Analysis
-
max time kernel
175s -
max time network
178s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 11:48
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231025-en
General
-
Target
file.exe
-
Size
1.4MB
-
MD5
d3bcc11e32d75fec333d1857c4e0a3da
-
SHA1
bea8ba8c44766d446e264bb6d25c9f9b5158ff78
-
SHA256
57dd76c7c512afbed21d7304a66fffd89cd904c39a47d459a49aec1f5f1d5235
-
SHA512
300b305602265e84dab3bf2941a35a409bafb263e955397ac41ff29f01b5e9ee17b0907db39b374f8e8973c3e2200b0b9b34c2074f11e2c5a67099f429b6c73d
-
SSDEEP
24576:nbm+AIHqd5yIfvDkTlAKot2+c3t7JVpfjfWZnHbyBrN1Rd9rmRve2GViRXUmFX:bm+Aoqd5yMvDkTlAKoty3t7/Fjs+BrvK
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
DcRat 9 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process File opened for modification C:\Windows\SysWOW64\GDIPFONTCACHEV1.DAT file.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MYbWPtTa0rC0lI41rL0Higo9.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hSJOAZtpRrcSZhu4ipSMVqeT.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rWHYijdM3XadoxYzCG3AI9LJ.bat CasPol.exe 1768 schtasks.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cDoW6qnptcWNZT5W7ysDVk4C.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\k5ITuCM1ImCk6kbLl0Qnwehj.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdwvN6RyTeSmCPdgpBBq6QcT.bat CasPol.exe 2884 schtasks.exe -
Glupteba payload 11 IoCs
resource yara_rule behavioral1/memory/2984-191-0x0000000002BA0000-0x000000000348B000-memory.dmp family_glupteba behavioral1/memory/2984-199-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2984-347-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2984-358-0x0000000002BA0000-0x000000000348B000-memory.dmp family_glupteba behavioral1/memory/2984-365-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2984-368-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2984-421-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2984-438-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2984-441-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2588-475-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1744-497-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\GVEHMVN1x0imgRSzbX5zwSCk.exe = "0" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\file.exe = "0" file.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" GVEHMVN1x0imgRSzbX5zwSCk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths file.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 632 netsh.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Drops startup file 7 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdwvN6RyTeSmCPdgpBBq6QcT.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rWHYijdM3XadoxYzCG3AI9LJ.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0bADiGKovE1jUgMDA9pbNHbp.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MYbWPtTa0rC0lI41rL0Higo9.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cDoW6qnptcWNZT5W7ysDVk4C.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\k5ITuCM1ImCk6kbLl0Qnwehj.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hSJOAZtpRrcSZhu4ipSMVqeT.bat CasPol.exe -
Executes dropped EXE 14 IoCs
pid Process 2064 pY3bXbPFXjvc280t3WSOIIwD.exe 2984 GVEHMVN1x0imgRSzbX5zwSCk.exe 2032 d2d1mALlWr44daUoihs20Q9G.exe 1200 TWuCOi1f6vgbzXQa3HjeSoFC.exe 2388 pY3bXbPFXjvc280t3WSOIIwD.exe 2224 is-RMTT4.tmp 1004 VZkJAov2FGqzZQPb9EaF8rof.exe 760 Install.exe 2168 Install.exe 1532 ABuster.exe 2236 ABuster.exe 1900 2LcaUHYs9hXNBCIExYW4dm4G.exe 2588 GVEHMVN1x0imgRSzbX5zwSCk.exe 1744 csrss.exe -
Loads dropped DLL 37 IoCs
pid Process 2968 CasPol.exe 2968 CasPol.exe 2968 CasPol.exe 2968 CasPol.exe 2968 CasPol.exe 2032 d2d1mALlWr44daUoihs20Q9G.exe 2968 CasPol.exe 1200 TWuCOi1f6vgbzXQa3HjeSoFC.exe 1200 TWuCOi1f6vgbzXQa3HjeSoFC.exe 1200 TWuCOi1f6vgbzXQa3HjeSoFC.exe 2032 d2d1mALlWr44daUoihs20Q9G.exe 1200 TWuCOi1f6vgbzXQa3HjeSoFC.exe 2968 CasPol.exe 1004 VZkJAov2FGqzZQPb9EaF8rof.exe 1004 VZkJAov2FGqzZQPb9EaF8rof.exe 1004 VZkJAov2FGqzZQPb9EaF8rof.exe 2224 is-RMTT4.tmp 2224 is-RMTT4.tmp 2224 is-RMTT4.tmp 2224 is-RMTT4.tmp 1004 VZkJAov2FGqzZQPb9EaF8rof.exe 760 Install.exe 760 Install.exe 760 Install.exe 760 Install.exe 2168 Install.exe 2168 Install.exe 2168 Install.exe 2224 is-RMTT4.tmp 1532 ABuster.exe 1532 ABuster.exe 2224 is-RMTT4.tmp 2236 ABuster.exe 2236 ABuster.exe 2968 CasPol.exe 2588 GVEHMVN1x0imgRSzbX5zwSCk.exe 2588 GVEHMVN1x0imgRSzbX5zwSCk.exe -
