Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
18/03/2025, 19:38
250318-ycrjca1kz6 618/03/2025, 19:35
250318-ya273a1kx9 918/03/2025, 19:32
250318-x86gpsw1hs 618/03/2025, 19:31
250318-x8flaaw1gs 318/03/2025, 19:29
250318-x7f6es1kt5 1018/03/2025, 19:25
250318-x5evks1j19 1018/03/2025, 19:16
250318-xyyn4swzdx 818/03/2025, 19:13
250318-xw6a6swzb1 1018/03/2025, 19:04
250318-xreyeswyfv 818/03/2025, 19:00
250318-xntmeawycw 10Analysis
-
max time kernel
55s -
max time network
58s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2025, 19:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Trojan/MrsMajors/MrsMajor3.0.exe
Resource
win10v2004-20250314-en
Errors
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Trojan/MrsMajors/MrsMajor3.0.exe
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, wscript.exe \"C:\\Program Files\\mrsmajor\\Launcher.vbs\"" wscript.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" wscript.exe -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wscript.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\disableregistrytools = "1" wscript.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file 1 IoCs
flow pid Process 94 5296 msedge.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation BossDaMajor.exe -
Executes dropped EXE 1 IoCs
pid Process 5732 BossDaMajor.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\ = "C:\\Program Files\\mrsmajor\\Icon_resource\\SkullIco.ico" wscript.exe -
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 89 raw.githubusercontent.com 90 raw.githubusercontent.com 91 raw.githubusercontent.com 92 raw.githubusercontent.com 93 raw.githubusercontent.com 94 raw.githubusercontent.com -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files\mrsmajor\CPUUsage.vbs wscript.exe File created C:\Program Files\mrsmajor\def_resource\f11.mp4 wscript.exe File created C:\Program Files\mrsmajor\MrsMjrGui.exe wscript.exe File created C:\Program Files\mrsmajor\reStart.vbs wscript.exe File created C:\Program Files\mrsmajor\def_resource\@Tile@@.jpg wscript.exe File created C:\Program Files\mrsmajor\Launcher.vbs wscript.exe File created C:\Program Files\mrsmajor\MrsMjrGuiLauncher.bat wscript.exe File opened for modification C:\Program Files\mrsmajor\CPUUsage.vbs wscript.exe File created C:\Program Files\mrsmajor\default.txt wscript.exe File created C:\Program Files\mrsmajor\Icon_resource\SkullIco.ico wscript.exe File created C:\Program Files\mrsmajor\def_resource\creepysound.mp3 wscript.exe File created C:\Program Files\mrsmajor\def_resource\Skullcur.cur wscript.exe File created C:\Program Files\mrsmajor\DreS_X.bat wscript.exe File created C:\Program Files\mrsmajor\mrsmajorlauncher.vbs wscript.exe File created C:\Program Files\mrsmajor\WinLogon.bat wscript.exe File created C:\Program Files\mrsmajor\Doll_patch.xml wscript.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 464 wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BossDaMajor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\Cursors wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\Cursors\Arrow = "C:\\Program Files\\mrsmajor\\def_resource\\skullcur.cur" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\Cursors\AppStarting = "C:\\Program Files\\mrsmajor\\def_resource\\skullcur.cur" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\Cursors\Hand = "C:\\Program Files\\mrsmajor\\def_resource\\skullcur.cur" wscript.