Analysis
-
max time kernel
899s -
max time network
867s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-uk -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-uklocale:uk-uaos:windows10-ltsc_2021-x64systemwindows -
submitted
30/03/2025, 11:36
Behavioral task
behavioral1
Sample
jopik.exe
Resource
win10ltsc2021-20250314-uk
General
-
Target
jopik.exe
-
Size
3.1MB
-
MD5
25af61a744bdfb7be6e811a1119d55f6
-
SHA1
c4352f21b66710e390592d50ae5914ce0c33cf56
-
SHA256
babed92f8fa49db0ca046162e82f7e2403f33c4ca9ea5097ba981a5d3d365793
-
SHA512
3b7bc8129c5fec44139d502b2c410680724bac368aa17094f6191d57e4f8fac182f28e86f8db512d0472e088540449171602a4f3b0db96b6811b7fb73f4580dc
-
SSDEEP
98304:jqmG8KBY7G6G6GCKuuhjtdtyDzPcuBol:2mv/G6Yad7a
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detect SalatStealer payload 47 IoCs
resource yara_rule behavioral1/memory/5524-9-0x0000000000740000-0x00000000012BD000-memory.dmp family_salatstealer behavioral1/memory/5148-16-0x0000000000160000-0x0000000000CDD000-memory.dmp family_salatstealer behavioral1/memory/1632-22-0x0000000000670000-0x00000000011ED000-memory.dmp family_salatstealer behavioral1/memory/5492-23-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-24-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-27-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-28-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-29-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-30-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-31-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-32-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-33-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-34-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-35-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-36-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-38-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-40-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-45-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-46-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-49-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-50-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-53-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-54-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-57-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-58-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-61-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-62-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-65-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-66-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-69-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-70-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-73-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-74-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-77-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-78-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-81-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-82-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-85-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-86-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/1788-94-0x0000000000330000-0x0000000000EAD000-memory.dmp family_salatstealer behavioral1/memory/3876-95-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-96-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-97-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5056-118-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/4604-120-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/5492-197-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer behavioral1/memory/4604-199-0x0000000000C40000-0x00000000017BD000-memory.dmp family_salatstealer -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jopa.exe" jopa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jopa.exe" jopa.exe -
Process spawned unexpected child process 24 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1836 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4904 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2868 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2668 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 864 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 748 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4360 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1524 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4496 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4500 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5292 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4656 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4912 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1460 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5924 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4848 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5468 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5476 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5984 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1984 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4700 1492 schtasks.exe 114 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1088 1492 schtasks.exe 114 -
