Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 08:48
Static task
static1
Behavioral task
behavioral1
Sample
3872d5f78bdab62d7f04a9a387acd178_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3872d5f78bdab62d7f04a9a387acd178_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3872d5f78bdab62d7f04a9a387acd178_JaffaCakes118.exe
-
Size
14KB
-
MD5
3872d5f78bdab62d7f04a9a387acd178
-
SHA1
91b7e5da78e2ed7e6df3dc76d1a2c12d99be607d
-
SHA256
b4798f1f38feb89e08ab516ca10e2f1713672f5e50acbb36794e2a3d89e1cbd9
-
SHA512
a0e46fa6f6a8873055afaa9762e21a4011d77a30734f6abd71b3df02eb7fe50dc538400676ce621047c659dbd484f01b87e7893898ea61111992586da029fcef
-
SSDEEP
192:KlHiwXu9Z7PERYU6lO74NB/6OkVDzh/0qo0CusK+lg5gNp8nt:KRRe9Z7SOpBOr/kuEat
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2348 msedge.exe 2348 msedge.exe 752 msedge.exe 752 msedge.exe 832 identity_helper.exe 832 identity_helper.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1516 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1516 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 752 4364 3872d5f78bdab62d7f04a9a387acd178_JaffaCakes118.exe 85 PID 4364 wrote to memory of 752 4364 3872d5f78bdab62d7f04a9a387acd178_JaffaCakes118.exe 85 PID 752 wrote to memory of 1696 752 msedge.exe 86 PID 752 wrote to memory of 1696 752 msedge.exe 86 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 4572 752 msedge.exe 87 PID 752 wrote to memory of 2348 752 msedge.exe 88 PID 752 wrote to memory of 2348 752 msedge.exe 88 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89 PID 752 wrote to memory of 4436 752 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3872d5f78bdab62d7f04a9a387acd178_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3872d5f78bdab62d7f04a9a387acd178_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://br.youtube.com/watch?v=BrqwPnxfDow2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc1d646f8,0x7ffbc1d64708,0x7ffbc1d647183⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,9405641666991130614,5763740323101174174,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:23⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,9405641666991130614,5763740323101174174,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,9405641666991130614,5763740323101174174,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:83⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9405641666991130614,5763740323101174174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:13⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9405641666991130614,5763740323101174174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:13⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9405641666991130614,5763740323101174174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:13⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9405641666991130614,5763740323101174174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:13⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2132,9405641666991130614,5763740323101174174,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5332 /prefetch:83⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,9405641666991130614,5763740323101174174,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:83⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,9405641666991130614,5763740323101174174,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9405641666991130614,5763740323101174174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:13⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9405641666991130614,5763740323101174174,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:13⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9405641666991130614,5763740323101174174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:13⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9405641666991130614,5763740323101174174,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:13⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,9405641666991130614,5763740323101174174,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2852 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3828
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x314 0x5001⤵
- Suspicious use of AdjustPrivilegeToken
PID:1516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5b815822c01fae2cbe9cba7225076286e
SHA1572f83479b6dd0e0069c458f92942c6f9ca0d9eb
SHA2565b0ccd1c487140883b75b6f4f94e211c6b857370e757f57a46c03ddac30f71d8
SHA51246ab61c14424536376fe90deca1ed615d7d1295636dbf869ce88a86337803e4aac91a2fe7127d1af33996151b2becf30c4cfbca527cba1e9d1d4429f6f934bdb
