Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
3a7576e7f6da2b1b9a3485f18ce268e4_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3a7576e7f6da2b1b9a3485f18ce268e4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3a7576e7f6da2b1b9a3485f18ce268e4_JaffaCakes118.exe
-
Size
528KB
-
MD5
3a7576e7f6da2b1b9a3485f18ce268e4
-
SHA1
b7b640e15c95e423c3949e3998cdd48bb41cdb68
-
SHA256
0e3d90892313078f3085e06c71012ce88e17e1bd8cb2f84981c8a36d58d9509d
-
SHA512
9416348ca418e6a97dc868cc6527a42367add61e6b3f0ce5023bceece97cedd1762e3db7dcaf27fcdc8d6ad828415edc4e1223cd3e2385be68522dc764e7fd54
-
SSDEEP
1536:+OmcxxJvbhMl6h5izUofECi7rJpyi85O+RsCAdFQ5+P8Mr3/fYFmOq3XdTXJU:+jcxtMlzdF6FpC8+RsC/5+UKgCXlZU
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\mplayer2.exe" 3a7576e7f6da2b1b9a3485f18ce268e4_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a7576e7f6da2b1b9a3485f18ce268e4_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Download 3a7576e7f6da2b1b9a3485f18ce268e4_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 3a7576e7f6da2b1b9a3485f18ce268e4_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" 3a7576e7f6da2b1b9a3485f18ce268e4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5024 msedge.exe 5024 msedge.exe 5052 msedge.exe 5052 msedge.exe 3180 identity_helper.exe 3180 identity_helper.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3416 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3416 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1156 3a7576e7f6da2b1b9a3485f18ce268e4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1156 wrote to memory of 5052 1156 3a7576e7f6da2b1b9a3485f18ce268e4_JaffaCakes118.exe 86 PID 1156 wrote to memory of 5052 1156 3a7576e7f6da2b1b9a3485f18ce268e4_JaffaCakes118.exe 86 PID 5052 wrote to memory of 4836 5052 msedge.exe 87 PID 5052 wrote to memory of 4836 5052 msedge.exe 87 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 664 5052 msedge.exe 88 PID 5052 wrote to memory of 5024 5052 msedge.exe 89 PID 5052 wrote to memory of 5024 5052 msedge.exe 89 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90 PID 5052 wrote to memory of 1052 5052 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a7576e7f6da2b1b9a3485f18ce268e4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a7576e7f6da2b1b9a3485f18ce268e4_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.youtube.com/watch?v=P57zN2Z1rAU2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf2fb46f8,0x7ffaf2fb4708,0x7ffaf2fb47183⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10785925085003070153,5862723095297211131,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:23⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,10785925085003070153,5862723095297211131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,10785925085003070153,5862723095297211131,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:83⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10785925085003070153,5862723095297211131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:13⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10785925085003070153,5862723095297211131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:13⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10785925085003070153,5862723095297211131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:13⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10785925085003070153,5862723095297211131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:13⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2120,10785925085003070153,5862723095297211131,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5396 /prefetch:83⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,10785925085003070153,5862723095297211131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:83⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,10785925085003070153,5862723095297211131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10785925085003070153,5862723095297211131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:13⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10785925085003070153,5862723095297211131,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:13⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10785925085003070153,5862723095297211131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:13⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10785925085003070153,5862723095297211131,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:13⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10785925085003070153,5862723095297211131,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2992
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x394 0x33c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD566e45ec22fafedccdbeff95aeb041ae4
