Resubmissions
11/03/2025, 16:25
250311-txd2jayygs 1011/03/2025, 16:25
250311-tw2ffaxqz6 1011/03/2025, 01:47
250311-b7vsxswzdv 1009/03/2025, 02:19
250309-cr474awzex 10Analysis
-
max time kernel
55s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/03/2025, 01:47
Static task
static1
Behavioral task
behavioral1
Sample
72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe
Resource
win10v2004-20250217-en
General
-
Target
72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe
-
Size
42.2MB
-
MD5
357b5f06e0a084f8c37e6a38afa29c76
-
SHA1
e7de8b81872b571e9e0fe6dcc48c94dfe8d50318
-
SHA256
72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528
-
SHA512
ab539349cb46cdf4c2ce48569a123abc9634adebe68e0ccd19c89f008692651deb727892c1476796d0229965ed25d96b73735ce9ab86fad2bf67abd65ae9cd36
-
SSDEEP
786432:M129ofpkXbsydPnpeWjrqBqe4k51vJ8EhsI14StdNoIvTe3HzuREJgIkH5:Y29AwsydPnpXqBq4pmEhh4Sj9Te3TGEk
Malware Config
Extracted
pony
http://www.orway.bplaced.net/pony/gate.php
http://www.socialnetwork-toolbase.de/ucs/pny/gate.php
http://btcminer.ddns.net/pony/gate.php
Extracted
darkcomet
SPREADDDD
852000.ddns.net:1604
btcminer.ddns.net:1604
p2k15.ddns.net:1604
DC_MUTEX-H0WQWZT
-
gencode
skMDhHCCHML8
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Hawkeye family
-
Pony family
-
Detected Nirsoft tools 5 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/2908-654-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral1/memory/2908-655-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral1/memory/2908-653-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral1/memory/2908-650-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral1/memory/2908-648-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft -
NirSoft MailPassView 5 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/2908-654-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral1/memory/2908-655-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral1/memory/2908-653-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral1/memory/2908-650-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral1/memory/2908-648-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 5 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/2908-654-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral1/memory/2908-655-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral1/memory/2908-653-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral1/memory/2908-650-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral1/memory/2908-648-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\Geo\Nation divx.tmp -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk dlhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk dlhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk pusher.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk svhost.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 17 IoCs
pid Process 1100 divx.exe 2160 divx.tmp 2992 setacl_x86.exe 2592 setacl_x86.exe 2164 setacl_x64.exe 2464 setacl_x64.exe 1752 CodecTweakTool.exe 1768 CODECP~1.EXE 2460 codec.exe 2604 dlhost.exe 2612 svhost.exe 1740 pusher.exe 2152 dlhost.exe 2856 svhost.exe 2272 pusher.exe 2908 net.exe 2176 net.exe -
Loads dropped DLL 64 IoCs
pid Process 1100 divx.exe 2160 divx.tmp 2160 divx.tmp 2160 divx.tmp 2160 divx.tmp 2160 divx.tmp 2160 divx.tmp 2160 divx.tmp 2160 divx.tmp 2160 divx.tmp 2160 divx.tmp 2160 divx.tmp 1664 regsvr32.exe 2884 regsvr32.exe 2884 regsvr32.exe 2884 regsvr32.exe 2884 regsvr32.exe 2884 regsvr32.exe 2568 regsvr32.exe 2568 regsvr32.exe 2568 regsvr32.exe 2568 regsvr32.exe 2568 regsvr32.exe 2568 regsvr32.exe 2076 regsvr32.exe 2076 regsvr32.exe 2076 regsvr32.exe 2076 regsvr32.exe 2076 regsvr32.exe 2076 regsvr32.exe 2004 regsvr32.exe 2004 regsvr32.exe 2004 regsvr32.exe 964 regsvr32.exe 964 regsvr32.exe 964 regsvr32.exe 2620 regsvr32.exe 940 regsvr32.exe 2400 regsvr32.exe 2168 regsvr32.exe 2168 regsvr32.exe 2168 regsvr32.exe 2168 regsvr32.exe 2168 regsvr32.exe 1904 regsvr32.exe 1904 regsvr32.exe 1904 regsvr32.exe 1904 regsvr32.exe 1904 regsvr32.exe 1904 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 2160 divx.tmp 1668 regsvr32.exe 904 regsvr32.exe 2160 divx.tmp 2160 divx.tmp 696 Process not Found 2324 Process not Found 1236 Process not Found -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook vbc.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" CODECP~1.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 whatismyipaddress.com -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00070000000196a1-604.dat autoit_exe behavioral1/memory/2152-609-0x0000000000400000-0x0000000000512000-memory.dmp autoit_exe behavioral1/memory/2604-611-0x0000000000400000-0x0000000000512000-memory.dmp autoit_exe behavioral1/memory/2152-669-0x0000000000400000-0x0000000000512000-memory.dmp autoit_exe -
Drops file in System32 directory 27 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\x264vfw64.dll divx.tmp File opened for modification C:\Windows\SysWOW64\ac3acm.acm divx.tmp File opened for modification C:\Windows\SysWOW64\huffyuv.dll divx.tmp File opened for modification C:\Windows\system32\lagarith.dll divx.tmp File opened for modification C:\Windows\system32\ac3acm.acm divx.tmp File created C:\Windows\SysWOW64\is-KPIDA.tmp divx.tmp File created C:\Windows\SysWOW64\is-3LLN0.tmp divx.tmp File created C:\Windows\SysWOW64\is-Q0U17.tmp divx.tmp File opened for modification C:\Windows\system32\xvidcore.dll divx.tmp File opened for modification C:\Windows\system32\xvidvfw.dll divx.tmp File opened for modification C:\Windows\SysWOW64\xvidcore.dll divx.tmp File created C:\Windows\system32\is-GLIVI.tmp divx.tmp File created C:\Windows\system32\is-3I49O.tmp divx.tmp File created C:\Windows\SysWOW64\is-7POBO.tmp