Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
f44ecc42f449c22891d0bce2885fdd9e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f44ecc42f449c22891d0bce2885fdd9e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f44ecc42f449c22891d0bce2885fdd9e_JaffaCakes118.exe
-
Size
242KB
-
MD5
f44ecc42f449c22891d0bce2885fdd9e
-
SHA1
7f28d3d53aabaa81b4c275e37a72f8fdcec940d2
-
SHA256
16b006dfcc746b7ad96dc55d4da962e38a3416c069851581d1a8c584e5cee707
-
SHA512
554d3c11ac5e22399a1150c073852b2b5f563962797141af786e79b7c775e23c515bb35e0e27d7430e176bb04e3c340639e80fcce6c858db8a2c83909e3d92fc
-
SSDEEP
6144:pz4vAPWeHYUlY5gOjZDQzkXDTQ9qBUfx43LRWafu:pzxWg3tSQzkzkfxctWSu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4176 msedge.exe 4176 msedge.exe 3980 msedge.exe 3980 msedge.exe 2008 identity_helper.exe 2008 identity_helper.exe 5420 msedge.exe 5420 msedge.exe 5420 msedge.exe 5420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 3980 2840 f44ecc42f449c22891d0bce2885fdd9e_JaffaCakes118.exe 84 PID 2840 wrote to memory of 3980 2840 f44ecc42f449c22891d0bce2885fdd9e_JaffaCakes118.exe 84 PID 3980 wrote to memory of 5024 3980 msedge.exe 85 PID 3980 wrote to memory of 5024 3980 msedge.exe 85 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 2856 3980 msedge.exe 86 PID 3980 wrote to memory of 4176 3980 msedge.exe 87 PID 3980 wrote to memory of 4176 3980 msedge.exe 87 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88 PID 3980 wrote to memory of 2440 3980 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f44ecc42f449c22891d0bce2885fdd9e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f44ecc42f449c22891d0bce2885fdd9e_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.vivo.com.br/portal/home.php2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe189b46f8,0x7ffe189b4708,0x7ffe189b47183⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:23⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:83⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:13⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:13⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:13⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:13⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:13⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:13⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:13⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6240 /prefetch:83⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6240 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:13⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:13⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6444 /prefetch:13⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:13⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1695369954049714878,12202927461272307805,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5420
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize888B
MD5a3040bbb245f6bfe60fdc483f6bcad27
SHA191f3902f13094eecf24a82cde2f2bf596c355e1f
SHA256422a48e2ecac9f7c635ba9fef5003bdf1c316ff465f2ed1bb470a6734d5a00bf
SHA5126b15f7497c42c9e0535f58d1dbf8e46ca1935829db3dd20e0b098184dd6b5032bd9b2257f15964ab3d194a5ab128fa937b424040a7e63089be703bfe4a78b201
-
Filesize
3KB
MD530e3029530aa96ab45946984eaddb410
SHA1ec79a565ca6644fbcdc987329e268800648e0208
SHA256c020d6336651a03a4b8bcdce7e472cd152249160e07e54fa038762cf4ad5e7c7
SHA5124b091413630ed0776f7e59ddd1d9b7ef1030e1800cf41ae900705ce90fbbea9e721df0da58c0f27cc79a4cf1dde6100486a843377bba9372e46b8260c266ff7f
-
Filesize
6KB
MD573c3e71cdc4016d459cf03b864517f19
SHA1ddab3b82a5c959d9abdb390ce711885621f3d3c5
SHA256541a2415087699a7842e206c0cbe61f7f76a07a230bceba5c3227d6705e2e71a
SHA512f86f42cb11ec3222370e2b293ceecff46c5202c0f3ebaffd73b91969aeb454d4c3e6d5c531e6431e2b553b4f93f298111f3c842e134a94ce5b116d79e8d76f57
-
Filesize
8KB
MD56d4b1ad153e7d3db53cfa57e00604e81
SHA17f3561ab433efb3a5fc1efdbffd0e95a60f51ff8
SHA256c83b9367c3b0f6d95120e83693ca67ef61410994cddd9ac4b0e70ed375f3156a
SHA5126e442d6a95da3c87eb6f4882d597fa8978c087e9faba22a37922af173dcb7d7aca31f96162ae4fe0c61c83180e56437191f58c0430d2bc935fdb9ad57bde4d10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\6a7b5ccb597f894858cf055065fc26c5bddd9909\index.txt
Filesize88B
MD52fbab2440a7db8ff004823c772f42fb6
SHA14fe12ea6fec6f71712b5ec62d48ee5461aa8e1ee
SHA256d7389c3f0271bdb0dcf553148a6ee949b08c0b0e31fa24075670a537f6b6fa33
SHA512142f857aca6e577e754a2077fb7881caff2fba683c0c0ab08257aa1d5631b513f70f634013f3308b9eaf5827d7cb47623b5886cd4983df3942841700a2d61fd0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\6a7b5ccb597f894858cf055065fc26c5bddd9909\index.txt
Filesize154B
MD5b5f5e9eba43f8c5c5aea573970b267cd
SHA164564509a789109d54d5e525b9adca53b03b132b
SHA256fadd52cd01974b5b3e12be3d572820013e3e20fd7d85df88d00f7b2230afbb92
SHA5126a2d518bb130b0175acdcff080845c76b672fbb46a70456076d0e4a16277e814dd7824bf0acb3bb6836c5883104355050dbb56ba2099f48bbe3d33d01ce48679
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\6a7b5ccb597f894858cf055065fc26c5bddd9909\index.txt
Filesize147B
MD5d78c3ddd1090c516ccd6a318e4fbddd9
SHA1a38bdf13dde18036c26444a77c69286946aff2c2
SHA2569fc1f100c52d86ff4079c46fce515c856b830004fbeefe15dfadcafa56b61152
SHA512fc92a9bd4871b0e1187c0b642b1b35ce4923ecf772a6d181cef7c82b0210c372a878e65ca33bdb5d36c8cefaa436856e7fe158465d7e115bc069357a611f5cf7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD543bd0a4e8f63fde4045b4e8d1a916038
SHA125a3280cbdb56d9e6cfc4bb4311d5c5dbe921bce
SHA25679aa45435e3ceb53506bfa4cde0ba422a678d08ed14f4a79782f9c9cae86d16a
SHA512f87e1967598c72efa4ac027b303717fa4cceb8db2f9f39344c4a5ca9c90f6947ec8370ce8ccdefd07c7c6730640e4198dd9104d5737aedae97250dd200974fa3