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133867997868406383" msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "179" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mp3file\DefaultIcon wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mp4file\DefaultIcon wscript.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3975168204-1612096350-4002976354-1000\{DB7DB407-3BD8-440E-A003-C03DB0BC97E1} msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3975168204-1612096350-4002976354-1000\{2F168F6A-97D5-4A41-B78B-89AA6715F1AC} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\DefaultIcon wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\DefaultIcon\ = "C:\\Program Files\\mrsmajor\\Icon_resource\\SkullIco.ico" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mp3file\DefaultIcon\ = "C:\\Program Files\\mrsmajor\\Icon_resource\\SkullIco.ico" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mp4file\DefaultIcon\ = "C:\\Program Files\\mrsmajor\\Icon_resource\\SkullIco.ico" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\DefaultIcon\ = "C:\\Program Files\\mrsmajor\\Icon_resource\\SkullIco.ico" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\ = "C:\\Program Files\\mrsmajor\\Icon_resource\\SkullIco.ico" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mp4file wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\DefaultIcon wscript.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3975168204-1612096350-4002976354-1000\{1C00259C-9735-4849-82C5-B1A513B604CE} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 3472 wmplayer.exe Token: SeCreatePagefilePrivilege 3472 wmplayer.exe Token: SeShutdownPrivilege 1560 unregmp2.exe Token: SeCreatePagefilePrivilege 1560 unregmp2.exe Token: 33 4444 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4444 AUDIODG.EXE Token: SeShutdownPrivilege 3472 wmplayer.exe Token: SeCreatePagefilePrivilege 3472 wmplayer.exe Token: SeShutdownPrivilege 4936 shutdown.exe Token: SeRemoteShutdownPrivilege 4936 shutdown.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 3472 wmplayer.exe 5076 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5036 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5076 wrote to memory of 876 5076 msedge.exe 85 PID 5076 wrote to memory of 876 5076 msedge.exe 85 PID 5076 wrote to memory of 5296 5076 msedge.exe 87 PID 5076 wrote to memory of 5296 5076 msedge.exe 87 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 664 5076 msedge.exe 89 PID 5076 wrote to memory of 3436 5076 msedge.exe 88 PID 5076 wrote to memory of 3436 5076 msedge.exe 88 PID 5076 wrote to memory of 3436 5076 msedge.exe 88 PID 5076 wrote to memory of 3436 5076 msedge.exe 88 PID 5076 wrote to memory of 3436 5076 msedge.exe 88 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wscript.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Trojan/MrsMajors/MrsMajor3.0.exe1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2e4,0x7ff8d7eaf208,0x7ff8d7eaf214,0x7ff8d7eaf2202⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1984,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Downloads MZ/PE file
PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2316,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=2312 /prefetch:22⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2412,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3528,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3556,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4852,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=4992 /prefetch:82⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4832,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=5084 /prefetch:82⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5572,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5652,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5652,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6080,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=6084 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --always-read-main-dll --field-trial-handle=6272,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=6284 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6092,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=6484 /prefetch:82⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6652,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=6680 /prefetch:82⤵PID:5708
-
-
C:\Users\Admin\Downloads\BossDaMajor.exe"C:\Users\Admin\Downloads\BossDaMajor.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5732 -
C:\Windows\system32\wscript.exe"C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\FDA9.tmp\FDAA.vbs3⤵
- Checks computer location settings
- Drops file in Program Files directory
PID:3268 -
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe"4⤵PID:2128
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Program files\mrsmajor\mrsmajorlauncher.vbs" RunAsAdministrator4⤵
- Modifies WinLogon for persistence
- Modifies Windows Defender DisableAntiSpyware settings
- UAC bypass
- Disables RegEdit via registry modification
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Access Token Manipulation: Create Process with Token
- Modifies Control Panel
- Modifies registry class
- System policy modification
PID:464 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" "C:\Program Files\mrsmajor\def_resource\f11.mp4"5⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3472 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon6⤵
- System Location Discovery: System Language Discovery
PID:4908 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT7⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
-
-
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" -r -t 035⤵
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6536,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6400,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=6808 /prefetch:82⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6508,i,14598460036914008737,18424566647529535104,262144 --variations-seed-version --mojo-platform-channel-handle=6852 /prefetch:82⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
PID:2488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x18c,0x7ff8d7eaf208,0x7ff8d7eaf214,0x7ff8d7eaf2203⤵PID:6072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1768,i,8288020022361724181,1519368848995327196,262144 --variations-seed-version --mojo-platform-channel-handle=2260 /prefetch:33⤵PID:5960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2232,i,8288020022361724181,1519368848995327196,262144 --variations-seed-version --mojo-platform-channel-handle=2228 /prefetch:23⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2520,i,8288020022361724181,1519368848995327196,262144 --variations-seed-version --mojo-platform-channel-handle=2500 /prefetch:83⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4128,i,8288020022361724181,1519368848995327196,262144 --variations-seed-version --mojo-platform-channel-handle=3772 /prefetch:83⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4412,i,8288020022361724181,1519368848995327196,262144 --variations-seed-version --mojo-platform-channel-handle=4496 /prefetch:83⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4412,i,8288020022361724181,1519368848995327196,262144 --variations-seed-version --mojo-platform-channel-handle=4496 /prefetch:83⤵PID:5548