divx.tmp File created C:\Windows\system32\is-6TRPS.tmp divx.tmp File opened for modification C:\Windows\SysWOW64\lagarith.dll divx.tmp File opened for modification C:\Windows\SysWOW64\ff_vfw.dll divx.tmp File opened for modification C:\Windows\SysWOW64\x264vfw.dll divx.tmp File opened for modification C:\Windows\system32\x264vfw64.dll divx.tmp File opened for modification C:\Windows\system32\ff_vfw.dll divx.tmp File created C:\Windows\SysWOW64\is-8UAPF.tmp divx.tmp File created C:\Windows\system32\is-B8181.tmp divx.tmp File opened for modification C:\Windows\SysWOW64\xvidvfw.dll divx.tmp File opened for modification C:\Windows\SysWOW64\lameACM.acm divx.tmp File created C:\Windows\SysWOW64\is-BHSF3.tmp divx.tmp File created C:\Windows\system32\is-HQQS4.tmp divx.tmp File created C:\Windows\system32\is-3NC9T.tmp divx.tmp -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2152 set thread context of 2908 2152 dlhost.exe 64 PID 2152 set thread context of 2176 2152 dlhost.exe 65 PID 2272 set thread context of 1044 2272 pusher.exe 66 PID 2272 set thread context of 2340 2272 pusher.exe 68 PID 2856 set thread context of 2492 2856 svhost.exe 67 PID 2856 set thread context of 2740 2856 svhost.exe 69 PID 2908 set thread context of 1832 2908 net.exe 77 PID 2908 set thread context of 2840 2908 net.exe 78 -
resource yara_rule behavioral1/files/0x0006000000019926-594.dat upx behavioral1/memory/2460-601-0x0000000003930000-0x0000000003A42000-memory.dmp upx behavioral1/memory/2604-603-0x0000000000400000-0x0000000000512000-memory.dmp upx behavioral1/memory/2152-609-0x0000000000400000-0x0000000000512000-memory.dmp upx behavioral1/memory/2604-611-0x0000000000400000-0x0000000000512000-memory.dmp upx behavioral1/memory/1044-707-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1044-683-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1044-680-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1044-678-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2492-706-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2492-701-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2492-699-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2176-696-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2340-695-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2340-694-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1044-693-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1044-692-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2340-691-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2340-688-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2492-710-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2340-686-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2740-727-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2176-674-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2176-667-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2176-662-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2176-660-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2152-669-0x0000000000400000-0x0000000000512000-memory.dmp upx behavioral1/memory/1044-735-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2340-736-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2492-738-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2740-743-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Filters\LAV\LAVAudio.ax divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Filters\DirectVobSub64\vsfilter.dll divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow\libmpeg2_ff.dll divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\LAV\is-27KNV.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Tools\is-UGRE6.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow64\is-MGO17.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\Shaders\is-PN8KF.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow64\Languages\is-38359.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\LAV64\is-D9BLA.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\LAV64\is-EUH11.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Icons\is-JPNR6.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\Lang\is-5GUGS.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\Lang\is-30RNO.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow\Languages\is-ME4MM.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow64\Languages\is-A2GTU.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow64\Languages\is-GQV3Q.tmp divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Tools\CodecTweakTool.exe divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\Lang\mpcresources.pa.dll divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\Lang\mpcresources.th_TH.dll divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow\is-I19L7.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow\Languages\is-80UB6.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow\Languages\is-759GI.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\LAV\is-4GHRS.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\Haali\is-NBU0S.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\DirectVobSub64\is-3HTFU.tmp divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Tools\mediainfo.exe divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Filters\AC3Filter\ac3filter.ax divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow\ffmpeg.dll divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow64\libmpeg2_ff.dll divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\Haali\is-S9O11.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Tools\is-IP9QA.tmp divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\Lang\mpcresources.ro.dll divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\Lang\mpcresources.tt.dll divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow\Languages\is-483HG.