resource yara_rule behavioral1/files/0x0006000000015c5f-125.dat upx behavioral1/files/0x0006000000015c5f-122.dat upx behavioral1/memory/2968-126-0x0000000008840000-0x0000000008D69000-memory.dmp upx behavioral1/files/0x0006000000015c5f-121.dat upx behavioral1/memory/2032-127-0x0000000000DD0000-0x00000000012F9000-memory.dmp upx behavioral1/memory/2032-183-0x0000000000DD0000-0x00000000012F9000-memory.dmp upx behavioral1/files/0x0006000000015c5f-367.dat upx behavioral1/memory/2032-376-0x0000000000DD0000-0x00000000012F9000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\file.exe = "0" file.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\GVEHMVN1x0imgRSzbX5zwSCk.exe = "0" GVEHMVN1x0imgRSzbX5zwSCk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions file.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" GVEHMVN1x0imgRSzbX5zwSCk.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" GVEHMVN1x0imgRSzbX5zwSCk.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3048 set thread context of 2968 3048 file.exe 29 PID 2064 set thread context of 2388 2064 pY3bXbPFXjvc280t3WSOIIwD.exe 36 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN GVEHMVN1x0imgRSzbX5zwSCk.exe -
Drops file in Program Files directory 34 IoCs
description ioc Process File created C:\Program Files (x86)\ABuster\Lang\is-EADGI.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-HA9JF.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-N56HA.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Plugins\is-BN1VJ.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-AS1RH.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-D0E1R.tmp is-RMTT4.tmp File opened for modification C:\Program Files (x86)\ABuster\ABuster.exe is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-C74AK.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-2RS6G.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Plugins\is-UEIO5.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Plugins\is-JJM49.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Plugins\is-7JSN2.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-0NB12.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Online\is-CIOU8.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-OE6J8.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-0KIEC.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-7AI8N.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-K7AAL.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Online\is-A15MO.tmp is-RMTT4.tmp File opened for modification C:\Program Files (x86)\ABuster\unins000.dat is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-3FS50.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-DRE7M.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-9SEA3.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-UFJFV.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-80VNC.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-QRAD8.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-EO1TU.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-CED9G.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\is-EKI48.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\unins000.dat is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\is-A2ATJ.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Help\is-KQUTU.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-867B2.tmp is-RMTT4.tmp File created C:\Program Files (x86)\ABuster\Lang\is-FV73K.tmp is-RMTT4.tmp -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bVMBaKiduVHPciRgqr.job schtasks.exe File opened for modification C:\Windows\rss GVEHMVN1x0imgRSzbX5zwSCk.exe File created C:\Windows\rss\csrss.exe GVEHMVN1x0imgRSzbX5zwSCk.exe File created C:\Windows\Logs\CBS\CbsPersist_20231103115031.cab makecab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pY3bXbPFXjvc280t3WSOIIwD.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pY3bXbPFXjvc280t3WSOIIwD.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pY3bXbPFXjvc280t3WSOIIwD.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1768 schtasks.exe 2884 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-101 = "Provides DHCP based enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-2 = "Provides IPsec based enforcement for Network Access Protection" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-551 = "North Asia Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-521 = "N. Central Asia Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace\Session netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-422 = "Russian Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" GVEHMVN1x0imgRSzbX5zwSCk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" GVEHMVN1x0imgRSzbX5zwSCk.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2768 powershell.exe 2388 pY3bXbPFXjvc280t3WSOIIwD.exe 2388 pY3bXbPFXjvc280t3WSOIIwD.exe 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1256 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2388 pY3bXbPFXjvc280t3WSOIIwD.