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:1652
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x508 0x51c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5908
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa392b055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5036
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD565044109d1beb8ed8d59560642cbc519
SHA10084485b0aa26069232fab51ee603682e8edfd17
SHA256a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d
SHA51296dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6
-
Filesize
280B
MD521c371a45eb5c9fdfeb476d2810d66f7
SHA111fddfe146f642082e28b44c5612c597d4649440
SHA25611cd0ab5ffaedd42ebcce9ec9a2d9cc2fb6ee6821ad002cec3a8a9becd3e5bcc
SHA5122a0faa2815787a537064537eae4fb35275631d3fbbe44e151200bb18957238373341c8e839134f286a14af087feff9019fd1e7581d0fc7403ed3ed7ed1739a82
-
Filesize
280B
MD59d8032889fb2303d83e589302a437083
SHA1a2fd544a1c266758946ca3864fd635a453599acb
SHA25600bd0382c3f93152aaef7398c18c8311d820d3605f4ec0e1ae5763c6ed6f0330
SHA5129bfc843b4f9f1c605d3d3ae859f11f76eec7ec2708a4c9af00b937c68fb4e39d196fffa3b0b88a79af3ada76f24dd757b449ebc1cc8090e584160085e2be2932
-
Filesize
44KB
MD5e1d4a5fb5661d503fa1164275b7d18c4
SHA1b62a82e5151b810060f2b6e8ff32074e4add0d14
SHA256b17e52f7baa8ee1d40eea04b99e4708130b1abe954c024b5561ca2d96e11e408
SHA51231f9575da774dbc3db6982e83399235c67ac8d1b682fefe8d7d361f2557462d265d65ebbdec6729961a3465b1dbb087e1ad13d9d906b65c691856811f1b802e1
-
Filesize
520KB
MD5264f423e9da33083707ed8aaa394fa32
SHA15d27a639f3f00997818f9b3bbadaaa919f58e0bd
SHA256830e6c6e08930f36dab726e074fabde16719ebd156390d00330661fd2abd6d81
SHA5125de66e4d4df5696c56e37874e7ff47c94077d417612a4509e6bae36d2ed5ecf3a9f31ce9d650504cf9f8c9cb1ea31b6465e9633ee2e0e6405b41a683d5760a5c
-
Filesize
1.0MB
MD5f5fff93a2043f631ec1a74bdc2e9942a
SHA177b0f2af730d431752c30dbded106f9d66608538
SHA256927b8e4f6ed2c6307a5ab4e0af3c3e357d83acd9cfe87c919cb22db5f5a834c8
SHA51229820717f60f450a77139e898b94c6f56fb7a357c08d8a077728ff2aedb637a40f9ac9a8d38b0860dd4bea6d8a80d876adc4ec8f4b39022267d3bebd703418e8
-
Filesize
8.0MB
MD5f6baffa8a181f538b4bc2042a77ee323
SHA1e757b0edb9262628056d57e804e01635bf04974c
SHA2564504bcdb0976cfa562e6da9ca234fd61d510fc860fbad7a10721f57ae6449dba
SHA5126101b02351920839a1a42c7c30eb8546550c0888594305af7145cbc4e070ab24e3434b5e81302cc36bd2cab6b18208e10dbfe01fb184170511f7a1454bfa277f
-
Filesize
1.9MB
MD538ff71c1dee2a9add67f1edb1a30ff8c
SHA110f0defd98d4e5096fbeb321b28d6559e44d66db
SHA256730a41a7656f606a22e9f0d68782612d6e00ab8cfe1260160b9e0b00bc2e442a
SHA5128347782951f2647fe433482cb13186653afa32ee9f5be83a138c4ed47ff34d8de66a26e74b5a28ea21c1529b2078401922a9a26803772677b70489967c10f3e9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD57d4424d4a09d2fe95c3786bd81bfab08
SHA198df8886e79eb12d3d6fb7acb816517d0f43a726
SHA25633e2fdc1fb73ff27414f7b7f312e1d573e76f41b932e5d1652fd28b2ea14ea40
SHA51295a1203d9577deecb75e4ef243eae755d9df23e5244174ee820a02136744b83ee10d70cffe124a3a0d898fce52ca8b64fb4b6bb06892c29a76939c285c316d7e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57e213.TMP
Filesize3KB
MD5da4652d9f42d0f5d2a69b0393e8e0e5e
SHA1fa88484991f8f5c72764ebe4588454e896b806a7
SHA25602b744141f9eb764547d0b1f5a7e0e7ee1fbc9fb5e1ab717004c06db22bbfaa5
SHA51243a7e3f6b5b448a5f7390f2110a8750d66bc756c603f3531709a2e1b0671c94c1e650e9edb4a850dd0c88a2507b43d61e7b1d470ae64d060be13a5cd3e33b675
-
Filesize
264KB
