Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
238s -
max time network
248s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
MedalSetup.Mjc5OTEwODQ5LDEsbm9yZWY=.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
MedalSetup.Mjc5OTEwODQ5LDEsbm9yZWY=.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
MedalSetup.Mjc5OTEwODQ5LDEsbm9yZWY=.exe
Resource
win11-20241007-en
General
-
Target
MedalSetup.Mjc5OTEwODQ5LDEsbm9yZWY=.exe
-
Size
143.1MB
-
MD5
1e622810ec211cc44426d5482a1d5d0f
-
SHA1
da7e158a2092fc64664e260626c847eaee3684ed
-
SHA256
d1273886847ed68aa98bb847cd0afcdb411ae57e80775ccf18ded854fcefc96c
-
SHA512
6f55a70223e0f8c917145edf63a51d16c991537382f7fcacf5af9e143cae77df0d1265d24e829588d4fe535c8e644feb9034aeb8ef5b147ed093511aae9bb0a8
-
SSDEEP
3145728:o5xGeJvRWj9zzug3X1rpMDM+a2LFdoeJoL4zc8HJvGWbpLJh4Ohojs:oXVQj9vdUaOd9qsddAs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\Geo\Nation Medal.exe -
Executes dropped EXE 8 IoCs
pid Process 2952 Update.exe 988 Squirrel.exe 2168 Medal.exe 1452 Medal.exe 2904 Update.exe 880 Medal.exe 3020 Medal.exe 2324 Medal.exe -
Loads dropped DLL 22 IoCs
pid Process 1232 MedalSetup.Mjc5OTEwODQ5LDEsbm9yZWY=.exe 2952 Update.exe 2952 Update.exe 2952 Update.exe 2168 Medal.exe 1452 Medal.exe 880 Medal.exe 880 Medal.exe 880 Medal.exe 880 Medal.exe 3020 Medal.exe 2324 Medal.exe 2904 Update.exe 2904 Update.exe 2324 Medal.exe 2324 Medal.exe 2324 Medal.exe 2324 Medal.exe 2324 Medal.exe 2324 Medal.exe 2324 Medal.exe 2324 Medal.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MedalSetup.Mjc5OTEwODQ5LDEsbm9yZWY=.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz Medal.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString Medal.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 Medal.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Medal.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Medal.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Medal.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Medal.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2168 Medal.exe 2168 Medal.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 780 WMIC.exe Token: SeSecurityPrivilege 780 WMIC.exe Token: SeTakeOwnershipPrivilege 780 WMIC.exe Token: SeLoadDriverPrivilege 780 WMIC.exe Token: SeSystemProfilePrivilege 780 WMIC.exe Token: SeSystemtimePrivilege 780 WMIC.exe Token: SeProfSingleProcessPrivilege 780 WMIC.exe Token: SeIncBasePriorityPrivilege 780 WMIC.exe Token: SeCreatePagefilePrivilege 780 WMIC.exe Token: SeBackupPrivilege 780 WMIC.exe Token: SeRestorePrivilege 780 WMIC.exe Token: SeShutdownPrivilege 780 WMIC.exe Token: SeDebugPrivilege 780 WMIC.exe Token: SeSystemEnvironmentPrivilege 780 WMIC.exe Token: SeRemoteShutdownPrivilege 780 WMIC.exe Token: SeUndockPrivilege 780 WMIC.exe Token: SeManageVolumePrivilege 780 WMIC.exe Token: 33 780 WMIC.exe Token: 34 780 WMIC.exe Token: 35 780 WMIC.exe Token: SeIncreaseQuotaPrivilege 624 WMIC.exe Token: SeSecurityPrivilege 624 WMIC.exe Token: SeTakeOwnershipPrivilege 624 WMIC.exe Token: SeLoadDriverPrivilege 624 WMIC.exe Token: SeSystemProfilePrivilege 624 WMIC.exe Token: SeSystemtimePrivilege 624 WMIC.exe Token: SeProfSingleProcessPrivilege 624 WMIC.exe Token: SeIncBasePriorityPrivilege 624 WMIC.exe Token: SeCreatePagefilePrivilege 624 WMIC.exe Token: SeBackupPrivilege 624 WMIC.exe Token: SeRestorePrivilege 624 WMIC.exe Token: SeShutdownPrivilege 624 WMIC.exe Token: SeDebugPrivilege 624 WMIC.exe Token: SeSystemEnvironmentPrivilege 624 WMIC.exe Token: SeRemoteShutdownPrivilege 