Analysis
-
max time kernel
300s -
max time network
304s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
15/03/2024, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe
Resource
win7-20240221-en
General
-
Target
0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe
-
Size
4.1MB
-
MD5
5c452c28469676ceae8bb01cdaef4ae7
-
SHA1
fd7686c3f11eb3f0dd9577ea1ca3d93f3a5c539b
-
SHA256
0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460
-
SHA512
51f4103e5f65eb93af5cc7953c1a4ad621f18e5863cd34964e987e21563ab0aec9fb3bb9f0ecfb54f0541bf74c131b0e6329176296c29838c80acd0e2fe2b34a
-
SSDEEP
98304:vpZ3BslI2HXHhL8caWS9URUM/Ogdf6Diy8PWZiZExHzDU1EHF01:vL+I6XBL8caW5SAuZiZEBDU111
Malware Config
Signatures
-
Glupteba payload 37 IoCs
resource yara_rule behavioral2/memory/2968-2-0x0000000002E20000-0x000000000370B000-memory.dmp family_glupteba behavioral2/memory/2968-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2968-301-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2968-302-0x0000000002E20000-0x000000000370B000-memory.dmp family_glupteba behavioral2/memory/368-305-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/368-821-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/368-1039-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1043-0x0000000003200000-0x0000000003AEB000-memory.dmp family_glupteba behavioral2/memory/4740-1044-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1562-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1788-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1789-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1798-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1800-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1802-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1804-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1806-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1808-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1810-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1812-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1814-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1816-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1818-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1820-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1822-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1824-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1826-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1828-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1830-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1832-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1834-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1836-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1838-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1840-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1842-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1844-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4740-1846-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe = "0" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 5100 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 4740 csrss.exe 3000 injector.exe 1052 windefender.exe 4960 windefender.exe -
resource yara_rule behavioral2/files/0x000700000001abfe-1792.dat upx behavioral2/files/0x000700000001abfe-1794.dat upx behavioral2/files/0x000700000001abfe-1795.dat upx behavioral2/memory/1052-1797-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4960-1799-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4960-1803-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe = "0" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (str) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe File created C:\Windows\rss\csrss.exe 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1212 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2812 schtasks.exe 4976 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2791 = "Novosibirsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2061 = "North Korea Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2531 = "Chatham Islands Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2612 = "Bougainville Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1842 = "Russia TZ 4 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-431 = "Iran Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1411 = "Syria Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-631 = "Tokyo Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 68 powershell.exe 68 powershell.exe 68 powershell.exe 2968 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 2968 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 644 powershell.exe 644 powershell.exe 644 powershell.exe 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 3528 powershell.exe 3528 powershell.exe 3528 powershell.exe 3772 powershell.exe 3772 powershell.exe 3772 powershell.exe 4508 powershell.exe 4508 powershell.exe 4508 powershell.exe 2928 powershell.exe 2928 powershell.exe 2928 powershell.exe 2524 powershell.exe 2524 powershell.exe 2524 powershell.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 4740 csrss.exe 4740 csrss.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 4740 csrss.exe 4740 csrss.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe 3000 injector.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 68 powershell.exe Token: SeDebugPrivilege 2968 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Token: SeImpersonatePrivilege 2968 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe Token: SeDebugPrivilege 644 powershell.exe Token: SeDebugPrivilege 3528 powershell.exe Token: SeDebugPrivilege 3772 powershell.exe Token: SeDebugPrivilege 4508 powershell.exe Token: SeDebugPrivilege 2928 powershell.exe Token: SeDebugPrivilege 2524 powershell.exe Token: SeSystemEnvironmentPrivilege 4740 csrss.exe Token: SeSecurityPrivilege 1212 sc.exe Token: SeSecurityPrivilege 1212 sc.exe Token: SeDebugPrivilege 3800 powershell.