Salatstealer family
-
salatstealer
SalatStealer is a stealer that takes sceenshot written in Golang.
-
resource yara_rule behavioral1/files/0x0008000000028166-138.dat dcrat behavioral1/files/0x0007000000028174-163.dat dcrat behavioral1/memory/344-165-0x0000000000D20000-0x0000000000E8A000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\Control Panel\International\Geo\Nation hitler.exe Key value queried \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\Control Panel\International\Geo\Nation NVIDIA Container.exe Key value queried \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\Control Panel\International\Geo\Nation NVIDIA Container.exe -
Executes dropped EXE 17 IoCs
pid Process 5492 winlogon.exe 5148 winlogon.exe 1632 winlogon.exe 5056 winlogon.exe 5728 jopa.exe 4260 jopa.exe 1788 RuntimeBroker.exe 3876 winlogon.exe 4604 winlogon.exe 1700 hitler.exe 1020 NVIDIA Container.exe 344 NVIDIA Container.exe 5052 OfficeClickToRun.exe 4796 conhost.exe 2436 sysmon.exe 2644 OfficeClickToRun.exe 5308 conhost.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\userini = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jopa.exe" jopa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\userini = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jopa.exe" jopa.exe -
resource yara_rule behavioral1/memory/5524-0-0x0000000000740000-0x00000000012BD000-memory.dmp upx behavioral1/files/0x00090000000280cd-5.dat upx behavioral1/memory/5492-8-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5524-9-0x0000000000740000-0x00000000012BD000-memory.dmp upx behavioral1/memory/5148-14-0x0000000000160000-0x0000000000CDD000-memory.dmp upx behavioral1/memory/5148-16-0x0000000000160000-0x0000000000CDD000-memory.dmp upx behavioral1/memory/1632-21-0x0000000000670000-0x00000000011ED000-memory.dmp upx behavioral1/memory/1632-22-0x0000000000670000-0x00000000011ED000-memory.dmp upx behavioral1/memory/5492-23-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-24-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-26-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-27-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-28-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-29-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-30-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-31-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-32-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-33-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-34-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-35-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-36-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-38-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-40-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-45-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-46-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-49-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-50-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-53-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-54-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-57-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-58-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-61-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-62-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-65-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-66-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-69-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-70-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-73-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-74-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-77-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-78-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-81-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-82-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-85-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-86-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/1788-92-0x0000000000330000-0x0000000000EAD000-memory.dmp