624 WMIC.exe Token: SeUndockPrivilege 624 WMIC.exe Token: SeManageVolumePrivilege 624 WMIC.exe Token: 33 624 WMIC.exe Token: 34 624 WMIC.exe Token: 35 624 WMIC.exe Token: SeIncreaseQuotaPrivilege 780 WMIC.exe Token: SeSecurityPrivilege 780 WMIC.exe Token: SeTakeOwnershipPrivilege 780 WMIC.exe Token: SeLoadDriverPrivilege 780 WMIC.exe Token: SeSystemProfilePrivilege 780 WMIC.exe Token: SeSystemtimePrivilege 780 WMIC.exe Token: SeProfSingleProcessPrivilege 780 WMIC.exe Token: SeIncBasePriorityPrivilege 780 WMIC.exe Token: SeCreatePagefilePrivilege 780 WMIC.exe Token: SeBackupPrivilege 780 WMIC.exe Token: SeRestorePrivilege 780 WMIC.exe Token: SeShutdownPrivilege 780 WMIC.exe Token: SeDebugPrivilege 780 WMIC.exe Token: SeSystemEnvironmentPrivilege 780 WMIC.exe Token: SeRemoteShutdownPrivilege 780 WMIC.exe Token: SeUndockPrivilege 780 WMIC.exe Token: SeManageVolumePrivilege 780 WMIC.exe Token: 33 780 WMIC.exe Token: 34 780 WMIC.exe Token: 35 780 WMIC.exe Token: SeIncreaseQuotaPrivilege 624 WMIC.exe Token: SeSecurityPrivilege 624 WMIC.exe Token: SeTakeOwnershipPrivilege 624 WMIC.exe Token: SeLoadDriverPrivilege 624 WMIC.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2952 Update.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2952 1232 MedalSetup.Mjc5OTEwODQ5LDEsbm9yZWY=.exe 30 PID 1232 wrote to memory of 2952 1232 MedalSetup.Mjc5OTEwODQ5LDEsbm9yZWY=.exe 30 PID 1232 wrote to memory of 2952 1232 MedalSetup.Mjc5OTEwODQ5LDEsbm9yZWY=.exe 30 PID 1232 wrote to memory of 2952 1232 MedalSetup.Mjc5OTEwODQ5LDEsbm9yZWY=.exe 30 PID 2952 wrote to memory of 988 2952 Update.exe 31 PID 2952 wrote to memory of 988 2952 Update.exe 31 PID 2952 wrote to memory of 988 2952 Update.exe 31 PID 2952 wrote to memory of 2168 2952 Update.exe 32 PID 2952 wrote to memory of 2168 2952 Update.exe 32 PID 2952 wrote to memory of 2168 2952 Update.exe 32 PID 2168 wrote to memory of 1452 2168 Medal.exe 33 PID 2168 wrote to memory of 1452 2168 Medal.exe 33 PID 2168 wrote to memory of 1452 2168 Medal.exe 33 PID 2168 wrote to memory of 2916 2168 Medal.exe 34 PID 2168 wrote to memory of 2916 2168 Medal.exe 34 PID 2168 wrote to memory of 2916 2168 Medal.exe 34 PID 2168 wrote to memory of 2448 2168 Medal.exe 35 PID 2168 wrote to memory of 2448 2168 Medal.exe 35 PID 2168 wrote to memory of 2448 2168 Medal.exe 35 PID 2448 wrote to memory of 624 2448 cmd.exe 38 PID 2448 wrote to memory of 624 2448 cmd.exe 38 PID 2448 wrote to memory of 624 2448 cmd.exe 38 PID 2916 wrote to memory of 780 2916 cmd.exe 39 PID 2916 wrote to memory of 780 2916 cmd.exe 39 PID 2916 wrote to memory of 780 2916 cmd.exe 39 PID 2168 wrote to memory of 1640 2168 Medal.exe 41 PID 2168 wrote to memory of 1640 2168 Medal.exe 41 PID 2168 wrote to memory of 1640 2168 Medal.exe 41 PID 1640 wrote to memory of 2064 1640 cmd.exe 43 PID 1640 wrote to memory of 2064 1640 cmd.exe 43 PID 1640 wrote to memory of 2064 1640 cmd.exe 43 PID 2168 wrote to memory of 2904 2168 Medal.exe 44 PID 2168 wrote to memory of 2904 2168 Medal.exe 44 PID 2168 wrote to memory of 2904 2168 Medal.exe 44 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45 PID 2168 wrote to memory of 880 2168 Medal.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\MedalSetup.Mjc5OTEwODQ5LDEsbm9yZWY=.exe"C:\Users\Admin\AppData\Local\Temp\MedalSetup.Mjc5OTEwODQ5LDEsbm9yZWY=.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe"C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe" --install .2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\Squirrel.exe"C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\Squirrel.exe" --updateSelf=C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe3⤵
