Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 18:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1_SpiN9Z-udCM3yJAEWobQshvbJ032WVK
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/drive/folders/1_SpiN9Z-udCM3yJAEWobQshvbJ032WVK
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 drive.google.com 7 drive.google.com -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings mspaint.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 1108 msedge.exe 1108 msedge.exe 4984 msedge.exe 4984 msedge.exe 4372 identity_helper.exe 4372 identity_helper.exe 896 msedge.exe 896 msedge.exe 1816 mspaint.exe 1816 mspaint.exe 5264 mspaint.exe 5264 mspaint.exe 5908 mspaint.exe 5908 mspaint.exe 1816 mspaint.exe 1816 mspaint.exe 5112 mspaint.exe 5112 mspaint.exe 5168 mspaint.exe 5168 mspaint.exe 5180 mspaint.exe 5180 mspaint.exe 4256 mspaint.exe 4256 mspaint.exe 4176 mspaint.exe 4176 mspaint.exe 5188 mspaint.exe 5188 mspaint.exe 2956 mspaint.exe 2956 mspaint.exe 4816 mspaint.exe 4816 mspaint.exe 1752 mspaint.exe 1752 mspaint.exe 3768 mspaint.exe 1848 mspaint.exe 3768 mspaint.exe 1848 mspaint.exe 4900 mspaint.exe 4900 mspaint.exe 5944 mspaint.exe 5944 mspaint.exe 5920 mspaint.exe 5920 mspaint.exe 2936 mspaint.exe 2936 mspaint.exe 5288 msedge.exe 5288 msedge.exe 5288 msedge.exe 5288 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 5744 7zG.exe Token: 35 5744 7zG.exe Token: SeSecurityPrivilege 5744 7zG.exe Token: SeSecurityPrivilege 5744 7zG.exe Token: SeTcbPrivilege 5776 svchost.exe Token: SeRestorePrivilege 5776 svchost.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 5744 7zG.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of SetWindowsHookEx 54 IoCs
pid Process 1816 mspaint.exe 3872 OpenWith.exe 5264 mspaint.exe 5312 OpenWith.exe 5908 mspaint.exe 6020 OpenWith.exe 1816 mspaint.exe 5112 mspaint.exe 5168 mspaint.exe 5180 mspaint.exe 4256 mspaint.exe 4176 mspaint.exe 5188 mspaint.exe 2956 mspaint.exe 5488 OpenWith.exe 5352 OpenWith.exe 5524 OpenWith.exe 5480 OpenWith.exe 716 OpenWith.exe 5624 OpenWith.exe 5604 OpenWith.exe 5452 OpenWith.exe 4816 mspaint.exe 1752 mspaint.exe 1848 mspaint.exe 3768 mspaint.exe 4900 mspaint.exe 5944 mspaint.exe 5920 mspaint.exe 2936 mspaint.exe 4816 mspaint.exe 4816 mspaint.exe 4816 mspaint.exe 5944 mspaint.exe 1752 mspaint.exe 3768 mspaint.exe 2936 mspaint.exe 5920 mspaint.exe 4900 mspaint.exe 1848 mspaint.exe 5944 mspaint.exe 5944 mspaint.exe 2936 mspaint.exe 2936 mspaint.exe 1752 mspaint.exe 1752 mspaint.exe 3768 mspaint.exe 3768 mspaint.exe 5920 mspaint.exe 5920 mspaint.exe 1848 mspaint.exe 1848 mspaint.exe 4900 mspaint.exe 4900 mspaint.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4984 wrote to memory of 536 4984 msedge.exe 83 PID 4984 wrote to memory of 536 4984 msedge.exe 83 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 4244 4984 msedge.exe 84 PID 4984 wrote to memory of 1108 4984 msedge.exe 85 PID 4984 wrote to memory of 1108 4984 msedge.exe 85 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86 PID 4984 wrote to memory of 1420 4984 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/drive/folders/1_SpiN9Z-udCM3yJAEWobQshvbJ032WVK1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8974b46f8,0x7ff8974b4708,0x7ff8974b47182⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4772 /prefetch:82⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,12332229315328091299,14204994892133665276,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5288
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2960
