Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 08:23
Behavioral task
behavioral1
Sample
cf1a17a7b634cb8f4899a7b4a6c4b2e2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cf1a17a7b634cb8f4899a7b4a6c4b2e2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf1a17a7b634cb8f4899a7b4a6c4b2e2_JaffaCakes118.exe
-
Size
28KB
-
MD5
cf1a17a7b634cb8f4899a7b4a6c4b2e2
-
SHA1
476a9b2e8a4fa03504c02050325ab2923eae27a9
-
SHA256
49c54d7cd3a3882bb872894ab6c9ba276ad865d95703ae76eee370af166a06f0
-
SHA512
a6625e1b815e205055d564e5a7b0d4b132353b71b5485f5e23ce3d2a69862b3d657b951db3067462ce0d3a6a20e6014c49ab0ce88b63ac45a78dc8cfedfc79fe
-
SSDEEP
384:Z6de2vulSeWk8WGFqUK0+PTwNuiKxf6HE4mEBAppa5AxTr6+S9Pfu7n5QboMK6:Z6dpvSHN73V1ujkxqdeVQPK6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf1a17a7b634cb8f4899a7b4a6c4b2e2_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2100 msedge.exe 2100 msedge.exe 3728 msedge.exe 3728 msedge.exe 4444 identity_helper.exe 4444 identity_helper.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 3728 3660 cf1a17a7b634cb8f4899a7b4a6c4b2e2_JaffaCakes118.exe 86 PID 3660 wrote to memory of 3728 3660 cf1a17a7b634cb8f4899a7b4a6c4b2e2_JaffaCakes118.exe 86 PID 3728 wrote to memory of 1444 3728 msedge.exe 87 PID 3728 wrote to memory of 1444 3728 msedge.exe 87 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 3764 3728 msedge.exe 88 PID 3728 wrote to memory of 2100 3728 msedge.exe 89 PID 3728 wrote to memory of 2100 3728 msedge.exe 89 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90 PID 3728 wrote to memory of 2168 3728 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf1a17a7b634cb8f4899a7b4a6c4b2e2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cf1a17a7b634cb8f4899a7b4a6c4b2e2_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.msn.com.br/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96f0446f8,0x7ff96f044708,0x7ff96f0447183⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16005093761019286004,1767662225827837853,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:23⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,16005093761019286004,1767662225827837853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,16005093761019286004,1767662225827837853,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:83⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16005093761019286004,1767662225827837853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:13⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16005093761019286004,1767662225827837853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:13⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16005093761019286004,1767662225827837853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1880 /prefetch:13⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16005093761019286004,1767662225827837853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:13⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16005093761019286004,1767662225827837853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:13⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16005093761019286004,1767662225827837853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:13⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16005093761019286004,1767662225827837853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:83⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16005093761019286004,1767662225827837853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16005093761019286004,1767662225827837853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:13⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16005093761019286004,1767662225827837853,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:13⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16005093761019286004,1767662225827837853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:13⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16005093761019286004,1767662225827837853,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:13⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16005093761019286004,1767662225827837853,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3116 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8a354078-a834-4057-8bd1-628254778db2.tmp
Filesize5KB
MD5df3c65e2a2ea93ac08921e35f9760a1c
SHA10223de513845ce20cc85321ecffa84a755322c67
SHA256b230a80a58ece81414bd04e065818260622b7aaef6b2f34c773bc4b5a8fada9b
SHA512f1bb9b472f63dcfc72d0a625766794d9bfcf867415fbedc1f4ff5f458c676c253861e14f40ac8c965912c87102d4952f5e758ec4d46e624e752389e6b0757735
-
Filesize
20KB
MD5c5ab9804e1a546dd80d33ae5dad6bb7b
SHA19c7b1a2329616a3b459119cad6e77aeea385c459
SHA25671552b4f459db452b159448fe634ae5c3ee8f18fba0d8d4af2368f05c9719ea9
SHA512de87701f4e8774b50e038026c384e67a8dcbc831bba353377afdbdbcddd787f914be4399ab99b5b688b61c34c796bcd33c4c53c2b34bc53b59da8bd733f48bcc
-
Filesize
27KB
MD54efb9aa5385421fc5899f9e7abf7e8cb
SHA12572cbd83a21ce01f315c126505f20f5e52da704
SHA2561f9c006e426f89d13e2ad5550f1eb29e85fa4595b31086be29cd9adb3cbdc960
SHA512e4ac6b0b72ffaab0dac276a764e6bfd7c78cb07024adfedaf0542a88515ca57bbcaa6c679dcf0f221f2da4840f25aedc08cb0a68146e181cf776b959b5463d07
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5fded27dc977a8806042963dc67d8e1dc
SHA1a3b587531c0232161c647d4213d49ac5ff1d838c
SHA25660cc05e44f6fa76e0a5b0e98007e4acb7586dc33eea0279ede23a632f9811b05
SHA5124944bf79cdaddb667b1b8a2984a31b2769536df8096e0bfaed997276a3510961befb6dd2c49ed5f70d2dd48a25a3472d8f79e3254252be56613801a413f4dce5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5400698b5eea0a7dc9afecadf70229f67
SHA1f466655c90b5d79bdd7c571d420673f8983d9a9f
SHA256de95f3e157d5b911eaa21f16c8d5218ccb5af4359f8ab68a1d6424b6eec75567
SHA512d75e25f554233da4dda53962e7c5ed758ebf6945215f7fbae1bc92dd60222addddbc252d7bf8ecd9f9e65aef4ed25202ba33d977cf35b0d5f50c2323dcc973b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD58d260eb0e09e50954176f22123df158f
SHA1ef61c28d519c5d73bb62e122c8a8f941a69b2086
SHA256dcd15984a188cbbcc358e777335c32c537f066ffbc6ac6e5558f323f2ecdf073
SHA51217db269ce84a95ed29e7363082e98c3753c9285a5d71e1d8eaf3586230c4503c458bbdd47f0877894715845fbc3ab44bc84ffd4cc8f1e0a13229a746b406b6fe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5273a8907f1853cb03208c10e544c1c0e