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeDebugPrivilege 2968 CasPol.exe Token: SeDebugPrivilege 2768 powershell.exe Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeDebugPrivilege 2188 powershell.EXE Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeDebugPrivilege 2984 GVEHMVN1x0imgRSzbX5zwSCk.exe Token: SeImpersonatePrivilege 2984 GVEHMVN1x0imgRSzbX5zwSCk.exe Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeShutdownPrivilege 1256 Process not Found Token: SeDebugPrivilege 1900 2LcaUHYs9hXNBCIExYW4dm4G.exe Token: SeShutdownPrivilege 1256 Process not Found -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1256 Process not Found 1256 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2768 3048 file.exe 27 PID 3048 wrote to memory of 2768 3048 file.exe 27 PID 3048 wrote to memory of 2768 3048 file.exe 27 PID 3048 wrote to memory of 2768 3048 file.exe 27 PID 3048 wrote to memory of 2968 3048 file.exe 29 PID 3048 wrote to memory of 2968 3048 file.exe 29 PID 3048 wrote to memory of 2968 3048 file.exe 29 PID 3048 wrote to memory of 2968 3048 file.exe 29 PID 3048 wrote to memory of 2968 3048 file.exe 29 PID 3048 wrote to memory of 2968 3048 file.exe 29 PID 3048 wrote to memory of 2968 3048 file.exe 29 PID 3048 wrote to memory of 2968 3048 file.exe 29 PID 3048 wrote to memory of 2968 3048 file.exe 29 PID 2968 wrote to memory of 2064 2968 CasPol.exe 32 PID 2968 wrote to memory of 2064 2968 CasPol.exe 32 PID 2968 wrote to memory of 2064 2968 CasPol.exe 32 PID 2968 wrote to memory of 2064 2968 CasPol.exe 32 PID 2968 wrote to memory of 2984 2968 CasPol.exe 33 PID 2968 wrote to memory of 2984 2968 CasPol.exe 33 PID 2968 wrote to memory of 2984 2968 CasPol.exe 33 PID 2968 wrote to memory of 2984 2968 CasPol.exe 33 PID 2968 wrote to memory of 2032 2968 CasPol.exe 34 PID 2968 wrote to memory of 2032 2968 CasPol.exe 34 PID 2968 wrote to memory of 2032 2968 CasPol.exe 34 PID 2968 wrote to memory of 2032 2968 CasPol.exe 34 PID 2968 wrote to memory of 2032 2968 CasPol.exe 34 PID 2968 wrote to memory of 2032 2968 CasPol.exe 34 PID 2968 wrote to memory of 2032 2968 CasPol.exe 34 PID 2968 wrote to memory of 1200 2968 CasPol.exe 35 PID 2968 wrote to memory of 1200 2968 CasPol.exe 35 PID 2968 wrote to memory of 1200 2968 CasPol.exe 35 PID 2968 wrote to memory of 1200 2968 CasPol.exe 35 PID 2968 wrote to memory of 1200 2968 CasPol.exe 35 PID 2968 wrote to memory of 1200 2968 CasPol.exe 35 PID 2968 wrote to memory of 1200 2968 CasPol.exe 35 PID 2064 wrote to memory of 2388 2064 pY3bXbPFXjvc280t3WSOIIwD.exe 36 PID 2064 wrote to memory of 2388 2064 pY3bXbPFXjvc280t3WSOIIwD.exe 36 PID 2064 wrote to memory of 2388 2064 pY3bXbPFXjvc280t3WSOIIwD.exe 36 PID 2064 wrote to memory of 2388 2064 pY3bXbPFXjvc280t3WSOIIwD.exe 36 PID 2064 wrote to memory of 2388 2064 pY3bXbPFXjvc280t3WSOIIwD.exe 36 PID 2064 wrote to memory of 2388 2064 pY3bXbPFXjvc280t3WSOIIwD.exe 36 PID 2064 wrote to memory of 2388 2064 pY3bXbPFXjvc280t3WSOIIwD.exe 36 PID 1200 wrote to memory of 2224 1200 TWuCOi1f6vgbzXQa3HjeSoFC.exe 37 PID 1200 wrote to memory of 2224 1200 TWuCOi1f6vgbzXQa3HjeSoFC.exe 37 PID 1200 wrote to memory of 2224 1200 TWuCOi1f6vgbzXQa3HjeSoFC.exe 37 PID 1200 wrote to memory of 2224 1200 TWuCOi1f6vgbzXQa3HjeSoFC.exe 37 PID 1200 wrote to memory of 2224 1200 TWuCOi1f6vgbzXQa3HjeSoFC.exe 37 PID 1200 wrote to memory of 2224 1200 TWuCOi1f6vgbzXQa3HjeSoFC.exe 37 PID 1200 wrote to memory of 2224 1200 TWuCOi1f6vgbzXQa3HjeSoFC.exe 37 PID 2968 wrote to memory of 1004 2968 CasPol.exe 38 PID 2968 wrote to memory of 1004 2968 CasPol.exe 38 PID 2968 wrote to memory of 1004 2968 CasPol.exe 38 PID 2968 wrote to memory of 1004 2968 CasPol.exe 38 PID 2968 wrote to memory of 1004 2968 CasPol.exe 38 PID 2968 wrote to memory of 1004 2968 CasPol.exe 38 PID 2968 wrote to memory of 1004 2968 CasPol.exe 38 PID 1004 wrote to memory of 760 1004 VZkJAov2FGqzZQPb9EaF8rof.exe 39 PID 1004 wrote to memory of 760 1004 VZkJAov2FGqzZQPb9EaF8rof.exe 39 PID 1004 wrote to memory of 760 1004 VZkJAov2FGqzZQPb9EaF8rof.exe 39 PID 1004 wrote to memory of 760 1004 VZkJAov2FGqzZQPb9EaF8rof.exe 39 PID 1004 wrote to memory of 760 1004 VZkJAov2FGqzZQPb9EaF8rof.exe 39 PID 1004 wrote to memory of 760 1004 VZkJAov2FGqzZQPb9EaF8rof.exe 39 PID 1004 wrote to memory of 760 1004 VZkJAov2FGqzZQPb9EaF8rof.exe 39 PID 760 wrote to memory of 2168 760 Install.exe 40 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- DcRat
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3048 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\file.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- DcRat
- Drops startup file
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\Pictures\pY3bXbPFXjvc280t3WSOIIwD.exe"C:\Users\Admin\Pictures\pY3bXbPFXjvc280t3WSOIIwD.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\Pictures\pY3bXbPFXjvc280t3WSOIIwD.exe"C:\Users\Admin\Pictures\pY3bXbPFXjvc280t3WSOIIwD.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2388
