Overview
overview
10Static
static
3YouTube-Mu...12.exe
windows11-21h2-x64
10$PLUGINSDIR/INetC.dll
windows11-21h2-x64
3$PLUGINSDI...er.dll
windows11-21h2-x64
1$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...ll.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDI...7z.dll
windows11-21h2-x64
3$R0/Uninst...ic.exe
windows11-21h2-x64
7$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...ll.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-07-2024 22:48
Static task
static1
Behavioral task
behavioral1
Sample
YouTube-Music-Web-Setup-3.3.12.exe
Resource
win11-20240508-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/INetC.dll
Resource
win11-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win11-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/WinShell.dll
Resource
win11-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240611-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win11-20240611-en
Behavioral task
behavioral9
Sample
$R0/Uninstall YouTube Music.exe
Resource
win11-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240611-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/WinShell.dll
Resource
win11-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240611-en
General
-
Target
YouTube-Music-Web-Setup-3.3.12.exe
-
Size
963KB
-
MD5
3904199813f3664891c0ff2668be7a3f
-
SHA1
4f53693da3c2f288e0c484c481d9342f66148a1f
-
SHA256
0f01fd97933fecb48693698a0ffef573d4be9e970b7622c08704adf965343af1
-
SHA512
49f8ebceda2582883ba4df809bcd9a2647f30bdc19efe0435234663c9a41bec88bfc23fc122c7221dd47f67311775a11330765d015b660fafe00eb5923e0874b
-
SSDEEP
12288:8wKTdRK1DPNKT1zH3ptaR1sDfOQSvJqFZ6bqrJ1OQ8:8fTdM1Du173pG1szLSvJwwqy9
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 2 IoCs
Processes:
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SDCE48.tmp ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SDCE4F.tmp ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe -
Executes dropped EXE 10 IoCs
Processes:
taskdl.exe@[email protected]@[email protected]taskhsvc.exetaskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]pid process 3612 taskdl.exe 1288 @[email protected] 4784 @[email protected] 4004 taskhsvc.exe 2112 taskdl.exe 4012 taskse.exe 2004 @[email protected] 4412 taskdl.exe 3932 taskse.exe 1408 @[email protected] -
Loads dropped DLL 15 IoCs
Processes:
YouTube-Music-Web-Setup-3.3.12.exetaskhsvc.exepid process 1652 YouTube-Music-Web-Setup-3.3.12.exe 1652 YouTube-Music-Web-Setup-3.3.12.exe 1652 YouTube-Music-Web-Setup-3.3.12.exe 1652 YouTube-Music-Web-Setup-3.3.12.exe 1652 YouTube-Music-Web-Setup-3.3.12.exe 1652 YouTube-Music-Web-Setup-3.3.12.exe 1652 YouTube-Music-Web-Setup-3.3.12.exe 1652 YouTube-Music-Web-Setup-3.3.12.exe 4004 taskhsvc.exe 4004 taskhsvc.exe 4004 taskhsvc.exe 4004 taskhsvc.exe 4004 taskhsvc.exe 4004 taskhsvc.exe 4004 taskhsvc.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\obpfgsjmrmyjcf936 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Temp1_Ransomware.WannaCry (1).zip\\tasksche.exe\"" reg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe@[email protected]description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643477688157513" chrome.exe -
Modifies registry class 2 IoCs
Processes:
chrome.exefirefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings firefox.exe -
Modifies registry key 1 TTPs 1 IoCs
-
NTFS ADS 2 IoCs
Processes:
chrome.exechrome.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\Ransomware.WannaCry.zip:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\Ransomware.WannaCry (1).zip:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
YouTube-Music-Web-Setup-3.3.12.exechrome.exetaskhsvc.exechrome.exepid process 1652 YouTube-Music-Web-Setup-3.3.12.exe 1652 YouTube-Music-Web-Setup-3.3.12.exe 1140 chrome.exe 1140 chrome.exe 4004 taskhsvc.exe 4004 taskhsvc.exe 4004 taskhsvc.exe 4004 taskhsvc.exe 4004 taskhsvc.exe 4004 taskhsvc.exe 4904 chrome.exe 4904 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
chrome.exepid process 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exeYouTube-Music-Web-Setup-3.3.12.exedescription pid process Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeSecurityPrivilege 1652 YouTube-Music-Web-Setup-3.3.12.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
Processes:
chrome.exefirefox.exepid process 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1432 firefox.exe 1432 firefox.exe 1432 firefox.exe 1432 firefox.exe -
Suspicious use of SendNotifyMessage 19 IoCs
Processes:
chrome.exefirefox.exepid process 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1432 firefox.exe 1432 firefox.exe 1432 firefox.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
pid process 1288 @[email protected] 1288 @[email protected] 4784 @[email protected] 4784 @[email protected] 2004 @[email protected] 2004 @[email protected] 1432 firefox.exe 1408 @[email protected] -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1140 wrote to memory of 1356 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1356 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3552 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 5032 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 5032 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3900 1140 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 4776 attrib.exe 3712 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\YouTube-Music-Web-Setup-3.3.12.exe"C:\Users\Admin\AppData\Local\Temp\YouTube-Music-Web-Setup-3.3.12.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8a183ab58,0x7ff8a183ab68,0x7ff8a183ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2192 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3480 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3808 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4460 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4572 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4680 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4544 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4684 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3992 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3428 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2612 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:82⤵
- NTFS ADS
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:82⤵
- NTFS ADS
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1724,i,14869587300046013367,5614268540481561287,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"1⤵
- Drops startup file
- Sets desktop wallpaper using registry
-
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 100621719874242.bat2⤵
-
C:\Windows\SysWOW64\cscript.execscript.exe //nologo m.vbs3⤵
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s F:\$RECYCLE2⤵
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\TaskData\Tor\taskhsvc.exeTaskData\Tor\taskhsvc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "obpfgsjmrmyjcf936" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\tasksche.exe\"" /f2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "obpfgsjmrmyjcf936" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\tasksche.exe\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1432.0.450093414\2132633363" -parentBuildID 20230214051806 -prefsHandle 1784 -prefMapHandle 1776 -prefsLen 22074 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8bd0762a-4cec-47c7-ac69-1e3a8e9c08ad} 1432 "\\.\pipe\gecko-crash-server-pipe.1432" 1856 22264221a58 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1432.1.1242752138\922497780" -parentBuildID 20230214051806 -prefsHandle 2360 -prefMapHandle 2356 -prefsLen 22110 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82f478aa-adb0-4ae2-baff-f2f406d683d5} 1432 "\\.\pipe\gecko-crash-server-pipe.1432" 2372 2224ff88458 socket3⤵
- Checks processor information in registry
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1432.2.1049533935\218961596" -childID 1 -isForBrowser -prefsHandle 2940 -prefMapHandle 2936 -prefsLen 22213 -prefMapSize 235121 -jsInitHandle 1396 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6882968c-9cc0-426a-89b0-b1d4b71f72cd} 1432 "\\.\pipe\gecko-crash-server-pipe.1432" 2824 222670f7958 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1432.3.1410316324\220943911" -childID 2 -isForBrowser -prefsHandle 4228 -prefMapHandle 4224 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1396 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e9bcb35-e111-462b-ab12-ee0ec0dc4ddb} 1432 "\\.\pipe\gecko-crash-server-pipe.1432" 4240 2226a110c58 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1432.4.290763708\835001262" -childID 3 -isForBrowser -prefsHandle 4920 -prefMapHandle 4892 -prefsLen 27695 -prefMapSize 235121 -jsInitHandle 1396 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4404e163-ab2a-438f-bec2-7f3f717c7ff1} 1432 "\\.\pipe\gecko-crash-server-pipe.1432" 5020 2226603ba58 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1432.5.1475218044\995302779" -childID 4 -isForBrowser -prefsHandle 5192 -prefMapHandle 5196 -prefsLen 27695 -prefMapSize 235121 -jsInitHandle 1396 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {854a7fb2-1cce-4f3b-a5a4-a51123bfddc9} 1432 "\\.\pipe\gecko-crash-server-pipe.1432" 5180 2226603bd58 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1432.6.674408622\1658474076" -childID 5 -isForBrowser -prefsHandle 5384 -prefMapHandle 5388 -prefsLen 27695 -prefMapSize 235121 -jsInitHandle 1396 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3fb1a01f-3a36-4e9d-bba5-bebfa27a257b} 1432 "\\.\pipe\gecko-crash-server-pipe.1432" 5276 2226603db58 tab3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000020Filesize