MD552cb1d026be408aa96f348602157cdb4
SHA1aaab2dc6ef93ef05221c60c9bd040143cae76248
SHA2569899e58f0dc6f7eff9905941c982d4789edd66b206c9718cde4cc07ebd63d054
SHA51260690c0ad609621ff920dd336141822d6858c844d694fde5f957240208e6ce408287c855547e5325f61245fcd2a7e6fea95d7d818ccd8a6a732bdccfe4817e1c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
20KB
MD516d66d1e3654a2231754a0b17360b640
SHA15bc900e9b9b75481542d67be6ea843124e212a61
SHA25698bafdb3ad692662a12a717dbc712239d56b992797cb5f83a4b5f1a99c038f81
SHA5127d5870cf4192289d52b7b4d6f48555d9d871f2d94bf0d584226d6affa6bbe6c6b273165ba367ba093f0da4c41b35b0fa6ad30cb8338b68974da192f388052f40
-
Filesize
192KB
MD53e0b3dd1f1a54945d37011d63376e92b
SHA1900303252a7f8d778610c0c530c592597df24e69
SHA256b99389294c269ac6de9e14d9afccd4ebcb2bb3e7b0f9ef1ef254a611e252ba16
SHA512db4e66e93680d608d7cae88f321aaaa730aa6020c95b58dc585a932acc156cc907487e1f49a07283146dc7fb5381dd7dfb45beaad9f2b186adc7f3cdc29dcce8
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD57196eaf189729fc043466b92cdf2f94d
SHA1826e5192fbf2e474fcbfc77e93e6447a7996a60e
SHA256827f2e75a320f2a693975329c9932df26a3fd575864583f4dcf53f47e7157401
SHA51201a1eb9ca81b34a0f82946260b4ca212b5240797bee14454004ee12e31c5cf8b018eafc3f0882185ed80f71601b0b19f8a6668bc1dd3075efb16e14b42c919ca
-
Filesize
2KB
MD5442d284deed0499b6fff55e6d8283fd3
SHA111419c16932189bec9fee55c034806208b626d06
SHA25695eb98d30724c6628df6090d41f0bbe955c831372dbd85819d4867a1516174af
SHA5127ca1eb2a00be43bb4170e064af8c25ce26b42666217b03ec4173337284d1436181897710eb822a95485eecbe10e1945d122260b996d9cbe703e234d08020a0eb
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5b63eb3ba74be622b31a19e60ef171182
SHA11b6f0264343efcf99b913dec7341bf5745dcdcdc
SHA256a047ddec243774eba472a54c7666dd79a78bd9fab24f5df5f43a4420fdd7fdfa
SHA5121b4ff5bf3091ceb2ad7f8eb49ab54a7abe07cc46f16f5d11728b720ef723b53d7026ee8488862eff4da7f16e4a615498ea65c02b90caa832c437a08bb7879ea6
-
Filesize
17KB
MD5425fa5bfbe2eca9e072b93890020ec95
SHA14f537432bf24ab30328299a7beec6b34bbb3ba41
SHA256155a2d62595bfa6ca5a9297a2a44c371d10f7e4d3137b023dbe4f73f69d81d0e
SHA512cb21ceca4a3aa723f8b878f5a21743e1d014c1d7490c69af6955272664d56e9b9ee5955a73aaeca4610d7eb2fa38a0ae0201dd5dafb17da5aebf3b009113090b
-
Filesize
36KB
MD5dc4a0d802c9c9b95bf0b860aff659510
SHA1cda7a67ddc8f176e24ab4d78efa8efa67fc73cf5
SHA2564fe2af715c7e9a18f0a12be6baf0777779333250c2a43626eba92b610f91e6e5
SHA5125a63620097947dc2fc9354c23dfed68b3be6da7b69471b6fb6576fdda7460e7ec97795fca60068105341c71fd1fd22006e86b526a820111b42b18f854aab0012
-
Filesize
335B
MD5c50f646a198c4e1517011fc20511e8d9
SHA138059e82481ec3ebaddc80556cb20a338877c1ed
SHA2565968a14847cd9e7d7ca93c3970f1261563b5ddde40733c267d83a972ce16e40d
SHA512f5cb32be7643f3bb61c21779c56827657d073753b707696b817b78f4cbf71df314cb7eb91d8371b5bb9bfacfd630d266240010ea86ae3c2c54812c6d7098ec0a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\000003.log
Filesize112B
MD5918b04899fcdb66d8af39c83c148751f
SHA18426c5899b9744bd9efd05cb736e36fa55e3cbf7
SHA256cfc7d6ea8c9beb764a3a5775a6158e2bda4efdce9ce8f7d52fea13a8af9b7e15
SHA512507de603838b9493f89dd6ed6b3b63c875d2409cb9778940e02177f031e83efd44efeb7d40a2c7427320121459ddc4295ea64d091f44557011d05b6b30fe63e7
-
Filesize
347B
MD53455d4e34db936332e09ca7a9a87a93a
SHA16a4cf472ba6d2c802d8afdb5f596b07219629093
SHA256dc2fcbcf6ca1e4d2533b4be0c58d0ba2cff69d08fbab4f00c21d024a66b79805
SHA51278058fd4bf068945dd775490f474a73ffbb9231c51bf7de91da1613b35a96ef4eb13e0238b22171153c506ae582545e652dcc11cd120e599f53e03362d1813de
-
Filesize
323B
MD5b068d5291902f7db333ca241d789a0ae