-
-
-
C:\Users\Admin\Pictures\GVEHMVN1x0imgRSzbX5zwSCk.exe"C:\Users\Admin\Pictures\GVEHMVN1x0imgRSzbX5zwSCk.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2984 -
C:\Users\Admin\Pictures\GVEHMVN1x0imgRSzbX5zwSCk.exe"C:\Users\Admin\Pictures\GVEHMVN1x0imgRSzbX5zwSCk.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2588 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:1496
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:632
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
PID:1744
-
-
-
-
C:\Users\Admin\Pictures\d2d1mALlWr44daUoihs20Q9G.exe"C:\Users\Admin\Pictures\d2d1mALlWr44daUoihs20Q9G.exe" --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2032
-
-
C:\Users\Admin\Pictures\TWuCOi1f6vgbzXQa3HjeSoFC.exe"C:\Users\Admin\Pictures\TWuCOi1f6vgbzXQa3HjeSoFC.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\is-AUEKO.tmp\is-RMTT4.tmp"C:\Users\Admin\AppData\Local\Temp\is-AUEKO.tmp\is-RMTT4.tmp" /SL4 $600BE "C:\Users\Admin\Pictures\TWuCOi1f6vgbzXQa3HjeSoFC.exe" 5477213 793604⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:2224 -
C:\Program Files (x86)\ABuster\ABuster.exe"C:\Program Files (x86)\ABuster\ABuster.exe" -i5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1532
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 35⤵PID:2784
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 36⤵PID:1460
-
-
-
C:\Program Files (x86)\ABuster\ABuster.exe"C:\Program Files (x86)\ABuster\ABuster.exe" -s5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2236
-
-
-
-
C:\Users\Admin\Pictures\VZkJAov2FGqzZQPb9EaF8rof.exe"C:\Users\Admin\Pictures\VZkJAov2FGqzZQPb9EaF8rof.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\7zS7281.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\7zS7687.tmp\Install.exe.\Install.exe /iVdidKYNM "385118" /S5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
PID:2168 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"6⤵PID:860
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&7⤵PID:556
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:648⤵PID:528
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:328⤵PID:2420
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "guKnhjZee" /SC once /ST 10:11:26 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="6⤵
- DcRat
- Creates scheduled task(s)
PID:1768
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"6⤵PID:2840
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "guKnhjZee"6⤵PID:2108
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "guKnhjZee"6⤵PID:2392
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bVMBaKiduVHPciRgqr" /SC once /ST 11:52:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\kjnTHjCvNoHDpipRv\ToKdrMUbLuoklxJ\aiUendq.exe\" jL /sgsite_idlgi 385118 /S" /V1 /F6⤵
- DcRat
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2884
-
-
-
-
-
C:\Users\Admin\Pictures\2LcaUHYs9hXNBCIExYW4dm4G.exe"C:\Users\Admin\Pictures\2LcaUHYs9hXNBCIExYW4dm4G.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&1⤵PID:632
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:322⤵PID:2832
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:642⤵PID:2604
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {CEB865D4-5C44-4A38-94FC-E0A7F869EC2C} S-1-5-21-1861898231-3446828954-4278112889-1000:PTZSFKIF\Admin:Interactive:[1]1⤵PID:2216
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2188 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2220
-
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231103115031.log C:\Windows\Logs\CBS\CbsPersist_20231103115031.cab1⤵
- Drops file in Windows directory
PID:856
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2564
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD51178279e5f0053581b8a0d6111ad2ee1
SHA1dd92165826dd339e8d798409ae6309914c2d2e3b
SHA256dbfa057f4d827b24078747c7118a79a8b263b2fdaa577236d0817d956b509ebe
SHA5129a97363ed82c5df71384342fb87f33d720dccc12ac943cb83fc5eef6890347604254ba997ad0dcef2528bcde2fa65a0d3b85869aacfa0127b22a25efb9b4defd
-
Filesize
3.8MB
MD51178279e5f0053581b8a0d6111ad2ee1
SHA1dd92165826dd339e8d798409ae6309914c2d2e3b
SHA256dbfa057f4d827b24078747c7118a79a8b263b2fdaa577236d0817d956b509ebe
SHA5129a97363ed82c5df71384342fb87f33d720dccc12ac943cb83fc5eef6890347604254ba997ad0dcef2528bcde2fa65a0d3b85869aacfa0127b22a25efb9b4defd
-
Filesize
3.8MB
MD51178279e5f0053581b8a0d6111ad2ee1
SHA1dd92165826dd339e8d798409ae6309914c2d2e3b
SHA256dbfa057f4d827b24078747c7118a79a8b263b2fdaa577236d0817d956b509ebe
SHA5129a97363ed82c5df71384342fb87f33d720dccc12ac943cb83fc5eef6890347604254ba997ad0dcef2528bcde2fa65a0d3b85869aacfa0127b22a25efb9b4defd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535cdaff118de60899f0218d5414fa3d6