21KB
MD55ca56379fad8429172659663783e5880
SHA18cdac7138c6b4893dcd8e58df77fb4b6f37df5fe
SHA256230409f126ef0ccda67300d520ac08ee113fb64e7457b9883914ee00b746950e
SHA51296a42b2236f71f03c313873fef16952d09fc228eda639222047a6fdabc5a8a02748834e19b72ca2f9bcfcf63a931cb6f10385b4f023dd8d916612758977c39de
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\temp-indexFilesize
2KB
MD583af99a2a61bf0259975004b7bb633e0
SHA1494bbcc72b17f14928c8f24588795129a24e1b6f
SHA256cb7fa5191ab89808ff9b1e9e0e2d4a762028925ecbb48a46b3e2c78596a3a74d
SHA512362b0456c4373afc710d065814c0e4a6120318148bd493e8cc6f97820d75d57e278a728262ac8fdc3d0d14d9ce80679bc84d1ab4d159ed66ddf00f0d9c5e2e80
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
2KB
MD51effe36b725d0f846fc0d49fbae858ea
SHA1b2971c7a6b7b1114a8b9dfc38d1fd233e676d089
SHA2569e520a8066895f31c13c8615bd2c4299923e3eb5815afe8e13690397a4100b99
SHA5127004aa996a16646ee887e79b75437c4bd8d258112cde80bd1504871a3b678dc2217c9b6df9a80969c44380a94b444dda6b8da4b20d2852869c2ed2077ba81eea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD598513c03659e6bff56a20553c77a9f70
SHA1664d7abcbfdaec550e4924a210f5c307489089d3
SHA256693e78f204999cd7b1d52a4e873d57a2ac0b4f466b391e7dfb4ea435a5a6d385
SHA512e06260750ad8b5342fce60bde7aec40f56f385a758d3c82f3a0b69160fe8cd6a490fec3f203b6453d3daec19b793a4fc443f8e5988365b2b46312184436d373b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD54ba1e200b6fce1641aeafb03a75880ad
SHA11b235917b125bc9b2f86fea081d5dfb933cf58a8
SHA25624f1033aed07b1d0fef9c4a5cbda0c57cef4dd88c7588d973e91825d3351f8b3
SHA5126fc59ca51ead2e9735cc39d006da34e2696c96cb7e740fea41246bbfa9c5a4c369a1a621075c2475183d02d8706e50c851e472a1d28850584d93099f18aab775
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD5b93ea763e9bcf999d4600c9ce82a310a
SHA17df619111caf0f56589db46a3ad4f9988d680779
SHA2568561389a3eeb32e6da90b0954193feecd7718627fc25c1f4e21aa093338c0c84
SHA5124b515fb7caea78ffb30ffc484febae2094aa2c412ab41ca202f33af91364b8bb7fac7c76e410c9d1170682903cc094122f681f960043ff4ff9ac94e94f798639
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
356B
MD5c99d8e5ed3868fe59abff76adcff91aa
SHA1060e513b8ff7c336a256e2f750a50c5467202bde
SHA25685aee68047f56fe9f01dbd60e1f548a86b5d8476fe8a7212687866aac81bcf26
SHA51235d4123cb8d22fb10c8854a919feb835cd97a50a9c8bfdd080afb1cde2b0388176bdbe7c562c720506c193ec746efe843fb6ef5a692a1cde3ea613a721c31401
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
356B
MD5007fa9e3f4078cf5cf59d6f7ec6581dd
SHA14fb087c7454537887e4ec66d30742dbdd9e78f7c
SHA256c3bba28358ad1ec0ce2826e88694c1693854db23e60c87ab5cdde93f24e5f2d8
SHA512a1a136640cdfc862e6f69e73343f01f695cbad1dad2d09024aa2244f9dc745c4eec3a29d82a0b57b43fa5c374f594ba9a70bf7a3bdc904b75ddef0ebc8133676
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5a0fefbca9a9d833a58ac2235e28ef728
SHA117168d85f8f32912b1ad569005cd4de5a2c3e376
SHA256ca3e5ea74520bf30f02c7d8186821846fb5f75e09acc84922dd87edf755d975b
SHA512cb5f68d40560095da4602f55b9cd15d771918d1f2c3094dc841f4f9ea8b43481b8612cb44dedd0fa0a601c0c91d061f79df88630a53604965558b17fbeb80177
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5ed0d6d9cd279f88123145d7c9034096b
SHA19133abb27ddd50a6a62f9ed7beca31923f37963e
SHA256e5bdaf0a4c73075d8d9886d222f369637bc453236612509bfe9f1b5be9c1b62a
SHA512efe8f10e6cdd3a644ac432b5be2e157b9b8ebd21ed7f2925aa26d96cb25ac9e5d7adcc38a44d10688486ca6203f24fe459a6316f1497ca92013130ecb5ad23a8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5b25dcc90144002826bcaa6b9e28a637b
SHA1147dee8046d353b51f45c99503afcf001c14b92d
SHA256a40cfc04e8576a332db0c636fbfae441bc92e9bed609c907dc7d0544476f0a98
SHA5120e60866d83bde8ef4ad04e209da4ab953ad89e384ceb07bf830c9d7724767133566937220b69fd6c66509da99c60731f4a6f81c2e08a6127f17ec84d9414364a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD503ff7b31c890339c125824db7eb1472b
SHA17b6775e68df75e3bb56d99ff646a988225928431
SHA2563fb4ed65467da736a3eb70d34d59fbe42d611ef56776ecb3ff86d8cdbf13ade5
SHA5126665549c8bd71985dd6e3ba5a5ce707f78f04f57a018e90c183adacff50653aeeaea3d1716521d02ed184cd6b7f7b1185f12f67a736ed1b0144da385f319ae78
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5d676219ca280a5076a34dd6ed4e5488a
SHA18db8e646d35805b5aa04aebf6551a687155e7e4e
SHA2565ad7f27bb837fe031aea14b8749437c2e7e0dfd44b938f3aec87b51c3f0b72a4
SHA5129cffdd0b283b9c08330c13647f87d6f1bee68f534b0f11d299750ec9ac471f2afcf2e23d54905c728293cfe9ffc9d71c903a17b1550ce51676b87c84910c72d7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD56b85480bf9e4f6ef13c66af0d6feaed5
SHA1276fa793598c4876ab36de397d35a6fb794904f3
SHA2560fbc2667c8af17f656031fe637c99e5328da2bb468bd805ec14110a2a36e58d4
SHA5123739361d61bbec0aff7f287b04aa2d7d121a298c100f0b9f17ddd7b045acc2701f8e2e7f082361fd1abbda7865c70b2838dd76f70ffc4b0ca97bd3316e787e66
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5a0d439791348d28633706fcb24bbf028
SHA11378c374889c7d5a1d48be2eb67822be4278bae8
SHA256f0fdba776f9aaa12c720a566698fb172e122bcba548e038bf12b45863d7b895c
SHA512632619c6137b5136c0455c53c9e0b1e2dd0ec33911714b5857a5baf18c42192782ee645a2c068433ade22ec1683be5f31e74e7e93669f27f2d42b742f6235112
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD513de94c90177fe99cc17ff0a843610f5
SHA1a120de07527a819bcb28f4daa82caacd1f393043
SHA256d6eb5a790e9d73badc72a35b0c19eedf5175c028a89087bedc5065a5e0277e08
SHA5120153195c7a1e2977c24da7309b2cd00bb7e64d2c4b7c6699762022cdf3787488256b8893a2df493713eb12b85299cb99c3cde9f7e1a22146357a5bf6d09892b0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD585686de6f8371e134678df9197243d1f
SHA10392b11a4969cc68b59c7003fa74fa4df89195c3
SHA25642ebf3fbaccba2b29494ffd61881c324d42dd904ce04bb964086fc52667297da
SHA512fc4ca52bb6d9c53d0615ef7d898c854e477f4f3e1b9775810a05fe66fdee4787b05e528b0525c20737ad2557f7bffe9c23ee5ef2e7a82ca9baf0cd5a6028c9b9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD5c85ae808e506e6cf64c218628d9bae89
SHA19cf01bb5c7dbc78140dd7a59e9d61f7d2ec0e20a
SHA2560d51160ef8e636411ad5e2358d6d92fe4422ecb1e8bf4a8e370debc4cc62a465
SHA512fe51af71c51e44c4bbce636c84ba41636a8200741059dbe797b61004d47d1a7baafe19809225ae5274ed8dbf34c9bbd43c41d8409c5300679b06b44d6261a1f9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
269KB
MD529648f9deba639a3f1e8bb98940e3da4
SHA120add1f58c61ed7ca2a08915ebda573a2a82b774
SHA256bcd8c09d856c73ca233d9df4a976c6db64b9baf9fb44b9ccc33c6290ce3fcd80
SHA51259cb4ef070b61e5702a59c75796ad788e05b8efb5460daba4d02d3ca985e40731bdc6ad8d1b16ebb3bc9ddf3c101c73cceb004bd9bc7decf6ec6c461ac6a56d0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
269KB
MD5cd734b81624965ab6f8c78d3d7a00bf9
SHA16a8a1339a1efad29a6579e1937909ac4c985581f
SHA25614343f1afcc548193d43aa279b62d9f8d096f4dc19962b66b3e025c97ec21d5a
SHA512811f71ace6dd5dca747a4087e20515dbb7b5223cb5ebccd0850cc072fd3f8948276b9ea6f6f7c7700b487d88ede0c8c618c3da97ba4ea4ac96abc03926488792
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
94KB
MD58b5215cc7bf6f47d59f502a875bab9ce
SHA1053cede1403b9be5418900aeb41ceb19755b6b4a
SHA25632223967350baedd9ac32cbde583a90c238fc05f4c89da8d5af1127cb25e69fc
SHA512b5934dcb2b443e92ac39593ded0e75297ad25f08481f57ac2e28b3325c87a3be58926f67180574d2c25370c8e3670b94358ab73e197bf0192aaaa51100f53bbf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe587886.TMPFilesize
83KB
MD582773c98960f9340ac22200bc9d45816
SHA1721ffcb8bacf34618cb9b4a5510e17471f03d948
SHA256a6f7096d6b433f13d1e893d5f1eb761ad824101bd026cb435344d2b4782aa03c
SHA5120964ecac32f8b64482ca8a65f7a00a97418f13daffbb66e7960c48d955d861fe82277a525584ca14e86b31114d19df4cd27e764045cb3ffb70af39474eaa76e8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\activity-stream.discovery_stream.json.tmpFilesize
23KB
MD5f1b878c532582ab320a21abae16295ee
SHA17018261fe00cc93c7d8d10b7e4ff51e52c6b81cd
SHA2569dab4dbd46f13f75e0cd1c01a124af997a835f5a9fe1e63c16b695e0370b44ec
SHA51246d01f8723246bed16dcaa538c127b810000a6e8c128ad57220a472a4a73351e4d96fd343286a34b2f6218755276f7d3791be85ee4ec4761a8abac1d6dc7e794