SHA10090db01a9deca8d2a9d0a0f6eb862f2db7487ab
SHA25606ebce3ebdecfaa99e84f30b4e5f8f8f02650c98e80962ac200b4eef80df93cf
SHA512f5d5402287127bb767318883467fc9b5d157916e1d065428e962c770461b364ea4cede6e5bb7f7a9e8238726023ed47d95c192f571fd8db01ed36fff10af762d
-
Filesize
22KB
MD588a6c8a18683c398c52a74bf2c834ef0
SHA18de5c0d8741e0e623f0a7587d6b5e2e3237b1162
SHA2569ac202101363e7e0c55fca062a7e42602b218bd7d230114da9e08500e4837834
SHA512aca034cb631dccbee1c2c362ec65119c4975f17856b1670dd41d4273ac977901fab542d484070f8a77f8031cac22c27778be248914664d8533c3f136a57861af
-
Filesize
128KB
MD5b225cdfef55dbc5a162a5b3102a11505
SHA1d623d0372a70c97dbeb1ffd0a4fde3b7c22b8b59
SHA25680bdd4c38660e6686e87f9fd32ac8f9023e9d840056f71296926d7d03dfb2a61
SHA5126f99f981141632f7d82be05fceb14b6c2885a7db620f0b478bd9b0b170f6da8b163085b1e272a393fbafa8e0df655af42a61c0b36bdd6d54417c04f1b28671a2
-
Filesize
12KB
MD518261eb12378081f939fb9415ca0c9e1
SHA120d4ff782e17fe45e71c3f9fc60a94655f72ec7c
SHA25612bbeec9a0af9e3ed945b28b9b8ef89b2f897768d1ba3ffd6f3fbb42fa5bc556
SHA512fef634b4ce77c2f36ce1bdd63e8ac28e76cd089f0bff33f4425c757ddf37fe9fab30dea7b5bb51c91eb27012cf78800e03643e13d51a25bf624ce58ab3488a80
-
Filesize
13KB
MD515d36e525cc5d95a06e9c321414c76b7
SHA1c900e9160a2144677c8073e1c3681dd1961ee328
SHA256c942760b996e84404fdbe7fdfffcde5f160e380161b12047f946da39cfd1fd85
SHA5125a1c6b78fbfad59a88506eac1d28d0e96a1bba38cb9ea32511d9259172189f0cbae33f423daa75b915b9e904b3f6c2312194cc0052c73b3b3f6dd12a46b8d576
-
Filesize
322B
MD5b1ecc877d5577e8e4c389cda1348ef91
SHA1b7a5b7da479bdeb0930efa04b0e0cb85a5135f66
SHA2569c59125b60da405f1588b44e5a4a91fe2758abb283dee06c7a0c6b3ed5014627
SHA51209bcb492d3ec07fa4c45508c58e3e2ebe77380ec39cf674f289fb861ab08b376c22650d1376723f2e7feff59841dc2311d88d39d1a5597b6917c12260d24a31c
-
Filesize
1KB
MD5bdef23460fb8ddf0cac33621fc9fa8ec
SHA1313cf4ef10ae13d0826d3bc5c58d45889e5b816a
SHA2567414f80a862867e6eda5df88729bcae726d7af96953f7edbdba562df1c173214
SHA51201ce1d871c19ab34ce10a48a153409b21e982b64e81f0df6e7e8c6a93ea912ebb8c1d679afc1b30cdf64310024256e8374fa6f92db5ee0bc4e2ba0cf06fec695
-
Filesize
340B
MD5f7f353dc562126c3b393ca7739e34854
SHA19e97436ce52102c6db059b871b94705fde498805
SHA2569ea97e556ce402ce817e7ca827de9602f21bc94a90c1b60806840e4777fe30ba
SHA512b12bf708165f581caca4ccc37480dcebe7747e361fdfcbe2d1363d0ae47075b3e8454418280d98686e4d2dbadab3796aa2ba7e6dc26a20145e74439ef857aad0
-
Filesize
13B
MD53e45022839c8def44fd96e24f29a9f4b
SHA1c798352b5a0860f8edfd5c1589cf6e5842c5c226
SHA25601a3e5d854762d8fdd01b235ce536fde31bf9a6be0596c295e3cea9aaf40f3dd
SHA5122888982860091421f89f3d7444cacccb1938ef70fc084d3028d8a29021e6e1d83eaef62108eace2f0d590ed41ece0e443d8b564e9c9a860fc48d766edb1dc3d9
-
Filesize
56KB
MD5e17c2b20afa96cbb23f3bb1572d70fdb
SHA1e9b20395a03b1e30f5c6695e5f0daaec9d1ac420
SHA25695fda27d56afab5aa2770d9fa9405f646187c410256969f6730fac03b1d3db24
SHA5128538f1e1ee8c12ad57f731d5bec5fdf39191c48f54026e11ca95343424691b3f2b258a8a2ce728877db54eee7a5135c6feefa58d7119ff749cf9d30e6c774136
-
Filesize
50KB
MD5c47f04a251aeecf820a2a76e64c4511c
SHA1518398f6e130f6df2ba6cdd9f1f8c2d9bf882488
SHA2568b33d621c263203803cfdd10439372a4710de0c92b644ba42fd8652c613368b0
SHA512918076ba27da3e433fbe3ef548a3a0ec8abdb335a074d8d517739dee9f0fef322d0d6da407c7b2504f56f64848b72aef41e570b8a01ae97e44ebabaabeab0cd1
-
Filesize
40KB
MD52b88f96ed38e5aebbc0d1d18e06f800c
SHA15c6ed54bfe60ac048a28395330b1a89ccbf4ac8a
SHA25637dc2fd49f7bba2b6673d4c27c9010390ff3a6e39eacf9b3bebea369ac6e666f
SHA512dc916d7a71eecdcd69f3521d3971849b04a7747e4660ec2bfdbedb8209dddf7fb7441be53d52f724fb89bf1ccea932b15257a3b2f543822e2b7b640720e08abb
