Analysis
-
max time kernel
300s -
max time network
258s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 20:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1hC2EXp57Mz7nty9riGYHQAw2RpiyY0bs/view
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1hC2EXp57Mz7nty9riGYHQAw2RpiyY0bs/view
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4508 flstudio_win64_24.1.2.4394.exe -
Loads dropped DLL 23 IoCs
pid Process 740 FL.Studio.v24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 10 drive.google.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\Rock\tom2_oh 19.wav flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\Thrower\18 in crash2.wav flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Hi Hats\Downstream CHat 06.wv flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Hi Hats\MA GreenDream CHat.wv flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Misc\Used by demo projects\Square a Saw - Oxygen (Tevlo Vocals Resynthesized)\Oxygen (Tevlo) Vocals.ogg flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\HQ Rock Kit\Ride HQ Rock #2.wav flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\HQ Rock Kit\Tom 2 HQ Rock #2.wav flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Channel presets\3x Osc\Windy.fst flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Channel presets\Automation clips\Shapes\Sin-1-0.fst flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Kicks\Attack Kick 27.wv flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Impulses\Reverb Devices\IMP Evnt - Chamber Warm.wv flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\HQ Rock Kit\Tom 4 HQ Rock #6.wav flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Claps\HouseGen Clap 05.wv flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Percussion\MA WhiteWave Planetary Perc.wv flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\HQ Jazz Kit\Snare Rim HQ Jazz #8.wav flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\Jayce Lewis\JL Kick Direct 1 Kick 05.flac flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Claps flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\Jayce Lewis\JL Hat 57 Pedal Hat 02.flac flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Claps\Attack Clap 13.wv flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Misc\Used by demo projects\Atthar Feat Mehran Abbasi & Elise Chantelle - Right Night feeling\AttharTHC.ogg flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kicks\Monster Kick 127.nfo flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\HQ Funk Kit\Crash HQ Funk #8.wav flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Hi Hats\Downstream OHat 06.wv flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Misc\Used by demo projects\Umziky - All the same\GMHiTom1_04.wav flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\HQ Metal Kit\Snare Rim HQ Metal #7.wav flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\Rock\hatclosed 01 subtle.wav flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Claps\HouseGen Clap 10.wv flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Percussion\Collider Tuned Warp Glock 01.wv flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Channel presets\3x Osc\BP string.fst flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\HQ Jazz Kit\HH Pedal HQ Jazz #4.wav flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\HQ Rock Kit\HH Closed HQ Rock #4.wav flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\Rock\hatopen2 02 soft.wav flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Foley\MA Pillow Thud 01.wv flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Channel presets\Sampler\Basic envelope.fst flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\HQ Jazz Kit\HH Pedal