- Executes dropped EXE
PID:988
-
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\Medal.exe"C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\Medal.exe" --squirrel-install 4.2535.03⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\Medal.exeC:\Users\Admin\AppData\Local\Medal\app-4.2535.0\Medal.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\Medal /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\Medal\Crashpad --url=https://f.a.k/e --annotation=_productName=Medal --annotation=_version=4.2535.0 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=22.3.27 --initial-client-data=0x374,0x378,0x37c,0x36c,0x380,0x148351898,0x1483518a8,0x1483518b84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController"4⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController5⤵
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic CsProduct Get UUID"4⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\System32\Wbem\WMIC.exewmic CsProduct Get UUID5⤵
- Suspicious use of AdjustPrivilegeToken
PID:624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController"4⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController5⤵PID:2064
-
-
-
C:\Users\Admin\AppData\Local\Medal\Update.exeC:\Users\Admin\AppData\Local\Medal\Update.exe --createShortcut=Medal.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2904
-
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\Medal.exe"C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\Medal.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Medal" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1224 --field-trial-handle=1376,i,13268569788357934008,12181529198879973482,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:880
-
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\Medal.exe"C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\Medal.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Medal" --standard-schemes --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=1084 --field-trial-handle=1376,i,13268569788357934008,12181529198879973482,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3020
-
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\Medal.exe"C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\Medal.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Medal" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1904 --field-trial-handle=1376,i,13268569788357934008,12181529198879973482,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2324
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD5d31f3439e2a3f7bee4ddd26f46a2b83f
SHA1c5a26f86eb119ae364c5bf707bebed7e871fc214
SHA2569f79f46ca911543ead096a5ee28a34bf1fbe56ec9ba956032a6a2892b254857e
SHA512aa27c97bf5581eb3f5e88f112df8bfb6a5283ce44eb13fbc41855008f84fb5b111dfe0616c310c3642b7f8ac99623d7c217aecc353f54f4d8f7042840099abc5
-
Filesize
175KB
MD55604b67e3f03ab2741f910a250c91137
SHA1a4bb15ac7914c22575f1051a29c448f215fe027f
SHA2561408387e87cb5308530def6ce57bdc4e0abbbaa9e70f687fd6c3a02a56a0536c
SHA5125e6f875068792e862b1fc8bb7b340ac0f1f4c51e53e50be81a5af8575ca3591f4e7eb9239890178b17c5a8ff4ebb23719190d7db0bd8a9aa6dcb4308ffa9a34d
-
Filesize
2.6MB
MD5ec098a73a78c1e2c26160219c3116fdd
SHA1ff770841cd5b048c30d6fdb95028a52379aaa72e
SHA2565603ea667254ee1bec209b9aaff9697684e7aab056d427bf9dcb7276952aa5ba
SHA51215e76f0974780a11e80607f9edb959fdfbe0ffbd50637e501a0391e2c1d2642bf0027a492a4b874983b914cd224a3e8fce24cae156f6351db13208feede74b97