SHA1104866bfff9502581aa558e3855b7eeca2a77413
SHA256ef4f212b6c94bcf5a8edafb65ca0ce04e53ed3a42d598cea474f4da4c6f1da08
SHA512896484990190a7aca2f724462cf5bf6ace6077995d022dad397922c58a39edef73b2354889ae62032dff4eedeb678141e29034bcc1370979c07e525aaeeb1f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df67cbf7806e0bd370780a9bde5fa236
SHA19ced8f9fb780b2ddd8c3dacffe0d983af66b1951
SHA256e1f1e5f3a168f555af8fb9bc0a8b017035d747f7d6582b47eea7e0403d1b7d4e
SHA51260f95b49d324d269170c837465e76fa5fc446506c37ee9f0e83ebf6cc86aaf2e19765e56375ff6e0f88b78ecea09dce9d4f633991627488e3214969e4e140173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df67cbf7806e0bd370780a9bde5fa236
SHA19ced8f9fb780b2ddd8c3dacffe0d983af66b1951
SHA256e1f1e5f3a168f555af8fb9bc0a8b017035d747f7d6582b47eea7e0403d1b7d4e
SHA51260f95b49d324d269170c837465e76fa5fc446506c37ee9f0e83ebf6cc86aaf2e19765e56375ff6e0f88b78ecea09dce9d4f633991627488e3214969e4e140173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504d1bf96524fd95eb9fba3a5fdfbdf30
SHA1e5b9eba7170dde4cc9545bc29f04cbeb9b006a6a
SHA256178bab256691608bb5fe6c7c21fea326db265fd5f8fb34195cea225bed8259cd
SHA512e02c83c11bc5b9d5e495bca00857b3443afad008d82c040885468d4fe6056eb95c843b20b261081a073c7d9d6c142d3183cd0209b1135e38611754c3903eb930
-
Filesize
6.1MB
MD5ca428c133e64892a1d57aa75658c1b1f
SHA10e5d498e267ac6162a85992145a823200aadbee2
SHA25669f9b4f276dff42a9347dd03c4a9ec7891b1a973ce1d89952239df360d265a93
SHA5126afdd05eb78760367fed7948c6244243827168c50d6729a0fe73fa3a654fb2ce95818e4326d07b01772d5f9669c556e9976ccf731d2e9ae877102fcc997ebcb7
-
Filesize
6.1MB
MD5ca428c133e64892a1d57aa75658c1b1f
SHA10e5d498e267ac6162a85992145a823200aadbee2
SHA25669f9b4f276dff42a9347dd03c4a9ec7891b1a973ce1d89952239df360d265a93
SHA5126afdd05eb78760367fed7948c6244243827168c50d6729a0fe73fa3a654fb2ce95818e4326d07b01772d5f9669c556e9976ccf731d2e9ae877102fcc997ebcb7
-
Filesize
6.8MB
MD5d00cda825278db4cb5010613f2872fa5
SHA112ba138ba33e0fc03240393290c63da7fae1abc7
SHA2569626e6fe1bc3857de844310493fbfbca5e0c2c9cdcf3eb0b0ad34eae4dbba5ff
SHA5120c4de63ac355f9bde40c80d467da94ce82a2ef24171dfb523574281dfcfffb9035d78d688e4e088a7706a369d2f0a4748c31c1d9f37d5674ea3597be7046f917
-
Filesize
6.8MB
MD5d00cda825278db4cb5010613f2872fa5
SHA112ba138ba33e0fc03240393290c63da7fae1abc7
SHA2569626e6fe1bc3857de844310493fbfbca5e0c2c9cdcf3eb0b0ad34eae4dbba5ff
SHA5120c4de63ac355f9bde40c80d467da94ce82a2ef24171dfb523574281dfcfffb9035d78d688e4e088a7706a369d2f0a4748c31c1d9f37d5674ea3597be7046f917
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
643KB
MD5a991510c12f20ccf8a5231a32a7958c3
SHA1122724d1a4fdea39af3aa427e4941158d7e91dfa
SHA2560c3ab280e156e9ff6a325267bc5d721f71dcb12490a53a03a033d932272f9198
SHA5128f387a6189f6fa51f84004706589ed1706dfd08dfc38c1f8ce3ce010f37efac085fd241396ab69bc25c86174a4637492163bf3cb26f88639551dc9fa0c52eafa
-
Filesize
643KB
MD5a991510c12f20ccf8a5231a32a7958c3
SHA1122724d1a4fdea39af3aa427e4941158d7e91dfa
SHA2560c3ab280e156e9ff6a325267bc5d721f71dcb12490a53a03a033d932272f9198
SHA5128f387a6189f6fa51f84004706589ed1706dfd08dfc38c1f8ce3ce010f37efac085fd241396ab69bc25c86174a4637492163bf3cb26f88639551dc9fa0c52eafa
-
Filesize
6.8MB
MD5d00cda825278db4cb5010613f2872fa5
SHA112ba138ba33e0fc03240393290c63da7fae1abc7
SHA2569626e6fe1bc3857de844310493fbfbca5e0c2c9cdcf3eb0b0ad34eae4dbba5ff
SHA5120c4de63ac355f9bde40c80d467da94ce82a2ef24171dfb523574281dfcfffb9035d78d688e4e088a7706a369d2f0a4748c31c1d9f37d5674ea3597be7046f917
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\K5UCAOXYFO81SCQL7DHF.temp
Filesize7KB
MD563e471d5c25f131177e52bde0281aa56
SHA14d369c318a77af9812fbf17c8e78f9764986bf8c
SHA2561059d6e62b588cd74803cd5b57a88ba2a9d3fb9042952c664d4f67e747cda7c4
SHA51249ffb502b74f02e520cc05b71b28a7b44433d3e275f26eea2d4585f8c29b982aa0508b65088dafa6bc60c6a92964d8d56955963aa095b202c0fac1febc572b9d
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
4.2MB
MD5890242216dd8519d72888e68acc51e49
SHA12e5c94693b57b9b8a5e160e64fdec6f460ee3269
SHA25646b5b12f7889efea31f1cd5e46041a43df05a3a0dd1d3e547be3509d4e631953
SHA512ef0650aa8706dac632ab906067c1d53218a7582cd2951c1f41f5d0a117f1d84f5bc010fcd5c5317c790db5efdb66796197b80e661b539c9122fbf71ca62d0254
-
Filesize
4.2MB
MD5890242216dd8519d72888e68acc51e49
SHA12e5c94693b57b9b8a5e160e64fdec6f460ee3269
SHA25646b5b12f7889efea31f1cd5e46041a43df05a3a0dd1d3e547be3509d4e631953
SHA512ef0650aa8706dac632ab906067c1d53218a7582cd2951c1f41f5d0a117f1d84f5bc010fcd5c5317c790db5efdb66796197b80e661b539c9122fbf71ca62d0254
-
Filesize
4.2MB
MD5890242216dd8519d72888e68acc51e49
SHA12e5c94693b57b9b8a5e160e64fdec6f460ee3269
SHA25646b5b12f7889efea31f1cd5e46041a43df05a3a0dd1d3e547be3509d4e631953
SHA512ef0650aa8706dac632ab906067c1d53218a7582cd2951c1f41f5d0a117f1d84f5bc010fcd5c5317c790db5efdb66796197b80e661b539c9122fbf71ca62d0254
-
Filesize
4.2MB
