Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2024 08:23
Static task
static1
Behavioral task
behavioral1
Sample
69aac52d0d03947f2cf55a59b67fb118_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
69aac52d0d03947f2cf55a59b67fb118_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
69aac52d0d03947f2cf55a59b67fb118_JaffaCakes118.html
-
Size
99KB
-
MD5
69aac52d0d03947f2cf55a59b67fb118
-
SHA1
a086ea35e2cbf908bdf3bcb7d8d12cee2018db46
-
SHA256
8dde9ef7d6a593d7f780b35cad88901f9ca0ca35d7db49bbc64204378c59864a
-
SHA512
9aeb43a7b0168fe327d52bd8e55b63909134db6938e131e1f98059f5589739d4ae626d415f4b692bb696a56901127da9c539ecdadf7a2559d02f6ffe88f216df
-
SSDEEP
1536:Zwgr8VkeO3xOWrWG3jTIy8LIj402JqTa2jaS6cgRrRt5u:FeO3xOWSG3Qy8LIjwJqTa2qnt5u
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid Process 924 msedge.exe 924 msedge.exe 2556 msedge.exe 2556 msedge.exe 536 identity_helper.exe 536 identity_helper.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
Processes:
msedge.exepid Process 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid Process 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid Process 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid Process procid_target PID 2556 wrote to memory of 2268 2556 msedge.exe 84 PID 2556 wrote to memory of 2268 2556 msedge.exe 84 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 1016 2556 msedge.exe 85 PID 2556 wrote to memory of 924 2556 msedge.exe 86 PID 2556 wrote to memory of 924 2556 msedge.exe 86 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87 PID 2556 wrote to memory of 1160 2556 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\69aac52d0d03947f2cf55a59b67fb118_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe56146f8,0x7fffe5614708,0x7fffe56147182⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6320 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:6100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2456 /prefetch:12⤵PID:6116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:6124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3640 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6396 /prefetch:12⤵PID:6056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6340 /prefetch:12⤵PID:5508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15040393645241769136,2525036860392222645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:1660
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
71KB
MD5da52e38c98b0f2047abeb07609608ab5
SHA1da1210caff36df73e49a0c271ff7d573c2d20d02
SHA256726a2ef49785eaecce64e98fcb3490c40db06d6a205455784f3267a5b4b7c34b
SHA51235adf36acd8e1c65f040663d7a064f642a6db5e0b7978241db8a9b4eb52b8ae71cef4e7bb1b4a0d85e4af1f7240d6d52e5a07f512e5e90504e063e51376b5f5b
-
Filesize
61KB
MD5468446a7240461af44b59ebb2047c231
SHA147b7c525dc91bece99df0c414960b9490b986ba8
SHA256ae1a0126552472d1e1347ceb8027ed725db3b93fcbc0b39745a92412cc1641a6
SHA512ac8cdf824112a3d25248e58f05495b458038d9388ba7e46e1ea8f6933cae23f044f4e532b74b13f52812bfaf602ca12ec152e44ce95266abe7cd6bd66b4a70b8
-
Filesize
28KB
MD59f6666de331aadc04c0bf966962c81c8
SHA1166b30b8de66e61bd4c6b412f98fe4ec04e1cefb
