Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2025, 08:55

General

  • Target

    https://github.com/kh4sh3i/Ransomware-Samples/blob/main/Jigsaw/Ransomware.Jigsaw.zip

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

Signatures

  • Jigsaw Ransomware

    Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

  • Jigsaw family
  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (3763) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 7 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/kh4sh3i/Ransomware-Samples/blob/main/Jigsaw/Ransomware.Jigsaw.zip
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3676
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffacd7b46f8,0x7ffacd7b4708,0x7ffacd7b4718
      2⤵
        PID:4004
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2
        2⤵
          PID:4784
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4608
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:8
          2⤵
            PID:2220
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
            2⤵
              PID:2756
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
              2⤵
                PID:2804
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:8
                2⤵
                  PID:4452
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3388
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5688 /prefetch:8
                  2⤵
                    PID:2512
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:1
                    2⤵
                      PID:4744
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:824
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3552
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4020
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
                      2⤵
                        PID:512
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2396 /prefetch:1
                        2⤵
                          PID:4092
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:1
                          2⤵
                            PID:652
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:1
                            2⤵
                              PID:3804
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:1
                              2⤵
                                PID:3704
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3608 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1236
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:1
                                2⤵
                                  PID:3112
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2480
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,7024349886543465483,14635878484498628820,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6352 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2332
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3752
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:4776
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:3724
                                    • C:\Windows\system32\OpenWith.exe
                                      C:\Windows\system32\OpenWith.exe -Embedding
                                      1⤵
                                      • Modifies registry class
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1592
                                    • C:\Users\Admin\Downloads\Ransomware.Jigsaw (2)\jigsaw.exe
                                      "C:\Users\Admin\Downloads\Ransomware.Jigsaw (2)\jigsaw.exe"
                                      1⤵
                                      • Adds Run key to start application
                                      PID:3528
                                      • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe
                                        "C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\Downloads\Ransomware.Jigsaw?(2)\jigsaw.exe
                                        2⤵
                                        • Executes dropped EXE
                                        • Drops file in Program Files directory
                                        PID:1584
                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
                                      "C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"
                                      1⤵
                                      • Drops startup file
                                      • Sets desktop wallpaper using registry
                                      • System Location Discovery: System Language Discovery
                                      PID:4836
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib +h .
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        • Views/modifies file attributes
                                        PID:3604
                                      • C:\Windows\SysWOW64\icacls.exe
                                        icacls . /grant Everyone:F /T /C /Q
                                        2⤵
                                        • Modifies file permissions
                                        • System Location Discovery: System Language Discovery
                                        PID:984
                                      • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\taskdl.exe
                                        taskdl.exe
                                        2⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:3796
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c 107261738573077.bat
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4832
                                        • C:\Windows\SysWOW64\cscript.exe
                                          cscript.exe //nologo m.vbs
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4020
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib +h +s F:\$RECYCLE
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        • Views/modifies file attributes
                                        PID:2180
                                      • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\@[email protected]
                                        2⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:4704
                                        • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\TaskData\Tor\taskhsvc.exe
                                          TaskData\Tor\taskhsvc.exe
                                          3⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:792
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd.exe /c start /b @[email protected] vs
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2512
                                        • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\@[email protected]
                                          3⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of SetWindowsHookEx
                                          PID:4796
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4956
                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                              wmic shadowcopy delete
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2380
                                    • C:\Windows\system32\vssvc.exe
                                      C:\Windows\system32\vssvc.exe
                                      1⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3796

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_remove_18.svg.fun

                                      Filesize

                                      720B

                                      MD5

                                      75a585c1b60bd6c75d496d3b042738d5

                                      SHA1

                                      02c310d7bf79b32a43acd367d031b6a88c7e95ed

                                      SHA256

                                      5ebbfc6df60e21044486a5df3cb47ccdcd7a4d5f197804555715ffd9bf6c5834

                                      SHA512

                                      663a302e651b9167f4c4e6ae30028307b4d8da0dda3a0e5fd414104951d50419862fc9396c5b39fe5c4b696efd3efbf0b575688983b1d341f3ef38becf500505

