Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Douglas County Government.pdf
|
PDF document, version 1.7, 1 pages
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\65107d28-4ad3-478c-a2b5-2ed981cc8a44.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-241023224755Z-198.bmp
|
PC bitmap, Windows 3.x format, 164 x -115 x 32, cbSize 75494, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
|
SQLite 3.x database, last written using SQLite version 3040000, file counter 11, database pages 21, cookie 0x5, schema 4,
UTF-8, version-valid-for 11
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
|
Certificate, Version=3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.5004
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
|
SQLite 3.x database, last written using SQLite version 3040000, file counter 24, database pages 3, cookie 0x2, schema 4, UTF-8,
version-valid-for 24
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSIef90c.LOG
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-10-23 18-47-52-698.log
|
ASCII text, with very long lines (393)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
|
ASCII text, with very long lines (393), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\3a63db07-6cb0-4a15-99cb-88196ef663f1.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\4c3a4eb8-b4e9-4940-ba6c-3493bd34b927.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\65b281cc-8a18-46b9-89bd-cbf367d4e349.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\b1209d63-ffe0-4fdf-8ee3-8a8101d6a115.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 57837
|
dropped
|
||
Chrome Cache Entry: 209
|
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 210
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 211
|
ASCII text, with very long lines (47531)
|
downloaded
|
||
Chrome Cache Entry: 212
|
ASCII text, with very long lines (50758)
|
downloaded
|
||
Chrome Cache Entry: 213
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 214
|
ASCII text, with very long lines (47531)
|
dropped
|
||
Chrome Cache Entry: 215
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 216
|
ASCII text, with very long lines (32065)
|
downloaded
|
||
Chrome Cache Entry: 217
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 218
|
ASCII text, with very long lines (6927), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 219
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 220
|
HTML document, ASCII text, with very long lines (5004)
|
downloaded
|
||
Chrome Cache Entry: 221
|
PNG image data, 60 x 27, 8-bit/color RGB, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 222
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 223
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 224
|
PNG image data, 60 x 27, 8-bit/color RGB, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 225
|
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
|
dropped
|
There are 55 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\Douglas County Government.pdf"
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0"
--lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log"
--mojo-platform-channel-handle=1796 --field-trial-handle=1732,i,3600882816956457796,436860592170962583,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "https://docsend.com/view/38rmsxw2rqttb6y7"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1996,i,6620047814814875631,87383685304778094,262144
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://douglascounty.kaisersupportcom.top/favicon.ico
|
172.67.219.183
|
||
https://douglascounty.kaisersupportcom.top/homea5428aa1af5200350664eefb7fe9e2eb
|
172.67.219.183
|
||
https://douglascounty.kaisersupportcom.top/logo_/5FWdkYmY5uOWJQt
|
172.67.219.183
|
||
https://douglascounty.kaisersupportcom.top/js___/67197dbfda298-bb1b0798a53ec245351b5f58e899428a
|
172.67.219.183
|
||
https://douglascounty.kaisersupportcom.top/b_/67197dbfda2a1-bb1b0798a53ec245351b5f58e899428a
|
172.67.219.183
|
||
https://douglascounty.kaisersupportcom.top/css_/ijTP7k50O5FP4Mp
|
172.67.219.183
|
||
https://douglascounty.kaisersupportcom.top/js_/67197dbfda2a2-bb1b0798a53ec245351b5f58e899428a
|
172.67.219.183
|
||
https://douglascounty.kaisersupportcom.top/
|
|||
https://douglascounty.kaisersupportcom.top/fav/G70PSKOQV73Ii5l
|
172.67.219.183
|
||
https://douglascounty.kaisersupportcom.top/cdn-cgi/challenge-platform/h/g/orchestrate/chl_page/v1?ray=8d7546440d25462c
|
172.67.219.183
|
||
https://douglascounty.kaisersupportcom.top/sig/ea748d6cd8541e66844d5ebb999d132167197dc45813a
|
172.67.219.183
|
||
https://douglascounty.kaisersupportcom.top/logo_/ea748d6cd8541e66844d5ebb999d132167197dc4580bc
|
172.67.219.183
|
||