SHA119a6887d6cb4435c43f341e099345554e25d556b
SHA256cc48421a40ad751db7833f59b5e836ed0662653573e3fc6b725a56839b91ace1
SHA51270c46942c088ec3ae4c0d24494cb60a24061ace6fa4f4ff34f7728cee8428a2b311d246261ff8d9debbe6612033f3fe5bc81e9c950837abf31f2c824af0a6ac5
-
Filesize
3KB
MD568e5ba08390fb60fd5052f960d2c077e
SHA12ffb9459d19b9c80af24e3dc7b59e5820118713d
SHA25603f727b24841b4358f9bd78cd1e2407be159a14a09ffa314efbf5f9abc2bf0eb
SHA5122f9f841656c636857543c7d1e78a0aa668c3ceb89b030ff066950636179cffe18ec2e65174782dc3903733875dbf6248c3dff1350797bd2cc73938eece30108f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD550dea1c35fa838c101543a85a801733c
SHA13a070fac56b3304f7cdecc7a8d72348dd308aa1d
SHA256921d53107a05fd5d3deba3d9c8ede98c4dd5e9351ffe746fb987415142c65ab6
SHA51216b1f485ce5a5853ee06318cef4cd790ad9a3b020901d101ae1930a89c07bc40ded578e688d439f0010af7c9414a19d24ac9ebb362d3d59ed178c279632e1968
-
Filesize
6KB
MD5f225bf0ff810af0c4d0a5784ff502a48
SHA15fc42c69f36e32941f178ae420d5ba3c15793b41
SHA256acbb1a4ef937045551092f732aa1776ce9abe4f555fe917d41fec3bf9717d20f
SHA5121b473853c8a9fe64c3b309706b1c345df9366d999ab296470d5b3c53b81a66dd94cfe1d0e6288825a6d5485319705ce29a2c644996e6593408fb94efdeb2ad6b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\c1eb0cde2406b6af565f825dcd492589d40ab644\91f077b3-57b8-4542-89b3-0cf0695177cb\index-dir\the-real-index
Filesize11KB
MD53c25f0297052ebed3bf5c5f1293a218a
SHA1ffc49db44e9073e0c9b0448648f18a578d635cd4
SHA256ee8fbfbfba851ddf56912964461e57b3b3b14f243b62ee39f03464fa15fdfbed
SHA51290530a23ecf9b17fa21e08489b5f787bacb91847a15ab481ce58d68ca2ee51adfd45af8991e1e4aebb325a795b09d89d189d52d6b890b435fc44a0f4ded97416
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\c1eb0cde2406b6af565f825dcd492589d40ab644\91f077b3-57b8-4542-89b3-0cf0695177cb\index-dir\the-real-index~RFe58b05f.TMP
Filesize48B
MD53c1f54c189fc5353079cbb6d10b363fb
SHA18802ee78241a05847f67b9d1f9c874e39f3ff681
SHA256d78a11a63078aba006bf85f9fe68aa4d2db69c88b14e7e1f4ef7b43399ea0973
SHA512c0db6ba5fffa37b0ea971d62b6c9dbb2f25a5460a79f66d7fb5befb315cb610b868109bb1602c80ce456f36907ab9974344ffa0f3622ac974a6d8c530b6a2dda
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\c1eb0cde2406b6af565f825dcd492589d40ab644\index.txt
Filesize93B
MD5b513c54c34c7aa03c4728d9ae3977541
SHA1b26b9a5e8bbb7310c0c62251bb3c2d41266d4c71
SHA2567d699a4ece3b9fd5cd32a211a386e8822577f03c9e1eb3d2d5366ca07fffc18f
SHA5127dc37d7d9701f1676d98c36dcb93e326a029ac06becfe8e67571e382366a6efad101094b94b15195bb42fde9bd9debd3572e82813d2116fc58daa4f70430d4c0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\c1eb0cde2406b6af565f825dcd492589d40ab644\index.txt.tmp
Filesize89B
MD5da4fc79a3de7678393276be9cdda7a57
SHA14da3cc1a9aeb90403924666476fbbc7d77c3fa17
SHA256fba351fe89446cbd7ca506f9e6bf7f795b471751d51a27b0da591f326ece0c82
SHA512977df63a2548a6b55863c7ad0031f6d49f7b03dd07762877a9652a8a6df8a0b6423ea1210b82e481c49d257879191b4fbd3c140d243b26790a38e26af1ebc50d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD55bd91e821731b0f46818a203eded7c8f
