Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
fea429f37e18b43323460fe180e0f320_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fea429f37e18b43323460fe180e0f320_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fea429f37e18b43323460fe180e0f320_JaffaCakes118.html
-
Size
57KB
-
MD5
fea429f37e18b43323460fe180e0f320
-
SHA1
0fe0c58965cfd7c3c19c27b0d13e1a35e91aad80
-
SHA256
e325daec284bedb7528485944ef89bea2c438c2444ac6492f1093aba16c31419
-
SHA512
127dcbbe90488341cad39dec5101f7fa8490487f22aea0c413ade8c856fb95a76b07a355626e22d182b168a374eb64e2f853832fdebd5f95bebf00165a428397
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVro/MwpDK2RVy:ijnOPHdsR2vgyHJutDK2RVro/MwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 724 msedge.exe 724 msedge.exe 4788 msedge.exe 4788 msedge.exe 4620 identity_helper.exe 4620 identity_helper.exe 5500 msedge.exe 5500 msedge.exe 5500 msedge.exe 5500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4788 wrote to memory of 368 4788 msedge.exe 86 PID 4788 wrote to memory of 368 4788 msedge.exe 86 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 4144 4788 msedge.exe 87 PID 4788 wrote to memory of 724 4788 msedge.exe 88 PID 4788 wrote to memory of 724 4788 msedge.exe 88 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89 PID 4788 wrote to memory of 4828 4788 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fea429f37e18b43323460fe180e0f320_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff59d946f8,0x7fff59d94708,0x7fff59d947182⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6220 /prefetch:12⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6700 /prefetch:12⤵PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1852 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1316 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7560 /prefetch:82⤵PID:5656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7292 /prefetch:12⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7424 /prefetch:12⤵PID:5800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:6088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:6100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14779140974741315450,6012090548058708063,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a9519bc058003dbea34765176083739e
SHA1ef49b8790219eaddbdacb7fc97d3d05433b8575c
SHA256e034683bc434a09f5d0293cb786e6a3943b902614f9211d42bed47759164d38b
SHA512a1b67ccf313173c560ead25671c64de65e3e2599251926e33ce8399fde682fce5cb20f36ee330fcd8bb8f7a9c00ef432da56c9b02dfd7d3f02865f390c342b53
-
Filesize
152B
MD5cb138796dbfb37877fcae3430bb1e2a7
SHA182bb82178c07530e42eca6caf3178d66527558bc
SHA25650c55ba7baeebe1fa4573118edbca59010d659ea42761148618fb3af8a1c9bdd
SHA512287471cccbe33e08015d6fc35e0bcdca0ec79bebc3a58f6a340b7747b5b2257b33651574bc83ed529aef2ba94be6e68968e59d2a8ef5f733dce9df6404ad7cc5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD58a051e222140c4a4a7f3a82aea4bb4f3
SHA14398a412ad5413b65c06ca307b9581d54cd063aa
SHA2566c79d826beb0ce3e09518e0e0c64837fb14d574f917118a925e070fbd06b5be9