https://douglascounty.kaisersupportcom.top/cdn-cgi/challenge-platform/h/g/flow/ov1/1818318327:1729702629:c-2lb-gOa0QemdKj4Z2iFIOttPYSvhWe4Z3IorcqLO8/8d7546440d25462c/YVB2WT.Q5y1y5XCBBjBRMkJwR6uylnkTYw37xD_RFF4-1729723704-1.1.1.1-Bcr5dSdNLhKJTfiohW5bb1D5AWTOa9BUNCFfoNC0fnyAFZs15lCAGYXxGZD8sp9V
|
172.67.219.183
|
||
https://douglascounty.kaisersupportcom.top/2svg/eBevQGWJ2ENPQj0
|
172.67.219.183
|
||
https://douglascounty.kaisersupportcom.top/&redirect=3ad0b201923e4047522303fad46c31e79b252232main&uid=f253efe302d32ab264a76e0ce65be76967197dbe0f5d3
|
|||
http://x1.i.lencr.org/
|
unknown
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/jx6iy/0x4AAAAAAADnPIDROrmt1Wwj/light/fbE/normal/auto/
|
104.18.94.41
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/flow/ov1/1471796142:1729702734:ptgFvXyp7PGk9wWsWoS0VbWiG3X_R4-0VZAdcTTu1Rc/8d754661e896e79e/R36xeldURKxOi6KwiC9NxkjSZUiaoHRUTHj1JbL6n7I-1729723709-1.1.1.1-piYYsE7K6Y7bJaQ1mXrknj0KJcVygsI_Kh1DPdnRvB7qDHFWmir7jV3Zb3MSV2Sn
|
104.18.94.41
|
||
https://a.nel.cloudflare.com/report/v4?s=sX3mL%2BhP9cV4muXZZ2lO226vTObh7l%2BbSljYqgjbdbvCKzHkpihX1F59TtB1a228TE2UoqEhoCrzkqUOkDEFeNq6Zu3Hi7%2FVgRTS2SjgrCIxHtuwVzDPhS7wlXTfXnrdv6JBPiQBCPAeNDiI3VTCJ4cgpFvI
|
35.190.80.1
|
||
https://docsend.com/view/38rmsxw2rqttb6y7)
|
unknown
|
||
https://getbootstrap.com/)
|
unknown
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/i/8d754661e896e79e/1729723712545/GFMaV7kXSWLywAa
|
104.18.94.41
|
||
https://docsend.com/view/38rmsxw2rqttb6y7
|
18.173.205.79
|
||
https://github.com/twbs/bootstrap/graphs/contributors)
|
unknown
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/orchestrate/chl_api/v1?ray=8d754661e896e79e&lang=auto
|
104.18.94.41
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/cmg/1
|
104.18.94.41
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/pat/8d754661e896e79e/1729723712542/17f3c7f99787208ecab29cf773ee8c7adece7f677206138511685c2078d00f0b/vTdPOBzgvE-1kmQ
|
104.18.94.41
|
||
https://a.nel.cloudflare.com/report/v4?s=LKpnBoFV8ma9uNqc515cDa5IJz1k11%2FbWU1VBxdxUgQKdlG2YH9xfgymeo9RaPJ6R2EeyFWAlXsn8e1VsXwc0b9hXTKJqa1wQT0i48L3EWoiZN%2BNem84zSECXfUigo0Tuh5ZvV6aiqVrkj1lU3UHI58BLsbD
|
35.190.80.1
|
||
https://github.com/twbs/bootstrap/blob/master/LICENSE)
|
unknown
|
There are 19 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
douglascounty.kaisersupportcom.top
|
172.67.219.183
|
||
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
a.nel.cloudflare.com
|
35.190.80.1
|
||
challenges.cloudflare.com
|
104.18.94.41
|
||
www.google.com
|
142.250.186.36
|
||
docsend.com
|
18.173.205.79
|
||
x1.i.lencr.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.219.183
|
douglascounty.kaisersupportcom.top
|
United States
|
||
104.18.94.41
|
challenges.cloudflare.com
|
United States
|
||
192.168.2.9
|
unknown
|
unknown
|
||
192.168.2.4
|
unknown
|
unknown
|
||
192.168.2.6
|
unknown
|
unknown
|
||
35.190.80.1
|
a.nel.cloudflare.com
|
United States
|
||
142.250.186.36
|
www.google.com
|
United States
|
||
104.18.95.41
|
unknown
|
United States
|
||
192.168.2.11
|
unknown
|
unknown
|
||
192.168.2.10
|
unknown
|
unknown
|
||
18.173.205.79
|
docsend.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
aFS
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
tDIText
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
tFileName
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
tFileSource
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sFileAncestors
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
uFileSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
uPageCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sAssetId
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
bisSharedFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
aFS
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
tDIText
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
tFileName
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
sFileAncestors
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
sDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
sDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
uFileSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
uPageCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
bisSharedFile
|
There are 10 hidden registries, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://douglascounty.kaisersupportcom.top/&redirect=3ad0b201923e4047522303fad46c31e79b252232main&uid=f253efe302d32ab264a76e0ce65be76967197dbe0f5d3
|
||
https://douglascounty.kaisersupportcom.top/
|
||
https://douglascounty.kaisersupportcom.top/
|
||
https://douglascounty.kaisersupportcom.top/
|
||
https://douglascounty.kaisersupportcom.top/
|
||
https://douglascounty.kaisersupportcom.top/&redirect=3ad0b201923e4047522303fad46c31e79b252232main&uid=f253efe302d32ab264a76e0ce65be76967197dbe0f5d3
|