-
C:\Users\Admin\AppData\Local\Programs\youtube-music\chrome_100_percent.pakFilesize
146KB
MD56c2827fe702f454c8452a72ea0faf53c
SHA1881f297efcbabfa52dd4cfe5bd2433a5568cc564
SHA2562fb9826a1b43c84c08f26c4b4556c6520f8f5eef8ab1c83011031eb2d83d6663
SHA5125619ad3fca8ea51b24ea759f42685c8dc7769dd3b8774d8be1917e0a25fa17e8a544f6882617b4faa63c6c4f29844b515d07db965c8ea50d5d491cdda7281fc5
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]Filesize
933B
MD57a2726bb6e6a79fb1d092b7f2b688af0
SHA1b3effadce8b76aee8cd6ce2eccbb8701797468a2
SHA256840ab19c411c918ea3e7526d0df4b9cb002de5ea15e854389285df0d1ea9a8e5
SHA5124e107f661e6be183659fdd265e131a64cce2112d842226305f6b111d00109a970fda0b5abfb1daa9f64428e445e3b472332392435707c9aebbfe94c480c72e54
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\TaskData\Tor\tor.exeFilesize
3.0MB
MD5fe7eb54691ad6e6af77f8a9a0b6de26d
SHA153912d33bec3375153b7e4e68b78d66dab62671a
SHA256e48673680746fbe027e8982f62a83c298d6fb46ad9243de8e79b7e5a24dcd4eb
SHA5128ac6dc5bb016afc869fcbb713f6a14d3692e866b94f4f1ee83b09a7506a8cb58768bd47e081cf6e97b2dacf9f9a6a8ca240d7d20d0b67dbd33238cc861deae8f
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\b.wnryFilesize
1.4MB
MD5c17170262312f3be7027bc2ca825bf0c
SHA1f19eceda82973239a1fdc5826bce7691e5dcb4fb
SHA256d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa
SHA512c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\c.wnryFilesize
780B
MD58124a611153cd3aceb85a7ac58eaa25d
SHA1c1d5cd8774261d810dca9b6a8e478d01cd4995d6
SHA2560ceb451c1dbefaa8231eeb462e8ce639863eb5b8ae4fa63a353eb6e86173119e
SHA512b9c8dfb5d58c95628528cc729d2394367c5e205328645ca6ef78a3552d9ad9f824ae20611a43a6e01daaffeffdc9094f80d772620c731e4192eb0835b8ed0f17
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_bulgarian.wnryFilesize
46KB
MD595673b0f968c0f55b32204361940d184
SHA181e427d15a1a826b93e91c3d2fa65221c8ca9cff
SHA25640b37e7b80cf678d7dd302aaf41b88135ade6ddf44d89bdba19cf171564444bd
SHA5127601f1883edbb4150a9dc17084012323b3bfa66f6d19d3d0355cf82b6a1c9dce475d758da18b6d17a8b321bf6fca20915224dbaedcb3f4d16abfaf7a5fc21b92
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_chinese (simplified).wnryFilesize
53KB
MD50252d45ca21c8e43c9742285c48e91ad
SHA15c14551d2736eef3a1c1970cc492206e531703c1
SHA256845d0e178aeebd6c7e2a2e9697b2bf6cf02028c50c288b3ba88fe2918ea2834a
SHA5121bfcf6c0e7c977d777f12bd20ac347630999c4d99bd706b40de7ff8f2f52e02560d68093142cc93722095657807a1480ce3fb6a2e000c488550548c497998755
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_chinese (traditional).wnryFilesize
77KB
MD52efc3690d67cd073a9406a25005f7cea
SHA152c07f98870eabace6ec370b7eb562751e8067e9
SHA2565c7f6ad1ec4bc2c8e2c9c126633215daba7de731ac8b12be10ca157417c97f3a
SHA5120766c58e64d9cda5328e00b86f8482316e944aa2c26523a3c37289e22c34be4b70937033bebdb217f675e40db9fecdce0a0d516f9065a170e28286c2d218487c
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_croatian.wnryFilesize
38KB
MD517194003fa70ce477326ce2f6deeb270
SHA1e325988f68d327743926ea317abb9882f347fa73
SHA2563f33734b2d34cce83936ce99c3494cd845f1d2c02d7f6da31d42dfc1ca15a171
SHA512dcf4ccf0b352a8b271827b3b8e181f7d6502ca0f8c9dda3dc6e53441bb4ae6e77b49c9c947cc3ede0bf323f09140a0c068a907f3c23ea2a8495d1ad96820051c
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_czech.wnryFilesize
39KB
MD5537efeecdfa94cc421e58fd82a58ba9e
SHA13609456e16bc16ba447979f3aa69221290ec17d0
SHA2565afa4753afa048c6d6c39327ce674f27f5f6e5d3f2a060b7a8aed61725481150
SHA512e007786ffa09ccd5a24e5c6504c8de444929a2faaafad3712367c05615b7e1b0fbf7fbfff7028ed3f832ce226957390d8bf54308870e9ed597948a838da1137b
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_danish.wnryFilesize
36KB
MD52c5a3b81d5c4715b7bea01033367fcb5
SHA1b548b45da8463e17199daafd34c23591f94e82cd
SHA256a75bb44284b9db8d702692f84909a7e23f21141866adf3db888042e9109a1cb6
SHA512490c5a892fac801b853c348477b1140755d4c53ca05726ac19d3649af4285c93523393a3667e209c71c80ac06ffd809f62dd69ae65012dcb00445d032f1277b3
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_dutch.wnryFilesize
36KB
MD57a8d499407c6a647c03c4471a67eaad7
SHA1d573b6ac8e7e04a05cbbd6b7f6a9842f371d343b
SHA2562c95bef914da6c50d7bdedec601e589fbb4fda24c4863a7260f4f72bd025799c
SHA512608ef3ff0a517fe1e70ff41aeb277821565c5a9bee5103aa5e45c68d4763fce507c2a34d810f4cd242d163181f8341d9a69e93fe32aded6fbc7f544c55743f12
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_english.wnryFilesize
36KB
MD5fe68c2dc0d2419b38f44d83f2fcf232e
SHA16c6e49949957215aa2f3dfb72207d249adf36283
SHA25626fd072fda6e12f8c2d3292086ef0390785efa2c556e2a88bd4673102af703e5
SHA512941fa0a1f6a5756ed54260994db6158a7ebeb9e18b5c8ca2f6530c579bc4455918df0b38c609f501ca466b3cc067b40e4b861ad6513373b483b36338ae20a810
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_filipino.wnryFilesize
36KB
MD508b9e69b57e4c9b966664f8e1c27ab09
SHA12da1025bbbfb3cd308070765fc0893a48e5a85fa
SHA256d8489f8c16318e524b45de8b35d7e2c3cd8ed4821c136f12f5ef3c9fc3321324
SHA512966b5ed68be6b5ccd46e0de1fa868cfe5432d9bf82e1e2f6eb99b2aef3c92f88d96f4f4eec5e16381b9c6db80a68071e7124ca1474d664bdd77e1817ec600cb4
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_finnish.wnryFilesize
37KB
MD535c2f97eea8819b1caebd23fee732d8f
SHA1e354d1cc43d6a39d9732adea5d3b0f57284255d2
SHA2561adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e
SHA512908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_french.wnryFilesize
37KB
MD54e57113a6bf6b88fdd32782a4a381274
SHA10fccbc91f0f94453d91670c6794f71348711061d
SHA2569bd38110e6523547aed50617ddc77d0920d408faeed2b7a21ab163fda22177bc
SHA5124f1918a12269c654d44e9d394bc209ef0bc32242be8833a2fba437b879125177e149f56f2fb0c302330dec328139b34982c04b3fefb045612b6cc9f83ec85aa9
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_german.wnryFilesize
36KB
MD53d59bbb5553fe03a89f817819540f469
SHA126781d4b06ff704800b463d0f1fca3afd923a9fe
SHA2562adc900fafa9938d85ce53cb793271f37af40cf499bcc454f44975db533f0b61
SHA51295719ae80589f71209bb3cb953276538040e7111b994d757b0a24283aefe27aadbbe9eef3f1f823ce4cabc1090946d4a2a558607ac6cac6faca5971529b34dac
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_greek.wnryFilesize
47KB
MD5fb4e8718fea95bb7479727fde80cb424
SHA11088c7653cba385fe994e9ae34a6595898f20aeb
SHA256e13cc9b13aa5074dc45d50379eceb17ee39a0c2531ab617d93800fe236758ca9
SHA51224db377af1569e4e2b2ebccec42564cea95a30f1ff43bcaf25a692f99567e027bcef4aacef008ec5f64ea2eef0c04be88d2b30bcadabb3919b5f45a6633940cb
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_indonesian.wnryFilesize
36KB
MD53788f91c694dfc48e12417ce93356b0f
SHA1eb3b87f7f654b604daf3484da9e02ca6c4ea98b7
SHA25623e5e738aad10fb8ef89aa0285269aff728070080158fd3e7792fe9ed47c51f4
SHA512b7dd9e6dc7c2d023ff958caf132f0544c76fae3b2d8e49753257676cc541735807b4befdf483bcae94c2dcde3c878c783b4a89dca0fecbc78f5bbf7c356f35cd
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_italian.wnryFilesize
36KB
MD530a200f78498990095b36f574b6e8690
SHA1c4b1b3c087bd12b063e98bca464cd05f3f7b7882
SHA25649f2c739e7d9745c0834dc817a71bf6676ccc24a4c28dcddf8844093aab3df07
SHA512c0da2aae82c397f6943a0a7b838f60eeef8f57192c5f498f2ecf05db824cfeb6d6ca830bf3715da7ee400aa8362bd64dc835298f3f0085ae7a744e6e6c690511
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_japanese.wnryFilesize
79KB
MD5b77e1221f7ecd0b5d696cb66cda1609e
SHA151eb7a254a33d05edf188ded653005dc82de8a46
SHA2567e491e7b48d6e34f916624c1cda9f024e86fcbec56acda35e27fa99d530d017e
SHA512f435fd67954787e6b87460db026759410fbd25b2f6ea758118749c113a50192446861a114358443a129be817020b50f21d27b1ebd3d22c7be62082e8b45223fc
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_korean.wnryFilesize
89KB
MD56735cb43fe44832b061eeb3f5956b099
SHA1d636daf64d524f81367ea92fdafa3726c909bee1
SHA256552aa0f82f37c9601114974228d4fc54f7434fe3ae7a276ef1ae98a0f608f1d0
SHA51260272801909dbba21578b22c49f6b0ba8cd0070f116476ff35b3ac8347b987790e4cc0334724244c4b13415a246e77a577230029e4561ae6f04a598c3f536c7e
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_latvian.wnryFilesize
40KB
MD5c33afb4ecc04ee1bcc6975bea49abe40
SHA1fbea4f170507cde02b839527ef50b7ec74b4821f
SHA256a0356696877f2d94d645ae2df6ce6b370bd5c0d6db3d36def44e714525de0536
SHA5120d435f0836f61a5ff55b78c02fa47b191e5807a79d8a6e991f3115743df2141b3db42ba8bdad9ad259e12f5800828e9e72d7c94a6a5259312a447d669b03ec44
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_norwegian.wnryFilesize
36KB
MD5ff70cc7c00951084175d12128ce02399
SHA175ad3b1ad4fb14813882d88e952208c648f1fd18
SHA256cb5da96b3dfcf4394713623dbf3831b2a0b8be63987f563e1c32edeb74cb6c3a
SHA512f01df3256d49325e5ec49fd265aa3f176020c8ffec60eb1d828c75a3fa18ff8634e1de824d77dfdd833768acff1f547303104620c70066a2708654a07ef22e19
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_polish.wnryFilesize
38KB
MD5e79d7f2833a9c2e2553c7fe04a1b63f4
SHA13d9f56d2381b8fe16042aa7c4feb1b33f2baebff
SHA256519ad66009a6c127400c6c09e079903223bd82ecc18ad71b8e5cd79f5f9c053e