-
Filesize
49KB
MD5447418a616932159b612ccd9496986fc
SHA18a56a76b0f844e924e68104cf8176abd8d1c121f
SHA25664a60a81bfdd1ec967e6260b97ae4009256b6b6ae51349cc3323271e40a70aea
SHA512152ed1cd44a380fbb185a5d96f44d246c2837bec0fcc9128f4515e1b7e28459a0108a4ba44de42bfbecf765bb93e81b4e0f3db40310829f73114ee603ac0a7f1
-
Filesize
56KB
MD51e68603ef7cd59d6314a0da4242f85ec
SHA10612b6bba0d7707d45257f165ee567cf07728f3d
SHA2563dd91d8464f887e406c6a1b5ff375dc0a5cc6e619b934d4734f7ed6ef67dcb57
SHA512bf74f0084b49e45e4fedb5cef5ac2daa155d300cae3f76daf195d789ff60c3e1a3b80fe526a3a14c2e1431ac9961edd8a71f5bc398ae5c7bbbbc69d801cae952
-
Filesize
264KB
MD53c5b30e9193fd55962fed653d8f1e1c6
SHA17df38e650c01239f6a8c5a309efd646151d2c223
SHA256d52414b8256661c9e1150afb61c9b5de4255831ab397e862560c17cb3916649a
SHA5123e190b8335491806777d0c8af7d2597cc9eb34b68c70633e0d4a5d9b860cda8d2b8736e4ed1b21b7ad34a37161c54946ade3e6897d90b0651da5e8d5cc81a07b
-
Filesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
1024KB
MD51b52440b3028f1b5046599c090bda4d3
SHA1f648f113f9829dd728f1359e571234e4a9a0f6e0
SHA2568322a5b86914d9a318620af5234b242fe56ab5475889c936f0a56e989af7e96a
SHA5125bed5b07b743230cb7c8deec081213e530ce203b76394f44905bb1cc4da630cd6c4fd370e12a290d4a2d43fe56481d7a6b8f9d05195a2cabd1a6396251ed713c
-
Filesize
68KB
MD57453e65f743c1f6798ef60d12ad8275b
SHA1761cf0d61ab976c44f50986fb67ab3b03c5ada95
SHA256953b406f6b1f1ac2dd00f2a5210f317bf13efd2fbfc10419b725e9d720c1dc09
SHA51228f2525098408f69f71d1c2d673413037ced4c92b332f8a4f644f1efb7c109beb6c04dad0a1111299900ffea134144c148892e42034fb183d2b4ef1d722dea56
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD57f0eaf860c5b98f3a7733e421d426ffc
SHA1f21d431008d40582be678f517205eb88e9baee53
SHA256b5541433c8198bd585389c5aa7c1f81028cdd3833de9f513c5418217470ca763
SHA5125e9e8b2ab7a3993df1fae6cdfb01674ecf2e13f9d98429eba349f724e66e34c0ddd5ca3f3b8636848ff197bf2edb872e628601de81f3b5277147d4debf970993
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1007B
MD55706bc5d518069a3b2be5e6fac51b12f
SHA1d7361f3623ecf05e63bb97cc9da8d5c50401575c
SHA2568a74eead47657582c84209eb4cdba545404d9c67dd288c605515a86e06de0aad
SHA512fb68727db0365ab10c5b0d5e5e1d44b95aa38806e33b0af3280abcefae83f30eb8252653e158ac941320f3b38507649cce41898c8511223ee8642339cfece047
-
Filesize
92B
MD50e4c01bf30b13c953f8f76db4a7e857d
SHA1b8ddbc05adcf890b55d82a9f00922376c1a22696
SHA25628e69e90466034ce392e84db2bde3ad43ad556d12609e3860f92016641b2a738
SHA5125e66e2793e7bc88066b8df3dccb554351287dea18207e280b69d7798ecd5cdc99bd4c126c3e394db9f45f54bb561e6688f928de4f638c5eca4f101dc2cea54a1
-
Filesize
360B
MD5ba81d7fa0662e8ee3780c5becc355a14
SHA10bd3d86116f431a43d02894337af084caf2b4de1
SHA2562590879a8cd745dbbe7ad66a548f31375ccfb0f8090d56b5e4bd5909573ac816
SHA5120b768995187f988dc15d055f9689cee3ab3908d10b05a625b40d9757c101e067bbd6067ccbcf1951ebb683f5259eec562802ea6161d59475ce86cf6bc7c957f2
-
Filesize
244KB
MD5c7bf05d7cb3535f7485606cf5b5987fe
SHA19d480d6f1e3f17d5018c1d2f4ae257ae983f0bb5
SHA2564c1cfbe274f993941ac5fa512c376b6d7344800fb8be08cc6344e6c16a418311
SHA512d30952a75d94dd64b7bd253ed72810690f3550f2262cfaaef45854fc8334f6201a8cbafb9b175c6435f7ce0499567f2fa8667b4b0046bfb651bf61eb4278e6c8
-
Filesize
590B
MD5b5a1c9ae4c2ae863ac3f6a019f556a22
SHA19ae506e04b4b7394796d5c5640b8ba9eba71a4a6
SHA2566f0bb8cc239af15c9215867d6225c8ff344052aaa0deeb3452dbf463b8c46529
SHA512a644c48562e38190720fb55a6c6e7d5ccfab60f362236fe7d63caebdc01758f17196d123fb37bd11f7e247ce8ab21812165b27496d3bd6ca5e2c5efefab8fb03
-
Filesize
71KB
MD5450f49426b4519ecaac8cd04814c03a4
SHA1063ee81f46d56544a5c217ffab69ee949eaa6f45