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\icons.png.fun

                                      Filesize

                                      7KB

                                      MD5

                                      72269cd78515bde3812a44fa4c1c028c

                                      SHA1

                                      87cada599a01acf0a43692f07a58f62f5d90d22c

                                      SHA256

                                      7c78b3da50c1135a9e1ecace9aea4ea7ac8622d2a87b952fc917c81010c953f7

                                      SHA512

                                      3834b7a8866e8656bbdbf711fc400956e9b7a14e192758f26ccf31d8f6ab8e34f7b1983c1845dc84e45ff70555e423d54a475f6a668511d3bcbdd1d460eeb4b0

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\icons_ie8.gif.fun

                                      Filesize

                                      7KB

                                      MD5

                                      eda4add7a17cc3d53920dd85d5987a5f

                                      SHA1

                                      863dcc28a16e16f66f607790807299b4578e6319

                                      SHA256

                                      97f6348eaa48800e603d11fa22c62e10682ad919e7af2b2e59d6bd53937618f2

                                      SHA512

                                      d59fa9648dc7cb76a5163014f91b6d65d33aaa86fc9d9c73bf147943a3254b4c4f77f06b2e95bb8f94246a982ea466eb33dac9573dd62f40953fd23de1c1b498

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\icons_retina.png.fun

                                      Filesize

                                      15KB

                                      MD5

                                      7dbb12df8a1a7faae12a7df93b48a7aa

                                      SHA1

                                      07800ce598bee0825598ad6f5513e2ba60d56645

                                      SHA256

                                      aecde4eb94a19095495d76ef3189a9abd45bcfd41acbed7705d22b4c7d00aa77

                                      SHA512

                                      96e454ebb4c96573e8edc6822290c22d425f4c7f7adbab35e6dc4b3ce04a5916ae9254c2c312c98299835ecbf3c5aa95da2939b8408ac25fbae44ba87a3795dc

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\new_icons.png.fun

                                      Filesize

                                      8KB

                                      MD5

                                      82a2e835674d50f1a9388aaf1b935002

                                      SHA1

                                      e09d0577da42a15ec1b71a887ff3e48cfbfeff1a

                                      SHA256

                                      904372666ca3c40f92b20317d92ca531678958affbc34591401e338146fe0ecb

                                      SHA512

                                      b10a8e384d0bd088443a5085f5c22a296f6f4d295a053d4526690ba65846e887daec47d01cf18fdf1160db98061a8b7c4040de56e6e604451a821fadccf32698

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\new_icons_retina.png.fun

                                      Filesize

                                      17KB

                                      MD5

                                      150c9a9ed69b12d54ada958fcdbb1d8a

                                      SHA1

                                      804c540a51a8d14c6019d3886ece68f32f1631d5

                                      SHA256

                                      2dee41184747742fbdc527b2023d67fecec1ccdfdf258439a06cd75d4fd33f43

                                      SHA512

                                      70193ee6f0919eb14311f43b5a5da041deacb568db55fc43290ee76e17af902ac468435b37a150630ea3b7871c724073915ae5dcba3c301ac42f2d68dd598e2f

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon.png.fun

                                      Filesize

                                      448B

                                      MD5

                                      880833ad1399589728c877f0ebf9dce0

                                      SHA1

                                      0a98c8a78b48c4b1b4165a2c6b612084d9d26dce

                                      SHA256

                                      7a27d891097df183fbf0031e3894bdac0ce77aef15d666ddd9f6a04e9836fb27

                                      SHA512

                                      0ddf247892a72a390437390d535debf6e41d12e51b31eb4f0353b710ec380c5fbc531a48e76935088063a41aca843287d3def9c1cd46be05b8dcb69f5017a464

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_2x.png.fun

                                      Filesize

                                      624B

                                      MD5

                                      409a8070b50ad164eda5691adf5a2345

                                      SHA1

                                      e84e10471f3775d5d706a3b7e361100c9fbfaf74

                                      SHA256

                                      a91790b778026db625c9dedfe1c6d94b884818b33d7977e86b2f9c2f3c500796

                                      SHA512

                                      767a75edd37d29b3433040ce21cda849cd11ba549f27581f7edc6416c433ba7047c56908d40956422393ab0f35ede61617d4bd2aad0bde3d1ebd276584c858c7

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_hover.png.fun

                                      Filesize

                                      400B

                                      MD5

                                      2884524604c89632ebbf595e1d905df9

                                      SHA1

                                      b6053c85110b0364766e18daab579ac048b36545

                                      SHA256

                                      ae2facd997527426fc4def82e0db68be29b44499bfff86a28c36f7c31b177d4f

                                      SHA512

                                      0b506397627823a1768796129c6b37d146821471b89338b5f2d0fd3aea707fd46a8e197ee0e298ddfb3b50eef0a0b064946006346b060f733ef19cbd5d24fc90

