePrivilege 2504 msiexec.exe Token: SeTakeOwnershipPrivilege 2504 msiexec.exe Token: SeRestorePrivilege 2504 msiexec.exe Token: SeTakeOwnershipPrivilege 2504 msiexec.exe Token: SeRestorePrivilege 2504 msiexec.exe Token: SeTakeOwnershipPrivilege 2504 msiexec.exe Token: SeRestorePrivilege 2504 msiexec.exe Token: SeTakeOwnershipPrivilege 2504 msiexec.exe Token: SeRestorePrivilege 2504 msiexec.exe Token: SeTakeOwnershipPrivilege 2504 msiexec.exe Token: SeRestorePrivilege 2504 msiexec.exe Token: SeTakeOwnershipPrivilege 2504 msiexec.exe Token: SeRestorePrivilege 2504 msiexec.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 4480 StarVPN.exe 4480 StarVPN.exe 4480 StarVPN.exe 4480 StarVPN.exe 4480 StarVPN.exe 4480 StarVPN.exe 4480 StarVPN.exe 4480 StarVPN.exe 4480 StarVPN.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 4480 StarVPN.exe 4480 StarVPN.exe 4480 StarVPN.exe 4480 StarVPN.exe 4480 StarVPN.exe 4480 StarVPN.exe 4480 StarVPN.exe 4480 StarVPN.exe 4480 StarVPN.exe 4480 StarVPN.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4292 wrote to memory of 4696 4292 StarVPN-FR1-x64-latest.exe 94 PID 4292 wrote to memory of 4696 4292 StarVPN-FR1-x64-latest.exe 94 PID 4292 wrote to memory of 4696 4292 StarVPN-FR1-x64-latest.exe 94 PID 2504 wrote to memory of 1328 2504 msiexec.exe 100 PID 2504 wrote to memory of 1328 2504 msiexec.exe 100 PID 2504 wrote to memory of 4452 2504 msiexec.exe 101 PID 2504 wrote to memory of 4452 2504 msiexec.exe 101 PID 1488 wrote to memory of 3152 1488 svchost.exe 112 PID 1488 wrote to memory of 3152 1488 svchost.exe 112 PID 4292 wrote to memory of 1756 4292 StarVPN-FR1-x64-latest.exe 104 PID 4292 wrote to memory of 1756 4292 StarVPN-FR1-x64-latest.exe 104 PID 1488 wrote to memory of 3156 1488 svchost.exe 106 PID 1488 wrote to memory of 3156 1488 svchost.exe 106 PID 1756 wrote to memory of 3864 1756 tctl.exe 109 PID 1756 wrote to memory of 3864 1756 tctl.exe 109 PID 4292 wrote to memory of 3152 4292 StarVPN-FR1-x64-latest.exe 112 PID 4292 wrote to memory of 3152 4292 StarVPN-FR1-x64-latest.exe 112 PID 4292 wrote to memory of 3152 4292 StarVPN-FR1-x64-latest.exe 112 PID 4292 wrote to memory of 5104 4292 StarVPN-FR1-x64-latest.exe 114 PID 4292 wrote to memory of 5104 4292 StarVPN-FR1-x64-latest.exe 114 PID 4292 wrote to memory of 5104 4292 StarVPN-FR1-x64-latest.exe 114 PID 4900 wrote to memory of 1496 4900 cmd.exe 118 PID 4900 wrote to memory of 1496 4900 cmd.exe 118 PID 4480 wrote to memory of 3472 4480 StarVPN.exe 120 PID 4480 wrote to memory of 3472 4480 StarVPN.exe 120 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122 PID 4480 wrote to memory of 4880 4480 StarVPN.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\StarVPN-FR1-x64-latest.exe"C:\Users\Admin\AppData\Local\Temp\StarVPN-FR1-x64-latest.exe"1⤵
- Drops file in Program Files directory
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Program Files\StarVPN\resources\wireguard\x64\wntn.msi" /qn2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Program Files\StarVPN\resources\openvpn\x64\tctl.exe"C:\Program Files\StarVPN\resources\openvpn\x64\tctl.exe" create --hwid wintun --name "StarVPN Network"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SYSTEM32\netsh.exenetsh interface set interface name="Local Area Connection" newname="StarVPN Network"3⤵PID:3864