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow64\Languages\is-OHC72.tmp divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\Lang\mpcresources.vi.dll divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow64\ff_unrar.dll divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow\ff_libfaad2.dll divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\Lang\mpcresources.sv.dll divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\Haali\is-KM3CP.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\LAV64\is-H8E2M.tmp divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Filters\MonkeySource.ax divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Filters\AC3Filter\ac3config.exe divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Filters\xvid.ax divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\Lang\is-1EPMV.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow\is-1K95D.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\is-0CHF6.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow64\Languages\is-PV8K4.tmp divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Filters\AC3Filter64\ac3filter.ax divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\Lang\mpcresources.eu.dll divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Filters\Haali\mkx.dll divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Icaros\32-bit\avcodec-ics-56.dll divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Tools\is-SJOND.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\Haali\is-2NBAT.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow64\is-SHUDB.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\LAV64\is-L0AMS.tmp divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\Lang\mpcresources.de.dll divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\is-TBC4C.tmp divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\Lang\mpcresources.en_GB.dll divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\Lang\mpcresources.pl.dll divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow64\is-IPQR7.tmp divx.tmp File created C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow64\Languages\is-SS46A.tmp divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow64\ff_libmad.dll divx.tmp File opened for modification C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\Lang\mpcresources.id.dll divx.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setacl_x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language codec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pusher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pusher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language divx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setacl_x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CodecTweakTool.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language divx.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 divx.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz divx.tmp -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\wmplayer.exe\SupportedTypes\.hdmov divx.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\KLCP.WMP.tp\PreferExecuteOnMismatch = "1" divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\KLCP.WMP.mxf\shell\Enqueue\MUIVerb = "@%SystemRoot%\\system32\\unregmp2.exe,-9800" divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\KLCP.WMP.oga\shell\Enqueue\command divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\KLCP.WMP.caf\shell\play divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\KLCP.WMP.ra\shell\play divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mplayerc64.ra\shell\enqueue divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MediaPlayerClassic.Autorun\shell\PlayMusicFiles\command divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.y4m divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mplayerc64.avs divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.mk3d regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.3gp\ShellEx\{E357FCCD-A995-4576-B01F-234630154E96} divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mplayerc64.webm\shell\enqueue\command\ = "\"C:\\Program Files (x86)\\K-Lite Codec Pack\\MPC-HC64\\mpc-hc64.exe\" /add \"%1\"" divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.hdmov\Shell\MediaInfo\Command\ = "\"C:\\Program Files (x86)\\K-Lite Codec Pack\\Tools\\MediaInfo.exe\" \"%1\"" divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.m4b\Shell\MediaInfo\Command divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mplayerc64.ifo\PreviousRegistration = "VLC.ifo" divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.m2t\Shell\MediaInfo\Command divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.mpeg divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\KLCP.WMP.rm\shell\Enqueue\command\DelegateExecute = "{45597c98-80f6-4549-84ff-752cf55e2d29}" divx.