upx behavioral1/memory/3876-93-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/1788-94-0x0000000000330000-0x0000000000EAD000-memory.dmp upx behavioral1/memory/3876-95-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-96-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-97-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5056-118-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/4604-120-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/5492-197-0x0000000000C40000-0x00000000017BD000-memory.dmp upx behavioral1/memory/4604-199-0x0000000000C40000-0x00000000017BD000-memory.dmp upx -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\PackageManifests\088424020bedd6 NVIDIA Container.exe File created C:\Program Files\Google\Chrome\Application\133.0.6943.60\RuntimeBroker.exe NVIDIA Container.exe File created C:\Program Files\Google\Chrome\Application\133.0.6943.60\9e8d7a4ca61bd9 NVIDIA Container.exe File created C:\Program Files\Windows Multimedia Platform\e6c9b481da804f NVIDIA Container.exe File created C:\Program Files (x86)\Windows Multimedia Platform\e1e81344-3509-cfe1-6e21-d6715f6f4435 jopik.exe File created C:\Program Files (x86)\Windows Multimedia Platform\winlogon.exe jopik.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\winlogon.exe jopik.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\winlogon.exe winlogon.exe File created C:\Program Files\Google\Chrome\Application\winlogon.exe winlogon.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\sysmon.exe NVIDIA Container.exe File created C:\Program Files\WindowsApps\MovedPackages\fontdrvhost.exe NVIDIA Container.exe File created C:\Program Files\Windows Multimedia Platform\OfficeClickToRun.exe NVIDIA Container.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\121e5b5079f7c0 NVIDIA Container.exe File created C:\Program Files\Microsoft Office\PackageManifests\conhost.exe NVIDIA Container.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Speech\Common\OfficeClickToRun.exe NVIDIA Container.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jopa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NVIDIA Container.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jopik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jopa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000_Classes\Local Settings NVIDIA Container.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 winlogon.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 winlogon.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2432 schtasks.exe 5924 schtasks.exe 5468 schtasks.exe 5476 schtasks.exe 4656 schtasks.exe 2868 schtasks.exe 2668 schtasks.exe 864 schtasks.exe 4360 schtasks.exe 1524 schtasks.exe 4500 schtasks.exe 1460 schtasks.exe 4496 schtasks.exe 2324 schtasks.exe 4848 schtasks.exe 4700 schtasks.exe 5292 schtasks.exe 4912 schtasks.exe 4904 schtasks.exe 748 schtasks.exe 5984 schtasks.exe 1984 schtasks.exe 1088 schtasks.exe 1836 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5524 jopik.exe 5524 jopik.exe 5524 jopik.exe 5524 jopik.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5148 winlogon.exe 5148 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 1632 winlogon.exe 1632 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5492 winlogon.exe 5056 winlogon.exe 5056 winlogon.exe 5728 jopa.exe 5728 jopa.exe 5728 jopa.exe 5728 jopa.exe 5728 jopa.exe 5728 jopa.exe 5728 jopa.exe 5728 jopa.exe 5728 jopa.exe 5728 jopa.exe 5728 jopa.exe 5728 jopa.exe 5728 jopa.exe 5728 jopa.exe 5728 jopa.exe 5728 jopa.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5492 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 5492 winlogon.exe Token: SeDebugPrivilege 344 NVIDIA Container.exe Token: SeDebugPrivilege 5052 OfficeClickToRun.exe Token: SeDebugPrivilege 4796 conhost.exe Token: SeDebugPrivilege 2436 sysmon.exe Token: SeDebugPrivilege 2644 OfficeClickToRun.exe Token: SeDebugPrivilege 5308 conhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5728 jopa.exe 5728 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe 5728 jopa.exe 5728 jopa.exe 4260 jopa.exe 4260 jopa.exe 5728 jopa.exe 4260 jopa.