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2968 wrote to memory of 68 2968 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 73 PID 2968 wrote to memory of 68 2968 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 73 PID 2968 wrote to memory of 68 2968 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 73 PID 368 wrote to memory of 644 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 78 PID 368 wrote to memory of 644 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 78 PID 368 wrote to memory of 644 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 78 PID 368 wrote to memory of 1952 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 80 PID 368 wrote to memory of 1952 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 80 PID 1952 wrote to memory of 5100 1952 cmd.exe 82 PID 1952 wrote to memory of 5100 1952 cmd.exe 82 PID 368 wrote to memory of 3528 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 83 PID 368 wrote to memory of 3528 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 83 PID 368 wrote to memory of 3528 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 83 PID 368 wrote to memory of 3772 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 85 PID 368 wrote to memory of 3772 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 85 PID 368 wrote to memory of 3772 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 85 PID 368 wrote to memory of 4740 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 87 PID 368 wrote to memory of 4740 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 87 PID 368 wrote to memory of 4740 368 0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe 87 PID 4740 wrote to memory of 4508 4740 csrss.exe 88 PID 4740 wrote to memory of 4508 4740 csrss.exe 88 PID 4740 wrote to memory of 4508 4740 csrss.exe 88 PID 4740 wrote to memory of 2928 4740 csrss.exe 95 PID 4740 wrote to memory of 2928 4740 csrss.exe 95 PID 4740 wrote to memory of 2928 4740 csrss.exe 95 PID 4740 wrote to memory of 2524 4740 csrss.exe 97 PID 4740 wrote to memory of 2524 4740 csrss.exe 97 PID 4740 wrote to memory of 2524 4740 csrss.exe 97 PID 4740 wrote to memory of 3000 4740 csrss.exe 99 PID 4740 wrote to memory of 3000 4740 csrss.exe 99 PID 1052 wrote to memory of 4656 1052 windefender.exe 107 PID 1052 wrote to memory of 4656 1052 windefender.exe 107 PID 1052 wrote to memory of 4656 1052 windefender.exe 107 PID 4656 wrote to memory of 1212 4656 cmd.exe 108 PID 4656 wrote to memory of 1212 4656 cmd.exe 108 PID 4656 wrote to memory of 1212 4656 cmd.exe 108 PID 4740 wrote to memory of 3800 4740 csrss.exe 112 PID 4740 wrote to memory of 3800 4740 csrss.exe 112 PID 4740 wrote to memory of 3800 4740 csrss.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe"C:\Users\Admin\AppData\Local\Temp\0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:68
-
-
C:\Users\Admin\AppData\Local\Temp\0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe"C:\Users\Admin\AppData\Local\Temp\0b5bcbdf1fcc378dbe0643a576e2c386035daab70aafce96d5a694eaa7ba5460.exe"2⤵
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:5100
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3772
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2812
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2332
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4976
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3800
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD55c6908bd79d335f97dbaa9c3786b168c
SHA110c9b5aff0eb6049335e72ffe319bcd8b77a0e6e
SHA2562a514afc4f6fd7ea0c1f76e3b8cf76db5104bcec2742139f512fa5e8d2d03a2b
SHA5120d3f198e4faebf47f1485ac3e0403eb1885b0f6535549adb7ab1a701cf19837881087a3f18fc93963e7eec873ed74c1f3bbdc8548d2ebed3b2188c0aca6bfd76
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5ffd3106416df1968684db4f94556a192
SHA14b025169470ec688641c8a09603f8d15ab5066bf
SHA2561654fd9f4da89f2c53a025919bd1b3393f9d2677e436bab139388b193728b791
SHA51215b048fa98ca44f3a73442f6d5ad1fcbd0acfefc4ff98a000d64550d40185458dfd348f0510b72611aeda1036b9d8f347ef90da969581d329115cd1c2969c931
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD511f0b620dfa4d5259185f0b237732b61
SHA115b6a4f3bd80b40fda11f217d70aee6d87e16e84
SHA2564e3ca4450090923d42266e880ec800738e0beb22e53ae313982a248669e4007e
SHA51299be5a14887e1ca94af904b5f5eb066d6b2fcd1e9d37acbdd9497b523e494e87d42c2fc5bee3c0f3598bf924eac48abd6f7d2389f6ed36a59f4f6b2300871d53
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD525be78f1cf17fa79449ede94e5e91557
SHA1cbe717d6da3befaa12698f0a0b291c2793d4a9ad
SHA25613c46c6780261a18f8493680f2e47e48d51380c77f53ebf22ada49058362fac0
SHA512e24d3496a54800742f3c0375b85baefcc0276b54cef916683e00ce4008bbb5bd76da57f6df6dc040c8585fde82792c759d546e19fd290aef14d418e91d776465
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD56daba588e7d14930fce237a27247a0fd
SHA1a32a1b216d2e7d231686bd142162287e7a3fea66
SHA2560f318dee8d7c68c84ee0f3cdd9400cca85447d67b3aaa810fbf51b552c9a1843
SHA5120b49ec4dc2f70b5661b0850b42ab427e68921139448aa02fadb438b1efcb4b7bfe17ac1d71599b7420b11c59afa69591b021180cd68127f755d4cd2dc01db9ad
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD59b70c8be3b630097af3850459bfefbb9
SHA1bcff75b8bc3f81ac2d8003bf1392372db8d262ec
SHA2566a0038df252ac60f6cd11649938adbb21708c2a7a568c09b49dbea929aa49103
SHA5125b0a038b9d9618f1eb5c66c007e0a35897bb9723c0837d240910a9dac2779e57f17453cd8670b734e29ff20b9a7638c42ea02f77203c3473bc3e3581158c9fb2
-
Filesize
2.8MB
MD52192e1f2ff85020c8bffdedcd29e344e
SHA1b17f3fee3ff01660359ca3117c9f51ff3a228950
SHA2566d1ca450a261d1b1b73d7facb251d0a36da43f6dc0529b383d1629dcaf4a7515
SHA51279e08fc9574fc97572017ac5f52e8fbf4825633491b5e135de22186245d7ab9f6a3530ba5c9b2c94b4e6c70dbc959299b328f40a1b8c046b98e98515191ce9bc
-
Filesize
2.5MB
MD5a924c5c505e16758405d06b90418967b
SHA1a84adac62f3d33da2734aa97b564b975df9a96d9
SHA256a212b9abfc91746f6fcf168887a0712e7558d858e9539a5577b53221c32a9361
SHA512b03cb6b509940ac4c7de97bcbd008be5714370c401c94d18d80f359df0935ce6d266a24d4abf8a33a3c3497aeb6178ead4c4ea82b9bbcdd876355e101b3b9f67
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
1.9MB
MD5b66e64bfc696538cd1161fd631e2eea5
SHA18a4c4501839a447e5473695564722f478967ccee
SHA256b241f64f98771ab5a860a4724aea96e5811d719e34aa67db89b12cff6962b776
SHA51202d97113b17233fc74ceab5c03bad399577bae9b0b1390bff4f33c7bf2bac50ace2cc6fece213f58cc74082aeb411b369d3340909545eaf22f41af937db201c3
-
Filesize
1.5MB
MD5ae50567488951d9c9b7a26d3b96d52b3
SHA1d7d81d26e80f201521908a655cabfa15700a5186
SHA256b69952006b53ccf41554216cb82d10efa718739d6246c596a5fc2a0e21c56db8
SHA512cfc3274b7331963f711ce7c1f80097d61bd7997e30a56c05f565f4002b9b9835c3a8ef4f48ed93466d450c985cec513e1e03269df2a0d8a4c0a24d24f716b5fb