SHA512e0159c753491cac7606a7250f332e87bc6b14876bc7a1cf5625fa56ab4f09c485f7b231dd52e4ff0f5f3c29862afb1124c0efd0741613eb97a83cbe2668af5de
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_portuguese.wnryFilesize
37KB
MD5fa948f7d8dfb21ceddd6794f2d56b44f
SHA1ca915fbe020caa88dd776d89632d7866f660fc7a
SHA256bd9f4b3aedf4f81f37ec0a028aabcb0e9a900e6b4de04e9271c8db81432e2a66
SHA5120d211bfb0ae953081dca00cd07f8c908c174fd6c47a8001fadc614203f0e55d9fbb7fa9b87c735d57101341ab36af443918ee00737ed4c19ace0a2b85497f41a
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_romanian.wnryFilesize
50KB
MD5313e0ececd24f4fa1504118a11bc7986
SHA1e1b9ae804c7fb1d27f39db18dc0647bb04e75e9d
SHA25670c0f32ed379ae899e5ac975e20bbbacd295cf7cd50c36174d2602420c770ac1
SHA512c7500363c61baf8b77fce796d750f8f5e6886ff0a10f81c3240ea3ad4e5f101b597490dea8ab6bd9193457d35d8fd579fce1b88a1c8d85ebe96c66d909630730
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_russian.wnryFilesize
46KB
MD5452615db2336d60af7e2057481e4cab5
SHA1442e31f6556b3d7de6eb85fbac3d2957b7f5eac6
SHA25602932052fafe97e6acaaf9f391738a3a826f5434b1a013abbfa7a6c1ade1e078
SHA5127613dc329abe7a3f32164c9a6b660f209a84b774ab9c008bf6503c76255b30ea9a743a6dc49a8de8df0bcb9aea5a33f7408ba27848d9562583ff51991910911f
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_slovak.wnryFilesize
40KB
MD5c911aba4ab1da6c28cf86338ab2ab6cc
SHA1fee0fd58b8efe76077620d8abc7500dbfef7c5b0
SHA256e64178e339c8e10eac17a236a67b892d0447eb67b1dcd149763dad6fd9f72729
SHA5123491ed285a091a123a1a6d61aafbb8d5621ccc9e045a237a2f9c2cf6049e7420eb96ef30fdcea856b50454436e2ec468770f8d585752d73fafd676c4ef5e800a
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_spanish.wnryFilesize
36KB
MD58d61648d34cba8ae9d1e2a219019add1
SHA12091e42fc17a0cc2f235650f7aad87abf8ba22c2
SHA25672f20024b2f69b45a1391f0a6474e9f6349625ce329f5444aec7401fe31f8de1
SHA51268489c33ba89edfe2e3aebaacf8ef848d2ea88dcbef9609c258662605e02d12cfa4ffdc1d266fc5878488e296d2848b2cb0bbd45f1e86ef959bab6162d284079
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_swedish.wnryFilesize
37KB
MD5c7a19984eb9f37198652eaf2fd1ee25c
SHA106eafed025cf8c4d76966bf382ab0c5e1bd6a0ae
SHA256146f61db72297c9c0facffd560487f8d6a2846ecec92ecc7db19c8d618dbc3a4
SHA51243dd159f9c2eac147cbff1dda83f6a83dd0c59d2d7acac35ba8b407a04ec9a1110a6a8737535d060d100ede1cb75078cf742c383948c9d4037ef459d150f6020
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_turkish.wnryFilesize
41KB
MD5531ba6b1a5460fc9446946f91cc8c94b
SHA1cc56978681bd546fd82d87926b5d9905c92a5803
SHA2566db650836d64350bbde2ab324407b8e474fc041098c41ecac6fd77d632a36415
SHA512ef25c3cf4343df85954114f59933c7cc8107266c8bcac3b5ea7718eb74dbee8ca8a02da39057e6ef26b64f1dfccd720dd3bf473f5ae340ba56941e87d6b796c9
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_vietnamese.wnryFilesize
91KB
MD58419be28a0dcec3f55823620922b00fa
SHA12e4791f9cdfca8abf345d606f313d22b36c46b92
SHA2561f21838b244c80f8bed6f6977aa8a557b419cf22ba35b1fd4bf0f98989c5bdf8
SHA5128fca77e54480aea3c0c7a705263ed8fb83c58974f5f0f62f12cc97c8e0506ba2cdb59b70e59e9a6c44dd7cde6adeeec35b494d31a6a146ff5ba7006136ab9386
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\r.wnryFilesize
864B
MD53e0020fc529b1c2a061016dd2469ba96
SHA1c3a91c22b63f6fe709e7c29cafb29a2ee83e6ade
SHA256402751fa49e0cb68fe052cb3db87b05e71c1d950984d339940cf6b29409f2a7c
SHA5125ca3c134201ed39d96d72911c0498bae6f98701513fd7f1dc8512819b673f0ea580510fa94ed9413ccc73da18b39903772a7cbfa3478176181cee68c896e14cf
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\s.wnryFilesize
2.9MB
MD5ad4c9de7c8c40813f200ba1c2fa33083
SHA1d1af27518d455d432b62d73c6a1497d032f6120e
SHA256e18fdd912dfe5b45776e68d578c3af3547886cf1353d7086c8bee037436dff4b
SHA512115733d08e5f1a514808a20b070db7ff453fd149865f49c04365a8c6502fa1e5c3a31da3e21f688ab040f583cf1224a544aea9708ffab21405dde1c57f98e617
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\t.wnryFilesize
64KB
MD55dcaac857e695a65f5c3ef1441a73a8f
SHA17b10aaeee05e7a1efb43d9f837e9356ad55c07dd
SHA25697ebce49b14c46bebc9ec2448d00e1e397123b256e2be9eba5140688e7bc0ae6
SHA51206eb5e49d19b71a99770d1b11a5bb64a54bf3352f36e39a153469e54205075c203b08128dc2317259db206ab5323bdd93aaa252a066f57fb5c52ff28deedb5e2
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\taskdl.exeFilesize
20KB
MD54fef5e34143e646dbf9907c4374276f5
SHA147a9ad4125b6bd7c55e4e7da251e23f089407b8f
SHA2564a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79
SHA5124550dd1787deb353ebd28363dd2cdccca861f6a5d9358120fa6aa23baa478b2a9eb43cef5e3f6426f708a0753491710ac05483fac4a046c26bec4234122434d5
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\taskse.exeFilesize
20KB
MD58495400f199ac77853c53b5a3f278f3e
SHA1be5d6279874da315e3080b06083757aad9b32c23
SHA2562ca2d550e603d74dedda03156023135b38da3630cb014e3d00b1263358c5f00d
SHA5120669c524a295a049fa4629b26f89788b2a74e1840bcdc50e093a0bd40830dd1279c9597937301c0072db6ece70adee4ace67c3c8a4fb2db6deafd8f1e887abe4
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\u.wnryFilesize
240KB
MD57bf2b57f2a205768755c07f238fb32cc
SHA145356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA51291a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\LICENSE.electron.txtFilesize
1KB
MD54d42118d35941e0f664dddbd83f633c5
SHA12b21ec5f20fe961d15f2b58efb1368e66d202e5c
SHA2565154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d
SHA5123ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\LICENSES.chromium.htmlFilesize
9.8MB
MD50ff177fbf2a3873dd573077840e0b8f5
SHA103d06bc7cd894399a5fc6600a0210f6e3226f92a
SHA256c4771c9158e31855293ee565db76c9b2c52f84c8a37eda4700cfb149a17fd7eb
SHA5123264becd3103c905ab7f9cc034320885f18cbecaa45f582a4a9567ca4bcd620d64dc59fb03532964e775c35f07928a4497f5529cf1b9dc18379e4e9cff02ff8a
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\chrome_200_percent.pakFilesize
220KB
MD577088f98a0f7ea522795baec5c930d03
SHA19b272f152e19c478fcbd7eacf7356c3d601350ed
SHA25683d9243037b2f7e62d0fdfce19ca72e488c18e9691961e2d191e84fb3f2f7a5d
SHA5125b19115422d3133e81f17eedbacee4c8e140970120419d6bbfe0e99cf5528d513eea6583548fa8a6259b260d73fab77758ad95137b61fe9056101dd5772e8f4a
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\d3dcompiler_47.dllFilesize
4.7MB
MD5a7b7470c347f84365ffe1b2072b4f95c
SHA157a96f6fb326ba65b7f7016242132b3f9464c7a3
SHA256af7b99be1b8770c0e4d18e43b04e81d11bdeb667fa6b07ade7a88f4c5676bf9a
SHA51283391a219631f750499fd9642d59ec80fb377c378997b302d10762e83325551bb97c1086b181fff0521b1ca933e518eab71a44a3578a23691f215ebb1dce463d
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\ffmpeg.dllFilesize
2.6MB
MD50e4e3466a8ca9b8fe64349435ff47b50
SHA118adee81cb4b1eab812c6649f886910d27db92d2
SHA2563bcdcd0694ab99d23afcf288e70fee118c670c9de3085cc6d37ddba04a264819
SHA5123188c718a95d20756b14e17b2aa47e86cb689938a38c1325197437cf40d62d7012bd0c11c0de9d13650e2c4b716985c53b1f6638b1aad9f92da2092cfe38a42e
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\icudtl.datFilesize
10.2MB
MD574bded81ce10a426df54da39cfa132ff
SHA1eb26bcc7d24be42bd8cfbded53bd62d605989bbf
SHA2567bf96c193befbf23514401f8f6568076450ade52dd1595b85e4dfcf3de5f6fb9
SHA512bd7b7b52d31803b2d4b1fd8cb76481931ed8abb98d779b893d3965231177bdd33386461e1a820b384712013904da094e3cd15ee24a679ddc766132677a8be54a
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\libEGL.dllFilesize
469KB
MD52c6a2c0aaf213fecd684f97ece3ed0ae
SHA127a1accfbca8cb4ce90470ef6b0bf4e54f8cb66c
SHA2562f341011a81ac1ae35731502c0f876fdbe319bd8686129ace17998d4646a0592
SHA512550a12877e666ac7e7823948f5cb051ba7c0c9a0417c96cec726a1e29355115be5aa556c31d796e56b042efcfad5f07057ee56fb5a1e275aece966ff0756ecbf
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\libGLESv2.dllFilesize
7.6MB
MD5a13985c7c2b578019111c7e83ffce18f
SHA1eb2d3cd25a19ae110e88a36dfc187cb5a1e4d547
SHA25697e32ba9371a90735263f4134d542e16b1413e0dcbf958f9487aa2f7c800d9fc
SHA51272ef94b2be9aa80d91fd61c616b18eb44cad7c195d787f1f44f2690da156905d237b648493e3628ce139f0ae0af10035179d0dc74a183293b61bd8c060387fb8
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\af.pakFilesize
481KB
MD594af96b7f60a4cfb9d596cd8927ba37d
SHA1556833517bc6ad77b5427000f2c3dccad91b92e6
SHA256716e296c2f663ad90cdde85c5134582fc2305e5ebe10649fc9653bea533500a6
SHA5126605688a373a358ff1dfbeda1c09dd031e4a63de662555f5304843c31eb3afcedbc8ffa4dae8ddc1483b04ea24cb709ecc639a9902caa68731d8e44d04cdbd83
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\am.pakFilesize
782KB
MD534b24f035bad74764b7cc57420488180
SHA1fac3fdba1a94d7676ac4d71447178cfbd1fa4e82
SHA2569cff5c4af5997b45fb2a384bd73560e56bcb7710149e1a7e3e172d64e6eda025
SHA512a01da4c45c6295a57248603f01a6b6231c4ce400aa3ec94e4228b26e8cea995c31d52b2008f99d0f17482aad80f1d67725c32e0f37cad6b012b1022ecde998f0
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\ar.pakFilesize
855KB
MD538b30dfa8ccd369c747c46bef204e2f2
SHA1047976a9b0aad536cc61ac3dfbc37b20f39ecbf4
