Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 19:19
Behavioral task
behavioral1
Sample
JaffaCakes118_946466f9d3b5c49b0141043d86068d48.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_946466f9d3b5c49b0141043d86068d48.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_946466f9d3b5c49b0141043d86068d48.html
-
Size
18KB
-
MD5
946466f9d3b5c49b0141043d86068d48
-
SHA1
7310254b3dd73061b0d8532e8721126224114d8d
-
SHA256
a2184addb4428c9de04cde3b250e0a797c93be1f9bcf2b486d836b711b43e804
-
SHA512
8c49988fc6c2209972f5ce6a29a08cd72b791e92f7cdd67df3c405de83045728081e7caa9dbdb3458665d211602510c544fb91db3d7362c75e30278924c6d365
-
SSDEEP
384:SIYeMEnP3ixNoMRXJsYuiymcIGyH57Dy2Mu:SFeBEVl5vn
Malware Config
Signatures
-
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_1047659534\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_1047659534\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_1760322362\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_1861070569\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_1861070569\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_2052958620\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_2052958620\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_51793111\office_endpoints_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_2052958620\nav_config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_1047659534\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_1047659534\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_51793111\smart_switch_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_1861070569\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_51793111\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_1047659534\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_1760322362\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4108_51793111\manifest.fingerprint msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877803630658352" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3218366390-1258052702-4267193707-1000\{01A500A4-C80B-480A-9E1C-496B997A2A7A} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5576 msedge.exe 5576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4108 wrote to memory of 3988 4108 msedge.exe 86 PID 4108 wrote to memory of 3988 4108 msedge.exe 86 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 4692 4108 msedge.exe 88 PID 4108 wrote to memory of 4692 4108 msedge.exe 88 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2056 4108 msedge.exe 87 PID 4108 wrote to memory of 2756 4108 msedge.exe 89 PID 4108 wrote to memory of 2756 4108 msedge.exe 89 PID 4108 wrote to memory of 2756 4108 msedge.exe 89 PID 4108 wrote to memory of 2756 4108 msedge.exe 89 PID 4108 wrote to memory of 2756 4108 msedge.exe 89 PID 4108 wrote to memory of 2756 4108 msedge.exe 89 PID 4108 wrote to memory of 2756 4108 msedge.exe 89 PID 4108 wrote to memory of 2756 4108 msedge.exe 89 PID 4108 wrote to memory of 2756 4108 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946466f9d3b5c49b0141043d86068d48.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x24c,0x7ff9e8e3f208,0x7ff9e8e3f214,0x7ff9e8e3f2202⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2216,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1884,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=2244 /prefetch:32⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2552,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=2616 /prefetch:82⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3476,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3484,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4184,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=4356 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4272,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:22⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=3540,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=3692 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5408,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5396,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5644,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=5588 /prefetch:82⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5432,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=5520 /prefetch:82⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6108,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=6132 /prefetch:82⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6108,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=6132 /prefetch:82⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6272,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=6264 /prefetch:82⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6308,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=6292 /prefetch:82⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6536,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=6544 /prefetch:82⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6304,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=6356 /prefetch:82⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6800,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=6796 /prefetch:82⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6544,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=6684 /prefetch:82⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6952,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=6388 /prefetch:82⤵PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7108,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=7124 /prefetch:82⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4408,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=4384 /prefetch:82⤵PID:6008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4344,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=4620 /prefetch:82⤵PID:6016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3684,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=4400 /prefetch:82⤵PID:6024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5412,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5704,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=3020 /prefetch:82⤵PID:6012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7236,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:5136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5360,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=6404 /prefetch:82⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6948,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=6432 /prefetch:82⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=7256,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=7248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6340,i,6503586602313293935,18012518004187880409,262144 --variations-seed-version --mojo-platform-channel-handle=5776 /prefetch:82⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
160B
MD5c3911ceb35539db42e5654bdd60ac956
SHA171be0751e5fc583b119730dbceb2c723f2389f6c
SHA25631952875f8bb2e71f49231c95349945ffc0c1dd975f06309a0d138f002cfd23d
SHA512d8b2c7c5b7105a6f0c4bc9c79c05b1202bc8deb90e60a037fec59429c04fc688a745ee1a0d06a8311466b4d14e2921dfb4476104432178c01df1e99deb48b331
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD54013ebc7b496bf70ecf9f6824832d4ae
SHA1cfdcdac5d8c939976c11525cf5e79c6a491c272a
SHA256fb1a67bdc2761f1f9e72bbc41b6fc0bf89c068205ffd0689e4f7e2c34264b22a
SHA51296822252f121fb358aa43d490bb5f5ce3a81c65c8de773c170f1d0e91da1e6beb83cb1fb9d4d656230344cd31c3dca51a6c421fda8e55598c364092232e0ad22
-
Filesize
280B
MD5fed4ab68611c6ce720965bcb5dfbf546
SHA1af33fc71721625645993be6fcba5c5852e210864
SHA256c41acdf5d0a01d5e9720ef9f6d503099950791b6f975ba698ccd013c4defa8c4
SHA512f9ab23b3b4052f7fda6c9a3e8cd68056f21da5d0fcf28061331900cac6f31ef081705804d9a9d4103ee7d9c9bdb6aa4237987b7e821d2d96cd52da24219e55ee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD515a3f4c678289a9474b86a62a6139ecc
SHA1ab17350b18306cf448768f2ac3f1962e4cf22f97
SHA256043d211287d407084bcf2a3d497ae0ac787dcf1ff212631b6f462638979cdd4f
SHA5125bfb879a9bba69e1b7cba90c80a343ea6e51ec34b527648b331870480c059f62363d2f75f4c5936e1c91bef0d74049b0833f820fe819f351d357706d9d412109
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57c4e6.TMP
Filesize3KB
MD54ae35ea082bffd823e51850016593919
SHA191d975a1eb0a7ae0d1b32137957b364ddf2e7993
SHA25648df1350b8adb4cbfa7c8fee1f4e1985ebcb31547b8d595ca4988df4ab9ba4b0
SHA512de02f8c7669d53890a4adedd7d37e0091926480e9532ebb155c80ca0788debf1e499563add2b165805602effa2907198136cc89defd8bf7019101a3fcb5a9ad5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
1KB
MD5c06756949364e5a74ff6b1b0b0327ccf
SHA1e725881393d21d0849f4aaf776969ef6835ff02c
SHA256855f938b83c1b7802fa13ce96c7ef0a41bc22c61ac0196cd9cde9bc2e0f78c62
SHA51233a932b0057c0efb637f5d781b1a91fad49621a41f6a65344b9992ed7a015378ec34506ae781043c11f2cf7f8bcd51eeace51959d4625b2e9abaa096ed4f804f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
13KB
MD5c7c35acdd618e1922d36fb0cff8bbb10
SHA178c71952ca7f84bb25dd1866ac877296076ee3e3
SHA256b2e7da8515e8c81ffc10a73db80939b0934bef6d76e600de4e49fb33ee34bae9
SHA512d4c2f82a918d3d41cfd180ecca4686262f08dd8d88b01ea4b5943a82646a95d011ad9cc8d6823c94503400ec6e129b55bb960e40c6bf873dc32614839b74575f