MD5890242216dd8519d72888e68acc51e49
SHA12e5c94693b57b9b8a5e160e64fdec6f460ee3269
SHA25646b5b12f7889efea31f1cd5e46041a43df05a3a0dd1d3e547be3509d4e631953
SHA512ef0650aa8706dac632ab906067c1d53218a7582cd2951c1f41f5d0a117f1d84f5bc010fcd5c5317c790db5efdb66796197b80e661b539c9122fbf71ca62d0254
-
Filesize
5.5MB
MD54c7bdcf4075e39c3df989c49f050b1f0
SHA12f9e28df24cbc0a84ecb82253f224b63f3501fc6
SHA256853b33fdd080e94fda0d32338dbad142ac301dcc41d110da54eb3c00f97c3646
SHA512e7135f049552d6aab3fce7f25e28a4c58a4f994a5816c93f7f0b986f1d84dc051f61d2b3b2e0d47a7a5fad0eb0623e38899be5826af0ee331c03cc0d88424d46
-
Filesize
5.5MB
MD54c7bdcf4075e39c3df989c49f050b1f0
SHA12f9e28df24cbc0a84ecb82253f224b63f3501fc6
SHA256853b33fdd080e94fda0d32338dbad142ac301dcc41d110da54eb3c00f97c3646
SHA512e7135f049552d6aab3fce7f25e28a4c58a4f994a5816c93f7f0b986f1d84dc051f61d2b3b2e0d47a7a5fad0eb0623e38899be5826af0ee331c03cc0d88424d46
-
Filesize
5.5MB
MD54c7bdcf4075e39c3df989c49f050b1f0
SHA12f9e28df24cbc0a84ecb82253f224b63f3501fc6
SHA256853b33fdd080e94fda0d32338dbad142ac301dcc41d110da54eb3c00f97c3646
SHA512e7135f049552d6aab3fce7f25e28a4c58a4f994a5816c93f7f0b986f1d84dc051f61d2b3b2e0d47a7a5fad0eb0623e38899be5826af0ee331c03cc0d88424d46
-
Filesize
7.2MB
MD52ee281e478949be991f70bc985355f0d
SHA1927a1ad246b74af1257d62dd5fa149599f5a2e54
SHA256fd8d96b745401213333fd6081c297eb18e79f9102c4cc187da79d21de46b06c0
SHA512283ff6a74f5c9014a1d6ab12c1bcc2bfc80b12001230855c40ccdde2f7a940baa50d540f8291e22d57e9a9be18e7c2d10a7dae34ae251021c243b37950f92b16
-
Filesize
7.2MB
MD52ee281e478949be991f70bc985355f0d
SHA1927a1ad246b74af1257d62dd5fa149599f5a2e54
SHA256fd8d96b745401213333fd6081c297eb18e79f9102c4cc187da79d21de46b06c0
SHA512283ff6a74f5c9014a1d6ab12c1bcc2bfc80b12001230855c40ccdde2f7a940baa50d540f8291e22d57e9a9be18e7c2d10a7dae34ae251021c243b37950f92b16
-
Filesize
7.2MB
MD52ee281e478949be991f70bc985355f0d
SHA1927a1ad246b74af1257d62dd5fa149599f5a2e54
SHA256fd8d96b745401213333fd6081c297eb18e79f9102c4cc187da79d21de46b06c0
SHA512283ff6a74f5c9014a1d6ab12c1bcc2bfc80b12001230855c40ccdde2f7a940baa50d540f8291e22d57e9a9be18e7c2d10a7dae34ae251021c243b37950f92b16
-
Filesize
2.8MB
MD53b244158608fda19232e8ef06d904213
SHA1d1723ca2792d40e83fd06615a353a5c16c8db98e
SHA256b886347fe57231a2bbf8c27354615f80c609cfce9e007e9f591c59315b9e40b1
SHA51235ae19a3035eaced88983b9b60d758f1fe57e0448b38d1b1884c0d5d31987086e891fd06277885f2b1c07aaea0cbe9275f2b1e66dd5d7826954df876deb4f649
-
Filesize
2.8MB
MD53b244158608fda19232e8ef06d904213
SHA1d1723ca2792d40e83fd06615a353a5c16c8db98e
SHA256b886347fe57231a2bbf8c27354615f80c609cfce9e007e9f591c59315b9e40b1
SHA51235ae19a3035eaced88983b9b60d758f1fe57e0448b38d1b1884c0d5d31987086e891fd06277885f2b1c07aaea0cbe9275f2b1e66dd5d7826954df876deb4f649
-
Filesize
263KB
MD5febf0500279d7b69e756d7b9d07736ae
SHA1a277e2e566ec5959825532ca73c110d469961084
SHA256e1ab8643d910c41199b19e991cd401090c74135b2c0b6a00c2721f31adb450c9
SHA5129b8563a4fd942d81486ae64f693fcddddc2807aed049f3fc5a863b0a9770e5f1fcbd7e9f61dc8b54c05dda4ee8a7069fad0a7941bba55e5a51e4c223e81846b4
-
Filesize
263KB
MD5febf0500279d7b69e756d7b9d07736ae
SHA1a277e2e566ec5959825532ca73c110d469961084
SHA256e1ab8643d910c41199b19e991cd401090c74135b2c0b6a00c2721f31adb450c9
SHA5129b8563a4fd942d81486ae64f693fcddddc2807aed049f3fc5a863b0a9770e5f1fcbd7e9f61dc8b54c05dda4ee8a7069fad0a7941bba55e5a51e4c223e81846b4
-
Filesize
263KB
MD5febf0500279d7b69e756d7b9d07736ae
SHA1a277e2e566ec5959825532ca73c110d469961084
SHA256e1ab8643d910c41199b19e991cd401090c74135b2c0b6a00c2721f31adb450c9
SHA5129b8563a4fd942d81486ae64f693fcddddc2807aed049f3fc5a863b0a9770e5f1fcbd7e9f61dc8b54c05dda4ee8a7069fad0a7941bba55e5a51e4c223e81846b4
-
Filesize
263KB
MD5febf0500279d7b69e756d7b9d07736ae
SHA1a277e2e566ec5959825532ca73c110d469961084
SHA256e1ab8643d910c41199b19e991cd401090c74135b2c0b6a00c2721f31adb450c9
SHA5129b8563a4fd942d81486ae64f693fcddddc2807aed049f3fc5a863b0a9770e5f1fcbd7e9f61dc8b54c05dda4ee8a7069fad0a7941bba55e5a51e4c223e81846b4
-
Filesize
4.2MB
MD5890242216dd8519d72888e68acc51e49
SHA12e5c94693b57b9b8a5e160e64fdec6f460ee3269
SHA25646b5b12f7889efea31f1cd5e46041a43df05a3a0dd1d3e547be3509d4e631953
SHA512ef0650aa8706dac632ab906067c1d53218a7582cd2951c1f41f5d0a117f1d84f5bc010fcd5c5317c790db5efdb66796197b80e661b539c9122fbf71ca62d0254
-
Filesize
2.8MB
MD53b244158608fda19232e8ef06d904213
SHA1d1723ca2792d40e83fd06615a353a5c16c8db98e
SHA256b886347fe57231a2bbf8c27354615f80c609cfce9e007e9f591c59315b9e40b1
SHA51235ae19a3035eaced88983b9b60d758f1fe57e0448b38d1b1884c0d5d31987086e891fd06277885f2b1c07aaea0cbe9275f2b1e66dd5d7826954df876deb4f649
-
Filesize
3.8MB
MD51178279e5f0053581b8a0d6111ad2ee1
SHA1dd92165826dd339e8d798409ae6309914c2d2e3b
SHA256dbfa057f4d827b24078747c7118a79a8b263b2fdaa577236d0817d956b509ebe
