Analysis
-
max time kernel
202s -
max time network
203s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
01/03/2025, 16:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://workupload.com/file/RVk2Ux6Lu3A
Resource
win10ltsc2021-20250217-en
Errors
General
-
Target
https://workupload.com/file/RVk2Ux6Lu3A
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
127.0.0.1:5552
90cdc4299e3838b5249c33e1c7a2dd25
-
reg_key
90cdc4299e3838b5249c33e1c7a2dd25
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3704 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 3136 Server.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NjRat 0.7D Danger Edition.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ilasm.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "13" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" NjRat 0.7D Danger Edition.exe Key created \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings NjRat 0.7D Danger Edition.exe Set value (int) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" NjRat 0.7D Danger Edition.exe Set value (int) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" NjRat 0.7D Danger Edition.exe Set value (data) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff NjRat 0.7D Danger Edition.exe Set value (data) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0 = 8000310000000000615a258810004e4a524154307e312e3744440000640009000400efbe615a2588615a25882e000000e27e0200000008000000000000000000000000000000c84787004e006a00520061007400200030002e00370044002000440061006e006700650072002000450064006900740069006f006e0000001c000000 NjRat 0.7D Danger Edition.exe Key created \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags NjRat 0.7D Danger Edition.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ NjRat 0.7D Danger Edition.exe Key created \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg NjRat 0.7D Danger Edition.exe Key created \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell NjRat 0.7D Danger Edition.exe Key created \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 NjRat 0.7D Danger Edition.exe Set value (data) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 NjRat 0.7D Danger Edition.exe Set value (int) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" NjRat 0.7D Danger Edition.exe Key created \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU NjRat 0.7D Danger Edition.exe Set value (data) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 020000000100000000000000ffffffff NjRat 0.7D Danger Edition.exe Key created \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0 NjRat 0.7D Danger Edition.exe Set value (data) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = 00000000ffffffff NjRat 0.7D Danger Edition.exe Set value (data) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\MRUListEx = 00000000ffffffff NjRat 0.7D Danger Edition.exe Set value (data) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 NjRat 0.7D Danger Edition.exe Set value (int) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\NodeSlot = "3" NjRat 0.7D Danger Edition.exe Set value (data) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0 = 14002e803accbfb42cdb4c42b0297fe99a87c6410000 NjRat 0.7D Danger Edition.exe Key created \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0 NjRat 0.7D Danger Edition.exe Set value (data) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\MRUListEx = ffffffff NjRat 0.7D Danger Edition.exe Key created \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell NjRat 0.7D Danger Edition.exe Set value (str) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Generic" NjRat 0.7D Danger Edition.exe Set value (data) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 NjRat 0.7D Danger Edition.exe Set value (int) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" NjRat 0.7D Danger Edition.exe Set value (str) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" NjRat 0.7D Danger Edition.exe Set value (data) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 NjRat 0.7D Danger Edition.exe Key created \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 NjRat 0.7D Danger Edition.exe Key created \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} NjRat 0.7D Danger Edition.exe Set value (int) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" NjRat 0.7D Danger Edition.exe Set value (int) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" NjRat 0.7D Danger Edition.exe Set value (data) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 NjRat 0.7D Danger Edition.exe Set value (int) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" NjRat 0.7D Danger Edition.