-
Filesize
14KB
MD5ab435358a0e08ca77963701a86b3549c
SHA1f232b273a0ebf3a62fcd3eb7673b470abb3a6f73
SHA256f94d0c241bb5eb1e8df4e48cf68f44ccdcfcb957477441f48e504c845f678171
SHA512817ab43e8708cd2b7e1cbfa567e120871a56524dd27e7d4f992079ddd6f939d28a29753ac31d7a89ca8f8c3fe58183537546324bd22f854a08408bc599e95d00
-
Filesize
36KB
MD5f890df9e66b4e66277139c836daa83b9
SHA13729ca55cbf643cb0bc0470f9738996747473c98
SHA2568773c07a049be948b245eb8e0e296e8ea503450d69f9b488a860cf2292a145d6
SHA5123d3b6c65b952abc5cc9852504683e48dfd65f8356452b301783603c81f7f0ad788b9557269513581f77c8cb66db18273de05ba270812992b2618a8ae0bf903bb
-
Filesize
4KB
MD54c776a6fd36aeeaddd3b5445c7923353
SHA15656a20603a8bb1bc564548dcd0647660941a4d6
SHA25633906468c801ca4c85bd0170cd8d722acf88548d9c330e7b0178ccb6cfd18d79
SHA512de0719accbe8984c291eae416894e6b379fb5c1bd8f217015b74ac78b6a616aabd985435891f8d5b4c62e00f882391b7c79b2906182070f573dce2817f8026aa
-
Filesize
876B
MD5f8f928530efa97250134682305320aa4
SHA18810276ce34e567d3960149efb75058c92f1dab8
SHA25639f8793d1bab3b93c90adc29e092b55ef96339e50091757c7571a34d47b5d78f
SHA5125a81e4daea5ece02b4f09bc9055273183215f84050c3c0c6724874a1d314d27f92bec2975abd7bb919003ef0d649a81c100ea505fe7cad02807654fc8c23fb3b
-
Filesize
23KB
MD5e433a44d265cc737cd09d5ae178431d4
SHA10e87bf7d279bec52cc1ab42cf100678e652e4b16
SHA256351074b943654537a32ee62d2fbf8b43b8dff4d5feb544c5f097af202c00ee60
SHA512cc5531044a36df224b31e71c68c005cdf1244c7cc6633215d37408c5a50db20443d2d5c7995e86a5aa1d5d7165b604ffac5bcf07c19fcbe44ae1ad78c0c7198f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe585f22.TMP
Filesize467B
MD50e909600dcafa7000edecc9e36478bec
SHA11845758244a798b967f794d409aa128350d8aec4
SHA256d30d21dda17eb466933f9bf3d31a00749cbbbc534e8781eb258977ef1e2473c2
SHA512d21a38ff55d48c32f0d2e771e779df3254bd0356af20a0486b0f5964ceb35d766696b87b6f4d1282096729e43b3ca4d7e5f2525a4affe70c597ae52b6ddbce09
-
Filesize
22KB
MD556a63f182b2938fbe3e59fbf9681dc08
SHA1b76578ca24fb20b8bd5dafad4296e5a46735a5e1
SHA25636edc2510fb072092e4c6b95efe4521857d9dcb7f0b45afdf5e8ef02e5d19593
SHA512b17246b7c61e26fce1f211311b578d6b3d22c03a042137bb2bb5b23018ce5290a8fbf7a34b2f66fa30b2027296b8a570478f66a144385c320d63c1cef64434f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe586136.TMP
Filesize3KB
MD5c7569efb2fa9fe93c0ea2f0896f54036
SHA1e231c700b778b624f6065b035e5803fdd8b4db4b
SHA2562422f055fd21adce7a027c3eaab1bbc474345a26cb1b9762b3d7572ebde67d3f
SHA512c394da9a75cca87f6e20cb2abbc2e087d3e374b613bbc960f255ebfc8f01d4349fc8a487ec56ff8141f47566cf021dc33196e42b6295ce5399ff78e5ce4b066f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
6KB
MD506ca82b32744cf0192a7877188520008
SHA1b2e6969e0dcaba342a1e357f637a97ea1b95681c
SHA256361721c469cb54325bf0aeef81caa26f4ec4c82456aa9f5ae950f454e172c3ee
SHA51237bdf6db5ebc7c79ea62112397f8f9eca6713d05f62cf821aa6b6fdd3287585b64749807806805fece527b921952e57c78d5fbcaedb9c0c274399ea4cbe5daed
-
Filesize
30KB
MD5e1e8616605c56c52a1db7d9481ff2fc0
SHA1f2aee872d1e664195e7bdfcf887c86aa9cfa5203
SHA25670c320f7c20c3f69aec601b7bf8ca40dfaea1da892a29f2ca1cfab1999f0a7d8
SHA5128abd877e4f4c3b0ab359a798d20f70a5793495866cc6562f220d7a7f26215995c891323790ff8ee263f3429715cc58f4049ae3c4687f819640a4770ea29e283f
-
Filesize
7KB
MD5993df5ce2e826e10be76e270ec31750e
SHA1a5f422437d8a4f72350b577131a3eda9555ea685
SHA2562d05743137705cd694fc181fffaabac745a94e87fd5606b598df2f970dfd48e0
SHA512dd87230f3d94bf040771f9219afdcf2e2d9279ebff9e1351eded88384127f0f0d37997b361fa35f330b025678a34faa340fe4a36d275d636ebfdaec9690c4023
-
Filesize
34KB
MD508285e6e4040cfa50bed32fcdad523c6
SHA1c06dd2729c806e862525e87fba656ecceab9b7b7
SHA2563114f76741ecea6f840ba501fb7fa80d00d97705ecd3ddf8ea3d39fdb155e24b
SHA512f0569f113a2d03c23d68c31d0b35e8ff3059577e19cbb13571a9dc82324189acebd0f87a4506a5b043bb44fb7132844ece616d108a5ef82278e968d4091a263e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\WorkspacesNavigationComponent\1.0.0.5\nav_config.json
Filesize2KB
MD5499d9e568b96e759959dc69635470211
SHA12462a315342e0c09fd6c5fbd7f1e7ff6914c17e6
SHA25698252dc9f9e81167e893f2c32f08ee60e9a6c43fadb454400ed3bff3a68fbf0d
SHA5123a5922697b5356fd29ccf8dcc2e5e0e8c1fd955046a5bacf11b8ac5b7c147625d31ade6ff17be86e79c2c613104b2d2aebb11557399084d422e304f287d8b905
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD570a3f9e5e64c48fe40c0abe80aa3326d
SHA12ce7dc732565bd22e42fc90879be17ad875bb265
SHA256a54664bb37739154a35e3380812a4f702042b9da25a9dbd4fa87e9156dd77de9
SHA5122b5bcedc34a3441af5303cc4ec8ba3a6f56b6a7811c1ae2ac98dec8dffda8d9ff5fd3efa99f909abb7e479c5be29ed86371a6844b9af1d553a5fcc71074e6096
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de