SHA5129a97363ed82c5df71384342fb87f33d720dccc12ac943cb83fc5eef6890347604254ba997ad0dcef2528bcde2fa65a0d3b85869aacfa0127b22a25efb9b4defd
-
Filesize
3.8MB
MD51178279e5f0053581b8a0d6111ad2ee1
SHA1dd92165826dd339e8d798409ae6309914c2d2e3b
SHA256dbfa057f4d827b24078747c7118a79a8b263b2fdaa577236d0817d956b509ebe
SHA5129a97363ed82c5df71384342fb87f33d720dccc12ac943cb83fc5eef6890347604254ba997ad0dcef2528bcde2fa65a0d3b85869aacfa0127b22a25efb9b4defd
-
Filesize
3.8MB
MD51178279e5f0053581b8a0d6111ad2ee1
SHA1dd92165826dd339e8d798409ae6309914c2d2e3b
SHA256dbfa057f4d827b24078747c7118a79a8b263b2fdaa577236d0817d956b509ebe
SHA5129a97363ed82c5df71384342fb87f33d720dccc12ac943cb83fc5eef6890347604254ba997ad0dcef2528bcde2fa65a0d3b85869aacfa0127b22a25efb9b4defd
-
Filesize
3.8MB
MD51178279e5f0053581b8a0d6111ad2ee1
SHA1dd92165826dd339e8d798409ae6309914c2d2e3b
SHA256dbfa057f4d827b24078747c7118a79a8b263b2fdaa577236d0817d956b509ebe
SHA5129a97363ed82c5df71384342fb87f33d720dccc12ac943cb83fc5eef6890347604254ba997ad0dcef2528bcde2fa65a0d3b85869aacfa0127b22a25efb9b4defd
-
Filesize
3.8MB
MD51178279e5f0053581b8a0d6111ad2ee1
SHA1dd92165826dd339e8d798409ae6309914c2d2e3b
SHA256dbfa057f4d827b24078747c7118a79a8b263b2fdaa577236d0817d956b509ebe
SHA5129a97363ed82c5df71384342fb87f33d720dccc12ac943cb83fc5eef6890347604254ba997ad0dcef2528bcde2fa65a0d3b85869aacfa0127b22a25efb9b4defd
-
Filesize
3.8MB
MD51178279e5f0053581b8a0d6111ad2ee1
SHA1dd92165826dd339e8d798409ae6309914c2d2e3b
SHA256dbfa057f4d827b24078747c7118a79a8b263b2fdaa577236d0817d956b509ebe
SHA5129a97363ed82c5df71384342fb87f33d720dccc12ac943cb83fc5eef6890347604254ba997ad0dcef2528bcde2fa65a0d3b85869aacfa0127b22a25efb9b4defd
-
Filesize
6.1MB
MD5ca428c133e64892a1d57aa75658c1b1f
SHA10e5d498e267ac6162a85992145a823200aadbee2
SHA25669f9b4f276dff42a9347dd03c4a9ec7891b1a973ce1d89952239df360d265a93
SHA5126afdd05eb78760367fed7948c6244243827168c50d6729a0fe73fa3a654fb2ce95818e4326d07b01772d5f9669c556e9976ccf731d2e9ae877102fcc997ebcb7
-
Filesize
6.1MB
MD5ca428c133e64892a1d57aa75658c1b1f
SHA10e5d498e267ac6162a85992145a823200aadbee2
SHA25669f9b4f276dff42a9347dd03c4a9ec7891b1a973ce1d89952239df360d265a93
SHA5126afdd05eb78760367fed7948c6244243827168c50d6729a0fe73fa3a654fb2ce95818e4326d07b01772d5f9669c556e9976ccf731d2e9ae877102fcc997ebcb7
-
Filesize
6.1MB
MD5ca428c133e64892a1d57aa75658c1b1f
SHA10e5d498e267ac6162a85992145a823200aadbee2
SHA25669f9b4f276dff42a9347dd03c4a9ec7891b1a973ce1d89952239df360d265a93
SHA5126afdd05eb78760367fed7948c6244243827168c50d6729a0fe73fa3a654fb2ce95818e4326d07b01772d5f9669c556e9976ccf731d2e9ae877102fcc997ebcb7
-
Filesize
6.1MB
MD5ca428c133e64892a1d57aa75658c1b1f
SHA10e5d498e267ac6162a85992145a823200aadbee2
SHA25669f9b4f276dff42a9347dd03c4a9ec7891b1a973ce1d89952239df360d265a93
SHA5126afdd05eb78760367fed7948c6244243827168c50d6729a0fe73fa3a654fb2ce95818e4326d07b01772d5f9669c556e9976ccf731d2e9ae877102fcc997ebcb7
-
Filesize
6.8MB
MD5d00cda825278db4cb5010613f2872fa5
SHA112ba138ba33e0fc03240393290c63da7fae1abc7
SHA2569626e6fe1bc3857de844310493fbfbca5e0c2c9cdcf3eb0b0ad34eae4dbba5ff
SHA5120c4de63ac355f9bde40c80d467da94ce82a2ef24171dfb523574281dfcfffb9035d78d688e4e088a7706a369d2f0a4748c31c1d9f37d5674ea3597be7046f917
-
Filesize
6.8MB
MD5d00cda825278db4cb5010613f2872fa5
SHA112ba138ba33e0fc03240393290c63da7fae1abc7
SHA2569626e6fe1bc3857de844310493fbfbca5e0c2c9cdcf3eb0b0ad34eae4dbba5ff
SHA5120c4de63ac355f9bde40c80d467da94ce82a2ef24171dfb523574281dfcfffb9035d78d688e4e088a7706a369d2f0a4748c31c1d9f37d5674ea3597be7046f917
-
Filesize
6.8MB
MD5d00cda825278db4cb5010613f2872fa5
SHA112ba138ba33e0fc03240393290c63da7fae1abc7
SHA2569626e6fe1bc3857de844310493fbfbca5e0c2c9cdcf3eb0b0ad34eae4dbba5ff
SHA5120c4de63ac355f9bde40c80d467da94ce82a2ef24171dfb523574281dfcfffb9035d78d688e4e088a7706a369d2f0a4748c31c1d9f37d5674ea3597be7046f917
-
Filesize
6.8MB
MD5d00cda825278db4cb5010613f2872fa5
SHA112ba138ba33e0fc03240393290c63da7fae1abc7
SHA2569626e6fe1bc3857de844310493fbfbca5e0c2c9cdcf3eb0b0ad34eae4dbba5ff
SHA5120c4de63ac355f9bde40c80d467da94ce82a2ef24171dfb523574281dfcfffb9035d78d688e4e088a7706a369d2f0a4748c31c1d9f37d5674ea3597be7046f917
-
Filesize
4.6MB
MD568001bcf377466ec4609ee69c69a60c6
SHA1703dfb6e1da43c378c1f9ee8ea55195b756df7be
SHA256fa8e4113a3b61f494284a8e95c1eef20953cadce31f2dba82bb2f3ed902053da
SHA5124e55d6592db8fee915eaf34a02e00698f63d3dfb8a9730fadaa74b4c66df1d1b1891af141a86ef93c2eeab0a480f0e526c8e24ad7305c1cd8e01863aca6507db
-
Filesize
643KB
MD5a991510c12f20ccf8a5231a32a7958c3
SHA1122724d1a4fdea39af3aa427e4941158d7e91dfa
SHA2560c3ab280e156e9ff6a325267bc5d721f71dcb12490a53a03a033d932272f9198
SHA5128f387a6189f6fa51f84004706589ed1706dfd08dfc38c1f8ce3ce010f37efac085fd241396ab69bc25c86174a4637492163bf3cb26f88639551dc9fa0c52eafa
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
4.2MB
MD5890242216dd8519d72888e68acc51e49
SHA12e5c94693b57b9b8a5e160e64fdec6f460ee3269