HQ Jazz #5.wav flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\HQ Rock Kit\HH Closed HQ Rock #1.wav flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Artwork\Fonts\Cuprum\OFL.txt flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Misc\Used by demo projects\Seamless - Sometime\DM-CYM-CRS 39.wav flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Kicks\Attack Kick 40.wv flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\HQ Jazz Kit\Tom 2 HQ Jazz #2.wav flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Kicks\MA LeWeekend Kick.wv flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Impulses\Chambers\IMP library_door_closed_front.wv flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Misc\Used by demo projects\Tevlo - Release Me (feat. Veela)\{B3A5EC7A-60D6-4809-85AA-021F5DFA10F6}.wav flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\HQ Jazz Kit\Kick 1 HQ Jazz #1.wav flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\Rock\tom1_oh 10.wav flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Claps\Power ClapSnare 06.wv flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Demo projects\Demo songs\LollieVox & Mars Ashworth - Pure Alkaline (FL Demo Edit).flp flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\Groove Bias\crash 2 v8 rr1.wav flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\HQ Metal Kit\HH Closed HQ Metal #5.wav flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\Groove Bias\snare 4 v8 rr1.wav flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\HQ Metal Kit\HH Half HQ Metal #4.wav flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\Rock\snare_oh 24.wav flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Claps\Attack Clap 08.wv flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Kicks\Attack Kick 05.wv flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Demo projects\Demo songs\Electroconductor - Inner Days - SH-1 Rework (feat. Maja Mannila).flp flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Envelopes\Maps\Blur - narrow.fnv flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\Groove Bias\ride 2 v3 rr1.wav flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Kicks\Power ShortKick 29.wv flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\Rock\tom4_oh 07.wav flstudio_win64_24.1.2.4394.exe File created C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums (ModeAudio)\Kicks\Power LongKick 20.wv flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Channel presets\3x Osc\Rave lead.fst flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Misc\Used by demo projects\Square a Saw - Lightning (VEELA Vocals Resynthesized)\VR W Angels and moon beams.wav flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kicks\707 Kick.wav flstudio_win64_24.1.2.4394.exe File opened for modification C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\Groove Bias\hihat 3 v11 rr1.wav flstudio_win64_24.1.2.4394.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FL.Studio.v24.1.2.4394.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flstudio_win64_24.1.2.4394.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 316 msedge.exe 316 msedge.exe 4276 identity_helper.exe 4276 identity_helper.exe 5260 msedge.exe 5260 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 740 FL.Studio.v24.1.2.4394.exe 4508 flstudio_win64_24.1.2.4394.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 316 wrote to memory of 4620 316 msedge.exe 85 PID 316 wrote to memory of 4620 316 msedge.exe 85 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 1780 316 msedge.exe 86 PID 316 wrote to memory of 4668 316 msedge.exe 87 PID 316 wrote to memory of 4668 316 msedge.exe 87 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88 PID 316 wrote to memory of 4188 316 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1hC2EXp57Mz7nty9riGYHQAw2RpiyY0bs/view1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa2a4e46f8,0x7ffa2a4e4708,0x7ffa2a4e47182⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4916 /prefetch:82⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:5484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:5492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,13377517430756879268,16645130727508932656,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4912
