Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 09:10
Static task
static1
Behavioral task
behavioral1
Sample
e9a4dfb473a47bb239348ae3273bff0c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e9a4dfb473a47bb239348ae3273bff0c_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e9a4dfb473a47bb239348ae3273bff0c_JaffaCakes118.html
-
Size
57KB
-
MD5
e9a4dfb473a47bb239348ae3273bff0c
-
SHA1
47da81707cd2252579a99385061cf81ee3ae2f25
-
SHA256
e2175c488fc5fb2d6fc4afca5e7f23680e3798378ce6c9c2acdb8a147c17455d
-
SHA512
77cfb73ab62a46cccf5d864ea58c26b1541ad8cc3402bd0a4178b7d8ca0a5bd9638422ad35df3a1d73ef6a146de7797c21b5939344b46c64bf954923accee4a7
-
SSDEEP
1536:ijEQvK8OPHdsA3o2vgyHJv0owbd6zKD6CDK2RVroTIwpDK2RVy:ijnOPHdsL2vgyHJutDK2RVroTIwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 64 msedge.exe 64 msedge.exe 4504 identity_helper.exe 4504 identity_helper.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 64 wrote to memory of 4464 64 msedge.exe 86 PID 64 wrote to memory of 4464 64 msedge.exe 86 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 4428 64 msedge.exe 87 PID 64 wrote to memory of 1364 64 msedge.exe 88 PID 64 wrote to memory of 1364 64 msedge.exe 88 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89 PID 64 wrote to memory of 4168 64 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e9a4dfb473a47bb239348ae3273bff0c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa06b346f8,0x7ffa06b34708,0x7ffa06b347182⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6420 /prefetch:82⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6292 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6904 /prefetch:12⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6576 /prefetch:12⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:12⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6664 /prefetch:12⤵PID:5656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11908948882592132187,10790019909687796092,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8a788fab-3a7f-415f-bd91-e496e32a2abb.tmp
Filesize8KB
MD5193f9f3e817ac7ace4ad0903d1d2350c
SHA159ffd70fc3ea4ce41cb5bf850465a0e3b9cfcbbd
SHA25679e21ad93d722f8358c774e0e04776ab4c749646bb6275dae19a56523688de41
SHA512fff89b58ec0e169e759700a86af4f4cd2c624a9bca55ea95a18f8f4e533382e5e91323e585e55c803833ed3c0e86ec376d1660b39312af16646ac29110b8744d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD560d5efe8740993210c641f8584c75f02
SHA1ae6efd75f3d14fb5dd2afea89c06d91915e789ff
SHA2565673b563a86aaba9f4eea2aa17778152e39a49852f3004c2bc07059717747b78
SHA51234238ccd3ce8188f91a63b1ac539f3ca94ae8a801f7f135c67c77743c604a86c711b640aa632fdd5e131ab2fa8b5e63d8635c097571747c591db294a0b332474
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_best.aliexpress.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
6KB
MD5334ebec620b240b9b310457e318dd968
SHA1dd1958779d367233c19e616ec00f527b85fac419
SHA2564671a18969255444a04d231e0f69b36e7a1a2264db65c520b2ebe733ab2e559c
SHA51215a659ee1f666fa2cbd4f81c3397fa5a1e149d5e6ac194f146cd42631ca4e337fe81ce3c227bafc1e8c28b4a6697b1e8eaea2aaecd835b93e93aa80e85e6320f
-
Filesize
6KB
MD522eb88e79cd7434d81128f384c4f69a3
SHA10b91de8e30bde9ba493b22df0046eee3d9821d5e
SHA25682aab56342118b5e95401c325c1da5c71dde9e5f1bf7d15dd4d763ac6d474f45
SHA512e91546ca5f9f812f60a8a6261aaef0dd8205cc7c5809ab99a07e18d0213c90652ea5dbe562ef0552dd9ab6a9c2f348553def7177f2206890c9a0d28931ae94da
-
Filesize
7KB
MD5db765a3141cde9ea0215f677b73e8133
SHA1e261e078b8be6f0c6ddba3339c9ec55a57bc72b9
SHA25672f88bcad508ca8b108bd7033747811353e392dd65ae25a9704e5a61e9415332
SHA51257063973e95119861984e34e9fb67d0473aa95795348f88805ed055d8485d2c4c0b67123d3f58c886ca58b766e459256978a8681a40ad9a55104b540e4a76f18
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize240B
MD5fcd3439428b4fcc7c77fdbe910866557
SHA10a580c2e5c418057e8c09a55bee928bca3aded8f
SHA25648046abf169e6eccfd7cc4b69358b93755c83babe6839bd0a731af84026bf9dc
SHA51285a8b7528fc6bc52a6b38ac06281b098b4cca0988ecf75db78871e5abc37de4ba485b533961482baea2e9ac60ffbe5902e1017c12a4467a7114e9298cba06e97
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57a46e.TMP
Filesize48B
MD526efefbafebad9f54e633ded03e4a843
SHA1e3274b64b4c02a8a967dd1066ee81c9bddc61200
SHA256994c7ad88c4df93c75a792cae926f5f6e070d935ac6cfce06d67cfba4cc0b2f1
SHA512f047cea9cdd25c87e78711848c902e15cc34bff82ca0bf17e2ab1fdcd7da62942cc580b9adfcf676b56ee54c76f2e56251060b58f5c2b1165b8e9c31bdfb7613
-
Filesize
8KB
MD5e91fee91148882312065dceb43212cd7
SHA188ced034d31c93c7160dc07eb979a5b675865384
SHA25631fd9947387aa69799cdc3219783b9997d6f78e1ea7d190338693f88f4eaf8d9
SHA51266400e145d13f28d9e824ee9b1bb8916589eeaa20f80fe33bee447635f36534a85f4837d92b32b27803f8d1a1af928d2d32627e72217d05cfeb9d1179f9a98f0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD580afbebf2a11854e9c8933099fda6146
SHA10d4071209e8c18ab78cac060d45485fe7d55be89
SHA256ba026a426beecd3e026cb03b3028d16ed6ec47bde4ccff6627d227d5273069a7
SHA5126df72195ce7ff0439d7d29a542fe0137e2f14555360fcdbe90232c88fdaf9c8d3b3935d0a84a618105fcfd39282b2ab6063af2b3fd9e30f9214a3e3281d2324f