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 5524 wrote to memory of 5492 5524 jopik.exe 83 PID 5524 wrote to memory of 5492 5524 jopik.exe 83 PID 5524 wrote to memory of 5492 5524 jopik.exe 83 PID 5492 wrote to memory of 5148 5492 winlogon.exe 86 PID 5492 wrote to memory of 5148 5492 winlogon.exe 86 PID 5492 wrote to memory of 5148 5492 winlogon.exe 86 PID 5492 wrote to memory of 1632 5492 winlogon.exe 89 PID 5492 wrote to memory of 1632 5492 winlogon.exe 89 PID 5492 wrote to memory of 1632 5492 winlogon.exe 89 PID 5492 wrote to memory of 5056 5492 winlogon.exe 94 PID 5492 wrote to memory of 5056 5492 winlogon.exe 94 PID 5492 wrote to memory of 5056 5492 winlogon.exe 94 PID 5492 wrote to memory of 3836 5492 winlogon.exe 96 PID 5492 wrote to memory of 3836 5492 winlogon.exe 96 PID 5492 wrote to memory of 3836 5492 winlogon.exe 96 PID 3836 wrote to memory of 5728 3836 cmd.exe 98 PID 3836 wrote to memory of 5728 3836 cmd.exe 98 PID 3836 wrote to memory of 5728 3836 cmd.exe 98 PID 1168 wrote to memory of 4260 1168 cmd.exe 101 PID 1168 wrote to memory of 4260 1168 cmd.exe 101 PID 1168 wrote to memory of 4260 1168 cmd.exe 101 PID 5492 wrote to memory of 4604 5492 winlogon.exe 105 PID 5492 wrote to memory of 4604 5492 winlogon.exe 105 PID 5492 wrote to memory of 4604 5492 winlogon.exe 105 PID 5492 wrote to memory of 1888 5492 winlogon.exe 106 PID 5492 wrote to memory of 1888 5492 winlogon.exe 106 PID 5492 wrote to memory of 1888 5492 winlogon.exe 106 PID 1888 wrote to memory of 1700 1888 cmd.exe 108 PID 1888 wrote to memory of 1700 1888 cmd.exe 108 PID 1700 wrote to memory of 1020 1700 hitler.exe 109 PID 1700 wrote to memory of 1020 1700 hitler.exe 109 PID 1700 wrote to memory of 1020 1700 hitler.exe 109 PID 1020 wrote to memory of 5080 1020 NVIDIA Container.exe 110 PID 1020 wrote to memory of 5080 1020 NVIDIA Container.exe 110 PID 1020 wrote to memory of 5080 1020 NVIDIA Container.exe 110 PID 5080 wrote to memory of 5920 5080 WScript.exe 111 PID 5080 wrote to memory of 5920 5080 WScript.exe 111 PID 5080 wrote to memory of 5920 5080 WScript.exe 111 PID 5920 wrote to memory of 344 5920 cmd.exe 113 PID 5920 wrote to memory of 344 5920 cmd.exe 113 PID 344 wrote to memory of 5052 344 NVIDIA Container.exe 139 PID 344 wrote to memory of 5052 344 NVIDIA Container.exe 139 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\jopik.exe"C:\Users\Admin\AppData\Local\Temp\jopik.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5524 -
C:\Program Files (x86)\Windows Multimedia Platform\winlogon.exe"C:\Program Files (x86)\Windows Multimedia Platform\winlogon.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5492 -
C:\Program Files (x86)\Microsoft\Edge\Application\winlogon.exe"C:\Program Files (x86)\Microsoft\Edge\Application\winlogon.exe" -3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5148
-
-
C:\Program Files\Google\Chrome\Application\winlogon.exe"C:\Program Files\Google\Chrome\Application\winlogon.exe" -3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Program Files (x86)\Windows Multimedia Platform\winlogon.exe"C:\Program Files (x86)\Windows Multimedia Platform\winlogon.exe" -3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\jopa.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\jopa.exeC:\Users\Admin\AppData\Local\Temp\jopa.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:5728
-
-
-
C:\Program Files (x86)\Windows Multimedia Platform\winlogon.exe"C:\Program Files (x86)\Windows Multimedia Platform\winlogon.exe" -3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4604
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\hitler.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\hitler.exeC:\Users\Admin\AppData\Local\Temp\hitler.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\NVIDIA Container.exe"C:\Users\Admin\AppData\Local\Temp\NVIDIA Container.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\NVIDIA\DisplayDriver\535.21\zajaYJ4rqwpmDK2a6yrvwdV.vbe"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\NVIDIA\DisplayDriver\535.21\mxJne99RtKqQDunPUGdos.bat" "7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5920 -
C:\NVIDIA\DisplayDriver\535.21\NVIDIA Container.exe"C:\NVIDIA\DisplayDriver\535.21\NVIDIA Container.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:344 -
C:\NVIDIA\DisplayDriver\535.21\OfficeClickToRun.exe"C:\NVIDIA\DisplayDriver\535.21\OfficeClickToRun.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
-
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4496
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4660
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\jopa.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\jopa.exeC:\Users\Admin\AppData\Local\Temp\jopa.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:4260
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2716
-
C:\Users\Admin\AppData\Local\Comms\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Comms\RuntimeBroker.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1788
-