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2412
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_Case 0102 - faeriejaninex-20250117T183348Z-001.zip\Case 0102 - faeriejaninex\C9113B95-251D-4889-AA27-EAE497C673B0.png" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1816
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:4280
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3872
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_Case 0102 - faeriejaninex-20250117T183348Z-001.zip\Case 0102 - faeriejaninex\C9113B95-251D-4889-AA27-EAE497C673B0.png" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5264
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5312
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap29921:154:7zEvent14461⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5744
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\C9113B95-251D-4889-AA27-EAE497C673B0.png" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5908
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:6020
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\image2.png" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1816
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\image3.png" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5112
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\Screenshot_2025-01-12_180030.png" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5168
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\Screenshot_2025-01-12_180036.png" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5180
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\Screenshot_2025-01-12_180041.png" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5188
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\Screenshot_2025-01-12_180046.png" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4256
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\C9113B95-251D-4889-AA27-EAE497C673B0.png" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4176
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\image.png" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2956
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5352
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5488
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5524
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5480
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:716
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5452
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5604
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5776 -
C:\Windows\system32\dashost.exedashost.exe {0c50dd5f-896c-4df9-87210cc92dab62a9}2⤵PID:5100
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\Screenshot_2025-01-12_180046.png"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1752
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\C9113B95-251D-4889-AA27-EAE497C673B0.png"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4816
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\image.png"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1848
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\image2.png"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3768
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\image3.png"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4900
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\Screenshot_2025-01-12_180030.png"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2936