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{EE30215D-164F-4A92-A4EB-9D4C13390F9F}\FilterData = 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 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Media Type\Extensions\.tp\Source Filter = "{B98D13E7-55DB-4385-A33D-09FD1BA26338}" divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20ED4A03-6AFD-4FD9-980B-2F6143AA0892}\InprocServer32\ = "C:\\Program Files (x86)\\K-Lite Codec Pack\\Filters\\LAV64\\LAVAudio.ax" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mplayerc64.rm\shell\enqueue divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mpcpl divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0512B874-44F6-48F1-AFB5-6DE808DDE230}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A0606860-51BE-4CF6-99C0-7CE5F78AC2D8}\ = "DwString::GlobalInitializationW" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\KLCP.WMP.vob\shell\play\command divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mplayerc64.ram\shell\enqueue\command divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.k3g\PerceivedType = "video" divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9852A670-F845-491B-9BE6-EBD841B8A613}\ = "VSFilter (auto-loading version)" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mplayerc64.mkv\shell\open\command\ = "\"C:\\Program Files (x86)\\K-Lite Codec Pack\\MPC-HC64\\mpc-hc64.exe\" \"%1\"" divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mplayerc64.mpv2\shell\enqueue\command\ = "\"C:\\Program Files (x86)\\K-Lite Codec Pack\\MPC-HC64\\mpc-hc64.exe\" /add \"%1\"" divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.mpgx\Shell\MediaInfo\Command divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{60765CF5-01C2-4EE7-A44B-C791CF25FEA0}\ = "DVSMainPPage" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\mpc-hc64.exe\ = "Media Player Classic (x64)" divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ape\ShellEx\{BB2E617C-0920-11D1-9A0B-00C04FC2D6C1} divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\KLCP.WMP.ape\shell\open\command divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mplayerc64.m2v\shell\enqueue divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mplayerc64.wma\shell divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.ac3 divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.amr\PerceivedType = "audio" divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A0606860-51BE-4CF6-99C0-7CE5F78AC2D8}\InprocServer32\ = "C:\\Program Files (x86)\\K-Lite Codec Pack\\Filters\\ffdshow64\\ffdshow.ax" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\KLCP.WMP.trp\shell\Enqueue\command\DelegateExecute = "{45597c98-80f6-4549-84ff-752cf55e2d29}" divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mplayerc64.mpls\shell\enqueue\command\ = "\"C:\\Program Files (x86)\\K-Lite Codec Pack\\MPC-HC64\\mpc-hc64.exe\" /add \"%1\"" divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mplayerc64.caf\shell\open\command divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\mpc-hc64.exe\SupportedTypes\.mpp divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\wmplayer.exe\SupportedTypes\.oga divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{53D9DE0B-FC61-4650-9773-74D13CC7E582}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\KLCP.WMP.ogm\shell\play\ = "&Play with WMP" divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mplayerc64.asf\shell divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\KLCP.WMP.ac3\shell\Enqueue\MUIVerb = "@%SystemRoot%\\system32\\unregmp2.exe,-9800" divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mp2v\ShellEx\{E357FCCD-A995-4576-B01F-234630154E96} divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.f4v\Shell\MediaInfo\Command\ = "\"C:\\Program Files (x86)\\K-Lite Codec Pack\\Tools\\MediaInfo.exe\" \"%1\"" divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.m1v\Shell divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE30215D-164F-4A92-A4EB-9D4C13390F9F}\InprocServer32\ = "C:\\Program Files (x86)\\K-Lite Codec Pack\\Filters\\LAV\\LAVVideo.ax" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{E8E73B6B-4CB3-44A4-BE99-4F7BCB96E491}\CLSID = "{E8E73B6B-4CB3-44A4-BE99-4F7BCB96E491}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mplayerc64.ra\shell\open\command divx.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.ac3\Shell\MediaInfo divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{93A22E7A-5091-45EF-BA61-6DA26156A5D0}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0512B874-44F6-48F1-AFB5-6DE808DDE230}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mplayerc64.mpv2\shell\open divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\KLCP.WMP.vob\ = "DVD VOB File" divx.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\KLCP.WMP.ra\EditFlags = 00000000 divx.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.flac\FullDetails = "prop:System.PropGroup.Description;System.Title;System.Media.SubTitle;System.Comment;System.Rating;System.PropGroup.Media;System.Music.Artist;System.Music.AlbumArtist;System.Music.AlbumTitle;System.Media.Year;System.Music.TrackNumber;System.Music.Genre;System.Media.Duration;System.PropGroup.Audio;System.Audio.ChannelCount;*Icaros.BitDepth;System.Audio.EncodingBitrate;System.Audio.SampleRate;System.PropGroup.Origin;System.Media.Publisher;System.Media.AuthorUrl;System.Copyright;System.PropGroup.Content;System.Music.Composer;System.Music.Conductor;System.Music.Mood;System.PropGroup.FileSystem;System.ItemNameDisplay;System.ItemType;System.ItemFolderPathDisplay;System.DateCreated;System.DateModified;System.Size;System.FileAttributes;System.OfflineAvailability;System.OfflineStatus;System.SharedWith;System.FileOwner;System.ComputerName" regsvr32.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2160 divx.tmp 2160 divx.tmp 2160 divx.tmp 2160 divx.tmp 2152 dlhost.exe 2152 dlhost.exe 2152 dlhost.exe 2152 dlhost.exe 2152 dlhost.exe 2272 pusher.exe 2272 pusher.exe 2152 dlhost.exe 2856 svhost.exe 2856 svhost.exe 2152 dlhost.exe 2152 dlhost.exe 2272 pusher.exe 2272 pusher.exe 2272 pusher.exe 2272 pusher.exe 2856 svhost.exe 2272 pusher.exe 2272 pusher.exe 2856 svhost.exe 2856 svhost.exe 2856 svhost.exe 2856 svhost.exe 2856 svhost.exe 2340 vbc.exe 2176 net.exe 2340 vbc.exe 2340 vbc.exe 2340 vbc.exe 2340 vbc.exe 2340 vbc.exe 2340 vbc.exe 2176 net.exe 2176 net.exe 2176 net.exe 2176 net.exe 2176 net.exe 2176 net.exe 2740 vbc.exe 2740 vbc.exe 2740 vbc.exe 2740 vbc.exe 2740 vbc.exe 2740 vbc.exe 2740 vbc.exe 2176 net.exe 2340 vbc.exe 2740 vbc.exe 2176 net.exe 2340 vbc.exe 2740 vbc.exe 2340 vbc.exe 2176 net.exe 2740 vbc.exe 2340 vbc.exe 2176 net.exe 2740 vbc.exe 2340 vbc.exe 2176 net.exe 2740 vbc.