SHA256516584da5741e7bb49ba6a70c9cf2ac47ff190ca9c4f692c3a30bc03a4560f50
SHA5125396af2e915808abb6f0ff8c4a1c3a7675e620687d717193d5e69905a070accce08925b7e243b54b922e1b022fd6210884fd12b18681e1b7d08f28c542cc4c3c
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\bg.pakFilesize
892KB
MD5d08e8e493f0b3c8ab19070ab05a78af8
SHA1c5fa430269dc2d32baa6885de2453fa84c36f2fc
SHA256d223e994ad1aa6e747507187f724cdede8c369d2e8e0def50c4a6c912dba3880
SHA5124b415fa2ae6ba399674f90ea67e571d90a35fff1ce93df77f20bf692b52c92bfc41e5a3622776e3979b1662fecd2d9665209d5d1d53ece1bff3ed01a28e499d8
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\bn.pakFilesize
1.1MB
MD5696016f43190747d63befa354d76e50b
SHA13399e641930b820b627a4e28dea0a79fc457f929
SHA2561e49980f89360b395a70e844ccd0c43b3a34eab84461b1499e7621f757149e3e
SHA5123966fcc5988ceeb4dca79c0053fb428e5180029d44704faa4723334c69413a6eacf622e637857c1dcc096e129dd84e2369e4595ea50316cf8eb68696611a8430
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\ca.pakFilesize
542KB
MD51ef1e76e7028cf6e0b1f93b3218feddd
SHA120c76258573d7499889147b5532a919a827f6de7
SHA2567e8b5bd0a7a9835f20130ed17fb68242d7eb277cfaa2be6407f08c8d0dfcd500
SHA5127e1a7e8cc5e5a2d32192dd38005553961037501a3b000210d92a8796cf65e025c60674d206bd9ca6a9dea5007ae322b2f87b233046d5dc1b838ad3e5b5ad91bf
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\cs.pakFilesize
558KB
MD5c942efb2a8c25205b66a056028a8bda7
SHA130b74bd9398e330ce5e4f4d3eb343a4e67ee0a41
SHA25621916011c2668389727c8970e1407b9c0806812effab9552106da963951d9f27
SHA512319fbdb304912b5628c0e5330416f000c6e0090e26a60ed8005a66aa5ba698892415ed3dd0e4f4ff8afce7986566d8557b76eed15e493f01f889b7a664180cf6
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\da.pakFilesize
505KB
MD54345285a4690b023767e352aa2a587f3
SHA19646a3a5662f2bf233e553e51e7cddf6212f8fd9
SHA25610dfa841d08a3ab094f83e151fdc1edbd66bf8f2392f1511e325628e4e9c7a0d
SHA5122d466e285b44eb0c30f1847015c0056a517dc1dddd4d49c907f070eef5f071d81286cb0834c2a30253d8da9eebb6c6f34271f49850e9bc0cfa7dab0eebdad52e
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\de.pakFilesize
539KB
MD5be9b3438f622428f971c92cd84681750
SHA180278ec6889973ba0fa47e542fb3e85ee52a3534
SHA256400f965d457e958b063e60131d88eaacd74fdb6213ae14cf84c4b6b45809e04d
SHA5128ec4388dd11829324f72b2828a4282cad5205488d4d47d90da83e25fd9f4b43d1aca1d67f9470a93fb0a23b21094b4c17dc68247fb285317dfd2b01f8e312cac
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\el.pakFilesize
979KB
MD5271c3234e3a07223e6db8f6ab1c18f92
SHA1dbc1ecc686eda75627f3fa60d034ea4021da0acf
SHA25658ca76aa55e11a475c830ac89010d4431f455f531079c1e8a0943490b4dd8e4b
SHA51250e6fab168889a283e26eacd7731367032db41841f39fef0f99543b98266c3784ee62a956cd4415c83a6fb7451b3f618f4f3dcf9807cf9b0f2f595ce26e24aac
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\en-GB.pakFilesize
439KB
MD5b98c06126d26961d99a7ee6e397afc94
SHA1bb5249dda1029597c461564798b77efc1fc0d402
SHA256a672387f6fb84ade1b0c44c456ff1a19dcd464c4a9e65e439ca95a115455340f
SHA512ad3783d03e3e7bb343eac48f179a3e3f799146a8ba7b25e2a02e860c53738b01518dbf5e66097366f0b7202e6c02dc046c6b51c116115cffc02aca3ed962951a
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\en-US.pakFilesize
443KB
MD588bbc725e7eedf18ef1e54e98f86f696
SHA1831d6402443fc366758f478e55647a9baa0aa42f
SHA25695fd54494d992d46e72dad420ceee86e170527b94d77bfaaa2bfc01f83902795
SHA51292a5c6cfc2d88272bb5144e7ee5c48337f2c42083bc9777506b738e3bcb8f5a2c34af00c4ccc63b24fb158c79f69e7205b398c9e22634dae554410450978a2c4
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\es-419.pakFilesize
534KB
MD5aa187b593ff0784db94718e4bb7aad2d
SHA1fd0a95dcfb08cc6e85a4b61e13e2be705f7cac8a
SHA256dba56ab390a959dc40cb79db195e4ed6b17d4009235063f738b9ebcf41c4b5cf
SHA51266f38fd0c6c6c2f87d00a46c41df57e82c11f260a1cf247e95182628b62f143a6707034f77577348f46a21d633966ff96e5a568cc9da587ae6bda77715c3fd1e
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\es.pakFilesize
534KB
MD5fe679a1a0332b0f36183421a0a41a478
SHA17230d8646db57466b07a0d700db35838e5030481
SHA256ea54cbe126cdd85b2799ad9600b86ca98c994e69251344163037139296ecea7c
SHA5128b5da5c0e2c55a2dc849050a7d092c78d4bf4975c885ce69d360a0245b1f40bcc9c4cc6eac67d83a6e98f77eb84e1401fc025ccba058be94e962e6f6627c37fb
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\et.pakFilesize
485KB
MD5818d154524c0c900d15a8a25b3659c14
SHA14121be86ee3869c3c884e3467d82ca6b8f4ae0cc
SHA2563610615dcac844cc9a64b843da606f4f8d29b1c945ecc19b288b54829d0e92e4
SHA5121bffdc771102997bc16b3b5fb01ba009a61a85e7d9c53f32a2b2e713ff70f396a9be9431cc45ebdd28dc5eda43490b8d8d82866b42acd32f49e6368ec0b779ce
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\fa.pakFilesize
794KB
MD508fcd4a7e857c8b42e61152e437566e8
SHA1018c041227f307fdef2fc38b42a598b73992667f
SHA25634d79e8a7fa478bf3b350412160a59249e87d31932d728f0167cee89aeff2bad
SHA5128405365949f31aeedfea0ecc7634abc81147b0dc163ee432f294926acfed3a71af469e2f4427dfed2877bee5fd38f5ffda6793d564f11c8ed4a6e64a78529d35
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\fi.pakFilesize
495KB
MD532391a1b0d1bf56bca591971974e8fb7
SHA1b578f82db8f42d9bae763320abf7c8bec886ca07
SHA25601f9669cd2fa17965f882e2cd81c39fa2face2f13ba4f024c3799f1841111ffc
SHA51206e066ab26ceb75d157b35bd283a55f40e2d15698c3f1b62c6596586975e09f5f3fee7d765b10a667b98b347d92883124bbb0f436edf7addea77871542f44bf1
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\fil.pakFilesize
559KB
MD54990033756bc1b2410e77a607bb62f8c
SHA1a02c0f347606bf50aa6f281e42d2d66ce6155299
SHA2563265ae5b6c16a09b1ec9ea53181de78df75e951c3ce28f33d4c483088a9ab37b
SHA5123d45c6dd30eea6d6929039c0cdaa7bb6f7b665fe67fc7a5ca79567d4fd3f907011857e5cb43c16cce9c558d4f669618bc5378f05fa583b19360df58b12b5f913
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\fr.pakFilesize
577KB
MD51aea0f212cb96575b119da1f7b84633e
SHA13d540d9f7fccd4a5ab03824e3b4894aea6b7ea48
SHA2568a283001240c59a552945d0466e3118dc125fbc9f1a10bdea4ca4197460102ba
SHA512be10aadf5a127e7cd354cc2620e162e377e7263ae7c97ba1f026e9711cc8e9655d7a0bb2327ec1f09eb287f68ad4df9ecb133bc6d72adf9d8a5cd6929fec51f4
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\gu.pakFilesize
1.1MB
MD586b829b3cdcf383f11ffa787a32446a0
SHA1c9f626a97bcf00541876caa7a49d23e0b84b83ef
SHA25674c62dca0b7a310aa593d1dcca8b0b0b382b052837e7cae6b87cf05b8b346b1b
SHA51272b69cc9846fb078a8c03afd60154a3b55bc828b9e13b5124a473c0ee528e3cb3ed67f67d7d763ec8e78883640c53d4c88a7a14552b851d493abf65e269353f8
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\he.pakFilesize
696KB
MD58cac9a900616961967ba5d0c9b3317d4
SHA12fd04055155222a1b220238edb3a20a908e7947f
SHA25625281efad59a66f310cabb92da67198451567da553f2c437e52388e8fd25b9a9
SHA512337deee8affc46670d3263ca17c2f8b7aef8450010d4ff2eb39a4bf66e2c6f639643639b2e576961e24a7fc772f331d9ef23085f557e605cd499f6992000c0da
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\hi.pakFilesize
1.2MB
MD53ddd4ae85a39fe6675365404dca77bf5
SHA12a3c2fc24612938edd46738f127098496262125b
SHA2564b5585a8cc1a21e2dfcbd0d33f6cea87b7a583b8690f0f3635bd74bb5cbd2ed0
SHA512fbbf103af336eceba0855f341c9e424bcb09c0527a63ce6ceb4773ddc228fdd5996b2b3bfbc2d11c77d82d012f9f4650317044cfbe50fa5adc0acb71c26e7da9
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\hr.pakFilesize
538KB
MD5427d00ead5500f7480cd6ef8de88b0cb
SHA14f271a9009201f00959a3eab337130ca9fad7557
SHA256d1f8093b91663d061bc2fa20426e2c430d53b06fc605ac1b0b2279d446dc9317
SHA51293190a72013d7fe155404585080c12b64f57948e829888a75d60284ea93cf59b6771956eb325b00eac484c7b424f8b8a1d5d293d90b221b7440ecc63c2899faf
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\hu.pakFilesize
581KB
MD592995b10868e466811b909c9702f1727
SHA16cd34086b876bf07dc1222cbd33e8fac60e401ae
SHA2560a62d168c0f6d9d651dedb4e01be5b533b94e8617535cd70ad22717748fbbc64
SHA512412d0f253d31eff5819fc05ed0da6284a39cd5dbc3f8dac81153511c69aef9cd3f1170d3c6a74616e3d9c51bc457045e9715456b1ef50e139f68f667d5662f53
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\id.pakFilesize
478KB
MD5fb42de6be21c78da1b05c518c5625882
SHA17d8d4e28ea196e3e48df4999d94a04c0be31de16
SHA256d9fc19e683240404a60d57037f24e1d8b20cfda4c8bcacfed577b86cd8988517
SHA51263885e8c82dbef4902c75ae7bc4c3f953057236b07d6919bf3a9f8d1e6ec0ae2cb94cbe0366e56e1272653087faf2fb07b92b18bd312e8e1b38fc76ff5eb3922
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\it.pakFilesize
527KB
MD5d7c45df7f6d29d9a2775f531817b2fad
SHA1f8a11fc014007e7ce2fd0ff137df117146a48a5d
SHA256f38e6b6d975f8148f46dbeda89563cf71bf07af98e9b79c1a8d158b5f8f1309f
SHA512c09b0f026077eb1f0be2206aabfc4bcf201fb2d8c6bb9072f27b7b95ab7fec18a837ecfcdefee2256b2508326e577e6e098572c4d3b0bba4852a79585d4bd522
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\ja.pakFilesize
644KB
MD5ace3fef3bcb086a6caafbdfc9562ecee
SHA1ac86efa1b8fe88f050a8936926b96b055485a8b9
SHA2566df72da472ee171acc440c20a2a194a2a4af4839b6a88323c4654c50ff8b492b