SHA18489da15efbf433688d0fb00cda0c47d24ecb6d3
SHA2563c548bf3ac915a492a7e0f5cc6ad1e09da55086bbce98f9dc5c9418a05b8f575
SHA512076d3b536443c660c4fa4ba6a7f69cc6bd23d104d9144b0d1d783265154ea24bda5a2104df390a9d59ce66dbe9ec23afddaa6cb1aa839f49a21ea6347ad54832
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe580b46.TMP
Filesize48B
MD59482739c19edca083ecd21a2e0b3d537
SHA1a2ffd1c50161cc02c7c89a01994fb8de0371515a
SHA25697646a81486ee11e32fa8271501617ffe5ff5e79ac463190cc7ae3d53169a104
SHA512deaf3227ef7a7411c72d5220afdea8aaef6d18dd984723e40638ae1ffbf9f7dae32d19f46db6a7b49bbd57590ab8e0fc8b205e5f7a5ef8be2610a57bb56c01a9
-
Filesize
1KB
MD54976c632145298919b9071a221cc33b0
SHA1fb3cabb8ea3aa46fa5be297d6ffcd2047e3334ca
SHA256fa8cd961bd9e581ce70aa2183495a90ae6dd25b97fec4d086e3738b7f60b7a96
SHA512299d7aff96188c357bdcb29dbd059b865840d39b8a517cc49631a73b2c7ac3995e057912c76a1206ccd65d6e449c5c7fd0ecdc72508b147894575e896b703756
-
Filesize
1KB
MD54e92f2779bd801afd190e0a52705584a
SHA1951a3a0fe611407f99f7b0d24d513e974b5a23ec
SHA25618000a4c254947936925ea9974ce763a14836d0128ef6e794e14f2c339401d3e
SHA5122f622d5b7e466fb678cbebea681abe3744bd7a8d55a80eb203d401e44558574fd20fe0b18592e8a3c921fd54170ed45a30cca9d465ac197981efcaf08a39b6a0
-
Filesize
1KB
MD51c255745f42f97fbfb05d6372dab9bcc
SHA10a83ad0c6aefa6579bf8bfe829013bffe5e2c7ba
SHA2569ddaa13e4db752136a422ca23220c4e446d3abdc3fc7c36877cd66aa8a67dcc7
SHA5126eb9009d707c035c0691940db395110ff1fa73d04f8b5fe9bccba47caf42d77f1d757fc9914be76544b55a607dc5baa638fdbe8b07965fa34c53650c2f050a69
-
Filesize
1KB
MD54a83e37b438a9f00881ba2fc54a9a790
SHA15c9cbc53735b5d4cb0066f7dfa8e47419f2712b3
SHA25670e6da941155987a988b8e4556e2e7f2fc1c65d77c65f1675829e7d4b046cf30
SHA51249649d746d4014f50fd99c09835464c349c085fcf3a760a5538241122d5a2dbbaa73c0c723e4dde6fe54fc14a993bcee5e23ee9fa6601ba7f6cb8165c605e7c7
-
Filesize
1KB
MD5f3329e7ce8862056439f62fb0a180a12
SHA1fc433ab4a566945d908bf12ea71164fc70bf03fc
SHA256e151053adb7282b24277599a7f6be2e2a0c141e14f68402f04460adf4a167b9e
SHA512b44e369ca892b8946693e067ee8419e642dfec368e8dda64243863d992ec257aa5e11524a6c0c8b0ec7f46ce23c10c9225d2ece7db1cd2c0c9c088f362df33b5
-
Filesize
1KB
MD5671c2c58eb2ce54e9b4f389d9f4b7817
SHA153ebf8c6eb90fd51186beb7aa8279d941a2f774b
SHA256c100d5479066e3d93cf263309781e1a091b3721ed2df338bc4df1c6d7f4752d2
SHA512526d032e133b2b02c53d1fc1be581985653c8cf4139b812bb11585a0ce46f5aa2b531087a9fd41333c18abe71c8d0cb175cc5504d7587a142f0b8d45c9e34c91
-
Filesize
1KB
MD51a09dec22f74327c52a767349459ac47
SHA18743dd758eff83a0a511dfb0d6e18a01641d0d17
SHA256748a5776f38b1e15309f67fdb44efabfea73f212a976168fdd36b1762db3e7c8
SHA512f4080ca0251e66747a0e47df0eec9b90a22455f6c6e210d7279ab710a6b28c6e59d18a9cccdf45cb733163569f034702df4b58795c077b7665bbb17dbea5b6a8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD582e8dec3fd43a77b65105957b86b5f10
SHA144a218b8f1ad31455ab56b5052557be442b53e8f
SHA2569babf02ba71b5e3d932bad23e1bbc07692ae94dabb332d53c519ff7e14f55751
SHA512693e9c39f9edc159b2833e8e1bda51ae9e2d370c1f8cbb548fa31a25782ba1f6f8d086276ede7e907a17639e92c80c5fe80ab0aacc28f742dfc699de5ca15ef5