SHA512b2edc3ce83fe71c9beab517dfc5447e76e47c290440f09e1f962c7117d66f992fe81988650a3cd66334445ee639581439f602bac3e3eeaf5a35da934f99586c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5c53384f4f9c2382229dcd7acfb0639e4
SHA174aec90ef439716ebbe502f5ca6e1786bd2da98f
SHA256259ba25dfd71d8a725c4208a9892f5e8c7c7cb52cd4bdb712cec8b24633c476f
SHA5129f196b15cb9ed7dc72a5b2e9f50d4ff5a45198e38658058516ccb339764f2283f55da64e301bdfb6821751472a564d9ba417b48fa14b0066ade0c7bc6e668eb8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_best.aliexpress.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
5KB
MD510e91fd76a414248ce93fae286d35bfd
SHA1f9b5a94f7157dbb8edabcf029c7c900ffc2a23d0
SHA256612e4b065481cd8bb97f7094b07c9b2d50416fd29bdcdc317373c0592af07e75
SHA51213fabe462b641302ca35c56536773d73b72042776391681c4ea558db77580a2dc337d4fafd61394f3b4ad275667b52e73383b7a879c713f9dff9c0595fdd58df
-
Filesize
7KB
MD5ef5f92850da3e06bd98da4fe515d9034
SHA143e146e171da926e0608940c888f109693d58b3d
SHA2569f0545cf2ca73432391f317200fae2fda2d3babe827838e0f7f52e1340bd86c0
SHA512a70e909b5d251a47769f43bb570df7996b58a7a53bcdac09966e3c7c19ca6d92f106c393859a5c0f865e053e820af56ed5aa61fcd4c81aa9bc665d4c929081a7
-
Filesize
6KB
MD5026b0ceddd6b93bc36cf2a83ba6db2ea
SHA1ac5b0bc00ed715df0f0200b3b2f40f956420d240
SHA256439749ce27e990f227154c9a64a7b6be2b1361b500c6de8235a54998e56f27d5
SHA5125fc412ba2598ca6ee89ea6380a72ccae30407b708ae3af466dfd81c6bbbaef3a913f22c534303adf1222d91e8c221b171b96853c42373a88946632eeec39637e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize240B
MD5bff3c8069de7c3ec62787440e262c9d1
SHA19ba0e8189d5075f8e1c9e9d18a4d302c265db675
SHA256dc5c63f0b8cfca443cc063922fda556b4f11dbb31adfbcb453ee6fa5cbae8765
SHA5120c01982dac9c39aac1757b213c66b88a719ee24a63002c9028e6cc6fa2f1ce4fa56a2afad1cd6bb15f1b2a69ee18d9ace686a64a6f3958877a2f9eb9de5b6efe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57c8be.TMP
Filesize48B
MD573e734b0824e97e9ce3b93a8ff2dce19
SHA155cb3f6320892516120433275921645aace08306
SHA25622c4bdbbf05115f8701f01d94ac9e879f5e9020ee4b4a2349ee6a72f328d16c5
SHA5120efd5864d0eb6a2b5d2f79e4cafe7a3b225e0fe022c549142891d5db09e69adce10c0624312243c83f67433b456a54ed04efc91ff7c0b3a29f6175878a21ac31
-
Filesize
8KB
MD5b6c3deff983eecd4afcd7ab48dd0e853
SHA162068f6d1184b3939fe811857e3c6a67c3153b2c
SHA2564186e60225f0cca3c2cd919ae55956c0d4eb495f77042a710c09d232177a44df
SHA512a8d5b105fc8cda9874ccebe8e1a98f299ef2b5ee042e329795f6f9379b42011929dd808594aea1e77fe5407272f2b0f5e0e13ea2bda4501fba98684bd27d3a8b
-
Filesize
1KB
MD5e8c0ccf374f224e999e3b9bd93aeb741
SHA16fc2103b4de18837c868f1b6edc56e37b484102c
SHA256dd30c18a19dac0c95eb3852035be557e7018281293e3755a1e54271072e59d4c
SHA51268c7c48f9e3e28b6947db51ab028cf2f98ed75b712694e7bc8d045f6472d62777678ec41b042daa64d55f20f134d254a6687e8e419b044c1a62c5a3097f43bcd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51bb5a6e9e064c6467606350d1490c53e
SHA1d6f5ccff4dce14b44e8ffb8823ebd4ba341b918f
SHA256039ee97bc4b9ccffdaaddcda0e7157e0773455444b2a13a5520e2a0d59e57d2e
SHA51203af95ca59a5ce89df6bbaff3f900b3ef8fc5ef4fb4f70fe8ddcc71ec272d74e01754e4b1b47ad530417aa8c8ec172eb278808cf3047a1630b627e3e28e0e69c