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeBackupPrivilege 2992 setacl_x86.exe Token: SeRestorePrivilege 2992 setacl_x86.exe Token: SeTakeOwnershipPrivilege 2992 setacl_x86.exe Token: SeBackupPrivilege 2592 setacl_x86.exe Token: SeRestorePrivilege 2592 setacl_x86.exe Token: SeBackupPrivilege 2164 setacl_x64.exe Token: SeRestorePrivilege 2164 setacl_x64.exe Token: SeTakeOwnershipPrivilege 2164 setacl_x64.exe Token: SeBackupPrivilege 2464 setacl_x64.exe Token: SeRestorePrivilege 2464 setacl_x64.exe Token: SeImpersonatePrivilege 1044 vbc.exe Token: SeTcbPrivilege 1044 vbc.exe Token: SeChangeNotifyPrivilege 1044 vbc.exe Token: SeCreateTokenPrivilege 1044 vbc.exe Token: SeBackupPrivilege 1044 vbc.exe Token: SeRestorePrivilege 1044 vbc.exe Token: SeIncreaseQuotaPrivilege 1044 vbc.exe Token: SeAssignPrimaryTokenPrivilege 1044 vbc.exe Token: SeIncreaseQuotaPrivilege 2492 vbc.exe Token: SeSecurityPrivilege 2492 vbc.exe Token: SeTakeOwnershipPrivilege 2492 vbc.exe Token: SeLoadDriverPrivilege 2492 vbc.exe Token: SeSystemProfilePrivilege 2492 vbc.exe Token: SeSystemtimePrivilege 2492 vbc.exe Token: SeProfSingleProcessPrivilege 2492 vbc.exe Token: SeIncBasePriorityPrivilege 2492 vbc.exe Token: SeCreatePagefilePrivilege 2492 vbc.exe Token: SeBackupPrivilege 2492 vbc.exe Token: SeRestorePrivilege 2492 vbc.exe Token: SeShutdownPrivilege 2492 vbc.exe Token: SeDebugPrivilege 2492 vbc.exe Token: SeSystemEnvironmentPrivilege 2492 vbc.exe Token: SeChangeNotifyPrivilege 2492 vbc.exe Token: SeRemoteShutdownPrivilege 2492 vbc.exe Token: SeUndockPrivilege 2492 vbc.exe Token: SeManageVolumePrivilege 2492 vbc.exe Token: SeImpersonatePrivilege 2492 vbc.exe Token: SeCreateGlobalPrivilege 2492 vbc.exe Token: 33 2492 vbc.exe Token: 34 2492 vbc.exe Token: 35 2492 vbc.exe Token: SeDebugPrivilege 2908 net.exe -
Suspicious use of FindShellTrayWindow 22 IoCs
pid Process 2160 divx.tmp 2460 codec.exe 2460 codec.exe 2604 dlhost.exe 2604 dlhost.exe 2460 codec.exe 2612 svhost.exe 2612 svhost.exe 1740 pusher.exe 1740 pusher.exe 2604 dlhost.exe 2152 dlhost.exe 2152 dlhost.exe 2612 svhost.exe 1740 pusher.exe 2272 pusher.exe 2272 pusher.exe 2856 svhost.exe 2856 svhost.exe 2152 dlhost.exe 2272 pusher.exe 2856 svhost.exe -
Suspicious use of SendNotifyMessage 21 IoCs
pid Process 2460 codec.exe 2460 codec.exe 2604 dlhost.exe 2604 dlhost.exe 2460 codec.exe 2612 svhost.exe 2612 svhost.exe 1740 pusher.exe 1740 pusher.exe 2604 dlhost.exe 2152 dlhost.exe 2152 dlhost.exe 2612 svhost.exe 1740 pusher.exe 2272 pusher.exe 2272 pusher.exe 2856 svhost.exe 2856 svhost.exe 2152 dlhost.exe 2272 pusher.exe 2856 svhost.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1664 regsvr32.exe 2400 regsvr32.exe 2340 vbc.exe 2176 net.exe 2492 vbc.exe 2740 vbc.exe 2908 net.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1100 1756 72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe 29 PID 1756 wrote to memory of 1100 1756 72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe 29 PID 1756 wrote to memory of 1100 1756 72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe 29 PID 1756 wrote to memory of 1100 1756 72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe 29 PID 1756 wrote to memory of 1100 1756 72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe 29 PID 1756 wrote to memory of 1100 1756 72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe 29 PID 1756 wrote to memory of 1100 1756 72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe 29 PID 1100 wrote to memory of 2160 1100 divx.exe 30 PID 1100 wrote to memory of 2160 1100 divx.exe 30 PID 1100 wrote to memory of 2160 1100 divx.exe 30 PID 1100 wrote to memory of 2160 1100 divx.exe 30 PID 1100 wrote to memory of 2160 1100 divx.exe 30 PID 1100 wrote to memory of 2160 1100 divx.exe 30 PID 1100 wrote to memory of 2160 1100 divx.exe 30 PID 2160 wrote to memory of 1664 2160 divx.tmp 32 PID 2160 wrote to memory of 1664 2160 divx.tmp 32 PID 2160 wrote to memory of 1664 2160 divx.tmp 32 PID 2160 wrote to memory of 1664 2160 divx.tmp 32 PID 2160 wrote to memory of 1664 2160 divx.tmp 32 PID 2160 wrote to memory of 1664 2160 divx.tmp 32 PID 2160 wrote to memory of 1664 2160 divx.tmp 32 PID 2160 wrote to memory of 2884 2160 divx.tmp 33 PID 2160 wrote to memory of 2884 2160 divx.tmp 33 PID 2160 wrote to memory of 2884 2160 divx.tmp 33 PID 2160 wrote to memory of 2884 2160 divx.tmp 33 PID 2160 wrote to memory of 2884 2160 divx.tmp 33 PID 2160 wrote to memory of 2884 2160 divx.tmp 33 PID 2160 wrote to memory of 2884 2160 divx.tmp 33 PID 2160 wrote to memory of 2568 2160 divx.tmp 34 PID 2160 wrote to memory of 2568 2160 divx.tmp 34 PID 2160 wrote to memory of 2568 2160 divx.tmp 34 PID 2160 wrote to memory of 2568 2160 divx.tmp 34 PID 2160 wrote to memory of 2568 2160 divx.tmp 34 PID 2160 wrote to memory of 2568 2160 divx.tmp 34 PID 2160 wrote to memory of 2568 2160 divx.tmp 34 PID 2160 wrote to memory of 2076 2160 divx.tmp 35 PID 2160 wrote to memory of 2076 2160 divx.tmp 35 PID 2160 wrote to memory of 2076 2160 divx.tmp 35 PID 2160 wrote to memory of 2076 2160 divx.tmp 35 PID 2160 wrote to memory of 2076 2160 divx.tmp 35 PID 2160 wrote to memory of 2076 2160 divx.tmp 35 PID 2160 wrote to memory of 2076 2160 divx.tmp 35 PID 2160 wrote to memory of 2004 2160 divx.tmp 36 PID 2160 wrote to memory of 2004 2160 divx.tmp 36 PID 2160 wrote to memory of 2004 2160 divx.tmp 36 PID 2160 wrote to memory of 2004 2160 divx.tmp 36 PID 2160 wrote to memory of 2004 2160 divx.tmp 36 PID 2160 