-
Filesize
10.0MB
MD576bef9b8bb32e1e54fe1054c97b84a10
SHA105dfea2a3afeda799ab01bb7fbce628cacd596f4
SHA25697b978a19edd4746e9a44d9a44bb4bc519e127a203c247837ec0922f573449e3
SHA5127330df8129e7a0b7b3655498b2593321595ec29445ea193c8f473c593590f5701eb7125ff6e5cde970c54765f9565fa51c2c54af6e2127f582ab45efa7a3a0f6
-
Filesize
313KB
MD53f6f4b2c2f24e3893882cdaa1ccfe1a3
SHA1b021cca30e774e0b91ee21b5beb030fea646098f
SHA256bb165eaa51456b52fcbdf7639ee727280e335a1f6b4cfb91afc45222895b564f
SHA512bd80ddaa87f41cde20527ff34817d98605f11b30a291e129478712ebebe47956dbd49a317d3eeb223adf736c34750b59b68ad9d646c661474ad69866d5a53c5c
-
Filesize
5.1MB
MD5f5ab76d2b17459b5288b6269b0925890
SHA175be4046f33919340014a88815f415beb454a641
SHA2564f29587bcd952de1dbc0b98df0aa506bd9fcf447e6a7258c5eb7e9eb780e6d6c
SHA5126ec6a08418743adb5e20218b73169be4f45f5458592219497c3718e620e37871876788937418f1341e0023c1137f9cac715e6bb941f4690febdda993b072feab
-
Filesize
386B
MD55e2fbb9d655e0dd204e8d211ec1b4d0c
SHA1440dc879e7fb836d97a5f5a40f016bbaa1b7f588
SHA2568debe05417ec5d5e42661e2697a8d0db3ba30fa9bd4ac70c62c992ec01527bf9
SHA512d6445a850642c562aa6affe907580fbf5b4faf70c51ad7b12613120a27ce1d6ee049571a709334fc588ff45c32ee918836bbae2188d4394a94c5810265139b2f
-
Filesize
7.6MB
MD59a566fe129c3621b3b9087430afb96a7
SHA19d01bbd71014ee7d05000ca563f0f1153726f1dd
SHA25688af76a1bc28dd8d27af7fdf0f55daa9fdc4db54ef6496ec39212c6daff49cf7
SHA512ece967c2b0884f375ab56a4a29c35b6c9fb1e9c1ad60b1c12d148385359863d907eb1fc4e9e622837271ff8bc21fb1bf79b6c34c2bda73f3751aa633655946a8
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\resources\app\node_modules\@electron\universal\node_modules\fs-extra\LICENSE
Filesize1KB
MD5ea817882455c03503f7d014a8f54f095
SHA1dd164bc611bca7ba8ead40ec4c2851081e5a16b9
SHA2561e76029602ae9b21cc4e612db2496d92febed882ba13ba745f8b3309e85f9d39
SHA5120ea343d0e696ba27877dc0611766c526aa73f6e7af46df5a0f83840dc4c7851fb5837b7f6bda8a014302bf877fe3b4b3e392b943cefb3af979e8afc67559a5ff
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\resources\app\node_modules\@electron\universal\node_modules\fs-extra\lib\output\index.js
Filesize947B
MD5b0adfc74c8e51ce2ab659bfc13752ed3
SHA11b0879db53a00bbfeddcfdc0c190901387bab7bd
SHA256a27d1a72ed1ecddffc57e70187a4b72467ed0dd34092b7e3d2817b9f4359ab5d
SHA5124bd96fa626592e856431c3da18f7f2c5262fcf7f8fc95a4fa8b3ecd6bd7f53e82ee27d3255711df0addaaaa3fc7ba5e11104dd448f90f490e5517eabc1cdad42
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\resources\app\node_modules\@electron\universal\node_modules\fs-extra\lib\path-exists\index.js
Filesize263B
MD5dfb2813673ea5279a9aa7305e5fe33f3
SHA16e6491c1ab3389433d1b39a33b3ac8760649a2c8
SHA2565ce096c95daec0259817248921b39a9e0df4d342db171138ccb62440cc7a0cbe
SHA51253d93b66ed4a2eca23046e6f2b08fcbe4cde40a2b841ab38db838ac75b0882947371024cb74ae43d2c9a2e095e2457e2207979c45f07d46e6e2b5f99efcfc794
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\resources\app\node_modules\@lwahonen\ffi-napi\deps\libffi\config\mac\ia32\ffitarget.h
Filesize4KB
MD54ef9928ec21c398681ed3357aa400c48
SHA15bafcdf7c4ff860ce7f94c5260159e7bf063243b
SHA256ce9a87677a9b9af9dcc6f8f632b62948214824174b65fe4361d3b662cc72aec0
SHA512c0f5f26b249cf3ca72b2d334008a7ab8b7332f286e57edf7c700b5c4a80960dbce14e3db940829134a3bc593a087f56b41afb757daf3f03e32611ab1172c1f6d
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\resources\app\node_modules\@lwahonen\ffi-napi\deps\libffi\config\openbsd\x64\ffi.h
Filesize13KB
MD54c8fce7c4f0bee30b8f03d94fba5b66c