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1808
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_FL Studio 24.1.2 Producer Edition KioNathan 2.zip\FL Studio 24.1.2 Producer Edition KioNathan\Installation - Instalacion.txt1⤵PID:4760
-
C:\Users\Admin\Downloads\FL Studio 24.1.2 Producer Edition KioNathan 2\FL Studio 24.1.2 Producer Edition KioNathan\FL.Studio.v24.1.2.4394.exe"C:\Users\Admin\Downloads\FL Studio 24.1.2 Producer Edition KioNathan 2\FL Studio 24.1.2 Producer Edition KioNathan\FL.Studio.v24.1.2.4394.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:740 -
C:\Users\Admin\AppData\Local\Temp\nslE90A.tmp\flstudio_win64_24.1.2.4394.exeC:\Users\Admin\AppData\Local\Temp\nslE90A.tmp\flstudio_win64_24.1.2.4394.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29B
MD5c9e2cc184f1dd73cd5a66abcd8c6e0cd
SHA1ccb180bc3ef502a872f88d591a90571fd8c61fae
SHA256c5705dd82713be76cc5e4c1930589106d67cab8b6e905768a21233c77387db31
SHA512addbac550b8d084e8fb95cf82d7ccb13acdf434b2aaa63b8e7b8bc09a9cc0e5ecd8d8121762a0de6eb69d8ac4f07d7ae9b5b0969f72d36f5b042d76df181887e
-
Filesize
36B
MD51406de33f68d12ff32f186da3a596309
SHA10d4c28f3f5a9290c553a33312bd0686ddda28eb2
SHA256f55f810b44800b37393cc2a97d85595f2a0ea3cd9c4d4416dc00c9dc8badc3d6
SHA512143282705c3c19a24b217653b8af2cdb5378a4adb0b5093fca2643a38be74f4fbc06e9551d75f854091855ddc401fb65ae4560aa865a638346a831e7b9100d0d
-
C:\Program Files\Image-Line\FL Studio 2024\Data\Patches\Packs\Drums\Kits\Groove Bias\snare 4 v7 rr1.wav
Filesize9KB
MD5d786090570f1b09f694aef4b78b5fb44
SHA1bb063717c78da303499bb0239ab6de0cd99ea079
SHA256f8c31012d32c60da332a6204133b832e610a38ba9506e42606fafc6d9b77053f
SHA51225cabe81af1c5ccfb45de1c37f2064a4784842a1c03513a6ac59d5e5d49de684961a683d2dafa269087fe5b88b7f0551448f5a9cbd8a490a81cd30822ba7aed3
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD559e8ae4f65ed9be425607aa3ee9a8d16
SHA1ca5b8429cd896eb57e76102c3f54488996297622
SHA256073c18a4893d894b3b754703b05073d0413c07f1f037e00494ba4fa47aef1de4
SHA5126144b56375d70448aebf38d9df49e9752d3acd955e086a894489cc5239d59f23a0a86308e6c33c0dddde1f1dd417d0dbf6867829559b8053dd10660133a9d3b3
-
Filesize
3KB
MD5593a1f1b14261e75dc38ba02719317c2
SHA175bf7dd767658639e1a3dbd2e6ff02bcb5bab67f
SHA256b7bea7abb3b0c88cf0b986069b9da7552f7de0f5076927ff991038dd2ca2e9b6
SHA5129b692e16f7c777858eab29121572d7b50053ebf8ee73043e334aefadfdefcfc3cacd37e725949b1094e68b5b83671b3354f5d489307ec39ad2b391fcf5495e64
-
Filesize
3KB
MD573e5134e9775240270088826d60d280a
SHA14f120e339d7691ed3a160f42dc40609e87b2a4b8
SHA2566c8c8dd6a3579828a80fc8704f33d3c4e4e0f0f41af6602038639d3fbca08aa4
SHA512e622a0eaf8f78e1a5543cf098fc01d83aaf2e883ae4d9891a703139dcf88598f077eccf56e88a7b7983cb3bec1433655c247e8bebc58ae1cd737f33e9bf954f6
-
Filesize
3KB
MD5e2f8f746d0d0c4daea99817d7522df59
SHA1b39c8cd4004888bf97af5ee3df1652d93f304301
SHA256d98805b72e36906303b35a59092250b76a7f5b1dac3e23b84ebc90c025e2e646
SHA51227e5a1c1b3469734fbc3ca3ef9c9842e90a53ed0d565b5f13b9f9c14899d65bf6030a90320ebd0e606f178eeefeab4afa136a21d5c03ea35802fe781fe36ab11
-
Filesize
6KB
MD51c26fe545e9f5f1989e58965cbee4acf
SHA186b2288d1cb91505846ef74214b2da7cf4e3c0de
SHA2569a23895b87ba9956f199f7ad86e487a33ef10f9caa18c6c02074211ca2ad673c