wrote to memory of 2004 2160 divx.tmp 36 PID 2160 wrote to memory of 2004 2160 divx.tmp 36 PID 2160 wrote to memory of 964 2160 divx.tmp 37 PID 2160 wrote to memory of 964 2160 divx.tmp 37 PID 2160 wrote to memory of 964 2160 divx.tmp 37 PID 2160 wrote to memory of 964 2160 divx.tmp 37 PID 2160 wrote to memory of 964 2160 divx.tmp 37 PID 2160 wrote to memory of 964 2160 divx.tmp 37 PID 2160 wrote to memory of 964 2160 divx.tmp 37 PID 2160 wrote to memory of 2620 2160 divx.tmp 38 PID 2160 wrote to memory of 2620 2160 divx.tmp 38 PID 2160 wrote to memory of 2620 2160 divx.tmp 38 PID 2160 wrote to memory of 2620 2160 divx.tmp 38 PID 2160 wrote to memory of 2620 2160 divx.tmp 38 PID 2160 wrote to memory of 2620 2160 divx.tmp 38 PID 2160 wrote to memory of 2620 2160 divx.tmp 38 PID 2160 wrote to memory of 940 2160 divx.tmp 39 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe"C:\Users\Admin\AppData\Local\Temp\72a4f802a0818076f00fdf7ca1710fad0f35244e472a74845f9cf6c2644cc528.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\divx.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\divx.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\is-R2M9T.tmp\divx.tmp"C:\Users\Admin\AppData\Local\Temp\is-R2M9T.tmp\divx.tmp" /SL5="$4021A,40413792,257024,C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\divx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow\ffdshow.ax"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1664
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\K-Lite Codec Pack\Filters\LAV\LAVAudio.ax"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2884
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\K-Lite Codec Pack\Filters\LAV\LAVVideo.ax"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2568
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\K-Lite Codec Pack\Filters\LAV\LAVSplitter.ax"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2076
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\K-Lite Codec Pack\Filters\Haali\mkx.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2004
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\K-Lite Codec Pack\Filters\Haali\splitter.ax"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:964
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\K-Lite Codec Pack\Filters\DirectVobSub\vsfilter.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2620
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\K-Lite Codec Pack\Filters\DirectVobSub64\vsfilter.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:940
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\K-Lite Codec Pack\Filters\ffdshow64\ffdshow.ax"4⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2400
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\K-Lite Codec Pack\Filters\LAV64\LAVAudio.ax"4⤵
- Loads dropped DLL
- Modifies registry class
PID:2168
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\K-Lite Codec Pack\Filters\LAV64\LAVVideo.ax"4⤵
- Loads dropped DLL
PID:1904
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\K-Lite Codec Pack\Filters\LAV64\LAVSplitter.ax"4⤵
- Loads dropped DLL
PID:760
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\K-Lite Codec Pack\Icaros\32-bit\IcarosPropertyHandler.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1668
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\K-Lite Codec Pack\Icaros\64-bit\IcarosPropertyHandler.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:904
-
-
C:\Program Files (x86)\K-Lite Codec Pack\Tools\setacl_x86.exe"C:\Program Files (x86)\K-Lite Codec Pack\Tools\setacl_x86.exe" -ot reg -on "HKLM\SOFTWARE\Microsoft\DirectShow\Preferred" -actn setowner -ownr "n:S-1-5-32-544;s:y"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Program Files (x86)\K-Lite Codec Pack\Tools\setacl_x86.exe"C:\Program Files (x86)\K-Lite Codec Pack\Tools\setacl_x86.exe" -ot reg -on "HKLM\SOFTWARE\Microsoft\DirectShow\Preferred" -actn ace -ace "n:S-1-5-32-544;p:full;s:y;i:so,sc;m:grant;w:dacl"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Program Files (x86)\K-Lite Codec Pack\Tools\setacl_x64.exe"C:\Program Files (x86)\K-Lite Codec Pack\Tools\setacl_x64.exe" -ot reg -on "HKLM\SOFTWARE\Microsoft\DirectShow\Preferred" -actn setowner -ownr "n:S-1-5-32-544;s:y"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
C:\Program Files (x86)\K-Lite Codec Pack\Tools\setacl_x64.exe"C:\Program Files (x86)\K-Lite Codec Pack\Tools\setacl_x64.exe" -ot reg -on "HKLM\SOFTWARE\Microsoft\DirectShow\Preferred" -actn ace -ace "n:S-1-5-32-544;p:full;s:y;i:so,sc;m:grant;w:dacl"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Program Files (x86)\K-Lite Codec Pack\Tools\CodecTweakTool.exe"C:\Program Files (x86)\K-Lite Codec Pack\Tools\CodecTweakTool.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1752
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CODECP~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CODECP~1.EXE2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\codec.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\codec.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\dlhost.exeC:\Users\Admin\AppData\Local\Temp\dlhost.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\dlhost.exe"C:\Users\Admin\AppData\Local\Temp\dlhost.exe" /AutoIt3ExecuteScript C:\Users\Admin\AppData\Local\Temp\JkRfuCdPC5⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\net.exe"C:\Users\Admin\AppData\Local\Temp\net.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2908 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"7⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:1832
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"7⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-
-