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\Screenshot_2025-01-12_180036.png"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5920
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Case 0102 - faeriejaninex\Screenshot_2025-01-12_180041.png"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
215KB
MD5d474ec7f8d58a66420b6daa0893a4874
SHA14314642571493ba983748556d0e76ec6704da211
SHA256553a19b6f44f125d9594c02231e4217e9d74d92b7065dc996d92f1e53f6bcb69
SHA512344062d1be40db095abb7392b047b16f33ea3043158690cf66a2fa554aa2db79c4aa68de1308f1eddf6b9140b9ac5de70aad960b4e8e8b91f105213c4aace348
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5d24e5feae9c70a5f61c3eeb050488f3c
SHA1c202c55787b981ed29d2018bd80c1472488915e6
SHA2565f5b59a60b9f86d34c57989c248ea018175b3ba9f1dc76d5a242af334ce46695
SHA51209a6149ffece6e916f094c8570f40696a662b738813049ecaf7b03962d1a577f6b65e6ee2dd7ed039331ddad75e40c1fcdc5bcdbc88e18c8f6a87aaeeca030e4
-
Filesize
4KB
MD5d656905389c725fa93e79b73b067308d
SHA1e4402c562de464b331b1beb996db45240ed164f3
SHA25635db528938fcf9d898b318259c579b554dec21ad7aba0806b18410113215e12e
SHA5127d50458030297965b2ac88bf2a9ad679bd34c0f04986a0b541521ebe4d035b2fa7f787957bb51c793cf3b25c36a4b98b240fdc26c04e739957b10a341952e705
-
Filesize
4KB
MD5758849d964a2c1d622bd3672bb87ef49
SHA1739c8137ae3bbe0d970260b09fd5e20384386665
SHA2563f5793155a9cffb06e0630ea5e6d9a2e7c0b7fa3d2ed31c3932c3f0c79fe0ffb
SHA5125d2851390eacc5bf9893433ebd6a13d46382faaf878029617f9651286fe23e000556a8c7ac9095a754e18e3faa5a8968d0e431d29224b2c715ddd08d90a04f9b
-
Filesize
5KB
MD5c7e44baee612712f80b1faf65253a701
SHA1457250268ac003b8044771d97da20e6b8de21018
SHA256109ec7ffa34291e3548675914abb6e416c05e13326946cf0b5acbdf36c052c5d
SHA5128f8c90d0eba3d6cdd5d4bc4bbaefc7cb2ec2fd999d9946e8b7481e5ec3a73ad192ee1e5f1bc9a7a1d265831310ff85f45cbe182e8cf3808478b7f511a06b0ed7
-
Filesize
6KB
MD537672c73131c4667fcbb5555d2717106
SHA1952ccfcda5c8e996ff3412197071eaafc918176c
SHA256e96fe464707fe78933e76aecfda3905920e6f50df494c7b92605052dceeb58ed
SHA5124553d255d676a73161cf814f333f59c4c0882da78b52cd42429cd97d8433ec885d564053797afd4cee293468a6f52e31b2c7835849bb36a9d30db8c671aa4c16
-
Filesize
6KB
MD50f08aa3dc8990cf62007866e3a6b88d5
SHA17acb63d99b4da5cbdd874b5a2e735f9f871de9c9
SHA2564fed9a3f5544f8addc985e129f025abab9039bacefc5f38b0962076a5bb07744
SHA512568d9b704283c5e1b5485afe8b2ea1b10329e0ec96d3e84a8dc04cff59e140cb22cb8195d75d4585726d0f203630ce644a81109e72b115afb6c3e3b8c08a6a7c
-
Filesize
1KB
MD5e0d584f994b465abbe0d282560bf2636
SHA14bae39334c5c2d11875c37a92952c41e728f76f8
SHA2569d9c3a90aec7120559ec0f072a5655396af18b0dce82534ff2f259469c74a9ad
SHA512e6d1c89aa309c13ac43033a9b144337fa6b47d80bd213997a778c7c7582f77caf293c2998e1bac2023ef630449b540666204809b770b9f10189aac92f1953d8e
-
Filesize
1KB
MD5ee216c2a1bf1af261b4809e853ca6d98
SHA1de324d7fa9c88cf44ffeee47991c07d711f876be
SHA25652bca38c00ca62cb75f10f085008e250cf0aa0558057d3e525302b8b957a0a58
SHA51249304ee29ec7c254fa826367451f1c320a1b88502469cffa11831f89d0c5aca0bdba54eb54042d9597889dad6473bc0dac924a6485795ba402a77f89732f22d0
-
Filesize
1KB
MD5ddeeee6864098452022206d761b3c159
SHA16d430bfc5debf4ebf21ad5ba6a84e5b621a258f2
SHA2569a5abf5f701ca9a6875d405f4f8ab7b867a89c96bfc2994bcc523e1a1172a228
SHA512c895cf74e45911e2c9927352c9392e93e0b6753103360f1d207d4b9630da087bf07dd7fdf57fac1bc7107c3696b10affce9c1660159cc864ca6bb849ced19dd5
-
Filesize
1KB
MD54b7ac9038dc549e7e81bd23110635514
SHA1d01b67e8af545fa1bafc25601c6f01a747902e98
SHA2562443e0926decd4f30c79b0fc570824c1b12daf3aee26203ab0c8915b773ff628