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /RU SYSTEM /XML "C:\Users\Admin\AppData\Local\Temp\nsz84F2.tmp" /TN StarVPNService2⤵
- Creates scheduled task(s)
PID:3152
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /TN StarVPNService2⤵PID:5104
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 739B869E74B29F959CFEDC56D08E2F272⤵
- Loads dropped DLL
PID:1328
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding B99B3B9136C848F13E758AD6B0BB226C E Global\MSI00002⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Loads dropped DLL
PID:4452
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "1" "C:\Windows\Temp\123f938d5bbfddf3de3135456fa9fdcf46b1b9d78bf973c5a612996b30d774cb\wintun.inf" "9" "4f3180097" "000000000000014C" "WinSta0\Default" "000000000000015C" "208" "C:\Windows\Temp\123f938d5bbfddf3de3135456fa9fdcf46b1b9d78bf973c5a612996b30d774cb"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:3152
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "1" "ROOT\NET\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:9ef34515d755ec66:Wintun.Install:0.8.0.0:wintun," "42b53aaff" "000000000000014C"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:3156
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Modifies data under HKEY_USERS
PID:4680
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Program Files\StarVPN\resources\StarVPNService.cmd"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Program Files\StarVPN\StarVPN.exeStarVPN.exe resources\app.asar\packages\service\dist\index.js2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1496 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "route DELETE 0.0.0.0/1 192.0.2.0 IF 1"3⤵PID:5240
-
C:\Windows\system32\ROUTE.EXEroute DELETE 0.0.0.0/1 192.0.2.0 IF 14⤵PID:5504
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "route DELETE 128.0.0.0/1 192.0.2.0 IF 1"3⤵PID:5256
-
C:\Windows\system32\ROUTE.EXEroute DELETE 128.0.0.0/1 192.0.2.0 IF 14⤵PID:5520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "route DELETE 2000::/4 100:: IF 1"3⤵PID:5348
-
C:\Windows\system32\ROUTE.EXEroute DELETE 2000::/4 100:: IF 14⤵PID:5488
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "route DELETE 3000::/4 100:: IF 1"3⤵PID:5368
-
C:\Windows\system32\ROUTE.EXEroute DELETE 3000::/4 100:: IF 14⤵PID:5496
-
-
-
-
C:\Program Files\StarVPN\StarVPN.exe"C:\Program Files\StarVPN\StarVPN.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\System32\Wbem\wmic.exewmic path Win32_NetworkAdapterConfiguration where IPEnabled=true get DefaultIPGateway,GatewayCostMetric,IPConnectionMetric,Index /format:table2⤵PID:3472
-
-
C:\Program Files\StarVPN\StarVPN.exe"C:\Program Files\StarVPN\StarVPN.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\StarVPN" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1660 --field-trial-handle=1856,i,15957057719482968853,17740003551683010449,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4880