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe 4012 msedge.exe 4012 msedge.exe 776 identity_helper.exe 776 identity_helper.exe 700 msedge.exe 700 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3136 Server.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: 33 3832 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3832 AUDIODG.EXE Token: SeDebugPrivilege 3136 Server.exe Token: 33 3136 Server.exe Token: SeIncBasePriorityPrivilege 3136 Server.exe Token: 33 3136 Server.exe Token: SeIncBasePriorityPrivilege 3136 Server.exe Token: 33 3136 Server.exe Token: SeIncBasePriorityPrivilege 3136 Server.exe Token: 33 3136 Server.exe Token: SeIncBasePriorityPrivilege 3136 Server.exe Token: 33 3136 Server.exe Token: SeIncBasePriorityPrivilege 3136 Server.exe Token: 33 3136 Server.exe Token: SeIncBasePriorityPrivilege 3136 Server.exe Token: 33 3136 Server.exe Token: SeIncBasePriorityPrivilege 3136 Server.exe Token: SeShutdownPrivilege 1800 Shutdown.exe Token: SeRemoteShutdownPrivilege 1800 Shutdown.exe Token: 33 3136 Server.exe Token: SeIncBasePriorityPrivilege 3136 Server.exe Token: 33 3136 Server.exe Token: SeIncBasePriorityPrivilege 3136 Server.exe Token: 33 3136 Server.exe Token: SeIncBasePriorityPrivilege 3136 Server.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 3596 NjRat 0.7D Danger Edition.exe 3596 NjRat 0.7D Danger Edition.exe 3596 NjRat 0.7D Danger Edition.exe 3596 NjRat 0.7D Danger Edition.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3596 NjRat 0.7D Danger Edition.exe 5076 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4012 wrote to memory of 2248 4012 msedge.exe 84 PID 4012 wrote to memory of 2248 4012 msedge.exe 84 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 2432 4012 msedge.exe 85 PID 4012 wrote to memory of 1656 4012 msedge.exe 86 PID 4012 wrote to memory of 1656 4012 msedge.exe 86 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 PID 4012 wrote to memory of 2436 4012 msedge.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://workupload.com/file/RVk2Ux6Lu3A1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ffc51ec46f8,0x7ffc51ec4708,0x7ffc51ec47182⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:82⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3492 /prefetch:82⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1688 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6272 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11444120957095453876,13473184424937471742,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:3412
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4024
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:768
-
C:\Users\Admin\Desktop\NjRat 0.7D Danger Edition\NjRat 0.7D Danger Edition.exe"C:\Users\Admin\Desktop\NjRat 0.7D Danger Edition\NjRat 0.7D Danger Edition.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3596 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ilasm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\ilasm.exe" /alignment=512 /QUIET "C:\Users\Admin\AppData\Local\Temp\stub.il" /output:"C:\Users\Admin\Desktop\NjRat 0.7D Danger Edition\Server.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x308 0x48c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
C:\Users\Admin\Desktop\NjRat 0.7D Danger Edition\Server.exe"C:\Users\Admin\Desktop\NjRat 0.7D Danger Edition\Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3136 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\NjRat 0.7D Danger Edition\Server.exe" "Server.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3704
-
-
C:\Windows\SysWOW64\Shutdown.exeShutdown -s2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39c6855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5076
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:4748
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c7783bea48a89e9a6f765d71cbc99692
SHA104440c5f8204e907041247319e7e1c967a465c18
SHA25607666a388a81a4dab32d818c75a7d2ba982b7461c5ec8e0ce804897f3d022066
SHA512a793cce705636200e9d1c9ce85b6a90a4a98d1e59c748009d355ff686ecd245358f1da8336b63740bef4900ed2a304064236f8e1ed65dcc9f36a5bb99e5b9579
