Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 18:36
Static task
static1
Behavioral task
behavioral1
Sample
3b7f7e5fc93a8ca93449f4221df51c2e_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3b7f7e5fc93a8ca93449f4221df51c2e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3b7f7e5fc93a8ca93449f4221df51c2e_JaffaCakes118.html
-
Size
34KB
-
MD5
3b7f7e5fc93a8ca93449f4221df51c2e
-
SHA1
e814b9902403f2ded26b136d73ca339ed82e457f
-
SHA256
cfb4f296e8d4905abdbf7ed3737c3bce5028a7d3a07ce542edac344a62e1e735
-
SHA512
23d5f51a6d14d0f4b92dd3b943324a7bef812b021ee546b6638a3af719a3a863fd87e703f5e2651ec787272f406f218da87736c9b68fd016c843791e07d66264
-
SSDEEP
384:q+jepUswuC5x7YcYwfqhUoFtAnbw0fML7RKDOr9e3t1rzI9yXZE:q7UswuC5JBNQUoFic0fG8DG9er3lXK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4248 msedge.exe 4248 msedge.exe 5000 msedge.exe 5000 msedge.exe 1696 identity_helper.exe 1696 identity_helper.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5000 wrote to memory of 3836 5000 msedge.exe 83 PID 5000 wrote to memory of 3836 5000 msedge.exe 83 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 1920 5000 msedge.exe 84 PID 5000 wrote to memory of 4248 5000 msedge.exe 85 PID 5000 wrote to memory of 4248 5000 msedge.exe 85 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86 PID 5000 wrote to memory of 3652 5000 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3b7f7e5fc93a8ca93449f4221df51c2e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9ef4b46f8,0x7ff9ef4b4708,0x7ff9ef4b47182⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,380532667799888221,2884357727033173259,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,380532667799888221,2884357727033173259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,380532667799888221,2884357727033173259,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,380532667799888221,2884357727033173259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,380532667799888221,2884357727033173259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,380532667799888221,2884357727033173259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,380532667799888221,2884357727033173259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5604 /prefetch:82⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,380532667799888221,2884357727033173259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5604 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,380532667799888221,2884357727033173259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,380532667799888221,2884357727033173259,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,380532667799888221,2884357727033173259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,380532667799888221,2884357727033173259,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,380532667799888221,2884357727033173259,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD58277dc5d05149a14d9bce617921644de
SHA1a2a7b39a475e50acff95b4eef1103d2c75fb1279
SHA25684695210cfa4d5dda9791bbe1caac6823970d3b3aec370216c5268837a5b243e
SHA512e9dbc86e4b7ed595d044ffade9df461b854fb82bec67e31f5ccc98ef162b059f8a75ff83778036351de33ca98e566fb98d7cbe06a24239ff079f4636cc569f67
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1018B
MD5a600ba36dfb151be41cec12fcedbcfe8
SHA1ee8c5dd22ff5a35e465aecd5c4976f30f4548c43
SHA256771d45ce817292db4665fda4a0dfe5a3834dc6cf3f8177238b1d98ac3d256f52
SHA512648c8e65accc029a563ceda475e2cea9671e6c5589df3f8995f41a78c668c467764fbbec07971120503f2fafb6c1fba97315ede75e0d5033308d265e79b4130b
-
Filesize
987B
MD5e9fcdd1c7228185d8e16e674f19d2b91
SHA1d3208209233305c993cb1322a1b86c4c7c829005
SHA25600e6635106f294e1cc33bb39e5c4c3a5116007e9c01a8a17e5dc79602dbf160c
SHA512cb537480166857b6c657b5b8d2f61f83af902821af252037e799f6eb1f2ebc613336da60f90b5ad75900a92f2dc34d5179c830305184dcee620143f357afdd7d
-
Filesize
6KB
MD59211285555f9f0439543c2c8daa26fd2
SHA187e29488daf519758c2f64b9531ddc6b17f84932
SHA256a0e98b4ccabb69410ae906ed6ee01eaa271a76a90e5ff41c70b82d08c8c6fa24
SHA51213e5ee7d0a111b320b1533543b072d9f4ac23085d3fddd81f6e2f23f809f14a0146c3a4271dd70da1d55d74cd3d9922aa3523513dcd6618c67e34b9584ffca3b
-
Filesize
6KB
MD5100ab49e47daf944b092046ac8fb1c14
SHA1b8dcbf662334aa7f7b3d9b9bbb5873d50f32462d
SHA256df0c305be514f25fb27c3e8473e8a01fb2c59efe495355664faea7c2b835d02c
SHA51241d3ee9e36bf76bec9fca8c38dc659062c0a9c89b56a3f772a35e9690950245efb56543f8235f5685c79015529c23e5f6f51260d4012ed3ba8d493a19bc41560
-
Filesize
7KB
MD588d4a393dc8154f411d1516d3dfa8e39
SHA14e1c8e566c5e3db77fdeecee508b8469da0469da
SHA256300d5ea99ad1eab8495010192185fb362e70ddbe519dd531f18b4e4ec759006d
SHA5128aed5596c9a457047746c8f2e01771aa06381e2ade7102e88ba9405e43b4b457fdcc1f0ea6d2972106747e776e7a534dcca28f570a419affc9df16977bad279f
-
Filesize
1KB
MD5050885e89d8eb0c5c34dfcc43f9ff90f
SHA1c9411dc4fefc1c4bac54059fe0340ca352058137
SHA256d136e5ec4ef5d7ad45d7bf3fc2acfde32cf50f8cb485d0acd7f165a1d518f268
SHA512ab8700ab6c10bc54b4ae51063b81d0714eea4c8fc924ca144af3de0ecbdcd65cc280a01e6e15f4ac46678b27d6cd3e79fb662fb9b3bee45f1532507e62679fc5
-
Filesize
1KB
MD54a2a80961e301ca2abd1e5c1094cdce2
SHA13d176537489b370b5dd71b073ea8130e724b7b95
SHA25602a8f7dfd0b9ac6d5334ffc0c5b3cfffce35302dbac380759afe7fbb76f36e41
SHA5129c47ce648812d45f371a3c4fc8379f75a0eb53be07c9efc2be2e37649c838ca51d771d35db9041a6c668350394f14884b7f3b8ad9d54f9984c9ad6e3656388ae
-
Filesize
204B
MD5ad9e1865939d612dc42c55e539ca22f0
SHA18008b05c62242351f3a047f2abbc95c625c3118b
SHA2562e476d4d585d6505d359e32cd320130ed1f86edb035b6573d4f837b777a4f5c8
SHA512765335b272c2f7ac1c7c03cb858614d21c237d7a266b270daf95f95ee89901f8b7ba0962a3cc3d439092b827d6ba68ccc5ed32237f9047c66387ef5f1e8c48b6
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
10KB
MD5a528004866216646c5e8367b3b0fd68d
SHA1ab62336f67273245577ef7013eae242197abd05d
SHA256c00a3e22fb5eadcbdd3a169c207cc9c768c7aa10fd5875dc4714e94315971f7a
SHA5127ecd76a56e8d0ea3d140d12309a5b5c7ce428c47b9347c931ed80d73c0780c0c69f99ed779bc3aed6e814214c68e9e46f6c3d2a424675f9a2c8f1f74d3709cf6