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_hover_2x.png.fun

                                      Filesize

                                      560B

                                      MD5

                                      e092d14d26938d98728ce4698ee49bc3

                                      SHA1

                                      9f8ee037664b4871ec02ed6bba11a5317b9e784a

                                      SHA256

                                      5e8ec278a273be22199884d519a79f748801baa3a45b76e57569fdfffe96e7fb

                                      SHA512

                                      b2fcb5d46339cdf6b5a954f2a083cf913779e57cb6e8699bc5da1fba1c370c41117b7ddefb50075622067eb7b02a20268bc047171bd883bcda4a497c2ec64ea4

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon.png.fun

                                      Filesize

                                      400B

                                      MD5

                                      0c680b0b1e428ebc7bff87da2553d512

                                      SHA1

                                      f801dedfc3796d7ec52ee8ba85f26f24bbd2627c

                                      SHA256

                                      9433084e61062d2b709c1390e298ddaf3fb0226656662c04c0b7026a44dee750

                                      SHA512

                                      2d1399a6bf225b048d2b12656e941ad912636acae2dec387f92f33ac80629a1e504bca63580ba73a8ed073788f697274d5eb76ea1b089f0555fd397a8f5cbbff

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon_2x.png.fun

                                      Filesize

                                      560B

                                      MD5

                                      be26a499465cfbb09a281f34012eada0

                                      SHA1

                                      b8544b9f569724a863e85209f81cd952acdea561

                                      SHA256

                                      9095e9b4759e823e96984981af41b7a9915a5ecaa6be769f89c13484cef9e0f5

                                      SHA512

                                      28196e5de9670e9f63adcf648368bd3ea5926a03e28a13adc2fb69c567fba2f84e4f162637c487acb64eda2e30993f849806f2313820ba693c7e70303542d04f

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon_hover.png.fun

                                      Filesize

                                      400B

                                      MD5

                                      2de4e157bf747db92c978efce8754951

                                      SHA1

                                      c8d31effbb9621aefac55cf3d4ecf8db5e77f53d

                                      SHA256

                                      341976b4fe312824d02512d74770a6df9e1c37123781655532bd9cd97ea65fa9

                                      SHA512

                                      3042a742c38434ae3ee4fe10f7137462cdebad5cae0f9a85fb61063d15a30e1b54ac878b1af65f699c6ca1a9d2c3e58d245e54bdebfadc460cbd060836734e11

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon_hover_2x.png.fun

                                      Filesize

                                      560B

                                      MD5

                                      ad091690b979144c795c59933373ea3f

                                      SHA1

                                      5d9e481bc96e6f53b6ff148b0da8417f63962ada

                                      SHA256

                                      7805ac9d0e05d560023e5aabed960d842e4f3ec2aa3db45a9cfb541688e2edb1

                                      SHA512

                                      23b4c799a7b25f70962e8dd0ec7286ba7150053cab7c88f5fb1efc1095c2987bd6f3572e7fb3ee4b2238958e52a763de2c84a74615df7a6d3a19a034584fd687

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\example_icons.png.fun

                                      Filesize

                                      688B

                                      MD5

                                      65368c6dd915332ad36d061e55d02d6f

                                      SHA1

                                      fb4bc0862b192ad322fcb8215a33bd06c4077c6b

                                      SHA256

                                      6f9c7ebec5a707de439e3fd2e278fdfa07a39465d56157b70b24f091509bf76f

                                      SHA512

                                      8bb9a7690aeb3c0b9e14e1a6ebc5741536d354cf2324fd74ee0c3e4ef511718f7795039a94c8d2df94b6e6d0fb1762191cb649089d1def12abdf34003f0cdd0f

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\example_icons2x.png.fun

                                      Filesize

                                      1KB

                                      MD5

                                      0d35b2591dc256d3575b38c748338021

                                      SHA1

                                      313f42a267f483e16e9dd223202c6679f243f02d

                                      SHA256

                                      1ca0cfc2df0354c8d886285ae5e743d9c7cc030e1afd68ac113c0f2ce43ad5fa

                                      SHA512

                                      f6c58c27bbde7508a866bd0e7fabadb13a4f020378cd8b8cfc0c9fa23f645d811d6cdea04b81afdf30c064c6248152e74b3e6a78ec7a3d1d19037a0db8897d7e