C:\Program Files (x86)\Windows Multimedia Platform\winlogon.exe"C:\Program Files (x86)\Windows Multimedia Platform\winlogon.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 12 /tr "'C:\425e4b9c48bf9566ebce35\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\425e4b9c48bf9566ebce35\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 12 /tr "'C:\425e4b9c48bf9566ebce35\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\425e4b9c48bf9566ebce35\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\425e4b9c48bf9566ebce35\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\425e4b9c48bf9566ebce35\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\425e4b9c48bf9566ebce35\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\425e4b9c48bf9566ebce35\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\425e4b9c48bf9566ebce35\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Office\PackageManifests\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\PackageManifests\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Office\PackageManifests\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files\Google\Chrome\Application\133.0.6943.60\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\133.0.6943.60\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Program Files\Google\Chrome\Application\133.0.6943.60\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Multimedia Platform\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Multimedia Platform\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\NVIDIA\DisplayDriver\535.21\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\NVIDIA\DisplayDriver\535.21\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\NVIDIA\DisplayDriver\535.21\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1088
-
C:\Program Files\Microsoft Office\PackageManifests\conhost.exe"C:\Program Files\Microsoft Office\PackageManifests\conhost.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\sysmon.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\sysmon.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
C:\NVIDIA\DisplayDriver\535.21\OfficeClickToRun.exe"C:\NVIDIA\DisplayDriver\535.21\OfficeClickToRun.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
C:\Program Files\Microsoft Office\PackageManifests\conhost.exe"C:\Program Files\Microsoft Office\PackageManifests\conhost.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5308
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD54a591f46c87b49a7de93f5ac771cd4ab
SHA1e0992350818e5c56d3f2e3a6db340d1f5b8f3314
SHA256b495e22042b08f27b690da18986ec74d5054a65d05d5cf41fdecd5751482ccbd
SHA512b498445d1e427853690250aebff35cbd7e28e85a89ad868e3483930b16ec13198357cfcd5feb45567b1bc8f3d9f97c5ecf2d242c8a5e9d758a536d0498ba7955
-
Filesize
53B
MD57784d810f5ff3afa8df50e360eb90e7d
SHA1f04802a991ff6461aa1c35b7c0f68e43d5a114c6
SHA2560385dbf94fc27705560cf0b6b04e9a37181db486ee8f7573c5ad2217d18f4ca0
SHA51280038ae2bfd5f8ca3f4812ab5c342878f98978007125c9dca5edb915701a5383916131cdc3082c054c49c508cd210aff70319ac0fc498cbdd6cee776df672cac
-
Filesize
225B
MD5d7df2670ad0c6c7b9cc48122f20f086c
SHA1e69bf8c214d8c4b768125ca03e402e1c871cc233
SHA256d3bf5c54de984dd2d1d779494deb8a995cc062eb5f25c465d0de78d99b8cc52b
SHA51205ed88410790bf74dc7ab880f893e555c4859c133e79a89f28b5e1a68c36f4a4f28d3b7b6532953c04b6d23a21faf53e60107efde9e6acb492a9235d48943f03
-
Filesize
3.1MB
MD525af61a744bdfb7be6e811a1119d55f6
SHA1c4352f21b66710e390592d50ae5914ce0c33cf56
SHA256babed92f8fa49db0ca046162e82f7e2403f33c4ca9ea5097ba981a5d3d365793
SHA5123b7bc8129c5fec44139d502b2c410680724bac368aa17094f6191d57e4f8fac182f28e86f8db512d0472e088540449171602a4f3b0db96b6811b7fb73f4580dc
-
Filesize
1KB
MD512a813ec669d9480f522198c50939fb3
SHA18183507eb58e6d4a2681cc13371ab673f92b644f
SHA256049951a35a57119f9057c912a8ce26ef4aeea74c8442693cc8ba99527c2483fb
SHA512f02a15dc78a391966f0f7c86c9663469a1c8e47dab6b7b4f47fcf45f4587b66008bec68e598fee9d690e7a749a974e86bde0a3c5b17f0d2e6ca6445816b3983d
-
Filesize
1.8MB
MD5531bf67134a7c1fb4096113ca58cc648
SHA199e0fc1fb7a07c0685e426b327921d3e6c34498c
SHA25667942630366d114efa35f3f4a79741a4a4eb2c3b0c8ffaac07af527f84d4489a
SHA5128facae8335a4f33f54e48c64814946eb8b480800b4453612fffcef64117946a35d493f433d4e27186ee864603da756319f816e70c3bfc08b8bb1861fc7030ff4
-
Filesize
10.4MB
MD53a1733f19b9ca74fe793df23700c3519
SHA131cf4474f0ac00d45c19b7e31e7dc9fde3054091
SHA2561b2a026beda12eff88e2397931018031e4358de05aa449e3441434e6cf5dad6c
SHA5120cd23dce1880c0b11d19f7d58102020baba7033e828aee233f8ed6b7d11c622d1dcec38c4a3e6c4691e07f7a1609fe550a30517e662236e164e550e87bea777b
-
Filesize
436KB
MD5713e18e3fc579e73a1926d06729d9687
SHA1cdaf86e6ebac8b52a43709f8fdbfb29b15c65513
SHA256effaa8fb70619158f6d2263ef45e328db84c49a20658a82621e28d0f03c4723a
SHA512497682193b5924f5ab8579e07a1c7cfdb179f4858f6460c139da9afa7d0d2858df79a5fad0680c1d83335bf8b639c8f9d91365e79d84465bd076fdfacd8dbdd9