-
-
C:\Program Files\StarVPN\StarVPN.exe"C:\Program Files\StarVPN\StarVPN.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\StarVPN" --mojo-platform-channel-handle=2232 --field-trial-handle=1856,i,15957057719482968853,17740003551683010449,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3540
-
-
C:\Program Files\StarVPN\StarVPN.exe"C:\Program Files\StarVPN\StarVPN.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\StarVPN" --app-user-model-id= --app-path="C:\Program Files\StarVPN\resources\app.asar" --enable-sandbox --first-renderer-process --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2484 --field-trial-handle=1856,i,15957057719482968853,17740003551683010449,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:424
-
-
C:\Windows\System32\Wbem\wmic.exewmic path Win32_NetworkAdapter where Index=1 get NetConnectionID,MACAddress /format:table2⤵PID:5192
-
-
C:\Windows\system32\cmd.execmd.exe /d /s /c "netsh "wlan" "show" "interface""2⤵PID:5212
-
C:\Windows\system32\netsh.exenetsh "wlan" "show" "interface"3⤵PID:5320
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic path Win32_NetworkAdapterConfiguration where IPEnabled=true get DefaultIPGateway,GatewayCostMetric,IPConnectionMetric,Index /format:table2⤵PID:5804
-
-
C:\Windows\System32\Wbem\wmic.exewmic path Win32_NetworkAdapter where Index=1 get NetConnectionID,MACAddress /format:table2⤵PID:5876
-
-
C:\Windows\System32\Wbem\wmic.exewmic path Win32_NetworkAdapterConfiguration where IPEnabled=true get DefaultIPGateway,GatewayCostMetric,IPConnectionMetric,Index /format:table2⤵PID:5972
-
-
C:\Windows\System32\Wbem\wmic.exewmic path Win32_NetworkAdapter where Index=1 get NetConnectionID,MACAddress /format:table2⤵PID:6056
-
-
C:\Windows\System32\Wbem\wmic.exewmic path Win32_NetworkAdapterConfiguration where IPEnabled=true get DefaultIPGateway,GatewayCostMetric,IPConnectionMetric,Index /format:table2⤵PID:2060
-
-
C:\Windows\System32\Wbem\wmic.exewmic path Win32_NetworkAdapter where Index=1 get NetConnectionID,MACAddress /format:table2⤵PID:5236
-
-
C:\Windows\System32\Wbem\wmic.exewmic path Win32_NetworkAdapterConfiguration where IPEnabled=true get DefaultIPGateway,GatewayCostMetric,IPConnectionMetric,Index /format:table2⤵PID:5500
-
-
C:\Windows\System32\Wbem\wmic.exewmic path Win32_NetworkAdapter where Index=1 get NetConnectionID,MACAddress /format:table2⤵PID:5444
-
-
C:\Windows\System32\Wbem\wmic.exewmic path Win32_NetworkAdapterConfiguration where IPEnabled=true get DefaultIPGateway,GatewayCostMetric,IPConnectionMetric,Index /format:table2⤵PID:5840
-
-
C:\Windows\System32\Wbem\wmic.exewmic path Win32_NetworkAdapter where Index=1 get NetConnectionID,MACAddress /format:table2⤵PID:5796
-
-
C:\Windows\System32\Wbem\wmic.exewmic path Win32_NetworkAdapterConfiguration where IPEnabled=true get DefaultIPGateway,GatewayCostMetric,IPConnectionMetric,Index /format:table2⤵PID:3276
-
-
C:\Windows\System32\Wbem\wmic.exewmic path Win32_NetworkAdapter where Index=1 get NetConnectionID,MACAddress /format:table2⤵PID:4976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