SHA256087fca40e079746b9c1dfaf777d3994c0321ea8f69d08238cdfc02fb109add1d
SHA5120cae15d863120f4edc6b6dabfe2f0f3d2e028057025d7d5ffe615cde8144f29bdaf099850e91e101e95d13f8a83cb1410a06172dda25a5f92967abcbc8453cbc
-
Filesize
98B
MD5c7146f88f4184c6ee5dcf7a62846aa23
SHA1215adb85d81cc4130154e73a2ab76c6e0f6f2ff3
SHA25647e6c9f62ffc41fbc555f8644ad099a96573c8c023797127f78b1a952ca1b963
SHA5123b30fa1334b88af3e3382813d316104e3698173bb159c20ff3468cf3494ecfbbc32a9ae78b4919ecd47c05d506435af4a7ccee0576c0d0018a81fbd1b2dfcf10
-
Filesize
117B
MD5870bce376c1b71365390a9e9aefb9a33
SHA1176fdbdb8e5795fb5fddc81b2b4e1d9677779786
SHA2562798dad008f62aace1841edfb43146147a9cade388c419c96da788fcaa2f76bc
SHA512f17c9898f81387daf42c9b858f507889919474ac2a17f96fc6d4606be94327e0b941b23a3ccc3f4af92b8abc0522e94745616da0564cdef1c3f20ee17ee31f53
-
Filesize
7KB
MD53e21bcf0d1e7f39d8b8ec2c940489ca2
SHA1fa6879a984d70241557bb0abb849f175ace2fd78
SHA256064f135fcc026a574552f42901b51052345f4b0f122edd7acd5f2dcc023160a5
SHA5125577e20f76d6b1cccc513392532a09bdc6dcd3a8a177b8035dc5d7eb082e0093436068f92059e301c5987e6122c4d9aff3e5ae9cc94ccc1ecc9951e2785b0922
-
Filesize
3KB
MD5cea57c3a54a04118f1db9db8b38ea17a
SHA1112d0f8913ff205776b975f54639c5c34ce43987
SHA256d2b6db8b28112da51e34972dec513278a56783d24b8b5408f11997e9e67d422b
SHA512561860907fa2f53c7853094299758232a70c0cd22c6df3534abd094c6970f28792c6c334a33b129d661a46930d90fd8c98f11cb34f3e277cf20a355b792f64f0
-
Filesize
1.2MB
MD54a9b1d8a8fe8a75c81ddba3e411ddc5d
SHA1e40cb1ee4490f6d7520902e12222446a8efbf9a8
SHA25679e9a3611494b5ffafaa79788ba7e11dd218e3800c40b56684ccc0c33ab64eac
SHA512e7a28acb04ca33d57efe0474bb67d6d4b8ceff9198198b81574c76c835d5df05d113fc468f4a4434580b1b58189f38184c376976604dc05d1424af1721995601
-
Filesize
227KB
MD517042b9e5fc04a571311cd484f17b9eb
SHA1585d91c69c3f9e3d2e8cb8cf984871d89cc4adbb
SHA256a9b0f1f849e0b41924f5e80b0c4948e63fc4b4f335bbdf0f997b03a3aff55424
SHA512709076c6cef8dd61701c93e1fe331d2b1a218498b833db10ee4d2be0816e3444aeebfa092ab1bd10322617cf3385414e8fdb76fd90f25b44ac24d38937b4d47f
-
Filesize
266B
MD530cfd8bb946a7e889090fb148ea6f501
SHA1c49dbc93f0f17ff65faf3b313562c655ef3f9753
SHA256e1ebbd3abfcaddf7d6960708f3ccd8eda64c944723f0905ff76551c692b94210
SHA5128e7d98e6d0c05d199114d2d6ab8da886aed68de690c4d79643868eaf051c229fff94c88d937adb3da5e31fe48116613cf79dd00dda30f296746ce0a8aded9fe2
-
Filesize
3KB
MD5e3fdf285b14fb588f674ebfc2134200c
SHA130fba2298b6e1fade4b5f9c8c80f7f1ea07de811
SHA2564d3aa3ecd16a6ba46a9d6c0bdacdcd9dce70d93585941a94e544696e3e6f7d92
SHA5129b0bfbb07c77d9e9979a6c0f88b0a93010133f7dd3cf01e1de5dfbe812a5ed920e916d16d6a32fe21b9ee4b5425e61a616ded1aeeb35a410d4f77c0f9392ed0a
-
Filesize
638B
MD50851e8d791f618daa5b72d40e0c8e32b
SHA180bea0443dc4cc508e846fefdb9de6c44ad8ff91
SHA2562cbd8bc239c5cfc3ef02f8472d867dff61e5aed9fde8a3823cda28cc37d77722
SHA51257a9d1d75dbbab842060b29f01958f7e6b27d0175ff9a3f7b97e423c1b4e3fae94547a569c2e5c88224fc5dcc785f5a1d49c61199a8c7b3afeb4fc520600df40
-
Filesize
1KB
MD513841b55781af30ba04beca887ce4c39
SHA1f07a2eba4d36a6e25f83f171ac49f82aa0ea5d27
SHA25605e4e32edf8b0b62a47cbec0bd19b7cfe5309bba8c4d45b1212a07ea534eece4
SHA51219c9eb5b09998e81449b90843901aaab866a918351c1a5ed5c1426f59582f62b012b5ba6a94ebefb614d5230a789e9714539a80d6a2a78d3b079fb6953a4ad0e
-
Filesize
27B
MD5e20f623b1d5a781f86b51347260d68a5
SHA17e06a43ba81d27b017eb1d5dcc62124a9579f96e
SHA256afeebe824fc4a955a673d3d8569a0b49dfbc43c6cc1d4e3d66d9855c28a7a179
SHA5122e74cccdd158ce1ffde84573d43e44ec6e488d00282a661700906ba1966ad90968a16c405a9640b9d33db03b33753733c9b7078844b0f6ac3af3de0c3c044c0b