SHA25646b5b12f7889efea31f1cd5e46041a43df05a3a0dd1d3e547be3509d4e631953
SHA512ef0650aa8706dac632ab906067c1d53218a7582cd2951c1f41f5d0a117f1d84f5bc010fcd5c5317c790db5efdb66796197b80e661b539c9122fbf71ca62d0254
-
Filesize
4.2MB
MD5890242216dd8519d72888e68acc51e49
SHA12e5c94693b57b9b8a5e160e64fdec6f460ee3269
SHA25646b5b12f7889efea31f1cd5e46041a43df05a3a0dd1d3e547be3509d4e631953
SHA512ef0650aa8706dac632ab906067c1d53218a7582cd2951c1f41f5d0a117f1d84f5bc010fcd5c5317c790db5efdb66796197b80e661b539c9122fbf71ca62d0254
-
Filesize
4.6MB
MD568001bcf377466ec4609ee69c69a60c6
SHA1703dfb6e1da43c378c1f9ee8ea55195b756df7be
SHA256fa8e4113a3b61f494284a8e95c1eef20953cadce31f2dba82bb2f3ed902053da
SHA5124e55d6592db8fee915eaf34a02e00698f63d3dfb8a9730fadaa74b4c66df1d1b1891af141a86ef93c2eeab0a480f0e526c8e24ad7305c1cd8e01863aca6507db
-
Filesize
5.5MB
MD54c7bdcf4075e39c3df989c49f050b1f0
SHA12f9e28df24cbc0a84ecb82253f224b63f3501fc6
SHA256853b33fdd080e94fda0d32338dbad142ac301dcc41d110da54eb3c00f97c3646
SHA512e7135f049552d6aab3fce7f25e28a4c58a4f994a5816c93f7f0b986f1d84dc051f61d2b3b2e0d47a7a5fad0eb0623e38899be5826af0ee331c03cc0d88424d46
-
Filesize
5.5MB
MD54c7bdcf4075e39c3df989c49f050b1f0
SHA12f9e28df24cbc0a84ecb82253f224b63f3501fc6
SHA256853b33fdd080e94fda0d32338dbad142ac301dcc41d110da54eb3c00f97c3646
SHA512e7135f049552d6aab3fce7f25e28a4c58a4f994a5816c93f7f0b986f1d84dc051f61d2b3b2e0d47a7a5fad0eb0623e38899be5826af0ee331c03cc0d88424d46
-
Filesize
5.5MB
MD54c7bdcf4075e39c3df989c49f050b1f0
SHA12f9e28df24cbc0a84ecb82253f224b63f3501fc6
SHA256853b33fdd080e94fda0d32338dbad142ac301dcc41d110da54eb3c00f97c3646
SHA512e7135f049552d6aab3fce7f25e28a4c58a4f994a5816c93f7f0b986f1d84dc051f61d2b3b2e0d47a7a5fad0eb0623e38899be5826af0ee331c03cc0d88424d46
-
Filesize
5.5MB
MD54c7bdcf4075e39c3df989c49f050b1f0
SHA12f9e28df24cbc0a84ecb82253f224b63f3501fc6
SHA256853b33fdd080e94fda0d32338dbad142ac301dcc41d110da54eb3c00f97c3646
SHA512e7135f049552d6aab3fce7f25e28a4c58a4f994a5816c93f7f0b986f1d84dc051f61d2b3b2e0d47a7a5fad0eb0623e38899be5826af0ee331c03cc0d88424d46
-
Filesize
7.2MB
MD52ee281e478949be991f70bc985355f0d
SHA1927a1ad246b74af1257d62dd5fa149599f5a2e54
SHA256fd8d96b745401213333fd6081c297eb18e79f9102c4cc187da79d21de46b06c0
SHA512283ff6a74f5c9014a1d6ab12c1bcc2bfc80b12001230855c40ccdde2f7a940baa50d540f8291e22d57e9a9be18e7c2d10a7dae34ae251021c243b37950f92b16
-
Filesize
7.2MB
MD52ee281e478949be991f70bc985355f0d
SHA1927a1ad246b74af1257d62dd5fa149599f5a2e54
SHA256fd8d96b745401213333fd6081c297eb18e79f9102c4cc187da79d21de46b06c0
SHA512283ff6a74f5c9014a1d6ab12c1bcc2bfc80b12001230855c40ccdde2f7a940baa50d540f8291e22d57e9a9be18e7c2d10a7dae34ae251021c243b37950f92b16
-
Filesize
7.2MB
MD52ee281e478949be991f70bc985355f0d
SHA1927a1ad246b74af1257d62dd5fa149599f5a2e54
SHA256fd8d96b745401213333fd6081c297eb18e79f9102c4cc187da79d21de46b06c0
SHA512283ff6a74f5c9014a1d6ab12c1bcc2bfc80b12001230855c40ccdde2f7a940baa50d540f8291e22d57e9a9be18e7c2d10a7dae34ae251021c243b37950f92b16
-
Filesize
7.2MB
MD52ee281e478949be991f70bc985355f0d
SHA1927a1ad246b74af1257d62dd5fa149599f5a2e54
SHA256fd8d96b745401213333fd6081c297eb18e79f9102c4cc187da79d21de46b06c0
SHA512283ff6a74f5c9014a1d6ab12c1bcc2bfc80b12001230855c40ccdde2f7a940baa50d540f8291e22d57e9a9be18e7c2d10a7dae34ae251021c243b37950f92b16
-
Filesize
2.8MB
MD53b244158608fda19232e8ef06d904213
SHA1d1723ca2792d40e83fd06615a353a5c16c8db98e
SHA256b886347fe57231a2bbf8c27354615f80c609cfce9e007e9f591c59315b9e40b1
SHA51235ae19a3035eaced88983b9b60d758f1fe57e0448b38d1b1884c0d5d31987086e891fd06277885f2b1c07aaea0cbe9275f2b1e66dd5d7826954df876deb4f649
-
Filesize
263KB
MD5febf0500279d7b69e756d7b9d07736ae
SHA1a277e2e566ec5959825532ca73c110d469961084
SHA256e1ab8643d910c41199b19e991cd401090c74135b2c0b6a00c2721f31adb450c9
SHA5129b8563a4fd942d81486ae64f693fcddddc2807aed049f3fc5a863b0a9770e5f1fcbd7e9f61dc8b54c05dda4ee8a7069fad0a7941bba55e5a51e4c223e81846b4
-
Filesize
263KB
MD5febf0500279d7b69e756d7b9d07736ae
SHA1a277e2e566ec5959825532ca73c110d469961084
SHA256e1ab8643d910c41199b19e991cd401090c74135b2c0b6a00c2721f31adb450c9
SHA5129b8563a4fd942d81486ae64f693fcddddc2807aed049f3fc5a863b0a9770e5f1fcbd7e9f61dc8b54c05dda4ee8a7069fad0a7941bba55e5a51e4c223e81846b4
-
Filesize
4.2MB
MD5890242216dd8519d72888e68acc51e49
SHA12e5c94693b57b9b8a5e160e64fdec6f460ee3269
SHA25646b5b12f7889efea31f1cd5e46041a43df05a3a0dd1d3e547be3509d4e631953
SHA512ef0650aa8706dac632ab906067c1d53218a7582cd2951c1f41f5d0a117f1d84f5bc010fcd5c5317c790db5efdb66796197b80e661b539c9122fbf71ca62d0254
-
Filesize
4.2MB
MD5890242216dd8519d72888e68acc51e49
SHA12e5c94693b57b9b8a5e160e64fdec6f460ee3269
SHA25646b5b12f7889efea31f1cd5e46041a43df05a3a0dd1d3e547be3509d4e631953
SHA512ef0650aa8706dac632ab906067c1d53218a7582cd2951c1f41f5d0a117f1d84f5bc010fcd5c5317c790db5efdb66796197b80e661b539c9122fbf71ca62d0254