SHA14eb6b34a1547e2da9b1a0daa9c9f7a32569a03e5
SHA256bdd54f5f8517f32767d864921edb878224068a75eff7e0386a55105d61e44466
SHA5120f077d7c2a9801eab3134d4c56793f64fc1c8434e8eabe9c749d0f7d0d875b1750ad0f32873b49778bbb7b5864c280c4546fd72775ad0ec49eb091ec26ee3848
-
Filesize
219KB
MD51257b1d9deaebe158498a18320cb5206
SHA16658b0192f5224d10475378ee50ce927b8b99f13
SHA256caeea733f6f61bb394a1a5f71d8bda604765dcc9aea0f0a9a0e54243a1d4c7e8
SHA512244bb4cc9a386415f1ff15392c92ffab5ceee43b78bada2f9836809b015738347cc781c8ec1eec97dd17d8a00e59d100079f7a6f9fa9790dc84f07ce64754fb1
-
Filesize
2KB
MD58b25d829d53060e8c855b44bf9f0a163
SHA1fba8834d773d13fc6c9c74a1ea3ffd013859d7a1
SHA256ed7622386e4427bbdd4eb08c09c0aca9bcc1d739becdfb421b2cd19c76dae308
SHA51243427701fb7eaac7fd06ef99ff86cbf5c2a27d0ca28d5bf95b3b9cb0469b00a39dc81afee2d7d2dcb22ec0aef2dd4cc36e01c241ee507865f31be5377d3d9b2e
-
Filesize
3KB
MD5b792856285e9760aac0ca447b4cdad32
SHA1c3f23229d5855aa849565a6f4dee345b4471e53e
SHA2567bb04f74fe05865a5382a76b07cf11cf34f53a18d7e44679a70e3ad33baa4d64
SHA512a147f23a7d0104812ec98d07604c96c47359aecef4873a912b87823737ed8fa4898e7574152815317c7c30c72f5857913453abc0616de20b998c151034bf818e
-
Filesize
701B
MD5530ee244b7c2df2e16d152d4dbe039d5
SHA16b5e6be8639f0c3f9828fcae1d2bbae7344edde0
SHA256287e126e6500f191066f1865ef155a4dd668ad08c177d42821a77a52e0202604
SHA5125401f101832ba756eb7693751cd857349aef42052ae2c0d29c886fe514f74c356ffd8f4c0dac95508a801c7b8d6b2dbb515f3388c96c63b9ae844e37bf4024b6
-
Filesize
5KB
MD513c05ea1a2f638b707aa56eea958810c
SHA1c93878e75a9f0545f73aa8d6fba3a761c4ceda36
SHA2568e32a0d37f20bd6f7d5bdbf99d041aa27be47cbbe5172ac13ebf7380a10b3bf6
SHA512f356619fa479c72086138eed34fbdcf501bb6f263249e5cf3b1069b2d6c120afc32d9b2ee89d9a41b2f516251c8bbf5d9913e78105961a989e136ac03146657f
-
Filesize
660B
MD517005447df8440e0e386849b8fa2b682
SHA114bbbadeb1307b1f711ee10093d5b46a7889677c
SHA256a87721fe406e1f1798fef44d697b46ea1efe346fda118010334713346ee4207c
SHA512a61aa9260b34479feb762f81f23ec26104d311fee81bb299efa00fc7091d3ae7f10047f6d91bd3bcfec7152b754c9fc6fe97ac280b3c00abc945a25ef387105d
-
Filesize
11KB
MD56d4fdddbe0e3df6ede11846ac2d9f104
SHA116ed563b7e5eb247279479de76bea594fab392f0
SHA256ab8919c1546bd3015afb834e6f0948a7c53121be4f4107ce2a3f4eb31c3e77e9
SHA512f895785e1143a0952c033db6317f9f7d1dfd8c220827019d4857f0c0a6fc67f08fb89ce2aa8fc45d601ee1afc40950c91de2532fc76fefda1c461fa25229c1f9
-
Filesize
4KB
MD5b1c4d73faad73d98b01810cde1eb52fb
SHA167c75686ab7cbee0ac60c3a7f8a5a9ae083dc0ce
SHA2560ab2389048116330718b012ce387aa693e3f318e9cc9b697d32a96d65bef25bd
SHA512bb5440c3bc7f2f309b1aa237015b493e01ebf53c595413225658feed63e48d42851064615a45323f3c13c7f55c7193f5c73c2f9c1f196406e474813fc2feab4d
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\resources\app\node_modules\blake2b-wasm\package.json
Filesize782B
MD585f6234e8249e84f2a2361d5142707a3
SHA1d3714b3f9fa05401342b89d5c9f9d47f9bdcd7ef
SHA2565bda19aefb010a8fccff1fc5dce0e9d3ff75ae1921e584d1becb4c371b3b4541
SHA512e6919601c8dd1f7dbbe487c42ec441411338cf7fcf3a2da0a4f7f91ed1d963d2db7e8a00ec4a4bbde5be8323db1fab55b44b364fc8684c710a041148c99b1e73
-
Filesize
9KB
MD5350e95a4d11b533abbd5d4414d38005f
SHA137f2bb772cc953169bbfc13087b13ba6952ed8b3
SHA25689d35ca4687b8ad3bd659b1a39f44a8a4a393ac977be5af1e1ce32116c25c064
SHA5128e9648cedceb87e36e915e050329d8ce246bfba0ac18f9d491efb0160e7e89defa7a4a33301def1dd4a2b72bf8b1ea6c64cf03dafb90c615f1e23d5d016e0863
-
Filesize
742B
MD588595359281788f64142b0938af3f9db
SHA1d35800917d86c3d104b9142926e9daa2ba4bf3dc
SHA25647bcf83fa22df55efb1759c46153bc6e994036c2146d5a0de3867953a603f870