-
Filesize
2KB
MD575151cf301daa35e9428730cfc481d97
SHA173001e074ab6beaad7a8658c84ff1c15d76b4bb8
SHA25665e35f383a80e987b77e086c198587733e16f34f86633138c6771cf425ee4894
SHA512f3afe5c2205123932ca0023a6321c2c7d783e4be93033d2bbf1ded36204daae3dd70d539cbf42bae759a74e7576f55bc35c63ea1142afb361e19454780ff2a3f
-
Filesize
2KB
MD5e21ce415a2f7ae5681f432b3d4604e12
SHA11d4bff1da2253c42e840e68a405c985164681c6e
SHA2562b6b24920b71d30a5169a08e4d5431b71295308fcf891caeaa42b08f1065cb0e
SHA5125ed32a6acd72ece92999a235ef195d11e7a77abc1cf1ace03be048515b29d34ad2161baf1d79874c3f988c775a85a3ff6ae321a682cfb191c2b36fea83f40ec2
-
Filesize
6KB
MD58aedbdb5701f516ad9fa9d088802c7a6
SHA1b434d6cb03c8a44963549cc9021a110d2210776e
SHA2562d33e6acbe65a8a0cd792b22ba76ad20d3f4eb1f1331214afeacbc61e4e1b292
SHA5126c5dddb46b2263b4ebefdfdf9e493736549a1d445c51aeedf916511e023f194c2307771db0afce52f8f198c10dfc899161c9e921edfabf6104e4d7b98df8a9cb
-
Filesize
6KB
MD5a18b2e6bf67e5e6777be1182b72674d6
SHA125f5ef8251dbf6ce954a2d477dc383e951a3af3b
SHA256ecea0800bbe72d347f43052e70a9b0963665b9462dce1c71eb9706cfd35e03f0
SHA5125f4754e76ec65b83e51e5ea0b68a5fc6e39a8e95dc3b4f93146e53a3eb3b9f5efa1c8c6dd538e91a40b6b23eaae82ae8391f120691b347ce247fb06c17c004a2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\b24f3ef1-1e07-46ff-aba6-ce769a75b65d\index-dir\the-real-index
Filesize2KB
MD502084e2ab6428f0b1d168ab0d7f4a71c
SHA198004a5fb7b59f924e3f1b9eecb0afb7eaafdeb1
SHA256fbc636ceb3beabd23a2c9fd768100ba6c1886c951360165f532c600c653df7ca
SHA512f53c33f9c9c0600a37dab3f4367c738b8ce3cfe1381698e6a2aae4fca3a95dde01f3788a6a7bdbade76cc762a343dfbe1fab7e6fffd18129253c248640c7689b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\b24f3ef1-1e07-46ff-aba6-ce769a75b65d\index-dir\the-real-index~RFe57fa1f.TMP
Filesize48B
MD5ad94a3bd26b16ad6fe535a0470b84baf
SHA16ce141385f90eca17dc6e4d9854693393fd4407e
SHA2567729453aa04956275a9598d686f5d30278619074b389c584b8ec7b64961cc805
SHA51232728e6045720db4537697ff6055ce7203938de16fb82c375b69b9d9d4f775af15c0623578dcde0884202fb76a445cd472477b9a87b874416579e83c8ded85d1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD5e27e641d004b50de430aeba484d73547
SHA187e9cfbaa3abc782f7f3e7e03856fcc30251e3f8
SHA2565bc165f9d0a9d7f92a18ae72dc7f01c56553dd8619f5afae0d8ba82d84be7b60
SHA5128b02eccd0059aa6eaa7a994734b6ef96dfbb4ca940f31db92e2eecca45804c1ed0ba2e1ca00b66d1d1489ad1731861b5452231da7713a4dcc75ef249999bfce2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD5f56fcfd89477b17942f9cea09da0d5d0
SHA1fca5176082d13611e589a75ba38de29dda31f55c
SHA2561c74c56c016bfb6fddd2c26a05dd63f809c94a101738497aca56538ccd01ff5c
SHA512de6b7d743f367628f6c564764132e6659ef54bedd3c11b64209058b2e7f4da73d156f9da0bae245763b9436875f10f468619bf4d460beea2e24ade6a4001578b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize84B
MD5c4fbaac1b2d7f42976ecbd85c9c8514b
SHA1c2d64f9d6ce4d7563043292ccd2723e29cb831ba
SHA256891e11e1ecfd8b3ad3f213ed2a1d0c435095d216da8d7512c022baa425c481b2
SHA512e0bce70e0e6e6cf29061f3a98a1c7cbd736e68a4675fb93362682588cc3eed176e948db0a6e2ca3ba579ed0d4955667fff6ffbf09e66eda5271f042dabfb52ea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe57a27a.TMP
Filesize89B
MD5f37692acbb654b608e121bbf1decd8e6
SHA1b665142b16af728013873984fc3bbc8c4638a7de
SHA256007cfa81752a7646ec820327f31e80751fc67d68465ca105dfca3cf8a0540041
SHA512ab2d3fcc103167ae3a6a8d32d24925fc3ba23adc657608ec33f28cad1245862ab81b82d7fefd0d8758682de7d160335d78574407729e160b514af867bf793066
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD543598f13a7f63569c8248aff127e5d1b
SHA1ff798953e939c4c594fb016cab8a34dfc88e5f7c
SHA256c71c12cf322b167f4e10c8916c88d94dd0157f972b45597b11e5f43f98d02da4
SHA5126376f08ce4818ce7e9a2dd45ac5c7889aa4aa53a0279376673e52e74632adda280176bb0834004d5da3ce36611a62cb97bb0fcd12636eafe5a25a5890ea2ee48
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f1a3.TMP
Filesize48B
MD5cf56ce71aadf6b3366555081d3e910ea
SHA11f97ef5d6f8c8c29a1f0d074078c129246957c16
SHA2569af12ba75d8809e2eaa2c23c8113456e2ec3a5e0e96807d58dba9db1bbdbf775
SHA51212c244cd753e848e32f8e6857d5f6775b4081b30566499ec2e03ee604b624ff860e3a2d106088f571756f6e8bd47ef5310120800f774fafaf0a9e3e29ffe2b82
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD587b379004658940ffe01f6d4e45e919c
SHA1ab4c839d18ca7393d0cc60fdfcc32f1c54b449f6
SHA256ac58af1e0577331c8d9eedc15787f08260dc0b24e2f9b92216193a3a0e831916
SHA512ba8c47816f808ebc9c3dc9f5b2a1fb7f177108be011c6b775442c9bd0682160cbe8506f3794009e129d3fdb4777b997b2617c32d0ef55a8996a4918e80ae5221