Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 21:07
Static task
static1
Behavioral task
behavioral1
Sample
616625d3e14a617c0c9c25fd105f70c8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
616625d3e14a617c0c9c25fd105f70c8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
616625d3e14a617c0c9c25fd105f70c8_JaffaCakes118.html
-
Size
4KB
-
MD5
616625d3e14a617c0c9c25fd105f70c8
-
SHA1
6fc3d87651bf8f36163b8352deb5c40b1259128d
-
SHA256
e7f168415fa8894fb6031faf086b95ef8efa9c2ae1ed1c05dcd78781d9cda5c4
-
SHA512
6991fa48ca9b92b3fbbeeaf5bc6cc87e663b79c4be2bfb5620080e8a182add86684524fdac2976a5425fbf1a288f17f9083821fa053f8c027466ff9313cf46b1
-
SSDEEP
96:1ugU0N4HBtwoYIDImnahP8KdLEMQ/nppa81p/6W2m:1ugU0NYwoYIUOkE7njaY32m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 4852 msedge.exe 4852 msedge.exe 2024 identity_helper.exe 2024 identity_helper.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4852 wrote to memory of 3192 4852 msedge.exe 86 PID 4852 wrote to memory of 3192 4852 msedge.exe 86 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5072 4852 msedge.exe 87 PID 4852 wrote to memory of 5088 4852 msedge.exe 88 PID 4852 wrote to memory of 5088 4852 msedge.exe 88 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89 PID 4852 wrote to memory of 1956 4852 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\616625d3e14a617c0c9c25fd105f70c8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9221e46f8,0x7ff9221e4708,0x7ff9221e47182⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1214447606322291803,6319902604050316822,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,1214447606322291803,6319902604050316822,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,1214447606322291803,6319902604050316822,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1214447606322291803,6319902604050316822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1214447606322291803,6319902604050316822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1214447606322291803,6319902604050316822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1214447606322291803,6319902604050316822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1214447606322291803,6319902604050316822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1214447606322291803,6319902604050316822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,1214447606322291803,6319902604050316822,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,1214447606322291803,6319902604050316822,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1214447606322291803,6319902604050316822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1214447606322291803,6319902604050316822,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1214447606322291803,6319902604050316822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1214447606322291803,6319902604050316822,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1214447606322291803,6319902604050316822,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD570742f1c6e702fe3c44c511152cec8f7
SHA1b154d696e6707dccaffbc6a28f24a665d39a9bba
SHA256622269116f398b97a20afbad0e9c88e7aa57658b02584d44916644cd5bad8c75
SHA5128f0025f36bc693cb236ed4abd920f3594b61d4157af796280c501a4925ee3782161f7328c1ac96b939446231e1dfdaf6e5ea9a0e61f56610b869008d7ac47387
-
Filesize
2KB
MD540d276368e77502009d2b6ec969bb379
SHA1ec614d28b823d5672a524a0034243016afe97a81
SHA25659b98e5ee27b40d068b9fca21c36abd778523d5835f608e73e9ed708b4c2480c
SHA5120219238641261344b428d4be34410318fc3f54afb7ccf00e2eb71a68b2cf8ba54f4c65dd84709c5dd985d9752b9bea66f998cc7ea9d7911e85a76a5526286aee
-
Filesize
2KB
MD5663339a91225ecd8da3d2dbc0e4dec1e
SHA1ea5aea6944eeae6163f7e0e1bba2b99d3bc7576e
SHA2568d303d7f2ea4d2bca3d991e06fa016436610e7424f894c96761b61556bd0308d
SHA512ad23f4ce6f2302dfd084d3c61bac627ed816e79cbebed1ce7ba2bdbe9b843594b6f8d9d040fbe53777cc966ce40466d9e48eaed217569028f9a80f8f24bd8b90
-
Filesize
5KB
MD5608e5e892c15ef10dbaa1153ff6e8589
SHA1be286fb8f4909246472e776c5e5e4504ebdad99a
SHA25647e4c8ffd58109eb946498a1a62b3345234dd7be355332d57b5eebbff71068d6
SHA5129ce7c44c71efca6705f1bf4119e2114ebbbd07b2b4ed3c1d380c7284a62f4bc594ddd18e2efd0267f16fae43675459a59ee8b8914409286e72f2795f2ae3bd66
-
Filesize
7KB
MD51925c18709751360deed97099cb1a2c4
SHA1e3b679bd7d943bd54cda541930b5d5a1312b0e13
SHA256308121d4a0442bdff579ea22c1383ae8f2f1d167d4bb3cb3287e534e7f6c1ea5
SHA51235d980ef6891260f61dc93940b79b6e6b1b695f54736fc161cbd30483ca35c4cfec5bab50f95ee885f466afbccdd0193b8e06dae85a9c5083bb775c6dccad229
-
Filesize
7KB
MD501f5630418954764961212f9eeeb3784
SHA1185cb6711e7cb720c3557e276ac56b3ea6fbef89
SHA256af7a0c27d26eec5f8c307cef76b11ed333e38232b8860f538be3783aae152f58
SHA5128a5d1011f00e9a75a173111546a410854aca735f01c30668afce79bb415134d77a472547a6d43a39ef3cf1f16b94ab4fa0a32955a5f2efd6237fb44b459a93af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\32cadb2b6d359d069dd3f3d132c212a43d223701\index.txt
Filesize99B
MD5ea8f56515eb1427985dbf9a6b4a0f4a1
SHA19141e40f6afd52133deda4711aaee4a2c2b6d56b
SHA256a3b62f2b9211b99ad9f5169d9d1c90f6413c16fef0443218822d0612615c588a
SHA51293a4e1a4e6f3078e3c19d9f5c63a14c9bf5e358582ae22d4be5681f6dead91c34d2d36072bbffca66df839443ae5d4e0f5241a8b4dcd7ceda6791070b685d308
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\32cadb2b6d359d069dd3f3d132c212a43d223701\index.txt
Filesize35B
MD5343859b4ad03856a60d076c8cd8f22c3
SHA17954a27de3329b4c5eefd4bdcb8450823881aad6
SHA2568c79b653c087618aa7395d5e75198da7d3b04c08654c39e56b1027f9ef269c2f
SHA51258014a4e7f2b4b0d446fae3570196b8fb95d0d1b70bdab0dd34a74d6c62cd8d7ca494a486f19c1a829988a3af83a08d401f18d1769ce1799a02ee09807234254
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD587a3087889bb0ab3fe918f4f1d66bbad
SHA1a9f706429d57b2a09b2941cf7361703b1e776ba3
SHA256413b1edb978488c5d27e1edf4d3f5c5ff731ce5f1c74ccb08d163121a952ae4e
SHA5125d7426eeadb9fa5d29720823a3cf968ce857e1a18bab2168f4928a9a99db1cd4e03429a02e62833bbde1cf9e2d3ac618e252cfdcbeb2dbe3396a5dab5d773507