SHA512a2b8cfc39020dce3384ecccb149df4092905e8ff77c14c93c6162eb35788c11b3141f2dc1382dbead2e0bbcc7f0970bc0e1af97b4e9795e2e0193f9fef4f7ef4
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\resources\app\node_modules\debug\node_modules\ms\index.js
Filesize2KB
MD5fddcc2097091479666d0865c176d6615
SHA155f9b3a7d4cfbf68b19ccd0d698aa86483dd4694
SHA25655986972f5f3c9446f876c576e1cd30fd4f04cd26527efbb5ad834637c740e4c
SHA512252644169a9398527927b69a2f19c6578bd62dcd180b94984d991939f53bf4e77ca687e840db42f7dba3b37124a5e3f3eda83535e75491bbe6ca440a7149913f
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\resources\app\node_modules\debug\node_modules\ms\package.json
Filesize705B
MD5b3ea7267a23f72028e774742792b114a
SHA1fe112804e727b4f3489e9a52900349d0a4ed302c
SHA2563708fd273bf5b1e91c72d88143f48ad962adcc10b99250a4a203d13804f37757
SHA51201975d65bc491d0b39435d793a62bcdba6b5edf4fb886de0e48a8a393e26fdf31bdfb4f91dd7e10ba69a1e62ed091d5ea04f9f8bf57d784c3491a5c5c8472988
-
Filesize
1KB
MD52630a1ac039c8970c8fb0daf0f2f03c4
SHA1ed6fe3dcf77a4c2ddadde904c5b1fc47cf9893c7
SHA256754ba4f352a9b983fbbf93cfffe015d29bc789a08eb05815270abf50902697fb
SHA512a017d21a1ecb159065bc32b94b38de03b38c10448b85f88bfe1498b144320884d612a868b9db192d6acf041f88da415f953d9dd8541ee29e4053e2463dd54791
-
Filesize
6KB
MD528e94a3cc7d081498bea5ced383038f6
SHA1c9707394c09387b56864a8865158d29fd307774a
SHA256c65bff44c189188e0c45afdbd9b02c427ff5c6e54b94da53c102fbb7a53f0e37
SHA5125775d4c9b823dc9514488a28f2bfcba990a13defdfc5992e1ffec915ca5e6ec2ba87bddb1cb7f4b772345a14b4041f98a74f7bcc9d9be2a3371e3002c33bbebc
-
Filesize
314B
MD5d6c53f5a0dd8f256d91210ad530a2f3e
SHA10f4ce3b10eff761f099ac75593f7e05b149ae695
SHA256aa127ff1752b7d9c7415c5c7bb6994d9aa722b81bcbcab4bd48316b013d23bf3
SHA5124faa874d9d862ffc921528742c4f1fe8a9b22a358760f6e93fcef138523575329a801ce9659ed8e96b02b73e581b3e99d91973e22981b358ffb5e43103a536c2
-
Filesize
4KB
MD56e63fda079262f01e14f03bdf77146c0
SHA1481608e3c95722f3a474336e5b777a6a521e76f9
SHA256f237adcb52849de7c128f57e0468b52353c529a6c8341810477c0e7144359559
SHA5123017b4717118f56fac106dcaa046aecf3cc63c37e64f49838e5379a13583c293f39ec5ace48fb2dabeac6af4a967f96219812733ead6f36c3f5c8d132d795900
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\resources\app\node_modules\electron-deeplink\dist\index.js
Filesize7KB
MD5d359d8698706d059e14b6f3eeedced8c
SHA19acb5276a78ed09acf81a62e1db439217aff85cf
SHA2566c693e5ca23e904436e4bf6e68901147d319fd7132b2bcff4dd061615bb8a773
SHA512f44a7196ad9d4f44085966ac6724f48d00566189136d08a9b13b4ac3cc7e6d1addf2e854098fb4c2ec94c28e3f48168f82b0d1134d0066237dd5fba91c35ccfd
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\resources\app\node_modules\electron-deeplink\dist\stub.js
Filesize156B
MD562063cc3b8565061daaddf496dd15731
SHA1206166851431982536333b4a1b9c31f9e5111295
SHA2563f39ca63ca2f696207da3702df9a4df21e980a13f0e77528340730e2bf315fd6
SHA512a6006c18cdf95cf641e54e10c76ff6c7ae47d881435ca54847e2b687fec2a9a129a2e2e3ca600557a328b34c22c54cfd7a6db4865af0f122c6cb5963e65c66e5
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\resources\app\node_modules\electron-deeplink\dist\templates.js
Filesize458B
MD5790b7b8bf5ed00feffce05aac1c79492
SHA15ac0afae48c626cc6474268c725342039e5e5ef0
SHA2566bd01e7f8ea390760ae26ae469f6627dd7a9447360b477bba6911b76cb0e921f
SHA5122522716477010a2ba3df3b1faa69fd8bb36cad02f6a43f95b7bbb75a49f516e6c2619e1dab8e1b85c888a2385b3435ffa95f9cda95e0c4dcdcb467cadbd515f5
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\resources\app\node_modules\electron-deeplink\package.json