C:\Users\Admin\AppData\Local\Temp\net.exe"C:\Users\Admin\AppData\Local\Temp\net.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Windows\SysWOW64\cmd.execmd /c del /q /f %temp%\*.lnk7⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svhost.exeC:\Users\Admin\AppData\Local\Temp\svhost.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe" /AutoIt3ExecuteScript C:\Users\Admin\AppData\Local\Temp\kFbyGHnpo5⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2856 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2492
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Windows\SysWOW64\cmd.execmd /c del /q /f %temp%\*.lnk7⤵
- System Location Discovery: System Language Discovery
PID:2256
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pusher.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pusher.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pusher.exe"C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pusher.exe" /AutoIt3ExecuteScript C:\Users\Admin\AppData\Local\Temp\LWyrXbgcf4⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2272 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"5⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:1044
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2340 -
C:\Windows\SysWOW64\cmd.execmd /c del /q /f %temp%\*.lnk6⤵
- System Location Discovery: System Language Discovery
PID:2120
-
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x13c1⤵PID:2796
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD51368ade1a6690d364dbf063fed88564c
SHA1cfa31815f7246199be40e42d69e01183dae9a473
SHA2563830920e7bc7a076aedfbc5506d3472a4bcdb73c502273c5f65878ae74b594cd
SHA512ae7c000444dcde2834fe6efbea1469bc8625e42eef5025d6d6a12aa2d7f5e3abe0a7e48e6836829d721f1c14df19ebbdaf3aeb2e4292da475f62310bdf6b68ea
-
Filesize
1.5MB
MD552e76ec0bb8107ccabe309cefc7e4861
SHA1a3578963ac38bd97f4f838202979f63df057a773
SHA256bb095360972ec84557e1cddab05a49a0b7e04def85d48dacaa8ee5a70e43a4c6
SHA5126ee3e1668b8ac18ebc5860aa9a429d428abf2793e2cbfac724909b6038bce043305fd9db35727b4f8fb0a8102e2203b0d2b7ce6f18ce004206f22af241caa95d
-
Filesize
24KB
MD53d46f41fed16db116dafab61458cfa24
SHA1bdd788e6e7d11291ecf0bcc159964e6c75a6e0ca
SHA2560331fe01f1843f6116f735abb1675d9cf51e29970c9a6ec876a9440013862892
SHA5125468daf4e6064b2a61641730aaeec95c729ea8412a778b6d5897fd9212659632e90afabc06e9e4eee102fbff728ae4eb58103e9a1ac3f5223111c2a9bfca9453
-
Filesize
541KB
MD52b9406c107139fc080035f17ae7dfe9a
SHA11dabbd2e1fa2278bd3273d9594bb6328d42030b8
SHA2560c0b7341e78023f7e21f26a55b5c9a32f10cd4a8bc1c38dad42f6a563366010d
SHA51272e4c5ca95beb44ff6b4172473eb3be5b4f795d0d8a05fb597db6e16cb01c79ed8a6d10b2818dddc017494fba1d15742c1be7b801391d0b03d8de190b0e8a581
-
Filesize
289KB
MD5198593663a47bed4d4f46e064948fc0a
SHA14027518294605a1cf1eb1df700c8814dcd912f38
SHA2563a14d169012959f7116d1d3044718d57457ce5c058eff1750dd2e7a1af4fa527
SHA512e46e9502b4de2f4471f281bbb4648dca54e244c773cff6f83009188adb12a6680078f407e4170abc7593145328810b571f2553147448dd80cd14923b92b88cf0
-
Filesize
1.3MB
MD5eabef82cdde22218730ac6ddb07a58e4
SHA12733f5e3849bc07c13b3b98c9518e266156c5bfa
SHA2565f40a5538df383fce822545c05069acba292a5f6468dfb42ae315d11b5f5c918
SHA51225c1ab9824138bf9737ca79a1b0fa9771afe5fe9acbac9736794309493226c82c9830b2e03c46e82e4f3a45842f5c7f77d332f1f99e6133c0ab330f367e00d07
-
Filesize
251KB
MD5550d922b2d08d6b73ac0b53a6bf043ab
SHA12d97ee2b82f28ff8a28162aa2308b93c51e09387
SHA256daa614332780919e8c32b9dd8487b0caa97458aaed90a573fda32bf82385f732
SHA5122cbd976fc3c691e0e13833b0b6f9d5ee03955e6b3311a1edc558f1e53aa935c22866cf7c18671d2a347fcf1c468bba6270174f7dfd6de80854dfa9b20fd31681
-
Filesize
480KB
MD5db14b3840a49da053d22d734b55e5b26
SHA1287287b3573f1f68275b24357a96410327f6895c
SHA2561005a3e68df7d400f63dbf03cf5b0dd19bb0823664a85097e219823b9dbd6a9b
SHA512d078759db8337360a8419203f823f8c9ec07cc8fef64880feec901651c73a31d16302cb82631e7354ef0832378096adf3359b5b28b791d903a3dc459e425dc9a
-
Filesize
9.4MB
MD5c652086050df7414d76fc0d6c228ef4b
SHA1f556e9e29b6a99eea52dd1d4aef3af90ed4a9355
SHA2562056ed41ff28faa90d6eaa3c1be0a9b77d507bfa451933bcec62e47aa002f39d
SHA5122be5fb9b7ecd5b753065165a28d8076865ffc9c1d3520b214e017fb6fd6d8697deed8fb888d87f872ee3072596638361650fb7904e4daf73480e3328fa457041
-
Filesize
1.4MB
MD5c4e431100317acca1db955bde74c96ba
SHA1084233465566928890281cb51f24a44357fc4a29
SHA256502a0f185bb3bf616bf107355d557c9c15c43d43597fd3d25d6072532798f439
SHA5123e35409bb94787d02974f2abbf7614b3549edd8909ed124183494656c3e9c81f6356e7fe6951d9d23f7a527c9530b6b9b866708732703b18feffeb5683dcaa88
-
Filesize
438KB
MD5e2c760c8fa62887f92a536d056d148d9
SHA15c73786780ba25a63ac29b199ac86c4d855a7d7a
SHA25690647be676dd07ed7ab2360475e8a774282ca5b3080060ff44a1163f93447d10
SHA5121de0ae45ae584bacac1a9e4ca3dde17aeed967c20255d1ef766696acfe3f636106f6b296310815b4bf4149546fd7c4b6ef30ef5118aecad3357e064239bc6db6
-
Filesize
240KB
MD553e26b42caf45d340f0bb7ac0e2e5187
SHA1e811ecbf0ef201dee94ad5a93049f9471e1500d4
SHA2564a2f41a8a5f395811ad9064b529f2b7f6ebf89d00084badce88675f4ba0d9201
SHA5123606f5c6102bae69a082d56448557f2f26ec0a48a4db9ab2e2c61fec8df018e3490a401c88bf3877169566a3eb1056e9bbdb129b21b3db23decdd94d3a80f64b
-
Filesize
4.2MB
MD548c097e767235c4a38b9fe689bb1b232
SHA16527b4f28cb9c8ecc90f5e484a4b33202cb6e26b
SHA256e03ce3c12a3fd6817e4f5278fda2ad256112a340dc2e1ac80639a060c0a36913
SHA5126841546f808d9827eae2a043a04035f4753409536bae37a0c67efa2c16a019dd7c51ceba2d987c18a7d0ea773a2654f516bad73ee5db4da0d9eb38cafc391c0b
-
Filesize
3.3MB
MD5a53e370830212d1df39748084c362489
SHA1ab219c839f2ff132891209da92723e5e15548665
SHA256a30948b80b4435ef4b0b84fdb4e8c3cbf64ab3ec759c3273686a1c327529afb9
SHA51281e922c804f28adef0057cda24a09f3cc1375d03985ee6fd8418a7234256b6175761ad25a5b5d4f3e80ac473b15fe9da671a51d032737aae4a5f016577aa7fcd
-
Filesize
39.1MB
MD583638209152822d2c9fe80cc7c634651