SHA512035bd82a2563ff9f2ba24f0e4b31c6d98a7f19344713b2fa1271b544037b5a81a0ec681d23bf75b1250e3d5dafe6113b4423dcbb0474e76b8a6415110d70612f
-
Filesize
5KB
MD5a22a93bf123c9fc833840c2ef270145b
SHA153c5e108b3bfe228e7f3a01e98294156213bb423
SHA25608cfb9e63788c264be1c9aa79790d533decd0494d3b32855e19d57bbf24164e7
SHA512ca3fe016decdbb793483b4b313931227a83210d86c2a84566fb6e5f7aa4dd43c1869298bffd46c117bf256b80a37865f3ed87ea62bf87334ceb9a79f47a6a426
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5470f13c5c31b26a686d884b6ab1fc239
SHA1defe219070007c4e6fd5a18d748647920beaf40f
SHA256c44e3033878e26cf1ca172ce034bdba88325c926eb34b7d04e79f436acf6b592
SHA512cafef324819057232e9976db1e1c486f21aeeab5263c632c6f645e452dc8fe2d4e1969608237816ad8db1d4090fb0f487b8f70242005cee416dbe4a6bb45a811
-
Filesize
11KB
MD5e865ea416e7b4305008642df60df970b
SHA1bf3e23352e3e39d40a2714620fe1ff8336426c3e
SHA25639d5555daf3ed086cafc490ac9a378097c80fdda27c886b606f0e2911fc44cb7
SHA5124d1e9c8bc163e65a0c377bf3620d8f6c1a7824d326bcc8646ab122ce88428570d5f521255b125c250d1be57140f605c5eaf037449b32e807f0a7398006aa04d1
-
Filesize
12KB
MD5192639861e3dc2dc5c08bb8f8c7260d5
SHA158d30e460609e22fa0098bc27d928b689ef9af78
SHA25623d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6
SHA5126e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc
-
Filesize
1.2MB
MD5494dbd5993a47b3b720f5e0f6eb04c59
SHA108d3f00ee435a9ddbb0afe7869a3183bd3e0a284
SHA256bee6fc430a05bdcf82226adcbbfba9abbe08fc065b97c1f2cfeb9f9c4e34cd25
SHA5122e9305862c5c55e37d5533b6392a428694858880a8ca533f9a7260b7ee4220b79b5d45f5645526b631a05bfaa9fc0725b6e43b0a5681cb36b7b6c413083f386e
-
Filesize
15KB
MD5998189882c9f1be220c9faf0fd2bde15
SHA1787d50c46c9a2a48565f684fabc7503aca8b0493
SHA256f34385901206a3952fe2724edb3b0b123fd897119c774ab68c8745de6662d990
SHA512e0c52ad851b476e7bcbadea8f993e5c6f9f70a9b46e2aebe8ee353a372b0bd5af95241240f880f49b9d91d240a4a2b7e7d2b7c8a18ca1654e607fa8d2772dfd6
-
Filesize
11KB
MD524523fe14bb9ba400a3950016b187915
SHA16ec152b4e4ac04038d4608a8a206070185116036
SHA256c4aaf80e3990185eeb5ea56bf841dbf5f3d02269d715f3bfdfe8b54aa797a7b9
SHA512ae73351d27109187f7c4e312bc30a165202f29d74c65dd0feaee75dab72b97d27c6482b1e95771063afec7e9f2ca03a27a11cd25e39228072b69c33fffef7257
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
23KB
MD59210597fba3dfab3c69b1eb490205419
SHA16e3ca39043756ed1cceaf2d4853e7cb6be1c64cb
SHA2567696c255014a543f720e189ab3fe48f62fcf43435465062649c96138eedb222f
SHA5124877daefdd34725791fba7c8cc2d85c4e91080ca7787a71ee9ffde71704ac40799b891f03d1f1805a31af6ddc35e335f74c9d620e87d517670a378c001cffb06
-
Filesize
1KB
MD5cdf69dcb7a306ae3f218e55a11259a3c
SHA1db0045965972c69430086cbc8dd433a73328e1a9
SHA2569dcf753a6f895da37b5c5650f17b4fc67484c3b0eee90ae5c98a95bdf1bb0b31
SHA512cb954c113e71c16623f3b2992edcc48a9e94c32dfcb6553ceffb8069e9acb387c515d2bd996c9b83ca32a868ee404306fe6c22d4af228ccf83572560024599ae
-
Filesize
1010B
MD5634fd2633a884035690fd3635c7ae34f
SHA191af7c2af8a41563d33f944868d22673c6116e2d
SHA256c0313e195465e521ef5cbd94e19a1abe70cf0d564ec38b017f1e09a276e30c15
SHA512810389998f4eb641228e5b4e2ec43849102d2d9e1890c17aff5067cbcd0e46bac7850f732815746cbdf62d4f698cc47002cad2aa2f3b442cec3a5652558b058a
-
Filesize
1KB
MD5f4f4c8eb5f1053d98be36ab8b493e632
SHA16650dfb177c57acd329bc353010f98263e3fabba
SHA256495e4ee7b9e2a0d2128a687d64ea3785f1a3edae09d8426d9c5345700134ba52
SHA5123e8f011138e5874a6168b0305fba1eaa28ba66f7a095e3272b6bec1cf87d560ba9e02674ff80851f38d9257a928dcf85901bbdd4442095ffda2463a5e4f6fc0e
-
Filesize
1KB
MD5a2707fd7e091ee7b881f249d15a3d3b7
SHA14685194d6d9a74e972361388c6f5673eb43943dd
SHA2564eac984d43b68b2f52acb4bd76e71f015c49a288b5e79522ba21c8569bb177ab
SHA512c41a42809cac51a1e7512f82d8356de3534b894d3bc6b9b94c0ff55c6653f5e99775efcfae6d1fd3966318169f6f8ca9a1e2d84fe3ad1f05e9573b8fb354ef68