Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 18:31
Behavioral task
behavioral1
Sample
2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe
-
Size
41KB
-
MD5
2ef05873f585d356665f0ea0fd8678ff
-
SHA1
0be8c14efaf9752d48f8bf34ca5d75a40284967b
-
SHA256
cb4957ca31c15745b25aaf474f66582daf99a9060a54f31aa5557317ea010684
-
SHA512
785bbb3090af3f82aa0ff501f761f66e3904ffd6707da39667ce87e0478aa5adcd8c8060e0472e460322a55a037850418beeccd0145b1ec9a04b8bc8cd14c908
-
SSDEEP
768:5xyl5HeOrgHICm1+Gu5NjY2eX7exwr2QB/9QSNTsryu+BFrForD8tMEWV+:585H7wLm14NtSmQeriBc8twV+
Malware Config
Extracted
C:\Users\Admin\Desktop\readme-warning.txt
makop
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Makop family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 4896 bcdedit.exe 928 bcdedit.exe -
Renames multiple (8225) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 3156 wbadmin.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Public\Desktop\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Public\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2045521122-590294423-3465680274-1000\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files (x86)\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\Music\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Public\Videos\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\Links\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Public\Documents\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 32 iplogger.org 33 iplogger.org 41 iplogger.org 44 iplogger.org 47 iplogger.org 48 iplogger.org -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\WideLogo.scale-125_contrast-black.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstaller.winmd 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Audio\Skype_Msg_Received.m4a 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_OEM_Perp-ul-oob.xrm-ms 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\177.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ClassicPhotoAlbum.potx 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\StoreLogo.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dummy.dic 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\oledb32r.dll.mui 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\GR8GALRY.GRA 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.targetsize-48.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\OutlookMailMediumTile.scale-400.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-20_contrast-white.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_2019.430.2026.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\selection-actions2x.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_OEM_Perp-pl.xrm-ms 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\en\LocalizedStrings.xml 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\dictation\SpeechOn.wav 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-72_altform-unplated_contrast-high.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\theme.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\vlc.mo 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\ExchangeBadge.scale-150.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\download.svg 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\jaccess.jar 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\TEMPSITC.TTF 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019VL_MAK_AE-ul-phn.xrm-ms 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarSmallTile.scale-125.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-30_altform-lightunplated.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\LoanAmortization.xltx 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-96.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\NoiseAsset_256x256_PNG.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\LISTS\BASMLA.XSL 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteAppList.scale-100.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-16_altform-unplated.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\ExchangeSmallTile.scale-200.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\MoviesAnywhereLogoWithTextLight.scale-100.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files-select\js\plugin.js 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptyShare-Dark.scale-400.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\reviews_joined.gif 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\Download_on_the_App_Store_Badge_nl_135x40.svg 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-36_altform-unplated_contrast-black.