Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
688aa9d6cd99e8e6a37c51651bb717c1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
688aa9d6cd99e8e6a37c51651bb717c1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
688aa9d6cd99e8e6a37c51651bb717c1_JaffaCakes118.html
-
Size
114KB
-
MD5
688aa9d6cd99e8e6a37c51651bb717c1
-
SHA1
64c6e454f624b0868a6c47ee4ab08aa02aca8576
-
SHA256
ce2af469b24c48b9e0f999d93843fdd55ae6646e2887021eb7b27a726c8570f7
-
SHA512
5cd34ee6448c16eabdaed85066e4edca27b7505b76df62bb8e841adef0df25244036bbe627873018f8504de321edbdb90d70284ad78c16310de9221d76e9ec36
-
SSDEEP
1536:kkclJQvH8l0v4hTO3nOUkOuOcOrOJOwi+Gg1r7Grg9OytJgUKxMu:kkclW/w0v4ha+UzFcT4Xy0UKxMu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4544 msedge.exe 4544 msedge.exe 4996 msedge.exe 4996 msedge.exe 4300 identity_helper.exe 4300 identity_helper.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4996 wrote to memory of 980 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 980 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 3132 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 4544 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 4544 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe PID 4996 wrote to memory of 1536 4996 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\688aa9d6cd99e8e6a37c51651bb717c1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffc7a7146f8,0x7ffc7a714708,0x7ffc7a7147182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,351494688241555255,16302002439100826917,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,351494688241555255,16302002439100826917,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,351494688241555255,16302002439100826917,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,351494688241555255,16302002439100826917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,351494688241555255,16302002439100826917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,351494688241555255,16302002439100826917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,351494688241555255,16302002439100826917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,351494688241555255,16302002439100826917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,351494688241555255,16302002439100826917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,351494688241555255,16302002439100826917,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7160 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,351494688241555255,16302002439100826917,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,351494688241555255,16302002439100826917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,351494688241555255,16302002439100826917,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,351494688241555255,16302002439100826917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,351494688241555255,16302002439100826917,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,351494688241555255,16302002439100826917,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\5706289b-d903-4bb2-8970-22c7cf28799a.tmpFilesize
11KB
MD52a5d63691f017bbd531785446965d176
SHA161057684d0872c3bbd3db7fb709f7538ac285f10
SHA256bbba7acdf9961ec8ac8a0c1f3901e37f32d3ab2f672d2ff884dd007da394bdf9
SHA5123010f04dd0c03595437570ccfd7b25e36552adbe96296d5883b98bf6b3fa525aa369249eaf3646c2635267c394b5c5c3e28a91c728f6646476aa5790a0a3cc53
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\216c05a7-3f72-4535-b31a-6ead876d64b8.tmpFilesize
5KB
MD506953085c3b7ceffa4b6abbf3c62dfe6
SHA15f2ac42d0ee9d69128732c84aa176fef3f954729
SHA2569000095e9744ea17e533b6aa240f1bb6058d16677f808203cb2f8759f449a94a
SHA5123c0317ea5c20027882c0004b0d58e88073eea6a12eea715716f72e620baef945dd4bb4871a65a57671e111eda226780d189af5b19f319c2d2a2696c47d9016d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000eFilesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
216B
MD57962160237bf7df56a56fff29a72c907
SHA1d33950b2ad4da5305cd915630c2ed5b141279aa8
SHA25694083efa7f6f56f468685ff59acf6c951ee2fbdf2e8bb9b9601efe026efba949
SHA512fd68f6feba42a253ecd1cabf6e48d3c32097f81f3c4ab0e3cb3bf6dfcf730d68c99de3348ab2d2acdfa46c93a2b76a5cf719a98484f086391bd49338170ace69
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
240B
MD54917c198c60f00f72c3940a67b9f14bb
SHA1ed5be989e16c90091f1dfdc1e792547a5e793c93
SHA256eb2dbf19f84754ea0ba22f97945139a91280e5fa1cc79f0d97bb78d7865fa8e2
SHA512bbbbdbfabae3584798f36f9fad6aeeb572f8549343f52e75ec014d3b8ad95f7a27a6e6aab6a7c35f34414f321bdbcf86d59d7320a47facf7bed55f128018cb5c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
2KB
MD53471b2f69721a15987ce800efa6a39fc
SHA19dd176a9ac24e1d436541c9b6529d7256312ae54
SHA2561550da13bb37628c5be8f2bd89ea83f49ff32a6aa79d82b2e6d7ffc22a772431
SHA5125801431b2ccce6c13bf1b32eb87c3abdc982f170f18b2a11e3a8ee7de82b78c5fead33ac8ca2349ca9162a29abdad455d686c9be09db0e5421c8a541efe1ea20
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
2KB
MD536038d1adbaa2551424bf9e71a26aed9
SHA1c67c151b99e5609366869b03d1e69f27b7c21bac
SHA256e97f5ecbe894682d9c3e9aa5b8b64f2629883caf5dd4cf514200de20b666cc17
SHA5120eb8e083a8a475c50e79062a4092eea293a22519a69bbbe0c492f25dae30054f7ac0f681670adc2e62924c994d23d0fc952ee6a68aa35b6715d4725ab1f0e7ab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5581cdad51828ad95aa95220a57ea03fd
SHA113be857a54ba35612a7bfab67455d9d6aea927c5
SHA256236547145618459071898e8fdcffd6e68b2dda3b6c99b346dc7ec2f720a0c2e5
SHA5123b762ee771db4d81621c50b34d0837672879b714a52bc7c6524f41d132757ad43e51121d91e7c3b3f0992032cdcbd457469c6fd3724a61fa0eea3df1bd3ed78e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD50542640d6387def7db04f144c2e233af
SHA1603d8f158b4dc0b8cd9becb3d0e3be23b143a786
SHA256e5a66915a537fd2083eb0591af5cce5879e3a7a9b27a6cfc0b4952e77d036dd4
SHA5128d3dff086343702c35d832f9aba74f3132079d0cacd763e55c84199ad2f31a9ea7e66d3c9ab3e58a370cac9aa39c287bb0d2ffb2ecb39d1249d3d3e822dd65a3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
370B
MD5b7855ea665c853b4f741070113758f3a
SHA19a3fbc0f17285a582a0be39c7aa97e490e753cb8
SHA256dcf5f0b295a70824f6cf8309300a8b1b6500d1ff38c124b8bdfcf0ef8a0e16aa
SHA51245982b02d49cec26335832d2208411c894ace4357b98c0fd90847f1536384d621c10c89201fdbbcc0e5362534628262c886304b0d497de92769edfcb8613accd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57b508.TMPFilesize
370B
MD530d5969072d8dd25470012dfc2d604ee
SHA1b71ac8f841a4fd18f2e2cbe4728f0eff0c29e168
SHA256f70a826008aadbbdeee329332c0ae9d5dc9d58bf8a5509d47842549a2a238da1
SHA512fe4a7a5348709483ea991e4388402d4ef66f8ea679cb3ed663448c67d9ce51fea741a10100b3142c5603c9bd6ec106876bbaa8ebfcb96e215018edf28d0f2bf5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
\??\pipe\LOCAL\crashpad_4996_EXMSGYOHFNPMZBVYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e