SHA256437a22e7b18633a4598142e97747b9ef9ec33d66742254711c28e1e753fed941
SHA51299590153477cfaff358fc242f484ee9dc1f92439a9b45583c8c9ea5c41628c7d022a814a11ac721a74dce225d01217b48f9aac0acb49524e88ffa0e627d4cbac
-
Filesize
43KB
MD59e29e28f7d3174572ccc29c97fd308ff
SHA1999bfe451c8d2195c18a34228aa112cbc1bfac42
SHA2569d1264eb04d23c4b5ebe6f1cb0483f5f7017dbb6b4f47b2eebfc6de34b4dad6e
SHA512f5f9ce39bd8961fac0c2d8942a5855a06631bd00c988c412ecb0a17c10eff589821ae01935f2b716b8b66d8d4a98298de01ad30b2dd2c06d9225c03a89b06e8c
-
Filesize
23KB
MD5beda68c7227c7a5a9f974b1c74d257a0
SHA18a03576d27c23e9612bcbb5b9e758e4535ee4c81
SHA256e9b270df7c8655f05f8336e4897debbf71a38a69c3030f33031376b4257addb2
SHA5124e178897f5ae13f1cbb2b374918e22b5b281a78e3362fd6125701776c8826956c06153147840b52aaf4316bc8078059f83ee4758d84cde70190bde8f1f36e619
-
Filesize
56KB
MD582e6cc227d1c8f7e0c2e99caa111eb3e
SHA1fe87b0941b3d2af255ac9afe6970bfa1606280cf
SHA256db1bc6f8807da8d9209f760538b766e7b0958b9b1a6bfe6be9b309668bf7f51d
SHA512f6a5f726deb44d869296f2f70009a28d72b657bf37934ca7c7e0b584cd233dcea4231e230dfe04454c94cf6f48439c73bbec05dbd74c798b506b1e62cbdb543b
-
Filesize
46KB
MD54db3a30a10fbe0482a8bdfc41b3aedee
SHA1375c291f6b315ddb37e87d945d4620f1c252d258
SHA2566c8b5d65f8fa10c85197b7e9935469a4433cc9964df80a951c44430dbd8a5c78
SHA512188f1ff8e0669082188ac328864f0bc96ebf2baabbdcc8d5f775f153ad5be9bd508b0b69a9a2b295ba3c191e921dc8d6334b49c7ff060037edb00a9b542919b1
-
Filesize
42KB
MD50486b6659eae4a8c15000f81630ac413
SHA1626583187745327d0cfef589e4d57199feebff81
SHA256f54369d8900a11594778ddc49b6f3b5fd948e465a26fa532a76d3618d3432e9b
SHA512d6786308c86e40da7a9746d0b9a155189b3cba9c4dfceb9cc1ae622186c0f51f6d0f656ff5d625fc2312bd571c5fe7dc68d1018e928945a4f4a5c161d3f56ee2
-
Filesize
22KB
MD573a42b77f3863d5f98720ee6c9e01c34
SHA134030ea13aae3ce1f84575a1c41e1ba97f3d4077
SHA256569f3aa05bc27435d27005068efb1c9279afcad03bc1f5a7cec5d70e654ff668
SHA512af1c31f006b7a09c35973994b7acfb9b0920c60e1149f6e8eb45e41acbec5428899b02efa0233cedb9abf35195af095ba9a88a27da788a52dbc83fb79e4af522
-
Filesize
33KB
MD5d37777717c7d1df5db3dd0c15811666b
SHA17f975c65e6ad79c425ed6518f09ae87d45480c62
SHA256ee55e3621562447e937ea2f351b96a0eecade19fdc0724b121c6179924d6b2d8
SHA512aaa02d1ec66c394528ab25241b07b04a6f99e9cb5780b0a7c87d6d0170a05b6e1723d97e1c2e43a8f6b9b27332533ddc0f955c2ad270602e793512e9ce3d447c
-
Filesize
41KB
MD598662a7cbdfb3b850a3bd57ad6966a8b
SHA11fe182ab317407ab3ac935dd2b71047fa904a951
SHA2565e0e9b79447318f010f19bbd37ea838a03763b384285aaa112b3a26bfb14fa54
SHA51292885f220a821017058bdace16e8e6f0f84132e821bd490a575bea4779ac99dde2c9e0e2ce9e6e5ffb64f0b2c2645c0ce24721197ba48883e8c8f004002695ab
-
Filesize
32KB
MD5d5e7010be08a3b3b32d0f2e15f0db678
SHA107e63904af69c941eca8ad9c56a84bb372700f80
SHA2567be914ad6e16c431f6b03f85e51d9ebd599b4c1ec101076e31dc112a0bfe0b3e
SHA5123d7d5d0337c615abc00f027223f3ce077badb608eff665e417134631c62828bbabe931498f52f77d6d3efbfe66d1d342f4a7eefb4fcbbeb3030e671f349700d2
-
Filesize
42KB
MD5101f2295c59a6c129b95bb68093aed06
SHA112f5843daaf99bdb874dfebaf10660c54ede2120
SHA2569b59525954d9da17ff56cac0c0cda55bb6c4df6b7550fe68565fe0d24a963ac7
SHA512f5e54b7609a1884253f1d05d9245def95b3721e1163ddabb6d32f5b31f824a218c60533eef25a6f91d8ae6fa314128ae258fdc341cf9a4f36bf378e874b5277f