SHA512cbf5ff8e731cf75ef5a69a0b1b8f4686f4776c58d4f19d0e6a8183f1a33eff70874b3b05ce1231f8a679ec5af2f9032660e757b58d789b3aaa96d44c66ae1951
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD536f1b1899a400e32c0d84f9b4ada7dbb
SHA14110f9ab72ea626df33817cd8e35b3e0ebc785fd
SHA25686c24199e4991e4760805aac2fbdba8c05e05ba680ce64736b789907f5246db3
SHA51225b0f44d2026588802795dacb044bcf4be54935835aa19b7897d4858503352bc176db7ac4cdb93b04a7b58900c4ab5acb14289b154e5e92af8f58eddc93d620a
-
Filesize
10KB
MD5b0f617964cc144b8afbfd413682a7b00
SHA1085c1d74f209493566ceb8d544e11b9a8fd8084d
SHA2560068b1c7b8a22a9cbd9c621a853032545da31f29d9ee8a29fd40437efc3bf772
SHA512d0651d163585a76fe37ec393e01ca8647d8262ff54b21a91f993bc85d4b01f3d804dd00f94a9ba99ff101389665bdb602df56a08a8b950086900a647e3a9dd70
-
Filesize
2.3MB
MD5802965ba799a099201d8015043b6df45
SHA169034770a7b6c19ccf7d60a351b232edecdfe644
SHA256153c0a7b947fc6d786588c87d0dd1edb1de32e08d20615f700daf6e8925ef9fe
SHA512a5fc111d4fe7f6d05cd2b1561114c4be827913756086e6808c62cc1c37f31019543b1e5c35df77251ac475415452a260c373a1d25779d799f9858e700c53b407
-
Filesize
1.2MB
MD5ecf39166757684fd90ce77d3fcd916ed
SHA1d9f4050c05cec6bf72681093b216087317207b8e
SHA2566e789f3d5931517b7907fd7a319a85de07b86c226dc7f5e4389baf5807d18653
SHA512936cc589c438b7fa9731d8aa69de9b113ee83a710039180e00467304c06e6605b55d3ce2dae9769905cc1e4d57edff481288cc9b73a40713867e46f8751bf01e
-
Filesize
219KB
MD5c1c6836b7356641ad91dfc6b4ca19f63
SHA1009e3da4e0303fe76b38b9739aaeee8f9697c8e7
SHA256b1bc9442cdc45f350745d871f5355b53df59c993b4db7b43d4a61a471ca65c0c
SHA5124bc7be0d2e5b47c0103e66a5a318f26e2dc9e161b56582121417ba9790fb6667ddef1c1b9c37b0b8b8a19365cd4d38a16edcc035c78825da32ba4305cbab1ae9
-
Filesize
208KB
MD5a93637e6e771cb6c817fa3f059ff80a0
SHA1d5774607b44d9c97a70b7b4780ef9e6d0ea3bcf3
SHA2563e4f978adfb961123d6ed8c0298c5f9f80aab86e952d38dd34bf67424df0e31c
SHA512195415352ae2fce37143b28258ea41670857de5da088457f5febd95822882af6ae5d4c6c67616f65af83302dffd4a8e4707102cb635e8baef30bc4ba64454748
-
Filesize
220KB
MD561d20aecbaa1f15604e08cc512c908bb
SHA1434cadc76daccdb2c9a3e713814e0a5da7db787e
SHA256a2b354c5b45219e8d5007c83feb47a8de77bdfead9bfde7b3b869a2e4c46c172
SHA512b4fdc3541e5ab73fb5278435f530e55685d87eebee59607d2d5215fec750f2d522674319cc8ab823ab908ec1cd4c6968818d41ecfe704afeefec271206c6405f
-
Filesize
97KB
MD5cf30e578604a07df4d6fc467b85ff71d
SHA1230918045dcdc486e35cd023b076cbb29f286052
SHA256eb7374557d57b827b1f952a7fbb8a1cd87586cae6b1b1c5650e77b1d06ca673b
SHA512bd3ae26b43a800f77de5b9d71d4d23a8e8a781979d0b87b44e32f6c60f1ade96bbd17b8f50f16c0353fc7977be31669853abbf4ea25b30d89c25c46d8ba94e16
-
Filesize
118KB
MD53108edf2f1e7061c7aa526552acda833
SHA1ec8de03499af10882f19a341f98accc35b4e37df
SHA256ddda4e9f7bf831ab4ccbaaa74e4597fa18a887251e8126d994bf0d7e20ed3053
SHA51268011a55e42d03eae858194cebe58d438e306902d6be137373125b9991c12fd2a91a16838fea1f501621a4083a26343252b0525671a33b88407e4d205986c19d
-
Filesize
175KB
MD541942e52d1aa5fae270bd8d6e1fff5c5
SHA1eda7375a4b6c26cd0a00fe597d43f4bad24cdeb4
SHA256b6538f9e67588dd15d591dc45acb7e0f5b00db371007a5219a6ac22cc7098333
SHA512943a88de599fc3df1ccf3f7dda56584a2ed563d700bcacc6ab82726c249835aa328d2aa64acca32a8b92ca370c7a671139ba0722d260ea825f265b805a0745e4
-
Filesize
89KB
MD50d6771e254c78b02ebea5cf414377fcd
SHA1b6909e9565348803d390636369f4ee67c16613f3
SHA256902fa6ac04e944fbce0d93195e0ccd156e609be0d8dab57ae3458ed83aa1e832
SHA512e8f261b4aa0e855cfa876a61ff35c02669a614c0078435b16761c0bec7dc4abc90415818651f7f192d3490cdb27dbaa2f547627a2645b36261494bcdc3a80c5f