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-32_altform-unplated_contrast-black.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_replace_signer_18.svg 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\plugin.js 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Mu\TransparentAdvertisers 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019VL_KMS_Client_AE-ppd.xrm-ms 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-36_altform-unplated_contrast-white.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\LinkedInboxWideTile.scale-100.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-64_altform-unplated.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\SplashScreen.scale-200.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\Fonts\FHubMDL2.ttf 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\WinFXList.xml 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Retail-ul-phn.xrm-ms 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\hr-hr\ui-strings.js 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_MAKC2R-ppd.xrm-ms 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\CalculatorWideTile.contrast-black_scale-125.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\SplashScreen.scale-150.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Square44x44Logo.targetsize-80.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Sticker_Rainbow.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailBadge.scale-150.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\fonts\NotebookIconAnimation.ttf 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\fil.pak 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\GamesXboxHubAppList.scale-200.png 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3148 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeBackupPrivilege 2556 vssvc.exe Token: SeRestorePrivilege 2556 vssvc.exe Token: SeAuditPrivilege 2556 vssvc.exe Token: SeIncreaseQuotaPrivilege 4132 WMIC.exe Token: SeSecurityPrivilege 4132 WMIC.exe Token: SeTakeOwnershipPrivilege 4132 WMIC.exe Token: SeLoadDriverPrivilege 4132 WMIC.exe Token: SeSystemProfilePrivilege 4132 WMIC.exe Token: SeSystemtimePrivilege 4132 WMIC.exe Token: SeProfSingleProcessPrivilege 4132 WMIC.exe Token: SeIncBasePriorityPrivilege 4132 WMIC.exe Token: SeCreatePagefilePrivilege 4132 WMIC.exe Token: SeBackupPrivilege 4132 WMIC.exe Token: SeRestorePrivilege 4132 WMIC.exe Token: SeShutdownPrivilege 4132 WMIC.exe Token: SeDebugPrivilege 4132 WMIC.exe Token: SeSystemEnvironmentPrivilege 4132 WMIC.exe Token: SeRemoteShutdownPrivilege 4132 WMIC.exe Token: SeUndockPrivilege 4132 WMIC.exe Token: SeManageVolumePrivilege 4132 WMIC.exe Token: 33 4132 WMIC.exe Token: 34 4132 WMIC.exe Token: 35 4132 WMIC.exe Token: 36 4132 WMIC.exe Token: SeIncreaseQuotaPrivilege 4132 WMIC.exe Token: SeSecurityPrivilege 4132 WMIC.exe Token: SeTakeOwnershipPrivilege 4132 WMIC.exe Token: SeLoadDriverPrivilege 4132 WMIC.exe Token: SeSystemProfilePrivilege 4132 WMIC.exe Token: SeSystemtimePrivilege 4132 WMIC.exe Token: SeProfSingleProcessPrivilege 4132 WMIC.exe Token: SeIncBasePriorityPrivilege 4132 WMIC.exe Token: SeCreatePagefilePrivilege 4132 WMIC.exe Token: SeBackupPrivilege 4132 WMIC.exe Token: SeRestorePrivilege 4132 WMIC.exe Token: SeShutdownPrivilege 4132 WMIC.exe Token: SeDebugPrivilege 4132 WMIC.exe Token: SeSystemEnvironmentPrivilege 4132 WMIC.exe Token: SeRemoteShutdownPrivilege 4132 WMIC.exe Token: SeUndockPrivilege 4132 WMIC.exe Token: SeManageVolumePrivilege 4132 WMIC.exe Token: 33 4132 WMIC.exe Token: 34 4132 WMIC.exe Token: 35 4132 WMIC.exe Token: 36 4132 WMIC.exe Token: SeBackupPrivilege 4300 wbengine.exe Token: SeRestorePrivilege 4300 wbengine.exe Token: SeSecurityPrivilege 4300 wbengine.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4000 wrote to memory of 2144 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 86 PID 4000 wrote to memory of 2144 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 86 PID 2144 wrote to memory of 3148 2144 cmd.exe 88 PID 2144 wrote to memory of 3148 2144 cmd.exe 88 PID 2144 wrote to memory of 4132 2144 cmd.exe 92 PID 2144 wrote to memory of 4132 2144 cmd.exe 92 PID 2144 wrote to memory of 4896 2144 cmd.exe 94 PID 2144 wrote to memory of 4896 2144 cmd.exe 94 PID 2144 wrote to memory of 928 2144 cmd.exe 95 PID 2144 wrote to memory of 928 2144 cmd.exe 95 PID 2144 wrote to memory of 3156 2144 cmd.exe 96 PID 2144 wrote to memory of 3156 2144 cmd.exe 96 PID 4000 wrote to memory of 1892 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 