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\bg_pattern_RHP.png.fun

                                      Filesize

                                      192B

                                      MD5

                                      b8454390c3402747f7c5e46c69bea782

                                      SHA1

                                      e922c30891ff05939441d839bfe8e71ad9805ec0

                                      SHA256

                                      76f8ed1dd50e50c7d62b804a0d6901a93e5534787d7b38467933d4c12ce98a0d

                                      SHA512

                                      22b26c62473e80d17c1f78df14757ccfb6c7175faa541705edc153c02baa7ab0982b5daabe8dd2c8c9efb92af81f55ccaeeecffe8ed9a0b3c26e89135ca50923

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\bg_patterns_header.png.fun

                                      Filesize

                                      704B

                                      MD5

                                      6e333be79ea4454e2ae4a0649edc420d

                                      SHA1

                                      95a545127e10daea20fd38b29dcc66029bd3b8bc

                                      SHA256

                                      112f72ef2bc57de697b82b731775fba3f518d1ae072120cd11b732bf4a782e36

                                      SHA512

                                      bed5906c7373814acc8a54c1631428a17f0aa69282920447a1575d8db826afd5dab262301dc6da610ff8bb81d24ec6babd3d9fb99fd6945f1aca9cb9c76ec2c9

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\illustrations.png.fun

                                      Filesize

                                      8KB

                                      MD5

                                      3ae8789eb89621255cfd5708f5658dea

                                      SHA1

                                      6c3b530412474f62b91fd4393b636012c29217df

                                      SHA256

                                      7c5b1d8469e232a58359ccbcb89e619c81c20e6d2c7579e4292eb9a19849bc5a

                                      SHA512

                                      f6998dbae1a2fa56f962045261a11a50b8e03573d9d4cf39083da3be341cc104e0ecf5908076f03961bcdb1356d05a7450d69940ec3aaab73623a6fe180e7051

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\illustrations_retina.png.fun

                                      Filesize

                                      19KB

                                      MD5

                                      b7c62677ce78fbd3fb9c047665223fea

                                      SHA1

                                      3218c7b6fd8be5e0a8b67d3953d37d5dbd0c71d8

                                      SHA256

                                      aa638be6e1107ed1f14e8430abedd6f6d0a837a31b1b63e6a7741d6d417eddc2

                                      SHA512

                                      9e0cc29835845f2a0260a6989c1b362bac22a8e0c2825bc18f1dde812ce7868503881d2deaf951429a80b5017b6ce31e785ff524883e08d730aa38b36a2fb074

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-gb\ui-strings.js.fun

                                      Filesize

                                      832B

                                      MD5

                                      117d6f863b5406cd4f2ac4ceaa4ba2c6

                                      SHA1

                                      5cac25f217399ea050182d28b08301fd819f2b2e

                                      SHA256

                                      73acdc730d8a9ec8f340c724b4db96fc222bb1eaf836cec69dfe3fab8d6ac362

                                      SHA512

                                      e10883029c1e0fbc64bec9aac0a6957a8499af255e1790843717212077926474e02b2870c5dd04b057c956b97ad4bb1747fe73e731ea61b891f4b38dd80494d7

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ui-strings.js.fun

                                      Filesize

                                      1KB

                                      MD5

                                      433755fcc2552446eb1345dd28c924eb

                                      SHA1

                                      23863f5257bdc268015f31ab22434728e5982019

                                      SHA256

                                      d6c290e942ee665d71e288229423a1f1866842988eac01f886910b0ec383aa9b

                                      SHA512

                                      de83b580ce27012a7677e1da867c91e2a42dbc6b5872dcf756ace51c2862801814665ecca997171f2e550e8b9a3de19994d2516a4e5d4d57e16c7b4b823236c0

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ui-strings.js.fun

                                      Filesize

                                      1KB

                                      MD5

                                      781ed8cdd7186821383d43d770d2e357

                                      SHA1

                                      99638b49b4cfec881688b025467df9f6f15371e8

                                      SHA256

                                      a955039cd9e53674395f4b758218e4d59c89e99a0c4d2a909e49f6008b8f5dd4

                                      SHA512

                                      87cb9c4288586df232200f7bbacee3dee04f31c9444902dd369ad5c392d71e9837ebf8b3bb0fcb4a5db8a879cf757e97ce248939e3316c6bf3a3fe7cbe579534