523B
MD526076f58cad81e9124d7388eae5c2f32
SHA15e2cd3a0896f06e18818beccc540eef488768c15
SHA25657448ba3998830692deab8991b8304477fe45636fd9e09bff421915efd63b842
SHA512912f9624252093fb23e33a21a4b3854c52dbd54462cf6f3a6c63860512a522befabd11a0aebdf9c9dfba91c6a08722ac9fa04a2a46a662f894afaaba0069f73b
-
Filesize
126KB
MD5d31f3439e2a3f7bee4ddd26f46a2b83f
SHA1c5a26f86eb119ae364c5bf707bebed7e871fc214
SHA2569f79f46ca911543ead096a5ee28a34bf1fbe56ec9ba956032a6a2892b254857e
SHA512aa27c97bf5581eb3f5e88f112df8bfb6a5283ce44eb13fbc41855008f84fb5b111dfe0616c310c3642b7f8ac99623d7c217aecc353f54f4d8f7042840099abc5
-
Filesize
1KB
MD54d42118d35941e0f664dddbd83f633c5
SHA12b21ec5f20fe961d15f2b58efb1368e66d202e5c
SHA2565154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d
SHA5123ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63
-
Filesize
6.5MB
MD5796505037e030807d9ddd01c93eb353b
SHA179a1eac3b505e6d94a6206d4a5198d3cc11ab038
SHA2569f3f2b4d9bbd3113486839eca85de119fab766450cdca08a4574b80748885708
SHA5129435273a4541a579a427a295be47af8b81133896f50c97bab1d8ab391089f90186a7fd057b53e8b74829e4747e98428d8b4d242eb6854b1304a94a2891c2fd11
-
Filesize
175KB
MD55604b67e3f03ab2741f910a250c91137
SHA1a4bb15ac7914c22575f1051a29c448f215fe027f
SHA2561408387e87cb5308530def6ce57bdc4e0abbbaa9e70f687fd6c3a02a56a0536c
SHA5125e6f875068792e862b1fc8bb7b340ac0f1f4c51e53e50be81a5af8575ca3591f4e7eb9239890178b17c5a8ff4ebb23719190d7db0bd8a9aa6dcb4308ffa9a34d
-
Filesize
4.7MB
MD5cb9807f6cf55ad799e920b7e0f97df99
SHA1bb76012ded5acd103adad49436612d073d159b29
SHA2565653bc7b0e2701561464ef36602ff6171c96bffe96e4c3597359cd7addcba88a
SHA512f7c65bae4ede13616330ae46a197ebad106920dce6a31fd5a658da29ed1473234ca9e2b39cc9833ff903fb6b52ff19e39e6397fac02f005823ed366ca7a34f62
-
Filesize
2.6MB
MD500ffabbb9438a0da15a021451a9c2d0d
SHA14bb79fe2b09962c6c46b70d7dfb1f9d9604a22dc
SHA256aad7e7ac9d74ac18892801950c9728e9c4eacd3b676cbb5d6f63382da2ce0559
SHA512989d8d0afd3ce64c65a90d1046f28b19e5b125f8b5a565b76b8c950d152d3b9a57d68126888321c7cd8a4985249c1ec649c453e7501aaa4ff60d9662afd85f34
-
Filesize
10.0MB
MD576bef9b8bb32e1e54fe1054c97b84a10
SHA105dfea2a3afeda799ab01bb7fbce628cacd596f4
SHA25697b978a19edd4746e9a44d9a44bb4bc519e127a203c247837ec0922f573449e3
SHA5127330df8129e7a0b7b3655498b2593321595ec29445ea193c8f473c593590f5701eb7125ff6e5cde970c54765f9565fa51c2c54af6e2127f582ab45efa7a3a0f6
-
Filesize
473KB
MD5ef4291ace01485ee773183ee3c1ed5c4
SHA19c9d32813a733ebceb25c0dbb9f85ef27f6e0a0f
SHA25685f238fb7ace3cbdf7c29c72b01307c440f13491b07a509cbc5b9f257a637164
SHA512a98bfe1845a712943687f0b20d1904bae1b6836ea37f8a2053872f938dceb2f391fadd3db034c0b8563c0b1ab3d4506d13b613ed51780ef10e813c085c830f82
-
Filesize
7.2MB
MD560e42e83b260582fc96aaf43293d99e1
SHA1c548a10873f9a57e18c7fbb1fe89685f4cf1ba84
SHA25625d49934fc220b169cadeb21fc99dc2a8fb1dd5a4f244265799392f0f5f2f8f8
SHA5126a905e2b9427fb6e4a53080afdc2ae9dc32c54aab5460f88f7d3fd16e7e9a841d332057f58942d54defe91361a54d3cbedba295399cead754f353f80f92f238b
-
Filesize
313KB
MD53f6f4b2c2f24e3893882cdaa1ccfe1a3
SHA1b021cca30e774e0b91ee21b5beb030fea646098f
