Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
2d8aa3210ac327328f777189e62d1a77_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2d8aa3210ac327328f777189e62d1a77_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2d8aa3210ac327328f777189e62d1a77_JaffaCakes118.html
-
Size
23KB
-
MD5
2d8aa3210ac327328f777189e62d1a77
-
SHA1
27cb996a7c6b71132ed8eea7d61a3b5a657bc5ea
-
SHA256
60f6b1254d4758ddf2f50b28e50d57e89832b03038f0f7c558e4c0009c0ee281
-
SHA512
f41ac1f7295d4362f6bdcc88c0b8ff3b1ae2193f8c53504c15e9f1318f49f4837267d48a44b5558b92132fce8c148124717399e49de6902eb5b9896b68bffba9
-
SSDEEP
384:CLlEPAoIusRiceeeVOPspB9+Eo2ju06mL17M+JTWAB:CLlYqZwceeeVOPspB9IlWM+JTTB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3558294865-3673844354-2255444939-1000\{ABD14C52-8A84-4156-987D-8E9B06206D65} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe 1716 msedge.exe 1716 msedge.exe 4108 msedge.exe 4108 msedge.exe 4304 identity_helper.exe 4304 identity_helper.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1172 1716 msedge.exe 82 PID 1716 wrote to memory of 1172 1716 msedge.exe 82 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 4060 1716 msedge.exe 84 PID 1716 wrote to memory of 2380 1716 msedge.exe 85 PID 1716 wrote to memory of 2380 1716 msedge.exe 85 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86 PID 1716 wrote to memory of 1800 1716 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2d8aa3210ac327328f777189e62d1a77_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bede46f8,0x7ff8bede4708,0x7ff8bede47182⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6604 /prefetch:82⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6568 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6832 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14455809564494147471,17805210988202881041,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6572 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5a8c070ee6a44aa0e65c2dbf44761c839
SHA15bb8f06852cbea440fec8450e790752129deeab8
SHA2561281239e67864e8788255e4e22dc14b03a35f299f893a13dee516bddff73242c
SHA51227fb78992788da2f06d5a0fd7039c034bfe3e5bcab7a26ce337a51fba20bbb3d21eb205460369db52a4e6a17612c116db242e4bc944f4fa34dea701a50466162
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_best.aliexpress.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
5KB
MD5673df406d9fd3f83b3c08a5bd4bcad5c
SHA12f4be70e1d0c4d09b5c29eda8fe1c535f09cfeb9
SHA256b9823b88264f62381b0b4cb7f52420e08f2c9e9a60b67ce862edf0cd3e9c2b12
SHA51216fbb1a07f541a4042adfa32eb71e0131de964c68063392c75920415f9984945e8472dc8dcf743391628437db22af371a4fc4aa480a78eb465b4624ae479f5c1
-
Filesize
7KB
MD5d74a566d81f04bf9e7f6b267f0989342
SHA15e664a66d16c851171424cc7e91ee48ca95b7c17
SHA256e2cb52a41119fa3d612e613fd771a9ae9f98550efe0f04e5450fdd8c6d76638e
SHA5124ffd8419442cb1a1e7ccdac148727a08591352d2ae6638afa558f325fa7ed686e0e0ce570e593bbe1bbdc672328d7fdb2879844244c3abcec24fa3522dbebd38
-
Filesize
6KB
MD5d70557795d040d495e741024eb805edb
SHA1de901d16807217a08fa251c89ad6bb81a40c9a23
SHA25633317cbde0522dd827406cd5d7462c950b3b698028e3d27379332d26661fe4e2
SHA512a6e0dd2d729331fe1426d41a41c9e4f85ac872954bb1945524bf2b50eb21648361792e27178355811c4ac16629305af7e42c0a9acd96b3d17122fe24ab364e0c
-
Filesize
7KB
MD50275b010ac60fd374ce3f465410b13ef
SHA1f1b66fe9f0e5dd70c992a2ee421ebd2b776275a9
SHA256dfd859422deab1fb203be42c8b19eeec2c7d0580b05368cb9227d42cf9da8242
SHA512b0d0e02d071294a7b1e3a737f5f49913efb0bcc1a529482eab935f94b9f0f44ba6b791b51642c702fa16b8da2925e48f157787dc6da982ac4ad08a325414be9a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize240B
MD5390d98c7eb9d9f00fd4f0c82df8d5dec
SHA1773ae2166f2ffc3e88c4cf297fae21a696327f9e
SHA25660dd63adff6e87d2b6655b73a0e2ef7fba0969d155f7647d927c38b7ecd281bf
SHA5129c401ac6d656c96f669d635f0975819d4c10239725f655e1b04627a9a4e88df6979a85c77beca68ac5ed19c9b57fa082409389e1074c2478e2db88fbb668b469
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57cf17.TMP
Filesize48B
MD5e0e8fadd8a8657cd814e0664d297671b
SHA154f34d7d491d0732d44bacdc878c2a2e56aad211
SHA2562fd86a0be83c91b690d4580d6be9f5a64788f0ca051e3c19b88ff1c178468a8e
SHA512f23030aa75a79832e8a3722fd6cb4cd0f930356a81b6254f7819174506bf441d4bff51d2514c5a758056cdb3e0fb9083e26ae258047c29fea3c8ca051c936555
-
Filesize
8KB
MD5b3bbc009176be9ea950fd9da3f63c859
SHA1074772261ac748e13cf1e4494e586b03767575da
SHA256fa7a494a02c1b00f68b2fd4c8bb5c02917b2ff68cb2173f61ec4292f8a36e14f
SHA5129d808143d98984eab3125eba957e63e165b711eca39464a1af534528b8d436bcbe8e659a24db7f93464e831b72454482bef0546bff31ea7f576430547aefd76c
-
Filesize
8KB
MD5b4b97d434817b0daef7bf2d1c6d1a1c3
SHA1d6628d2829aafae8702ca5354e9e9496c92f38a8
SHA2568aa3681ebd55069099e9affa86bf4a9cd660385fdd33d5b7454ffc188ff84d84
SHA512c17e48d315e02e831c8241ac40623179e0f813231da50c510a3c49d180f59a8c125b8404c4cd92aeaec22ee8b2ac2fc441d2bb8b846e9262dda58c1020ce1658
-
Filesize
7KB
MD5c4e966a55b3f06496f8876deb631e7ef
SHA18bb8d6ac012a66302b8abbe5178291141254fb20
SHA256274edb5375ad189cabad06874f2ac5775959de7b222bc566841fc0b395181d7f
SHA5125f079b68792ab139dd898cb3ff3f83b5f7ec1e51f5f9199dd503251fad113075a38c3db1d7430e0ef557e84f899152996d81bb20f8a08d017b9c22a23a924626
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD514bbdffa1b4c111ceb84ea93de40d5df
SHA17e9e16a4b848d53f38a2de8746519e0e3131af57
SHA25645edf91777223cfd354de3845f77d54cb5ebff86b24cdbcff750e1d9681ce166
SHA512181612e499422c819872b68e5e808f8a76bbbda16db209e7c9b819abbf131292c1952139ba15a67478e9ec33e5b9ec95136bf094ce289dbd90dd7633df04bec1