SHA512da5425b10b239ce941733781b6994581d37c8b683946b97d759c2915e96808e18ba967849354687b2ba5ba492387b740dc8e6e67badccbd1a812e349693eb9ff
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\kn.pakFilesize
1.3MB
MD5a48fa9762b3504adc3fe4ec828c75149
SHA1043f6ced7e30cee906eb15dcdd3ae59b9574fb1a
SHA256333725ea1045d44acf2c19efc765bffc38cc5cea6e9977fe583ad6e203442582
SHA51240d983b3df4b6cd8e3df855f4062e163bdbdd5142882088e6e8d5ca30bc538af44044f61803d33e94f4527cceafc44059c5de67c847567190767d3246bb93396
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\ko.pakFilesize
544KB
MD5c524ce72c7049c1c401d8685772e8d74
SHA156d28e03538e2fca873ac453ef2698fabda75a4a
SHA2563ad0012db772293073acb05d24b8dfb26697d6cc5dd1612150df023dbc31b674
SHA512ab764fa9b9f82c7146e1b108a2af792c35cba91b0e3be9accba48bac87a13612a61ec026705b77f006519d65a6415a5978139898239093b249ff583af0dc6aa3
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\lt.pakFilesize
583KB
MD51bab0f6c08b1cb26db455aaf581490dc
SHA13a32246b812e8ed35ddf0a6842b8bf26b19be9d3
SHA256946351ed2d74f247dea0f2742fc36d89225355480f0cec99d71599ccce3ea9e1
SHA512c6e4502fda62e2606e31a7c67679d59d21a04342c507e1fa39ac59156a4d1e1cab1923de4bcf30b735d5bcf89824d4283b57db11af9673b5b956c2f883a3bc7c
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\lv.pakFilesize
582KB
MD5e4993f39d6fa671658aa3ce037aec60d
SHA12db9bfc42b07060f6e256c74a01c348cd6c2ac0a
SHA2561e6f9a40f4fa1206117063234399bd7c1e7d198cbf6c4ad633e5e18ad0929836
SHA5124192274330be238a93e370fc3fc8ada444b38fa1464889f0e3d0f6c5e548f7f7de14248937d45f8aa84c043078a69174ac1c9a5894fc9b4ff8f10deef6f77e5e
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\ml.pakFilesize
1.3MB
MD59f0422326953a0c48c1db82ca2a9d639
SHA12305bc895e9ccc5b9a3d661e891c4f06d8a503ff
SHA256f2fb440eb0518dc695810fcb854b20b72aa47e5ffc75c803aacf05861d35a94f
SHA512a899dd975a56a53503b5cbc7448f54423b18bfbd917f73f0871840d6cf6a574bbaac8d735ae8de6a074cd78c43b6640e3e46be1550dcef8f8cfd1971cc1513d6
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\mr.pakFilesize
1.1MB
MD5b0e1f36587445f28f22777d555683a0f
SHA142f7cd3c596c2f52662b86df9d9096bf822a80f3
SHA256a674db4e60152fc17a32d4b92add129adaebfc02a1a783a12653f984447c535e
SHA512575fdea827497ceab51df5fc8783f960b87d180f6031f0947525279d224189a6299943df37a014f7bcefc637ee23327fb1ae82eb77c175d63c515b29947ac0d1
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\ms.pakFilesize
502KB
MD5c8d605a91b2b66603b379f5557783afe
SHA1d6f294eb91675182f658158ff9399592935c779a
SHA2567707f79a2a4aec553e68af87802a0f19d3714a25311fb7b8afdc6ff4a5b6c5ff
SHA512a9f100dc1fe0a19a0a0a4360fff392af4e07eaed6613ab6dc61548d36afe55e4c9183e6584ca4e15feb477947ee8a79a96775718197129a555319a162281b9c7
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\nb.pakFilesize
487KB
MD54914ceee005991ad76c7cd75ed8bb645
SHA161d2732f5d5a20467d7f667b54ab654849d23289
SHA25653b12866e7265661c0088b89653d2c1cb9220e1ec0ce0049f3095d53356b3f1c
SHA512fdb51c9239eb894bc807d56a6afeaa06cabdbaa25cedf3d0b3763c6670321ef7087a35258737c0627b450932aceb7b6859224735bcf53b4b12f6f531fb066f99
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\nl.pakFilesize
503KB
MD5ed94cd5fe4846c197ebcdc3fb3dec939
SHA13239425517ebc508a449f3998036c21370685e32
SHA2564736b7ec56cb845c14795e6e4fa98ddaba47c75aecec86e931f61222dff45ad9
SHA5120f0a79ae99e8f74aab18c3673e640d4ea5f24d8b88a3ba63ea262da77ee3fe630296a818337c7b36b6603365f43c6f60720336fab9f594eb755f9c7efcdb8fe7
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\pl.pakFilesize
560KB
MD512c3e7597522f09e87ff438ff2cf5c23
SHA1e634c8bcd7d5f77fdb227f7428c146cac3e87b81
SHA2562191f77aabe75522166a3325e2660395479633b936d5173d150120367ed501a4
SHA512fd58c466458496316c659dea6afcd8dd8269b312c56a506d65db4bbcbd28d37edd137947f3c78e783cd1b3fbe9014480f3c625dc707ec4c27a63115ff8d877b4
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\pt-BR.pakFilesize
527KB
MD5576c1c0bbac545348532ffe36bf27fc1
SHA155c614f9d31c5e6466080afdaca79b6daf8ab10a
SHA2561deee32edff320827dbfbe22aa42e83d8caf79f95f7cf18013424da7cdadb975
SHA51211caaa048778e258fdf2af5b442eaeadf3412921d2e50065b7217de2277980a5fde086b7d6749cb918090daf4feaeb5e89ad7876ded2fba9f62d9e809593ccda
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\pt-PT.pakFilesize
530KB
MD5e4565bfa531c9c4344f84dc8be207c93
SHA15d1084ad5bff80383129850a853fe1319c23199f
SHA256fcd194e5caf36be4958c559acbde4f28a957083bf2aceac893f9e5c9e65d8a95
SHA512531a318e8ef1683abe4bc7b44e7d3a4d6ef907d5e7ddfa1f5cea20414dd33060981afdb8d1f4813b05be90985f10fb892f9060f6c1f2b975984f12acc8cdce6a
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\ro.pakFilesize
549KB
MD58c922129bfb61fe14fa035d965108823
SHA1aa8d8dac978053163a303c1f1206480144d4b330
SHA25606c6486e8a42b447a55bd789bf2bc794354fa4be062139481e4612550f16c755
SHA51225f9c2b75febfe607cbdd872a82338aecb5f277ed2d3d80fe0ec01289e3361445102392ea23207658ac347a774a7f47bbe19672d49f080cd6aea220da5ac3618
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\ru.pakFilesize
902KB
MD5dbd513d5ff195a0068677ba4aa417648
SHA19d6304911c1bfd9449a661baab44518f17ba64a3
SHA2566e53b1b54bac43c07798ee6507bd05806fbd2146ac0f987a7f03aae3cf5d9985
SHA51258b903eab4e0c769245c56f1d92dc020690b617d30495e8b436e0e052978c23d38219ad6a89493c116443e8ec4556f59de782326e567088d866751415abde40e
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\sk.pakFilesize
566KB
MD5b74b01d80d6edcf13ba6514dcb1bf3f7
SHA1405ddedaa9e3c9f3b5ddfeae6f440085c155a6f8
SHA2567a1db23a5b4f8e4c7cbc80a832f4f4c33fe29e31d4ae78a814bd8ca85620968f
SHA5122f649b116eb297c7ee7248a35858506f5329094c14be2e6c2cf52bca42170c519ef0446773be096c1571d1cb4502a5a840c3c934710c4900c8cd8344e4e9bd1c
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\sl.pakFilesize
544KB
MD5998585ed4b877e6cb29bef5ec5675004
SHA1d82e9c2127062187a0ad3906579cdc491f6ecf04
SHA2567235e631afff75cad9d25b2e5a0e74696ea6b7f4b2a05753331bbd719a0699cb
SHA512b0d4ad73c4e1aaddd156cd115dbadcda692e314e6f5629e26aa13144e2bac5fdb432db345b68eb79f732e6e102674ebf8cb90c06570ea4d49e4045fbd8cedba4
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\sr.pakFilesize
839KB
MD5044954b860180caff2b57af02aa4e1ec
SHA1c006f910386d7a11c9d074586c60b629131caf0b
SHA25635e57d972a60e161f123a5783e67e250f5cae1f66a2c11b119c10b81c43bd03f
SHA51233d8a0fb6c76364b756eb199f629f930d419ea31f631b8e6935b2efdefeca7f755a87bc3ec5422f9ca9f00da7ed5564fd90e228b0f1e9951a82cd1a4deb9b2b3
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\sv.pakFilesize
489KB
MD5d5925395fb791adebe0d06ce055ce976
SHA173163c7420f6a70ac7fcb52bb8cd97f4828a3ded
SHA256bcd070d70a4284fd3144bf37c5e56994ca3a69c8f65aa72a9231748b30210e00
SHA5126e0bf0f4d488eaf388431f05effced112e597be52b9c8f199c88ebb6e7e6a28d06f9a180ba3a9e7bf9da5166570077ed895249af7806db74343a64bb598a4260
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\sw.pakFilesize
515KB
MD50787972a076c6690e7938758c2a92e24
SHA1dbf02e5a3ae26acb060b533bb006756c19122bfe
SHA256eb96ab83e2e08e811928742590178e97454863bc581dd8574d6a644fd3c6615a
SHA5129f3560a3b648b1a7025cd8a98c39ec7634883aade1ac2c7836fde890cc04bd009aa5c1bca8354ee1259ebcd9482326c51a7d21bdee3caf92984ecbefab35d34c
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\ta.pakFilesize
1.3MB
MD585403cab968fbdcbf7f92f3a4d49a4b4
SHA1eacf6ecf2bef4ed5275ed237d3830754db9e1149
SHA256e213c963248c93fcb4b88b1a45936dda28a5fe39cc0428a16556c6d737fc9940
SHA512b49bcd260c38f302fa9fa83a2b17d2f7bf576bae14b64882ce9b38152141504a69fbb73d1f9ef8b47ae1a7a995a41e1127df3689c1e043e3b110cc35b73c0fb0
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\te.pakFilesize
1.2MB
MD5d251d089aa789bccc27a0b473d39e46c
SHA1283d8fb6b6195b3427144773ffc4691c82e31f0e
SHA2568dd7d206379445bd9afa4e01ab986c439cf70841d080fca6e152b453e94fcc49
SHA51227e6f13f6c7937c8121451d70ee90d2a2ce5e519d17e882a86b29a6a78764427022c36b6a99178e9933e01500b55bcbfd0dc79a6f028a046967c2c53f78424fa
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\th.pakFilesize
1.0MB
MD5f30b74c4203bc2cdf830681b14651943
SHA147f541c0b5ca948dd371e657ac24f7e61b402ceb
SHA256a4c2c305aa9d3df52d988c4da2bda398e8ee81d320e9da1de7d4d366e826dbc2
SHA512a92ac611d43287060fafc66070d7b40d4d253d32cec9cfd01c15fd7892eabbc49c1ba63d03c39919bb2ba94e974f93c73f6e455263ce4e0080fc8161587f09c6
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\tr.pakFilesize
527KB
MD5a4520237e44d35110e003a26cac98052
SHA18e50c8f88200a417d2d792c67e52ca115340902a
SHA256f842b56ddc4145e4474c5cfc67893900b577c131a4b123cb16cfcad48ed0f338
SHA512b08e577ebe680383f9fb228162ab21e8aaa38abc3e5d0b95326cd579454571738845f4bd86ccd316643f45bf5b6b619dd3f77f67b68b056dde68ee1697029b03
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\uk.pakFilesize
902KB
MD58f894b4972b41dc4c7b65847ba856ff1
SHA163ce84840a90485fd376908c39a4125dfd53fc2d
SHA2565dd2fcc64ef09be0775c2efe7e07dddfc18f5ba6059f878d0c22b9b0c2207cdc
SHA51277ecdfcfd31803f308da51e6b2bbd47b7c0848104925b642cbcf877c6ee228c5c7e9dc7746a208d0640455daeeb6dfcbe954d7268119b9c096588deab3c2b53f