SHA256bb165eaa51456b52fcbdf7639ee727280e335a1f6b4cfb91afc45222895b564f
SHA512bd80ddaa87f41cde20527ff34817d98605f11b30a291e129478712ebebe47956dbd49a317d3eeb223adf736c34750b59b68ad9d646c661474ad69866d5a53c5c
-
Filesize
5.1MB
MD5f5ab76d2b17459b5288b6269b0925890
SHA175be4046f33919340014a88815f415beb454a641
SHA2564f29587bcd952de1dbc0b98df0aa506bd9fcf447e6a7258c5eb7e9eb780e6d6c
SHA5126ec6a08418743adb5e20218b73169be4f45f5458592219497c3718e620e37871876788937418f1341e0023c1137f9cac715e6bb941f4690febdda993b072feab
-
Filesize
132B
MD55fb66ddc54d5d390c97c98894feadcd8
SHA1df95a98549a07b49a652c60b7d0f49555614d03a
SHA2567e4e9fbd7e7cff709225d8af4abe2cb95de3e56876307c4a14008c6dedd5b103
SHA5121d797e880dfa8d50de9082758068d9cab127fdd6d4e4010289e5342dcd37c273f2e7d82001301c7007f346644b70674f6ff69d49b6ad22c9de30419f34cabda9
-
Filesize
2.5MB
MD5babaa1b5f25831ad2930e1994ae62125
SHA1d4c6a5829a67ec5cf6326e26dc53f69a4264deae
SHA2562c65fabc4a51709e868a4d095abac71a76f61c268cf5c245ef09a668149d6f0f
SHA512c0bc58c5bed05ad55e8b6d87ad39a4dedd20e62801657421d5ccc7d82b27ca0e9c4ffec0b3970dfdb426c07d4354b2cecee41a3d763afbab1c4e1b7b4c21f3ef
-
Filesize
127KB
MD545eaa6389c23d4c73294a6133396b1f3
SHA1463fd2771e8a0a4390aa5419fff5dc1078c35c3c
SHA256aa6418d97356dca8fcc0dc843f7e62fb22b98a11b6fffaeb76a0b8282910615b
SHA512108f8eed7d69493e947f7d9e38e9c7c65033218690797091ee514980e1163976fe0d936c01359df22ddd707d78ce3638b2c7962b7c081b57e8b44fe353087edd
-
Filesize
4.3MB
MD522a17af7f3965cc53a53ea8c52a8341e
SHA1b3f21d247be28bc8d4861995a234fd1f212dc6c9
SHA25658064e37b75827f6c09e8bc394054fcf7cf503dd14188936209bc35601eeb26d
SHA51286171f4ed8f7d3a1c3620afbe3b1c08beba5ae624b298cf2d96e54262130da09c08cfe839e23819ff0b702c51ec44a9b429c7ceeee18bed79d47adabe35b59f5
-
Filesize
111KB
MD58c1ca4cee2b894f912e521bb03eb26a6
SHA17b9b3d08c3ea5c00a534deed4f9f62a72a557d90
SHA256227dd30f1f822ef3a4811a8d4996b511a625eb4047ed0c6f42232adc182e5f2e
SHA512a2038e036a37c58637c0b9415307501736ecc60021af4f1e297e72457e3e4b8c6c260e15ba9b4ef909ac7da78b89e575b64573325f726dc2dff7c66c3212bbd2
-
Filesize
545KB
MD5d021de4eac5284a1a2658fd43fdd4341
SHA1f770717b2b27a80f998b16e6135c485cf472cf2e
SHA256569484dd6b982e56710e71dbcc477a2b5b087d187ab944d1697f99f0c86a0355
SHA512319c9a37f657ae7831cbe759108041c3a9c2db74a7afaf0b8cae503c5714e766e08d563542881ec9676d62ecdeabba63c6255600ecac87440fc17feeb2463eed
-
Filesize
1020KB
MD5740c3f83d6076a6f114def998f29c66c
SHA1f4329649ccef980805a2a137b662b734ac13f659
SHA256779922e30608e92d8471cb96b42edc2d86f6d8d94e438675be61bbe4107bef9f
SHA512285b7711a9e9efbbcdb70f9238e4ec5eb7fcba3fa9517acf44c9b824057d921287013e7cff11dd7173990cbf1eec8399b7885603311f46780e836580ceda3f27
-
Filesize
53KB
MD5e8063708daffd3e1a2c1ca1041f5b0fb
SHA1c2d001cf20776f2374e7998d93c6d48ca225a0cb
SHA2561b48b37ea89744bce667bf078872b08e760f83f09eaec057a38cecca20ae7d80
SHA51249a3e364c57192ee483ad6d4a021b2d531eb71fa70dc428c0aab15b6b1319a0d0f28c2697c18a32d5394baac9bd6cffb8131ea438f0a4c7da2fe11f627cf7edb
-
Filesize
94KB
MD55797d2a762227f35cdd581ec648693a8
SHA1e587b804db5e95833cbd2229af54c755ee0393b9
SHA256c51c64dfb7c445ecf0001f69c27e13299ddcfba0780efa72b866a7487b7491c7