Filesize1KB
MD516fd5b35f0cbaed2b0b719e69f9f5a4b
SHA17b82df17cfdfcdfd8f8d4ff02502f1d7a8b964b4
SHA2569fa3547f74427c8e7b20cd51a27f58d4a97a465f919177a7fb177143624e0e2c
SHA512a19b574a3009dd7cf823dcfaf84790a60bec7b743211045cccaa3970923fc403af3c80d801d8a706cde599afe79317f99c98f429abefaad4583e6e181d55a5ed
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\resources\app\node_modules\file-uri-to-path\index.js
Filesize1KB
MD5d98f7c699c54e0e90f408a44feb3188b
SHA10ffd660201ce0749053d108c53e5606b9da158d6
SHA256e62293e871bdd5a7449ff3c7956c9536ec1d2ea7369461de77322b5256bb93e7
SHA5127389081fbf3b16f0ad99f556337679be895e04930e36bfc8f99720e013f28b68bdd4579f11eb41dd4cc7a64a36ec26a6e6539d42d5888696f71e7d2d9c8784dc
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\resources\app\node_modules\file-uri-to-path\package.json
Filesize717B
MD565f30030f0e7b2eff552eaabd8bb1fe1
SHA15dee8a540c467ffbf9025481180c77a06a9f46f2
SHA25671eb1e24bb9694f89c613fa0aa307f977dd43f41d11794c7b48fabf6c55f66b0
SHA512763c372773f093de60fdbe0bdd5d0b6362882e22eaebed51f70ea50fa3087417b5c517ea9ea057b56d40f019cea042a6e8c387356da1b9b9d39c2a5f16e7b5d4
-
Filesize
2KB
MD583c46187ed7b1e33a178f4c531c4ea81
SHA1ea869663486f513cc4d1ca8312ed52a165c417fa
SHA256e5f0b6a946a9b2b356a28557728410717df54ea2f599edb619f9839df6b7b0e9
SHA51251b45089a53a23c12e28eb889396e2fa71b95085baa5ac34d71ffb625131bf2fec3ae98efeae537656e20ea257f44e089bcebc9ad54cf672cde852102e43e153
-
Filesize
732B
MD5a682078f64a677ddad1f50307a14b678
SHA1c290eb97736177176d071da4ac855ab995685c97
SHA2561a6b4d9739790c0b94ab96c8cc0507e281c164c311ff4fbf5e57fb8d26290b40
SHA5129e16c5689b57275f4ed624c6954f12299706e2372a60f6173421800da5edf9ed52e52fd2b0798f826cddbade6ca19a6e6a996960c6697cc2da0ddecb36409520
-
Filesize
438B
MD544d45c7081a567a4d0cb4bbb36bf6be6
SHA169a7954eab536502b052557d5911acb9de503dad
SHA2565a3c8dce33093172d9cb3d6bdd34e464d17a1da175a8f8b74f0c0d22dde94fbb
SHA5120c3195a63b389bab6612e3824a65a5cacc2852aa2f8b272e34717be4608197bc1f9b4529879a13fa9567d0ae9846916dd645349b9797418f88e7ce7bc5d4e504
-
Filesize
647B
MD5de6935b833716ef4d703b58e188ace78
SHA101cb598615db0cb08979b3ff1e4324d047eb1fa0
SHA2562152421c559e2aeb7c002ecfeac306340d23cf3783446cea607a284658df30bd
SHA512b134877eb15c2fa70a5e0549c8a736e8bb8ff84426cac51ed581f707d38c75c110f96c233825409a3948a6943fb1c26cc25617092b40645e68073d6d58f0ee65
-
Filesize
7KB
MD57d598c8605e26cafe489544f1730d380
SHA102c41eea7eb4ce2d32b7faeb4229edaa28b9d8e4
SHA2568194f9425ce9ab06ea9aebcd64a85ec064d95d61bb349f8f1c98762ad256638e
SHA512f79b6e635786bb4b38f80562d862a6a2c908ea691b3fc42712aae82591c735acd02d8fd79ccf37468e58f865bba28f9be0d92182b30c8e4b4ef7261bb57f213d
-
C:\Users\Admin\AppData\Local\Medal\app-4.2535.0\resources\app\node_modules\tr46\lib\mappingTable.json
Filesize253KB
MD526c6da7a34c8a051a60b3592287d3fea
SHA16e09dfd1d4d65675bba0a9bb69e0bd6393f0d5da
SHA256b6b39724dca9011113a08d9d6910204062b58169e98952acdfbd19bf2c31bbff
SHA5128ad552c64f53303c00f2a56c1fdc2d6c644b12aa993c181d5f4847fb4613701b3d03d2a4f8e347e1d755999681585ae3081e865ae54f21340c826196c2af83d4
-
Filesize
732B
MD536ce158498fb4f35c9a42edb60665bbe
SHA149c76b0a075effa9325c17f55c4d6472ddf3c7a9
SHA256615087f58ee138fd35c2b414c355b72e36e5919725b8aecc1c34f6a5585b9779
SHA512676215940610329d35feef0674d9dc61a9ab7c265d6eedca582e13003acd8b9d8b4894c86e79eaa85e97266682dbbe9637826b99f0b9afa56dbcf9ad077a1a55
-
Filesize
9KB
MD5a86e209d4b8219384556d7b641e571c2
SHA15453945c75646cd23bd9cd562c52ec86aae69189
SHA2560c8bb2d6ce351c4dad829b23178c271b10d4cf028ba239edf4f687756cf2420e