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\ur.pakFilesize
790KB
MD57b5fed5150135b728bf8865246f7c8fc
SHA1214b0f507ff6384b1b305f1718db43023499eeaa
SHA256a0c752a805da7dd6608ad04625734f4d27cb75b682f51b2dc8ef08350cc7a2cc
SHA51281fc55db4b0635e09057fd060d9eb72bda5a5fd2d2e1e4284e1b45098b287c609526c766b030dd0eaebc0836a32bcbf6dc0aae94327c103f3f736b5cd051a8a1
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\vi.pakFilesize
624KB
MD5d910fb70771f06c64f6a2d78ca25d340
SHA12b1ba5cf58c552984164e65e30cc05744d8ec419
SHA256d7f676cf557d43db07b14a22b0b20ca761ced59285cadd75c07c68613486e909
SHA5124e3626cd558cc75b8833308c816c45ca106203cc054e214a08ceccd3214aa296097153ad69635f584dbab9def2440ea2aed79c0e02464c164bbced572840f264
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\zh-CN.pakFilesize
450KB
MD56617a2bfccc344c5dc0dfe03762d219d
SHA19f9d5059515af878d273a9b74f32ecddd4a93f83
SHA25648e32f53d07cad6e6dc12040619f7021fa8f0b3254cc6945905b7c6748acb787
SHA5129ad87e1f4b404cfaa80ba4bd617217bd638cdf7255da0c74d03b8b3123e2afe9f1077f27dda07e5dc71edf82d08c69ac20a415157b12519731e1ebd45fc3b5c9
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\locales\zh-TW.pakFilesize
445KB
MD5197d88a99d2348c9539d388f4b825c4c
SHA17b634dcd2cd27b2f8592eacfe314cf23a37f316d
SHA256a8b11c74a0512fed29b11748181ef4b1de84dc99197c48d9eecf316aceb425fa
SHA512da7acb060d14f87743ed788df4e2c6ff3ca18a633e46f4d84c4619802edfc23b363f45cec8d2cb23c3e12bbaa547f6df1f5b60ce7ec7d770f689346b0e06a977
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources.pakFilesize
5.1MB
MD597770ebb513490dfb038bed3bc444128
SHA12e459ca458879ac8f427080764bb5d668a912235
SHA25675e03df55d7d23c840c09288da270285f17d067cef8709252451c0a8aa1254f4
SHA5127f41708f8f29f0a9730e461c7a5a6780824ec31dac6278abb2c42a50919c10e01ce00aa7e4cdef680d667c467bab4683df90d5db2c61aef8dfdf77c2eb3d8d24
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app-update.ymlFilesize
93B
MD5ed0053411b3e6b2a23aa29677c86ab8e
SHA1c0581403ae1d324cae2e038a40f135bc0dacb5ec
SHA256eb00b688f8e8dbc7eddfad73977534f9d748dc2601dc53c8b2147a8b5ea36a79
SHA5129e345b7ee3c1718765d449b7fc5e940004ae2c02e317927fecdc48d16e418ae4e3756ca826514d20e2cf84bd916c35f7769f6592fa3d3dab240820b9b0a21aa5
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asarFilesize
31.0MB
MD5d369d15d80e2b3ad3632065f7ed9f516
SHA111787a1d7c36db884c31e4a381b70e1f3f006f27
SHA256be3b22fb55685387566c5310ebfb4c9196a52717c2366ecd48c8045e1c8687bd
SHA512f15ca67f800ef50e61fed0b4ce8bd412c416495c1443c8a7953ede72f13c6741c7f0aa651941a411a2786ff655a22e20ef1f8bbf03690c5416701c9e872e60dd
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\error.htmlFilesize
1KB
MD5516758f2fbabae4faf5d0a65302299c6
SHA1c941f4397432840402c07bf1116b6b9363e9bd5b
SHA256586b57a0fb53c6da76d1f24f12ed480c883c614f3396fa7b93a746e31411c633
SHA51227c0c778117f388fc521b40e58d96f668bd019fedaf8557c395e8bafbc09407a5045afd8588d3fab3bf02513385508f2914152ee7f19e35aa7a8e1b95d351d82
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\generated\icons\mac\icon.icnsFilesize
105KB
MD559e6c233814baaa7888222a9eb581a18
SHA1595076428290073f2de50acaa5b3fda1b69aa899
SHA256947742962076d09fa8f311680631fedece52b3365356d6967fc2ea230133e6a3
SHA512ad99c8c4bfd6bb2d759bc0443d5433dca9336fad512a0aed97e2f09d62494b5fc8d854a7421561cfb7eccbd1188511a4cb69b0f763c8361c7c20ce199d9ccf94
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\generated\icons\png\1024x1024.pngFilesize
58KB
MD57d3595513a46a1beef116889686b69d2
SHA17e3ac409b96aac627ada8dee5705aef242a680d4
SHA2564f317c018f536df555b36c634d7220ef306ab96f6045793aa61473f922f46026
SHA5121c0f09351b6427f4d7c09bce71bd7712747de322ece337200da0058a40510361992251c2bf6072933d291c441b20ebf6ac13dd7dc52769d7628a7d7746ce07bd
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\generated\icons\png\128x128.pngFilesize
5KB
MD5b4c2b0e094d0aaf39fe92bcb7655e117
SHA1937e71e439395ec5e4eae81b71571d6ad5aee1ae
SHA256df3066bc2468da85967954a4e9085ff6af801ba97b1208603401a1b1bf7aa969
SHA512c7d0bcbd4cf5859130687d07cf7eb0ef9af6e0f82a9c638c1b042ce731a0f1e199d28ec05b7a5d83f79a314d095cba2fde7dfa802ab92349e452df8273c228b7
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\generated\icons\png\16x16.pngFilesize
600B
MD5e7fd9802ff4d2f2bcb503eff791fd17b
SHA1674e9a8505ce5e8b4ba48fcee02354c34ede5947
SHA2561a9e6768ee8dfd3e18cb638cd773e8b99694e306e6ebe254e290cec1f3d492f9
SHA512ae96ed5703bee220e69a31b99b991fba79e326f5e7f8a7149c7fdc545ce8fc05dd7e7ff36a60cd6d588615c0b07808a1ed412b7be7ac94b6b9a0fd333a1a7328
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\generated\icons\png\24x24.pngFilesize
931B
MD522e196d8d315a0bf1a672ea3095ab1f3
SHA12065cb6578b6f63b98f69fc59f02e7188549b4f3
SHA25617cd4f4a333613c573e979461641870a6198cc82af249d86ca9aa157abb5bebd
SHA512687028bd753aaffae24572b96ef5eda2e00364dab780c90075c7f0db6e094b086542d7cfece1fee16ec7d1c4098c2b82ba504de8653539b39e5e8a7c285f1288
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\generated\icons\png\256x256.pngFilesize
11KB
MD5f1eed06c90a3c821b18a57440ac95e15
SHA1455097ca8f291c17ce9bab7fcedae8387abc10f9
SHA256340f4645d69c399a612fb06123b3405113e9e5cc34c965b20a5c8c94c653e7ae
SHA512439cf91d2d6d680ebbeabd8564bf40b792dda2468a1d0164a32db357f14eacead918787661388275dc1d9c220d0a194d8956b41f19a81d3b018ed9695c91bfb6
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\generated\icons\png\32x32.pngFilesize
1KB
MD5d29f9b3554732a03b10a8c0a30c7c79b
SHA1eb46435c5cb7631f40795bbfe7b63c5bdfe728c8
SHA256574c54ef497e96d1075d7376f951b3b04f61537d7e9b0bdd00ad6c15bf23232f
SHA512f5576ea6fbd163e11f286b91121c729e08b3e5ebf1ae8d6df1e17cb7690bc5580f677a1e59e38b9d805eee2e3f7f8bb749367ab68a83783ee92583e73fea35d6
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\generated\icons\png\48x48.pngFilesize
1KB
MD5d5a749730438d35a2b3fb084136e7de8
SHA1ce3ed893d5ecc51c941943903e59d1d8500f3c0b
SHA256e8872647204209b311bb3e6d08d9f7482bd237c9bb9e8df39d4b2b0048ed2698
SHA5120b0b5482ab66fc12223131d07539bed1db1aff35a59e7fcbfcf886a5e819b44d9fa3caddf09498db3543527712d8b1bd1cd5e494a347cb71d5a513e3f7371a5d
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\generated\icons\png\512x512.pngFilesize
25KB
MD577c4cc7f3a3c03c69c4ecd25ed5d06d0
SHA16f736f4583aafe8e8aa6da6dc65e7fa693a5a6f8
SHA256b4e23e1bbe5275478123a3318dfb85295c4c8e4fa8456af59b5f16b9cb2786ae
SHA512951aa553d271cb10285a67e63f04474034a5b37af0554242629e7dc363b171c27948d4d399586bfb7cdfa10947bc2f07e384c80717ca5241775170185aa09cab
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\generated\icons\png\64x64.pngFilesize
2KB
MD50adf3505c04a88cd3c0eadb933523fab
SHA1745b33fcc04f928ba5a4ffc92716d50a87d10493
SHA2566d7edfe716797481042e9e33289347f53127a87fe989f493a569d4a7c7038766
SHA512dfca34b9859830653ace2bf1484c851265161f5b615ea4747502086bfab7a1b85f90a043b8780923f410cdd03b9052986442b0bd21a6b1a42bae0cadb8afcd8e
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\generated\icons\win\icon.icoFilesize
352KB
MD5aa41e80b8abbc4d0c736bee6569dcdc0
SHA1a39c3f736a08bafcdabd69b65547d43de1bd294a
SHA256f3ee403874375c857c45d7e4fae22255f31edaf73ac970c39c8263c2a51d8ee6
SHA512d9385c501a04847de941c9f082e0847560e24d587d17e23f69a3649dda2b811bd449b86264c5a94b491217ded85f4fdeaba0bacaf28b81ac808791d23b2fa44c
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\media-icons-black\next.pngFilesize
250B
MD589a60936abfdb577a67c559cb710ac6b
SHA13279add12ef19cbfc1302c56cbb099acb714a4af
SHA256ba2ef432901ec1f141cdf03aa6ad9f24461fe8c0bc35879cb998631605093a7f
SHA512d50b1df1ab883271b95f69d80d692a526b1250b4f5e5fbed251c875c4a7117a5cf1528a58c514f2f63583916ccab8c87e35ecf2da6f5cd12b022838fa55a912b
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\media-icons-black\pause.pngFilesize
192B
MD53602f53107d06c3ed234afc65a4e5667
SHA1d6d72a2fb4b8e08332c67e5390ae74d6f2cf20b3
SHA256c4bc8536e971ba8534f39356255101fac4108a5dd362ca37492ac05966108333
SHA51205429d3b71cadb754df3e3a0fafe48d1b980e38f30ad1377c765d0a37660fa26539aaa1fbc06353683ced7b562b279367fd708bb7e16afa9b6e8782a22000a53
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\media-icons-black\play.pngFilesize
265B
MD53517490b6bec9bcebdc32f44383b86d3
SHA1622a8494a37dec40fbd8c64014b63bfa299ec220
SHA2561aaccebf6317a7cdbccfbc9cb57e6e1718e6aea1831d4386d03c478ad28973c5
SHA512304c3716a86d16d260d5e4bba7d5c9b1f29ba6549f1d446df646f67c2ed64c7d3a4e8cebb0cae38bfc49c3abe269ce4e391ec3b9b437007c40f815160bd9282f
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\media-icons-black\previous.pngFilesize
269B
MD59b2745996765ba7959dc2d4cabaf36bd
SHA1aa1764d84a18c2f9b66a81f3963e104eec5b5231
SHA256d5576f2f8ab13fa57f6fc8e405159273f0c2aa0c805436f3772e7a625e93ff1d
SHA5122ba9f447a34f38eec1c36a313d94b8c6993f6475a4ff8986c175107ba1dc593ec35de531c33f55f683ebb275905f91e8fda65bc64e6a73377f83886db13c2e28
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\youtube-music-tray-paused.pngFilesize