SHA5125c4de4f65c0338f9a63b853db356175cae15c2ddc6b727f473726d69ee0d07545ac64b313c380548211216ea667caf32c5a0fd86f7abe75fc60086822bc4c92e
-
Filesize
6.1MB
MD5aa91dae58c533706ad15d3ab62ab5383
SHA119bdd6b58bfef88ba55dbe12914a9ce21053b55e
SHA256e4343e4d2d48cd9ab421656f1a44dda2b24ce10704fcb972242cfb0b8d66d1cd
SHA512e4f00f56e1406254c41d8886dc4254e1e58e9f209c5fdee617f7cec36535e078635d96b31b4954ea09bc0b4a219018d6026da471e177820e577f086c54fe8b8b
-
Filesize
232KB
MD50311460f9c96343dc53a6db26ed8f468
SHA1d76509b4ff0659ff74bb3a4454cdd8ee382af6b9
SHA2564811a2181c9820ebf130a100bb50f57d580a0baae4c6b1044ea0d52efb9e91ec
SHA51271397d3042009a5d0f21a07303e77a01eb0edc633ede0303e04b86134016af732395f89dfc76521cb55d854f8ac388bb2352d43009b54de612ea28f1a01894f8
-
Filesize
154KB
MD582d490393a18a87b4043e4774ca7a6b8
SHA164958e6f5ed80b7073e67c0003bb8c6818850708
SHA256f6cc7ebfbcf05ef6db54ba793eb4b3bccd874f7d3d465e616c5155ed6c522b50
SHA5120f3788e02c623c19d0a1b879d3a449c3cdd9f75556b540c952e1ebb5af72efdfe6ddafcd2656f7119b6b4cfb59b066f4c823e627d86c8f9e639806f0bd7f0ca1
-
Filesize
7.8MB
MD5681221b2a7490b91a1ddf03b3cf62177
SHA11bcb3e19de477a6a9c9b7660cb1c16665f82fcb4
SHA2564ed70e64a72e7c81a50dce103d227f526013d1ac30a3a991f0bcd86aa4a114f7
SHA51267053d20a482e6e4237a0c4c5bfd17cc25c18cd89626a621c048f6e9a890507d8cea2083b9769d55268d466f1b3199276ff272969fdf676b1ef6a25ec471516e
-
Filesize
308KB
MD54f9855957a9e04023166e3619d233e26
SHA145478661f419b425a06380c3e89f101247fc53bb
SHA256fb73b8c3034f2cf44b2a82f2820f1b6975b4e8bb63aa8b5e476063b6797174c8
SHA512817ecf32b82b2dcb5d78082e9f02e191c7d09a1c799391906aa83ad80f016f55e8ae7a5248eb5c8a3e776e4cc9b519ca0b13f03775e77893eb520080da7db76e
-
Filesize
168KB
MD5d276f526d6af118924193274b8456df4
SHA119043bde20a58102d48e94a90074ab76cea9401d
SHA2568613412ebcf462373d4d50f5729f5b9a61ef2b5c599b267f750276c8e29caf25
SHA5124babc0c7df37a873053b6df8d3a3ad80a7231fbfbaae844297730bc4035c00a248812634a37ed12ccf569b0c250d0f15a153dcda4403f335e5ce270d4e96e186
-
Filesize
471KB
MD56503b392ac5c25ff020189fa38fbaecb
SHA150fb4f7b765ac2b0da07f3759752dbc9d6d9867b
SHA256add78f3f85f0b173cbe917871821f74c5afe0a6562462762b181180d16df4470
SHA5129c12fff1686845a2c0b43d35a8572f97e950f232f1ce5690fd1212f48c171edbcc5d725754f10a66599b0823ac0c995c7212e263b7e02ea0ed9f2d2b937fa760
-
Filesize
4.9MB
MD5afb174ccd1abb292da14779a079d4282
SHA1ddd74e61c48c4445f1b3fa886b7c28b0de3f1859
SHA256a32c3fbbf74699a10e7642bf4901191f29c88c5aec93ae7ba28c79ab28462a69
SHA512fddd4d70dc6b8d424adfa509ad145845d13d898eaedb1706de357cf1dcd4eb25fe581c9dc58c1de0954b1a10b232934d219563a1e2e8ed1bc01412bfc789cbfc
-
Filesize
106B
MD58642dd3a87e2de6e991fae08458e302b
SHA19c06735c31cec00600fd763a92f8112d085bd12a
SHA25632d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9
SHA512f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f
-
Filesize
894KB
MD57ba000aece0d376e6f77e4c2f48f69c8
SHA124b103a2d9d5d742783ad3ecbfeb2cc57bd711c6
SHA2561f8b647f161f20d45d554e349b3e5ef0b7b5da8c7bdbc1ff631d37dc9c819503
SHA512d051ed9d1b9c28cd38da020cebe8b58da53c520f8686dc08fb9e626a9751c23fc43b97b2c309314e3f9a94f1eea448b77657c955c7b22aaadc6c0753b85f744c
-
Filesize