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\bun.png.fun

                                      Filesize

                                      2KB

                                      MD5

                                      51da980061401d9a49494b58225b2753

                                      SHA1

                                      3445ffbf33f012ff638c1435f0834db9858f16d3

                                      SHA256

                                      3fb25ddd378ab756ec9faa56f16b76691cf6d9c7405bb9a09ce542a6f5b94e44

                                      SHA512

                                      ecc5eb2a045ce2508d461b999f16caba6cce55aa0c00b34bd73a33e0458795f93a77caff5026212912684164057be016f51dc57ec83821c2a1f2e27417c47b2c

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\cstm_brand_preview.png.fun

                                      Filesize

                                      2KB

                                      MD5

                                      2863e8df6fbbe35b81b590817dd42a04

                                      SHA1

                                      562824deb05e2bfe1b57cd0abd3fc7fbec141b7c

                                      SHA256

                                      7f1238332901b740cde70db622abcfb533fc02f71e93101340073552f4820dad

                                      SHA512

                                      7b2d95465ea66951ea05c341549535a0a939d26dbde365b212e3983e4047fa6912c37d737cb8054c41bb1a7d92586d968a0154c666572a70ebc59a4776897f38

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\cstm_brand_preview2x.png.fun

                                      Filesize

                                      4KB

                                      MD5

                                      79f6f006c95a4eb4141d6cedc7b2ebeb

                                      SHA1

                                      012ca3de08fb304f022f4ea9565ae465f53ab9e8

                                      SHA256

                                      e9847d0839d3cf1039bebdc49820ee7813d70941347ce420990592e5e3bd998e

                                      SHA512

                                      c143a4cf1ccfa98039b73214978722408188535ee4aa3dac08a34760b94bdf6d36ad0ff0de893da5b17fd69c96a6dfb25098ab7fec219fad1a77532113d0353e

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\dd_arrow_small.png.fun

                                      Filesize

                                      304B

                                      MD5

                                      b88e3983f77632fa21f1d11ac7e27a64

                                      SHA1

                                      03a2b008cc3fe914910b0250ed4d49bd6b021393

                                      SHA256

                                      8469b8a64e80d662eec71c50513f6d295ef4a3a9992763dbcac9d81253cef9d5

                                      SHA512

                                      5bf93d4f4250ca96169f3d27d4e648cc5d6e00b7558a3ef32e07edcbae36dadb8008d7ba5f83ac3ed812b72c9d52730e866191b4de7a339df57b5697e00df50d

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\dd_arrow_small2x.png.fun

                                      Filesize

                                      400B

                                      MD5

                                      f77086a1d20bca6ba75b8f2fef2f0247

                                      SHA1

                                      db7c58faaecd10e4b3473b74c1277603a75d6624

                                      SHA256

                                      cf10d2a22b638cf0978cf30ecaf39ecb5bb0e3ad78cd920afa433ad60cc1290d

                                      SHA512

                                      a77a897c0b41f4052cb9546d4cfd6e0856b288b6b8583a86d6c7e79059a05b19cc2593599251581e79107235e9d5cd589c392bf490452be04ff57e944cd19df3

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\nub.png.fun

                                      Filesize

                                      1008B

                                      MD5

                                      e03c9cd255f1d8d6c03b52fee7273894

                                      SHA1

                                      d0e9a9e6efd1746bc9ccb4eb8e7701c1cd707e2e

                                      SHA256

                                      22a34c8321384fc7682102e40d082e7812232a9109e4d4e8fa2152fda3f260f6

                                      SHA512

                                      d4bd002197b725316e1f1f2dd0a70ee44a82a53ac0dafa8c6b1166343adc406e147d0c4cca30d65a32aa545f1b327c6b69c0ec1d15330af48a6faa234dc4b5ac

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\share_icons.png.fun

                                      Filesize

                                      1KB

                                      MD5

                                      62b1443d82968878c773a1414de23c82

                                      SHA1

                                      192bbf788c31bc7e6fe840c0ea113992a8d8621c

                                      SHA256

                                      4e96529c023168df8dde241a9acdbf4788ea65bc35605e18febff2b2071f1e24

                                      SHA512

                                      75c8604ea65e0cdd9ea74b4802930444dd16a945da1e7f0af4a9a3762259ee9eb41ea96973555d06f4814ee2f6b73ab662c6b314b97876e9628fa5d4536e771c