2KB
MD51a0568c5b1e253aa8619288e5dda56b8
SHA16a2a149fa7a3dabfbcae19b5c188a24a5973b157
SHA256e581ba9e6f56264dc0be2ba9c000b6c55d4f27adaa58e31bd5e0b3496965a1ae
SHA51246e20a4ff2d92ad4261ca6e94ec68c391ce39d1cfcc6e454bf8f31d6c1f106a82d3a76b99909ae86e7466c24406731c0003c517a029fac26f5943ffb2ff8fe63
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\youtube-music-tray.pngFilesize
1KB
MD5bf50e27874667caaf6497a31290c1d9f
SHA13102960393d5378185511e90019d716caf7fa8d6
SHA2569b49ecded06055794730fa7af6d39fb67b88ef69f705e30b731f888da019b705
SHA5128cb7219e0158cf7ec63e54d2f1e213225ada167313a7c10e5f873d8658ba414c02cc030c856391a57f0c95de571f1b7486f392ddb198902ffcbf8ca804638854
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\youtube-music.pngFilesize
40KB
MD515549fc49920a406b07ce89e26a50ad0
SHA117fabdf3d7c2332c63df44c3af159d50208d82fa
SHA256c2fb2affbedee36106a3402482c5ae667eb4f8ff4bce37f243c21247b8be22a5
SHA51202de7b37643f02e450688a807659578bb1f0ff06168dab9d30978b854b78c5ce0bd98a5a230a864fed5c576de45144436c5702c3ea5923a5eedba3ffff7d7994
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\app.asar.unpacked\assets\youtube-music.svgFilesize
353B
MD5a5c0cb05ea04c095162b494291ef21b6
SHA180594c26c4937b53bbdb4f00c0d38d91e0990873
SHA25639f6e2dd2463863222cd7765d6fbf9a6a9966c967f9e17ff23d2afc2df67a86a
SHA5121cf314b74a9f130477e4ca725750cdc7e44e4d024f217743fcd53167e8a7040b9a45703a17fc4aaf1f885018a982e29229fd7bc80a163823bae248b36786e586
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\resources\elevate.exeFilesize
105KB
MD5792b92c8ad13c46f27c7ced0810694df
SHA1d8d449b92de20a57df722df46435ba4553ecc802
SHA2569b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37
SHA5126c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\snapshot_blob.binFilesize
300KB
MD50c13aba4e77dd56e5f7ec8f8fdd6c9a8
SHA1e17eb5b549ac1389cf3761da7d2b2aede1c93fd9
SHA256ca7012d6e1478bdd112c485844253e48ef43168c4267ba19be229f0ba2bd6994
SHA512f7d49048af8f2dd58c4af0602bda888b948aeb0846f7f27dd7db873f4b185debf5edf3869f8e311e31865e2408aa93af4f0f67a4f1ca0554ff8a8f2fb9a1214a
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\v8_context_snapshot.binFilesize
641KB
MD5228cb75c5b14fb790ec913a34c12b4d6
SHA1aa6dbfb6cd403be3110f85c2a3ae72ab575645fb
SHA256bb9c5a66316280c3d90ad63e20e34a7311972632bfd927f9d192407c13714444
SHA512ab6b94de633b71a99b58f3924b0b8a351e0899ccff0fdab35e06938ad22ed62548a331b0b296a886f67941a642fd32d00ec2297b0d687139c0e57d2919739c19
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\vk_swiftshader.dllFilesize
5.1MB
MD5cef2000b42350b40537d1da2bfe770d9
SHA1a4218422437f03318fe764be7d3d7d8c59dd57c1
SHA256711b025f81b288feb2cf56ed0f3b056d7cddce9fd7ab0d78c28e55308b4b9fd0
SHA512757d21910a7af0d6311f87dc488ad5a224b4df6c603b17b38d38652abac3b6f92c150180924530d2c078659abc37bc6dcf698790f82956d6170db765f809f612
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\vk_swiftshader_icd.jsonFilesize
106B
MD58642dd3a87e2de6e991fae08458e302b
SHA19c06735c31cec00600fd763a92f8112d085bd12a
SHA25632d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9
SHA512f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\7z-out\vulkan-1.dllFilesize
935KB
MD53ed5209e51e0c13bbf6c2cf199121f4d
SHA1fd906a98bbafc39f4b72ddae695b5f1395bc8b3d
SHA256e9a8c3f0d4584aaf3ed5f9408e91c7baa9bfe48c0ba9f3f22a3443b75e4902d1
SHA5126d60bef96fc759100065bdda01592fef09bbdc1935f17dae38ffaa70fe6a7c3f4498975a1af10a482ba5e0c0b7d7f44fc7235abe7ce7a6942ed4872548690594
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\INetC.dllFilesize
238KB
MD538caa11a462b16538e0a3daeb2fc0eaf
SHA1c22a190b83f4b6dc0d6a44b98eac1a89a78de55c
SHA256ed04a4823f221e9197b8f3c3da1d6859ff5b176185bde2f1c923a442516c810a
SHA512777135e05e908ac26bfce0a9c425b57f7132c1cdb0969bbb6ef625748c868860602bacc633c61cab36d0375b94b6bcfbd8bd8c7fa781495ef7332e362f8d44d1
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\SpiderBanner.dllFilesize
9KB
MD517309e33b596ba3a5693b4d3e85cf8d7
SHA17d361836cf53df42021c7f2b148aec9458818c01
SHA256996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93
SHA5121abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\StdUtils.dllFilesize
100KB
MD5c6a6e03f77c313b267498515488c5740
SHA13d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA5129870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\System.dllFilesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\WinShell.dllFilesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\nsExec.dllFilesize
6KB
MD5ec0504e6b8a11d5aad43b296beeb84b2
SHA191b5ce085130c8c7194d66b2439ec9e1c206497c
SHA2565d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962
SHA5123f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57
-
C:\Users\Admin\AppData\Local\Temp\nsu79A5.tmp\nsis7z.dllFilesize
424KB
MD580e44ce4895304c6a3a831310fbf8cd0
SHA136bd49ae21c460be5753a904b4501f1abca53508
SHA256b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
SHA512c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df
-
C:\Users\Admin\AppData\Roaming\@[email protected]Filesize
1KB
MD53786ef965461a5b69397f5553d168d54
SHA100dcdec3ebd068f7ea41b8a7f8fe842c586b6df3
SHA25670b346ac4d59532da7e7ea092a18204a37b81372a7ff38babbd8aac08c09b625
SHA5121810e0774fe129f72226339663ef392108b62b1592acd2c51da98542891b8304126983fd0e506cf8b7144df6913363e387d6b2c81dd324b3a81431a8c6db083a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\prefs-1.jsFilesize
6KB
MD5124d4d616bae605da43a0fb71957101c
SHA1e474cf7c250b229063febb1ecd7a8575442c7f11
SHA256c437f29e7cae86f00b39d01260e30571ffc5031653e013777ea94496759a2cbe
SHA512f0d3ae3024305beb1132970e28696d369ae6d1b2772a909c3482f6b55eeff72422ec3be845172d9f517e93a64e152fd05554841fc95faf16401332a76cbfb520
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\prefs.jsFilesize
6KB
MD52d77885a0df184dd7d2e167b42e3366d
SHA1f35b211c41a7e97279cd669e6845fa287df107a9
SHA256517a0898c3b73438a1ad3921194516843e4107098891f5db7007b539adcd0966
SHA512c5656cd4a48ae7f4a606496fdb369eb86204f82dacc061e78311070bf01764f26e7e66cfad1edd31b3dc5728496873176087d27e02a2421bff144418a1cf5d42
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\sessionstore.jsonlz4Filesize
904B
MD53800cb4d8abb9b42092d7e5d4b3a4d0e
SHA12ca9434f4c7cf7e263eb3e0fa1d15c6a932aa5fe
SHA2565fffa206a996cddafb01d943e5dbdbee6268873c230c9d62ec9342d696bc40b7
SHA5124849ffd688eeaecd46fb760d282e55fd43def0b642b936a952acb995a04212d8a7d7099f4d7252c0f8c2ca1f523837cfad60f2adc7bd063ed25fb5ad39dffb23
-
C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.newFilesize
18.4MB
MD544626d6d64e59918c183ca128726bec6
SHA16421328583411138eb77ea9b51939964f32954bd
SHA2563a25f4ca18c6b265fc8f9e7cccc1548e0dde429d73b65db984894fd83e9eea11
SHA5121a5e8614c4b55633df172c4d77ade0cd2c3d452231ef5c93c98d970b07b5cdd067ccaa892cb9228ecfdaae88f8723508066f812cfc7f63413362d18f401eb36b
-
C:\Users\Admin\Downloads\Ransomware.WannaCry.zip.crdownloadFilesize
3.3MB
MD5efe76bf09daba2c594d2bc173d9b5cf0
SHA1ba5de52939cb809eae10fdbb7fac47095a9599a7
SHA256707a9f323556179571bc832e34fa592066b1d5f2cac4a7426fe163597e3e618a
SHA5124a1df71925cf2eb49c38f07c6a95bea17752b025f0114c6fd81bc0841c1d1f2965b5dda1469e454b9e8207c2e0dfd3df0959e57166620ccff86eeeb5cf855029
-
C:\Users\Admin\Downloads\Ransomware.WannaCry.zip:Zone.IdentifierFilesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
\??\pipe\crashpad_1140_TUBNTBCNFLJGKKYUMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/2992-1411-0x0000000010000000-0x0000000010010000-memory.dmpFilesize
64KB
-
memory/4004-2746-0x0000000073B00000-0x0000000073B82000-memory.dmpFilesize
520KB
-
memory/4004-2741-0x0000000000C30000-0x0000000000F2E000-memory.dmpFilesize
3.0MB
-
memory/4004-2742-0x0000000073CD0000-0x0000000073CEC000-memory.dmpFilesize
112KB
-
memory/4004-2751-0x0000000000C30000-0x0000000000F2E000-memory.dmpFilesize
3.0MB
-
memory/4004-2747-0x00000000738E0000-0x0000000073AFC000-memory.dmpFilesize
2.1MB
-
memory/4004-2778-0x0000000000C30000-0x0000000000F2E000-memory.dmpFilesize
3.0MB
-
memory/4004-2745-0x0000000073B90000-0x0000000073C07000-memory.dmpFilesize
476KB
-
memory/4004-2729-0x0000000073B00000-0x0000000073B82000-memory.dmpFilesize
520KB
-
memory/4004-2743-0x0000000073C40000-0x0000000073CC2000-memory.dmpFilesize
520KB
-
memory/4004-2744-0x0000000073C10000-0x0000000073C32000-memory.dmpFilesize
136KB
-
memory/4004-2731-0x0000000000C30000-0x0000000000F2E000-memory.dmpFilesize
3.0MB
-
memory/4004-2728-0x00000000738E0000-0x0000000073AFC000-memory.dmpFilesize
2.1MB
-
memory/4004-2727-0x0000000073C40000-0x0000000073CC2000-memory.dmpFilesize
520KB
-
memory/4004-2730-0x0000000073C10000-0x0000000073C32000-memory.dmpFilesize
136KB
-
memory/4004-2993-0x0000000000C30000-0x0000000000F2E000-memory.dmpFilesize
3.0MB
-
memory/4004-2999-0x00000000738E0000-0x0000000073AFC000-memory.dmpFilesize
2.1MB
-
memory/4004-3066-0x0000000000C30000-0x0000000000F2E000-memory.dmpFilesize
3.0MB