SHA1c77ff7890d935d19fe2c4d3d0ad933247e383e32
SHA256777159af2544a2bd9d7bff6c6c120981325c580939d276235904c8be1bc6922c
SHA51234dd370511691037507eb395ba18bc5c65ff7527ec6681f1e05930a96ea583064788c1e9a380b9210971b817c9e92381019e76ba846d064dd3a2d210e937e959
-
Filesize
1.1MB
MD529dc7c626ac48deb0283a5ae198afb01
SHA12e6fc2b2a3efd0ef5a4d37721be6922176138df7
SHA256ecd5ccc6fe1e5bff9023e8026205366ab32d639bad5352a165c52f59369e9b62
SHA512861678543f21a2fba0f65a0f38d031168a331dc8373579cf72c7eaa2dd44f4c128a18ca1b1103eea1da01563c4d6cc8fa0239866ee478ec04e7b26500d2fa8c1
-
Filesize
4KB
MD5b8b3eaf4cd8d25a248ae35e50c60a2cd
SHA15675bea07480d26530165b3d853bb0d9b4790f1d
SHA2566fe52421d30a6aeaaf9398e00555e08e1c84fd997956248b661708a55ea88d78
SHA512832845e8ea1be26fc8756b7ef53ff49a500cc799fe189ba4229599702955192b4d8c87159c17cb949b5df0b4c055b798f66c174ba8cb0613e9a830168e7b3dd5
-
Filesize
1.3MB
MD5840a1508abc59cd1006cf7989f443dfc
SHA16277d23d77ad50718c7f38de03b0d6221e0788f2
SHA256df039f2c04f986fb8e9b8fd7d734713f5efd143a614c0cdf11c0e8390652518a
SHA512a562f89a82cebaaed6143f1ae809cc8755913743d8b2c2ea3cbe918a70b37ce798b1c97239fcfc828e1df7985b87663eb13c42ad1a4d2e1c34c13b4b84633aaa
-
Filesize
349KB
MD5efeba7b08cc277a4011187dce1e0b823
SHA10c7e36b88782930230aae86faf767c4dbc9e2475
SHA25697b74d05d50443e31a0de2f21e4ec2bf427d6e9c01f698ef31e0f244aa7b508e
SHA5121060b735b95cd6b1fd73e5f8295d756af4dbb5a370ee956d46fc346d5c13e5d1dce6835d29b5190342b52ac185a2d81fb319a249f0a42fb96f7143cffde2a0c7
-
Filesize
146KB
MD56dcdd04c7d28779a817405c554f36ddc
SHA1fb7c9d7583e5c941951c2c1a1d7047dec3ec58b4
SHA2565dae00099e01936a303176d9df3c8132bf6d24129a3c0fc7b5c62a6a72e7bc96
SHA512176fb7401520ac4d231b890a660a25a66f2b789e5b02d8077943c2e10f8a84800773ef8ff4fe64e569d6fccd1267c11d0b05f937b8a0a71144af76145c9d8d99
-
Filesize
78KB
MD51d3f92a3d93058fa4b49ac1d9c616515
SHA1f604cd2d877fbb6deb3421c6418cbcca70ce5457
SHA25622c06048a13693626f27c64f805060f32d97c84ea653e95cbc4cae0b628a6440
SHA512dc26dd3b6d033edb5ca55abe799703db522e66b37785e1fe4d3bea0cbbaef5b067fad8b7f6d64140a85959684f96f7f3604b92f87876d29808b9e01e9a033c44
-
Filesize
954KB
MD5ae049a27b51ec2a7779cdfc477683b62
SHA1abad08d0f49006291bf7d628581d567cd2cbc9da
SHA2568d72b1ce97c36421ef3d0325249e09eee684605b0e0c1d342ed6d0120d079a8a
SHA5121fcb146d43b0895266399d72b2d35cb2a63b5f79488ed7410b69b3b8e32b8fab5025872156a0d5ffe7e7f8b20641c835dbebeae17b449312aba7ff59a4b89e95
-
Filesize
177KB
MD5bf01b213af787ebab456d83f52e6e564
SHA138cdff5cc4612e05b90ad37a5620d4ff9181d27b
SHA25660e94ff1e7896198d40983aadb848501a8c6f76070d9897090993310f9feb74d
SHA512cbf70f7f3e2ab55ab81ec8024960150d99c0dfae89ca0b88f6eb7d6d27c64aa891cadc473a83e6aa7f62f6ba14eba4d2ad0f0db46551fd3248673971313e3eff
-
Filesize
151KB
MD5ead1924880fb56f052e2c685f7584dce
SHA13e8724aa6f92f425e88ca451890c61576bf66e25
SHA2564abf3e808e369e83c9c4212d61724692c73e1ef753cd79f1734f562ad46af38b
SHA512c84f4408decf57e96afce73754bfd972fdb61d861b29ab143cb03ac4f4e70424c19a4c7c93e638d1b425511c83e5fd6cc232eaf649cb7f50e193ebb87cb49202
-
Filesize
502KB
MD527550c88b2c9993678d5ff1a07b25a14
SHA158423774b030538fc5c1d3149b8cc77e5b584dbd
SHA256db10df242fabd9546fee2d2a01b0fadd45d2fae587ff8b5e541387c728a9ebd3
SHA51222c1dd819e094de375ac2295b6a87cea221edf189b3db9b8060fa20ac61a9edbbc5a389e5138eed3ebf6db294ef37e541b9e53d8a089d9330bc4f9c2052a6d97
-
Filesize
7.8MB
MD54e2136acc844511e10793d628aacdb5e
SHA14910e3438c80615d81d1877c184801fd981abedd
SHA2567f2a3ad8407b1d8db0425bb3cb8d0da993f03b55e1bb22b6f7a5e69d80bc8b3d
SHA5121ea0b49a81757e96b3c551699c8b8fb2077661a440f0773e59efb369309422533f98d0e5be19c73eadc3b4b9ff382e321b541b31e64f0d405102d6f419cc561e
-
Filesize
1.1MB
MD58a3a1b1d58c43a45517321bc8c650752
SHA1e68eaca78a38aafb62e3dbdd37a92c0477bac4c5
SHA256146cfa7ceaaea25ddf2231baa14b6554a6df0b38accf3e05da90bb01b3ae223e
SHA512efd40f82f2426275c8ea7cad613c1d96fc8549f855120a69397b71beb314d95c8bc8d9128063e180dcf87d0645f13b1e1b56c0b32a5a52837a5d97c131556902
-
Filesize
4.2MB
MD5730c21c228bc74149c835137446a14c4
SHA1a5a278ff3f5a483b32f78b89544e37df40884c56
SHA256d1e8e852aef324595d18a7a9bdf9f6e2c00811744e061a261b98fdf561bb5b7e
SHA51213b898b51fa84d3ffaa21796790b9d7d19d2aa7f6debdf94718f59354ff4fd336a0762077e82c86df8089463c58cf94ecac9452d0affaa31d03529fcae379aa0
-
Filesize
5.4MB
MD58425490a24aa98c7239cdcfc018bc31c
SHA1430229ab3a69e80c4d9be3e74425bd209706a8d6
SHA25607f1d8531db037d7e315bec6085182845589cb11df1ebc003aa12e71eae5d991
SHA512b2aeda5830bd3f41233e44898503c49e4113587bf59d4f046551b3264618046b84dd1b1812d4bdeead0fa47215c331d263332cbff3a9d205e449227139225107
-
Filesize
1024KB
MD5ad937f57725167e2d5d7be534feed706
SHA118668605af8ec081eb9cdac5b0a6aced6a2b600f
SHA256e28bcf9b230c537525e074fc82c84cf1df56f27dc3a05fc62615b9ddaceddd6e
SHA512cc417d4b486616014a9e44207f3c71168623023337fc82305854f053d4a3b9ab1bc4f5027802dd3307f3f609b79602e6e1944a2ddeeaf1ce19abda3f155f1069
-
Filesize
1.3MB
MD5a8c2e9a11ab557ecfe425da7ed2c56b2
SHA163fd99a2c72b6a87c6ee6df3678a0dec569e5235
SHA25615d778b5957798013c8ed34cf69b552900a3a26c313c933bc615f684ed8b826c
SHA512c6039fb2b43c315d980191a139b4c88c83f7afd385689b58b60fb1767a367eb7fc4611abfc91b6d13bfbc7ed60b1bdbce7e4cf6c0bbada0730f9d6f20c29d54e
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
55KB
MD55b4eaa57dce5f61687513fdec129282e
SHA166f2bd1b49c3bdba54923e93cfcf3548748b99c7
SHA2567be1d61459c0ce007aa12d0fe0d747775897827f0da6c90c3a189f02b878beb8
SHA5129e62764e241aaec8b773699097465f21a7abba0e1bdf00af1fa1d4e6418475199e9acf2e568a819f875ca8227ee23dc203a45c923fa83c4185a2375a96518b00
-
Filesize
1.3MB
MD577d3db03dfcb155bfdc21eea46158565
SHA17ef9f5a1ed81052c8a7a53c6bfbdcad46817f971
SHA25658e366192e500acd1c9e8bcad208ec4b36e19072ca03a1f8d9da99e4002c6d45
SHA512546b71cb5244e9813501e425437b0abd5041be313a1bb12e2976a471c6fe83ac083849d72686ad7401289cf164eef176d830e81acb90a6e7ff8823f1bbc316a8