SHA512db612348233d366e249ed83f240c6144a16195979792c62f48b6af03f9c7648aa8593c122df99cae63fc1a007b5a7b04089b989270afc57a5e715ed754f41ba7
-
Filesize
20B
MD5adeb46363a0d587d0d93784e223ce1de
SHA1ef8936254d20fdee5f1fcf80a43e5bab277d4993
SHA256507a929a125c5038b68c113a1e4c7a17ccea1978fe43a4a92a16f905c54a41ec
SHA5120479e1c3aee76e4ff939965655452716a99f9ad4457ae567d43cd3c12adfd80439908ad10146020b6c0548e620278377da762bb2556b3c1db54f74a5e709dfa6
-
Filesize
2.0MB
MD5ccea2b1c1820bc3c0431b3f713c14181
SHA1eda155902d7c5104eddb404f0e03c8368165e745
SHA25605989a097711e8628f5b3912321e23f66394b7873c319a775bde977908a09436
SHA51200da888d8e9ddbb5ff9a85e90db3919e443cbf1e5bd8e237eff544216ec445e889395a3a54f70de2a6c314081deeb666414117c01ec1041dc15c90e2719344aa
-
Filesize
471KB
MD56503b392ac5c25ff020189fa38fbaecb
SHA150fb4f7b765ac2b0da07f3759752dbc9d6d9867b
SHA256add78f3f85f0b173cbe917871821f74c5afe0a6562462762b181180d16df4470
SHA5129c12fff1686845a2c0b43d35a8572f97e950f232f1ce5690fd1212f48c171edbcc5d725754f10a66599b0823ac0c995c7212e263b7e02ea0ed9f2d2b937fa760
-
Filesize
79B
MD5969371ddd9f9b4db6179c4fdc6e56545
SHA1959e571107d82970405e322164c97cef9540b6eb
SHA256d684a6dc4ed1c4ac7a5dabfa27fe8b10d2532b65fa1132ef6f8a0da5e46578c0
SHA512678ea1f8af47eb91d2b7d066bffba1658c3638df27527a2d7d076a93e2307f2df23489038652d4311297ca7d9913a0ac6c063214867ca93fb7ba6d38ce7486ee
-
Filesize
356KB
MD5b15e2e40fac551f7aaac328b423e5a31
SHA171e2bcdf47e0097a30c849b1c65611cfab7b9441
SHA25608581fd1729f3ef887b32a9c943bd8d3bb2c0e71adea75065a990327cb46ce60
SHA512c5ac4d3ee876a046b6c66e12c1d41e9991300e83ec736c2051297c9f711bf5e95f95fbac8dca51332c2911251a640844059aa33b965b2ec8733c63886e3cc715
-
Filesize
132KB
MD54fe78278c727ca838a6b0a8b5d2fc924
SHA17eba94ab9295e387f43fba20fcb79bc3db1dde64
SHA256af8a663dc9f9407b1a0582c835317f62c0f3fc1fbe542e1df0f9ef39e913ba45
SHA512ce381dbbd80e0ccbd0e9a5b1d7c070f0bf3bd52d71ae9cd87254cad2c41b61871392595f7bffb23f215f8fabdc2fba64758eb5d1e6b97da99fe4149db54123c2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
55B
MD545841b9c69ca32fe3dae88a7e8a56cad
SHA175ffddf066f31d300a96f66fe5047642af4af6ed
SHA2564ba3e1146a473400141191b0f3e0192e589a8a5909997890cca232ab5fcbb102
SHA512d94e987bffbd7a8f6db4197e00c86639f6ff84dc56e7bd1de65a2c329657cd24d8a59efa0b470fbd40afabdcf634300a240bcaf1ba221638ebf9858412a817ef
-
Filesize
19KB
MD506e68fbf4095f600c844b7e250a6dfdb
SHA122f1aa6c8eb82861caa8a913663aadf738cf8f59
SHA25662b912b1f31337af388e1042d25306f321c0bf00c3fb49a93c52b470bbc012e6
SHA512451ebfd9a4d23adca529f94187597aa148ac584329a92a80a8d3291393030f58da169d59100973b815d6e5d341702b969d06b8d39c826a267da8824fb7747110
-
Filesize
115B
MD5873b97c297599228f15829950734e6c5
SHA1c74a7ec441f403cb2eb29d09badbe9d3e2fff2b2
SHA2567c0539dce90e8360885bf7dd804d41a24168afffae0dee0374d5bf1463a2c630
SHA512a1fff289618067f3b3a25a8f492de78cecc997ea3c54e40ed520f29e114690d82d5027ec0dc638cad2b4c20e75b92340c2b6ec05a827f1cce2ed104f86355026
-
Filesize
4.7MB
MD5cb9807f6cf55ad799e920b7e0f97df99
SHA1bb76012ded5acd103adad49436612d073d159b29
SHA2565653bc7b0e2701561464ef36602ff6171c96bffe96e4c3597359cd7addcba88a
SHA512f7c65bae4ede13616330ae46a197ebad106920dce6a31fd5a658da29ed1473234ca9e2b39cc9833ff903fb6b52ff19e39e6397fac02f005823ed366ca7a34f62
-
Filesize
1.8MB
MD5d1eb407d80c6dd2b86df39c2f5a7c0c8
SHA13c09fb7f21e90b61e5495603d48e1423daaa98de
SHA25601d8f8aca664ecd655bdaf80003de490015ef67daa685a8d5abc1faa7af6a609
SHA51256debfefbe89c5ad5476a1fe2ab114752a326adde6b8e867bb398a0a1b4d35405f3db2df96f295c9c2adb27d1eb49aac0ae5389f444271d56da85e4d1e4671b5