SHA1c0b0c71364f40f0053aa01833a641c190eb62e80
SHA256d4e591d244a73d538843d1edfe09fc3d4839107b96e373bb794ee4afafb270ec
SHA512f4769825f7f9c31df0d260ca1e7c4c4d14194fef06b2d261307ec30c37d59408866d84fbfa607d1579e36fe64ebf4ecb08b1f0be9696aefe6fa914569b8c6c00
-
Filesize
2KB
MD536e9a489ec6f3114a48224ffea4c711d
SHA163d802ca886d594a38ae33161160092a22ec33af
SHA256c96d56829323516b4f5d5745ea8de1f02f26c2c870883259d3afdb882138f4e8
SHA5120f3fd0c3e4cbe7c101ddba10b4716050dad5b126fdc10264c5cf06a802b3a0b119c318577a68e2a991eb5b485f732592e4706119f3ada628c33fb70c589289f3
-
Filesize
2KB
MD5f3816e2d793433af96b2c423c4870161
SHA1839c5abd0bace86f8889baf05ba3732eae2830ea
SHA256f0af26e64190088e5891082c2b084dad351bc91425a4b3ffc326807f4f3c2f66
SHA512a75bab0a24fa04c1cb179de201003bae5056c250ad1e0f5a4f91ae7fdcc530606c71d0f9febcdf9accc0c14cca104708ce34b6426eb6136763ead95e753fe006
-
Filesize
6KB
MD50b69a6291dc85340f65c43b2c85f018b
SHA14406f336b2fc238d478a9e3876cfad2fb8a0c0bd
SHA25655367a4718cf996c87384f2983e3f94fa65964432995ad87e11c977c07088a05
SHA51200d562fa17e38e52378752627c91029844cc864b76684ad8cc51c160e6e92fbb4b03fd166db4c87f8b64926e942f9fb0c96bdcc61332a7304ccf57f406ffcf2a
-
Filesize
6KB
MD52b6987fd835f8215d89bfe0f3c8e9fbd
SHA194ca5b12806ad17da87718d084461550a9b6c74e
SHA256feca9f104574472464edaeb0ac51840cdad626e26becee6221a8d94cb47a9a19
SHA512abf7fa5817c80e4a78fa52019a0958dfe436ee899e94825d925b20ad9fe79801a5f96f90c335b6625ac70b257d110706e861a68a34c53ddfc17e9dac0f216daa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\f06bdff3-252b-4b10-811b-da30d97c3a3e\index-dir\the-real-index
Filesize2KB
MD5ba79589cbfdf5aacbdc51d2858fb821d
SHA113962f6154bc36472bcc5e061d7c117d8417b9ee
SHA2564c799e05a3470d1770915e72afb5cdf16b619fc540146f01b84ce262028ffab7
SHA51242424b6593f7e000f6c20ad88d3aef40bf3fb9b086452d03204ff9c010e62a706a5fef3ec39c470e4b50fa008c0163c8ba5141b9c3317dba26c12bc7b43b83b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\f06bdff3-252b-4b10-811b-da30d97c3a3e\index-dir\the-real-index~RFe5821eb.TMP
Filesize48B
MD593c2d82d03f10bfc964907fae1fe5dc4
SHA17ade5cd23dff2ed73be1ad8704446347093da9e4
SHA256395c6d697e995fb777c60f95e781ca5a704aa35ef7a4737dfb7b05e167a02d23
SHA5122b6e2ded59feb62127c30f299ea1536967b1d82922bf673e81709d9aca228a95a72e2444ab4c91fbdc0f4ce45917477b4084c8bfef671a56e31ba7ebfb12533b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD5d8cf8a8f6a9d3c98f7114dc0c8dd1d99
SHA1658fbb1b37388301d05f50f44273fc40c2f29997
SHA2563de483c37a496f74c36fe8085c722ba37d566e672b3dc8fbb854eed73317abf4
SHA512ee6da9ef88464aa1cafbb05aef5353e6983bde5615cf06b049e4d624f551c7b77610b0f6a8cca95f70c8b5c844e13c31239069251fafb20d7b947cb9cb3c99f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD5c00e79cb5daeb5f09c22ba3c5edfc371
SHA1a549c40ba9ce26b136a8c214bb947942d09b0b7b
SHA2569404ca026efb7c5f6c837c5a6e1f01fb8e05cba6bf53c180d8f9fcd9b1a2f775
SHA5127eb3ed5a018116b8ebacc98f5d4a38ee85b1ab53c3052dd17652366ad2ea1eea35ac85301ea4aa76315e9e0154bbcc0cfa85de055ef9d3fa5f54720b78565bb8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize84B
MD5a290403252dc50a755e420791bd9c2b4
SHA1d777bfaacfe1c7d2b32f1cd9baf69564f66fbb39
SHA256d89554764c53cc21f443832c9442eacc978a3f86cbd0b9046ae19d169e947646
SHA512ba5fd200a7dc984fc78f5cd41458cbf45f9cd1ef70849ee135c91ddc334812be2dfbff15be5ceca63f6ef56d514875f22c6c4871f8ceb28b200cf2819c80aac3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe57cd33.TMP
Filesize89B
MD5dacff472a2fca5f16abeedd54dbd8419
SHA124906ed5404a7e7adfa237393c0cf2103e49b09e
SHA256ca22cdcec38a3ac8870446d555348d28d718588d9f7a6d8ad11eab583d9ae973
SHA51232c0760c9106011687c14ac4b84ff1d14b02d19b2116fec25bdf0d7d04a27b4eb7b197ee647788b4e9788b975675d505f23a9ef53f3d6f620e64754c24563fbb
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5c7b4567cc32cc6ed48c2940b9754ee3a
SHA14f57ac4c8fbcae1a7f4c2f0c98a3a41509a06382
SHA2561c7a5553830ec0be4c6df2d0cbf6c2696f4a0ef9d3204c78743d91f254e5c5c6
SHA51271c0be740a316062a67f6c87be799eda46471c66d577143b6a8afd621a0e6a3de2f4b832ebb68637f4912416aabc307644f5c6d25c00c77112ab3723356eec81
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe581cca.TMP
Filesize48B
MD561c74763697e79090209e3280835c45e
SHA142d0fc3dc0b9e4d9f620e017276f226ddce20669
SHA2568250a97eaa9fc01b958ecf6a7f4cc70902ea7ee96aa7ec55a48af6eea26f03be
SHA512c7c111b685093c43342f262196ce2b56f19bb080d00d1fe663e7ef90fb76e1aa7188016d50eda040e9b0e45533186bdeb135ecf910a12925db08cddf34dd5c7b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5ec8f003aa9762d34642ef6679d3d6aa6
SHA18857753165241d9ce4bea87215b891c9ea38ad36
SHA25626eea5679176a5e1ea4f78304ba4b32bc472674d10751f47e9d4164ae9a02a4f
SHA512ac3615c93cd3b39c7efbce0cd6c1aa7fc0ce7c4b10a48afe666984a4b4e4bab478380e3e7249846eb365de87a846dd67dd58b5d42d510e1318d6adc1bb806f59