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4f5b8caa-a438-41bd-b74b-eb1ba9687df1.tmp
Filesize24KB
MD553cd489ae1b50ccf71f8a9f52504057f
SHA16fb31ee24b93612e214f101ba598dd94ed446593
SHA256c0644967d5d5656a1361d012776c8e43e9c3cf7d7f0f49e4e844833101dfe8ef
SHA5126804d9d9034a25c2b6ece549380100f0c3886e57885ab9a36380e0c143bfa74746873d3f023e5683f3de6d22c876048c8b3ace399bf7b86a350f9dd7bd3ff60a
-
Filesize
144B
MD5c4782f230201d6226ce0213b440dec57
SHA12c14bc747fe0d0b10646728c5d331309a6b43d14
SHA256d40cb4e54345cc3b183a1ab1e537f70723d300eb85af67be6161066b7e536865
SHA512ad0665752e1084aac0c88487d9d9a4968e646867dac742ca812a40adaa8e53eba31fbe814791db6d308eaf2edd8ee1880176b0657c76cc66f0b010334dea12be
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5a3f7ffb5aea9824c51b439d1095448d1
SHA142b75307a456f047e83023f5e7a174ce637440ee
SHA256aa845f23eb067fd34b264401325b3b1d0f84cd5ec99637261f44c1a4a8533555
SHA51247bc5c0a99e49b74aaba56b63f5bb7fd2951e2d7c5c2efa24c285d78cabb6ccab808e6c631f7d3df5cfce14148f2011838226a6377ffd635c5e1364539d028ac
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD516b57b4a106def8c74cd9228fb820a97
SHA1cce91517554ebe16b66a6aeb7749f6bee8f6e3c4
SHA2565f5ca8200da76fdcb5d0d5cf057442c9c0cbc25e6d8724aaa548e86d9bc87d21
SHA512047b1c5fb7f29b830930705eb125ec55315b0d4750f1c698a574e5d9de5d3a463d09eca3274e62bf132d2bed5eb0536fea2058fea2a9dc5d8994920ec6c858d3
-
Filesize
6KB
MD58d8df9511c0c43bd9dc8d2007a9adb7e
SHA1dc5b722a7168369f44dc32bac7cf20e1631670b6
SHA2560fba76bce063660febe865d0700f4301b94dc6d1eec40ded19ec8c7d5cd82496
SHA51277f662e0dbfa02570a95ebf5887cb5470ffabb71e067db969d56b3ece814dcb2058a152c7d461799a561c274ab98118e3a9fdcf7ce62b464c2fd91e6bfa46624
-
Filesize
5KB
MD596eeebf717ac4441eecf94267b67a651
SHA1b09498cec935103815f8d0eba89ce315b52b6c19
SHA256d76290768f3c47c7bec085ec735119e369c8b1ad6310957a0536959c36451e94
SHA51218ee91b8194b6c0a4dc4f68a5b29da1548e73648b442b023c51038faeb7da8d5004e49dfb66d58323767055481c78cb12bb6ca62f8d1991111bef41c58276eef
-
Filesize
6KB
MD5b554ccc3e92c30c6d83425b9089e1c41
SHA145378c0c1ea85c9b6133caf6b6b72c46dc6e08f5
SHA256daf8fd5eb82f15f8d95fe9e484739712eb41824c47e9a50cc784f60b74932767
SHA512f7e48e3a3abf15bc4a92e13cf3918b58fcfed2a35bd3d7f4a28394a9fc3c6b536ff7eeca7b9f20e41f8330763538ecce38f9c3e477589ce75cf541d5e0bbc57a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56b6cf924bc2d32ae548cf2abb4d80bc6
SHA110fb1b62c25159ac0073ca5c96b8e25be5a6d2e8
SHA256475fec9593612de71d7f3ab4a8fcca59f64d69eca6233d6e9597082aabbbdfab
SHA5120e1accb568d115ad8faca63e20b0c0b40f4e7bdee690e606b13867fac6191a90504e76c1c1406ee75d22f286dea7b1f56b45e353f033ec5925693e47b6fe4f50
-
Filesize
10KB
MD5a6c2f1a06e557adbdcb2022f995f3e86
SHA11a0c95fcde747bc59c286acb8b2d56bd25978366
SHA256d1d94221a034f233e97b881f483f3d3f7d4959347414a56c04c3d35a7b1d1475
SHA51252b17fedce6cbeabc22e5a7f9525f9e2ccdb10e221538c24cf4316483664c1267e63aae778cfe8dbea83a25a20a2ac88b312359a31ef8ceb0c46bd9ff21d3034
-
Filesize
10KB
MD5e5c4234956ee832af6367023c551e199
SHA16d93da0730e8e42b3553789da06aa233ea8f2e0b
SHA2567a853db786cda3cf67490b599486d76db38b2ca37324e03a64fc931b8cbb3bb6
SHA512ce99f6538fd772ab26cc997ac2afc95417d6f59adec9e46132e1d84a1c82ba79205e548b5fb61bd772381cd70d17075367e243c34c9dad367e40467a02e32610
-
Filesize
10KB
MD5f3bb82956b71962583262507209cf6cd
SHA1a0b4aeab1c1fc8c5fb7d6e9b4b4d7d29340bc535
SHA2563e4bb886ea3b8078ff934b84dd0bf3f96ff74e81c6dcb9ef674177258ec454e7
SHA512ee0516dd0813068e81aec82ae0818b4beb65eb4bdb148da22e9ac685925353343fc04753f8cbfd68dbaff98dad0bfdbb899ce0677f05b20862ce8fc58ee4cb4c
-
Filesize
1.2MB
MD5becb6303daca0596aa6f1f7cf75d87cf
SHA152d6d8b1f85c5b26674309605938d998b8e98005
SHA2567d7faffafbd91aa09bb2328badbd3f350841522678af0008740d2f5059ca5a8a
SHA512c5ebc6fc57da45f14a269f82a53043c36437b8c74c286c8d6af19910f16ab761b50014fb58b3051981a3c91cb38d8215ddf1161de684d2c8aeb7ee8b6843a714
-
Filesize
93KB
MD572c6943fdf1522f99a598c19261bd6e2
SHA1df85c4a95645244ff1d33b7aac55ff2a870e54ab
SHA256b4d31e26c80ceb74ea734ed9b3520709ded615bbf864462bec5df2bd12d2e09d
SHA5120313b64ad570ffad9c5fcdf9ab24a3d68a2497ac5dda785072f62bd662a757103cd729f2015b514d0688103b6e538f2bc7aa66d58a2a462fc07f17de65c0a63f
-
Filesize
15.5MB
MD53f718345aab7d78e3e26f0f0fd34d7f5
SHA1f5315671a2ebb572ed22f6233d09038daa426df1
SHA2562385541da9adbcd936229cc8d79c1a5f0055e5ec982366e1d180ec65104879fa
SHA5129c622cf569004868a613eb21e40e809745069b28d82cf1e22cbe5f06820e2ee7d438bbba5558d02fc5144760f49994f5353cf48073b2593de8970b4a82886a86