-
Filesize
20KB
MD557e3e0f8029ac4d82e5c9ac127418abc
SHA1bc9828d0a593450b445f98ba52377096174c821e
SHA2566ea006a2bc9e5c905ed167cbeb2b186e49593e4ac81458f5535ae512f14f9ac5
SHA51239141e02f4b55e90a25f2c84e7111e9c9065602a67153d8a94ac1d2424493391d25fe50bd5013e99d46fc7344cea1f7e6c29219131e77932aee30253923bf562
-
Filesize
75KB
MD5d8f203b2035552bc109ca18129d0e91a
SHA10e05b046dc9ed4d7a7e50e28ede6a47093caec16
SHA25617e9c7676d07cecdc4e7392fe1ba34f4271c576c0defae26e7476b51302a545f
SHA512ca0d546fae68c1f58a4d3556f8fc114ba59642d8f9c6bf2a2ba2a6ea446ab01cc6944ee27f75e096d7d57ee14eaf4d13e5a5e355f23091c9f857c33ffd5c3ad7
-
Filesize
115KB
MD533c3faeacddf59e976122c44f9d16871
SHA1421459761e4818a2d12877aeb3b507b8d1bfe3be
SHA2563faabaaf9835ab20677fcbef1e7fcfc93e2b5ae3d3265d04bcc1bcd1e95d4abf
SHA512d62c775dd4b51a929c0b54ef5b9086dc52c5178a6b6d0c4a4fb35f290e4794323a12af40e67cdd61aca81cbd0340deaba4c75474ed1326c21def2cae3ecdc8fd
-
Filesize
19KB
MD5504c509e7ccec111dcb2a0736c9a5ba8
SHA16af2353a0d05f0c7ba50f0f93d90c241cf89c146
SHA25627129ac0d6cfe983d48b122664cc88738ca59225d8d352486d680d926e92614a
SHA5123ee36476c101cc14f23089435038575fd2a86100d2b88afb061728e84d9faa428eef8a81a71c86992096f4b7bd3c0aabf5d0867766351eb1466306459d1d0eb2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5c1ff1b0d94b99907c8b14c837ddd9604
SHA1022fdd3ec9266c883196d438d1976c9395eac645
SHA2563cb56b752f6abbb75b8eac66af684fe4a0c87dda92efb80c381283c82502f8cc
SHA512284fbf0bea2136888c29f530eddb76e15b2172d360cfc14408565a88001598f37e59a254f60d1ca0f6414f862d18742ce284250273b5ebedce4723ca37c525ee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD5ed83658a7c1046dd5ba878f74f899314
SHA1cf27ea6144dc4c5342fb57db4d582f263c561f08
SHA25654dc29ea62e887f76ecc014b238f5a9a02274feba4b98762967c812f6b6465d0
SHA5121bb4e316c60051e74539beb5a180b329156e5a100fac6c960d62953c4da24551414c7779899125b660a301a616a5a4351d53a9a5dcf5c1e19d6917b90cc09ce9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD54de2143b121653fa060bcb9ea5bbd4b0
SHA17c04d75a88f75c920dbe3273c7ecf2fa0f6a990a
SHA256b36010fbf28877bfef70916e2846276032c8de3de0c8c393f839cea795bd6944
SHA512039b46262f24e207200614ba8cce23fc22e02954c93345307eb08948737e811644a1cc4d35015c054344368b04ddb47f1cd6bc7b5216f1d68c0fdbbcbcfbd51f
-
Filesize
2KB
MD5f2bb5f6e242bee5195f566f5dfe82fb5
SHA17885e4fd1062fd096bd7241c7f96ff6d6e4ef756
SHA2560dc2b7e65c05d480072e1b2f5b01afc886ee485356437b021e8bf67cf8a0f6b2
SHA512a30de484c16190fa3fa1cc5d98810ff654b6cc1ecd5b6ac636ec9525fedd904962210836a73072d1f3b209d2a8ee47a574ae4192231c263c668185b0de89eaac
-
Filesize
7KB
MD52873032e0d40553241e81f168eb1cdb3
SHA1ff640692e6c4028aae8e53ccf2aa21940aaeb603
SHA256207d65bb79dd8a78777041f76e02036d2c2073ccb595d7286b67faf968a36338
SHA512d85a6caf82e4d37016dcaf302203321563bf3da48e72c96e07e2ece369f7f78b7fed81abb21bbb53d140ffeea5f41ea5b6307bf800be7f4394430ebca143f45f
-
Filesize
5KB
MD5312c5def570cb15f113a727680cdbd1c
SHA177b5d3052c247f8377ca4b213748a44f1ac95ec8
SHA2560e5db24dca88a7dfec263c04a35ebc0c53476b05ba4d3b6a09a758b7b87223f1
SHA51263cc6c75922d7f5fca55439a7503bf87c207fe5ccbfd8e94ff01f442611d30206940bd86dd4cd9cc10d890393e825c209a7b3aa1da19c30f4fc0be9f3669a5c3