100KB
MD5c6a6e03f77c313b267498515488c5740
SHA13d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA5129870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
Filesize
9KB
MD5466179e1c8ee8a1ff5e4427dbb6c4a01
SHA1eb607467009074278e4bd50c7eab400e95ae48f7
SHA2561e40211af65923c2f4fd02ce021458a7745d28e2f383835e3015e96575632172
SHA5127508a29c722d45297bfb090c8eb49bd1560ef7d4b35413f16a8aed62d3b1030a93d001a09de98c2b9fea9acf062dc99a7278786f4ece222e7436b261d14ca817
-
Filesize
6KB
MD5ec0504e6b8a11d5aad43b296beeb84b2
SHA191b5ce085130c8c7194d66b2439ec9e1c206497c
SHA2565d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962
SHA5123f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
424KB
MD580e44ce4895304c6a3a831310fbf8cd0
SHA136bd49ae21c460be5753a904b4501f1abca53508
SHA256b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
SHA512c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df
-
Filesize
2KB
MD56f7302434e58f392a056f4e0114f5abd
SHA14537ca788e396655772b1fa3b110749a3b5cd41d
SHA256544132a3d60ca461925e201209946383675b050b32106d2dcad798c3aa7a222e
SHA512f6d94325e0d99f53e86e32fb15f95ce13ce3409261361181fb8d2fb97b63027094ffcc1c139082a114341c2c0f4d2d6648906e2d20ae0b14cdba6853fcacbcdf
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
300B
MD545c36931e252050e3dff29eb9afaf2b0
SHA18b9559bcb00c290b1ab56e1a2f4f43ff8a96d6aa
SHA2565d76752383fd1655b2537f15974a8bdf42690bf83acbbf35a4c9c3531385e966
SHA5125bce0cbe68722170b45ff6ac72a8c59ea07fea87201eceef02d64319fda2bbcda9f4cb1d7e2644d8105a9994c3fe11ed4cebb37758258ea3382af174cdddaf03
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
275KB
MD52232c07e354364e0eb1dc80024593826
SHA165bb4232c0416cfb2c158bfc32a7732ad72cee72
SHA256fb1cd5e7c3ea30dfafd3cc1862e311388361d896610db28c63716da9d71e8f3f
SHA512f0d295565b209f4dedd2a79123fa54ff9b8cbb173f14463ab3d3707b8d87aad84b05c2898478ecc148e29d02fa07ddda9499795e0ceafc2982c0adbd570a3572
-
Filesize
9KB
MD5faba2ccb8fe366fd281ca6be6d2bb7c2
SHA1bb7bd32a21f3eba652fde24146387ffc5278143e
SHA256602187e5470ddbdf9421045bb0515f358c88bf88f59fd8a886fb6373da5d0f82
SHA512ec424a545e2598f299706499dab07b4d12b0734a52f928216a53bca2b7f384b97bd4fc092d7d68de636a75daf79ac392c4b49b7251ec011236de1659253d6214
-
Filesize
37KB
MD51945d7d1f56b67ae1cad6ffe13a01985
SHA12c1a369f9e12e5c6549439e60dd6c728bf1bffde
SHA256eb58bf00df7b4f98334178e75df3348c609ea5c6c74cf7f185f363aa23976c8b
SHA51209af87898528eaa657d46c79b7c4ebc0e415478a421b0b97355294c059878178eb32e172979ee9b7c59126861d51a5831e337a96666c43c96cb1cf8f11bc0a0f
-
Filesize
1KB
MD58480579050970b0812cc3d9a1bce1340
SHA1edebebd090602f4eee375ad754c8566d4fda23cb
SHA25644098408ab9611dd99a38e140c7fb1ca5dce6eb2d5f0d5e500547ac1ba5d235b
SHA51246de9202c3cf0ddbf19f9e0e02ec17530f2722abfa08669fd30a6095ce2342fa89a2cc59c1d47afd82b48c915bb95f4c6d16e7c21129a9c8f09c2bf239566933
-
Filesize
172KB
MD577c35abb6ac88f1118c3cb0fa8a253fa
SHA13fea73e15b59d8f1b7f16011ea2ef8d659df491b
SHA256e150ae302462bf0f06bfc0ee83512f3ea949f309e81e2a43b29914e451a58f88
SHA51263ee35e3cbac5485a59c1c55a669d52b12d3bf6d3dc5ed3f1269739c05de05340a00cc47152f2bbdfeb7fd5229da63ac8081ee592ff4f3b3cc0f4f2384f94323