115 PID 4000 wrote to memory of 1892 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 115 PID 4000 wrote to memory of 1892 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 115 PID 4000 wrote to memory of 2428 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 118 PID 4000 wrote to memory of 2428 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 118 PID 4000 wrote to memory of 2428 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 118 PID 4000 wrote to memory of 940 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 120 PID 4000 wrote to memory of 940 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 120 PID 4000 wrote to memory of 940 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 120 PID 4000 wrote to memory of 4084 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 122 PID 4000 wrote to memory of 4084 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 122 PID 4000 wrote to memory of 4084 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 122 PID 4000 wrote to memory of 3060 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 124 PID 4000 wrote to memory of 3060 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 124 PID 4000 wrote to memory of 3060 4000 2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n40002⤵
- System Location Discovery: System Language Discovery
PID:3564
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3148
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:4896
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:928
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:3156
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:1892
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n40002⤵
- System Location Discovery: System Language Discovery
PID:4480
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n40002⤵
- System Location Discovery: System Language Discovery
PID:276
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n40002⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n40002⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt2⤵
- System Location Discovery: System Language Discovery
PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-27_2ef05873f585d356665f0ea0fd8678ff_makop.exe" n40002⤵
- System Location Discovery: System Language Discovery
PID:4872
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:4796
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:2864
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356B
MD526702708cd9761cf2a36c37302d1f6c5
SHA1b4a88d59377515802e8b8242217f6233c6817214
SHA256e808d0ebea60c76ffc4cd775767a2a4a98e40995a043d4bf9129acbfe9d63b56
SHA51245d93a9a239702a4b599977f025f81118e395047f4995e55758f58c3c38022ddb10168670aed1c6db92c24be38465b421c7dfd5feb065f51d3f9f8486bdaae66
-
Filesize
356B
MD5badb7888d5bb89031ee1953da5caa8f1
SHA126e928b026d4d892c988b7f9dba9de0ba6dafccb
SHA2564388bf471fbfc0f03819e64fc6a021d309c50bbc2b178791eb3e2c73da1eed20
SHA512c12ea4632da408fb64fdcfa3d5f48c6dc8f3c33b1b1f58ba381d1e4f4e3c7eb85837631343df41564a825b2bdf9c4c7084e589b1d788e320348dc3b69e5b2270
-
Filesize
580B
MD5051155587fdcf3a8d8f83bf03e16acdf
SHA1e33154af2a20d9a7d438462e9f663e89a0958c08
SHA25662d122886393294fe4f5cf5762731253aa6283ceaf93d801498b2370e5574ab7
SHA512f017ad73d68470004fa93cb775c759806c6b91041851651893f25f2d2c77002cfc123d61e81eaa4d8a88586a8f38a7dbbb17734bef6fdbf54f3bd03b1443c9d6
-
Filesize
804B
MD554731fb44947043be3115006d11bb803
SHA12f35aec02fe77472fa9db983472667bfe6e728f6
SHA256cce4967376abf965332eccfd5519b789b1431ae5e5ef2bc122c27c3b05a23fd3
SHA5127b71dbc99e7b4ec79b33d4acb883ca2c3e1a1b5f93fc63bab014f443431166b2def379bd4d17af298e573fe2b614d32d1e51bfc47c40b5e6cd550f17ad39a89e
-
Filesize
1KB
MD52f4148c57b7bb6956128f7bc36e106f8
SHA111739e924095abce76d3fba74bc29cff295ebefc
SHA256b3a2c764480108db38b0d26a330bc78e9e49b288fa9f7a12ebf017acbe31622c
SHA512abfc719870258598381ca9e1c41dbc0d88d48cc7bb8e5d5c17c08323e072f19b7b2efc1418d147a3ba4fb14cfd2842720934614ba439338f49a4419ab746bc50
-
Filesize
1KB
MD51cb84bff1347a0417fa3e0f5ab6fe264
SHA10dc37fae709639a0f92217365d5d7dec7c56a042
SHA2562ffd2a3717502a27e6367c1f826ed136da3c624f311eb39429abcc093f856346
SHA512281aa5bb6ab693520df802e89ec2f3ab5acc8a321eab414ce38e570174236bfaf649615006a3c38f1b0984d3f87b94c136ced1d7bf358e534c2ca4046f2ae2d9
-
Filesize
1KB
MD55b847e2c729d9b78c10c5a05a7f00e4d
SHA1753c40fe7f8f18159eb9702660773502e7eb564a
SHA2561647ba80119c23da45a2b01d70c8564a062122b9273f94f130379a4bead68435
SHA512e450eff2150d7cec896a46391d51477c57f8cc22b41a66587d56b6d8b3642ea61cc52f85455521a2d8ced28ef284f20caca129eb01da73cf9bb29d902a9f3de0