-
Filesize
7KB
MD57cb1c1eea877d5b293b00440b9b1a84a
SHA1fc94492536b8950a957de0a93fae58b1cbe1e680
SHA2561e6eae346662b48fd11f91f70691dc01b1d439dff436d06c0d91fc043154d65a
SHA512b36610c83ff432f3c26035d5a06972ce32f86cfff1aa0f2fcb39c7b38deb884bfd198cccbf17c0595374f1e910080899c3b4fcd52dfb737a6058f6c328cca24c
-
Filesize
7KB
MD5642aaf2ccef2f1d82e623367c79fbfb5
SHA1cef73b76c829a90b2be0c5bba94848af8c26e883
SHA256234895a0920a41a1e9e7cf6535ff6addae221b89c901b79b86d4fc02a0be9d2a
SHA51251a8238246ee14f72c6466389800067946ad70f6f014fe53237b638ded491da8503d22f00aa172c990aca4ea24b990363ec38b90e009c93ce0d4d4bcbbb63149
-
Filesize
7KB
MD5f9db64a0f756e92dfae5d78c9e9319f7
SHA1ecb0a4259313dd17e2e398f9867f8009fedda8f3
SHA256ce8447d2ddac4d6fca1669e29afd2613c5eddba98c96d158deacca66fa306c91
SHA512a991f1dffafa79b057f20f2b9af1ee53e7eee7974a2a0b08b93a4429f8efea13478bebdb72e97bd0c171af276db5eeee6c2990a516d87a454136d007ddaf2e84
-
Filesize
7KB
MD55b10bf39ac40066ddbd856a511b80241
SHA1808a1d838b5292b9b07607cf3cd243f53cba3b35
SHA2566cb58daf774b8d44027d5ac232278905a5bd4483794f729fc545d8bf2b6c1668
SHA51225c1a2a4f98d17618195eedf44b702ef135ac53b63f806f08247743a79fde5d300e8daae01089e7a2dfa4d15664e57857180d5adc99f7acdf83d5fefe4adfda5
-
Filesize
7KB
MD5074dcb0b2293b7aadc1cbf669c75b980
SHA1be23333441450f2233e18189ce988a4387fc5c35
SHA2569805286197eedf8e37744300123aafa6b9fe27be3a0ce2a5ba920dd440e40997
SHA5127674a378244df6c09eb6463fd5eafc8050a829c232d96f24417e50fc6c9572459442d2064dc1aabfa2d4409c38793afc11afbd87c8629d0b1d7765b563967931
-
Filesize
538B
MD5d321220a73b5f4e27d929ef595a61ef9
SHA101afb71bbe67206742885bc212af832c7da48220
SHA256b9143bd0f95542d9cd5cc9e803c2e7b9f02e3ac429012b6ad4d5704affe4f04b
SHA512a522899d9cc329f64d5d5bb787739b67d85f44a8dd05dc1e5e88c7b5c6229ac5979c8cc216f97195cf035ac794f2bb32d2bda98a8efdd1fbdbd1444b4208b379
-
Filesize
538B
MD58d5fd1981b2e0f24774355722ee9ffca
SHA1bd0abac06bb05c505c44ddc542dbfdcbf6051f10
SHA2563164591bb5e35b328cae0613e24d7523bb231638ba5d26653241f86a24bfffc5
SHA51252ec39031cb43581cdfbab5d07178cadaf69439d3f8eed582c434284a763db10ddd3a604306c435191b33ec37b552fa85c75a7560d36b6cda16f4184107fa328
-
Filesize
538B
MD5c79797cd39dc8620e92ddb5740beb7dc
SHA17dc1a1c29d68d825f6d047fc9dcf8b92d12c225f
SHA256c3460b435808ffeed75aca54d8c5e386627d98d651d3b9daea224db2b73e5b32
SHA51224d58cd2f6f4d480f0535addaf00f278c3d8705d3ebdbe563cd64803311cf147be894492952df347748e2455bb3335606927cb18af733dea4abfc453ce0d267e
-
Filesize
538B
MD58c6a73d9d81e74a24245be201ecffcaf
SHA1a49e5703da2655a4e3ec77030ee135a366fe4e0e
SHA2568427762ff3505c6239994e6bf6c66278f449fefa6c0ae4c2111fc52e477ca5d5
SHA512df30f1bc70699ef894ca3123402e1780f650c90234af4f195fdbd98ebc3289ced2807d23875c3dc17da83039352938372044f2e22d197293849cde50d17ac7ed
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d5f29adb0be770ed6007fd9c841e0868
SHA137490052f6975a26b4b3c7520ea11b0d52bbe7f4
SHA256dacb1f6d73fada47eb6d03ceee6624da15d3ee50c8409ed1ceb15a4560ab2d56
SHA512f168eadb0545adf485cd81bf8c3bdd65ae921b90184a0366890c0e1d78a27158c65a8b6b0a9997c7ea29f27a9ae299cc2c70c1a9fe6c4475849b2a3b0752132e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e