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\share_icons2x.png.fun

                                      Filesize

                                      2KB

                                      MD5

                                      bca915870ae4ad0d86fcaba08a10f1fa

                                      SHA1

                                      7531259f5edae780e684a25635292bf4b2bb1aac

                                      SHA256

                                      d153ed6c5ea8c2c2f1839f8dadcc730f61bd8cd86ad732bab002a258dea1d037

                                      SHA512

                                      03f23de6b0ae10e63c41e73308b3844d49379c55d2df75fa1dc00771b26253d832c21081d8289f04260369df996e31273b7c0788cf3b5c78a27ec909f14a283a

                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\nl-nl\ui-strings.js.fun

                                      Filesize

                                      848B

                                      MD5

                                      14145467d1e7bd96f1ffe21e0ae79199

                                      SHA1

                                      5db5fbd88779a088fd1c4319ff26beb284ad0ff3

                                      SHA256

                                      7a75b8ec8809c460301f30e1960b13c518680792e5c743ce7e9a7f691cfafc38

                                      SHA512

                                      762d499c54c5a25aba4357a50bb4e6b47451babeda84fa62cfbd649f8350bca55204ad002883b9147e78dda3dbabaae8da1dc94b716204226bb53326030772b7

                                    • C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.fun

                                      Filesize

                                      32KB

                                      MD5

                                      829165ca0fd145de3c2c8051b321734f

                                      SHA1

                                      f5cc3af85ab27c3ea2c2f7cbb8295b28a76a459e

                                      SHA256

                                      a193ee2673e0ba5ebc5ea6e65665b8a28bd7611f06d2b0174ec2076e22d94356

                                      SHA512

                                      7d380cda12b342a770def9d4e9c078c97874f3a30cd9f531355e3744a8fef2308f79878ffeb12ce26953325cb6a17bc7e54237dfdc2ee72b140ec295676adbcb

                                    • C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\invalid32x32.gif.fun

                                      Filesize

                                      160B

                                      MD5

                                      580ee0344b7da2786da6a433a1e84893

                                      SHA1

                                      60f8c4dd5457e9834f5402cb326b1a2d3ca0ba7e

                                      SHA256

                                      98b6c2ddfefc628d03ceaef9d69688674a6bc32eb707f9ed86bc8c75675c4513

                                      SHA512

                                      356d2cdea3321e894b5b46ad1ea24c0e3c8be8e3c454b5bd300b7340cbb454e71fc89ca09ea0785b373b483e67c2f6f6bb408e489b0de4ff82d5ed69a75613ba

                                    • C:\ProgramData\Microsoft\AppV\Setup\@[email protected]

                                      Filesize

                                      733B

                                      MD5

                                      6406e239ada5826be36e72e80f1d9ad0

                                      SHA1

                                      f498c102dcc1e1d0c577eb6b27038b3659381364

                                      SHA256

                                      21bab806d75cda301dd98648adadeed7c33febf52da40bb9578fb84c37ad0366

                                      SHA512

                                      0a60efc2c2915b3957473483e41a916def380ec5d594877c27c8c081d7370cb76407ce03901f0d54d703fc581c4be614249c12cfc8f431c408441391090dc5d1

                                    • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe

                                      Filesize

                                      283KB

                                      MD5

                                      2773e3dc59472296cb0024ba7715a64e

                                      SHA1

                                      27d99fbca067f478bb91cdbcb92f13a828b00859

                                      SHA256

                                      3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7

                                      SHA512

                                      6ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      bc29044ff79dd25458f32c381dc676af

                                      SHA1

                                      f4657c0bee9b865607ec3686b8d4f5d4c2c61cd7

                                      SHA256

                                      efe711204437661603d6e59765aba1654678f2093075c1eb2340dc5e80a1140f

                                      SHA512

                                      3d484f755d88c0485195b247230edb79c07cc0941dedbf2f34738ae4f80ba90595f5094c449b213c0c871ade6aff0a14d4acfe843186e2421ccbad221d34bf54

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      709e5bc1c62a5aa20abcf92d1a3ae51c

                                      SHA1

                                      71c8b6688cd83f8ba088d3d44d851c19ee9ccff6

                                      SHA256

                                      aa718e97104d2a4c68a9dad4aae806a22060702177f836403094f7ca7f0f8d4e

                                      SHA512

                                      b9fc809fbb95b29336e5102382295d71235b0e3a54828b40380958a7feaf27c6407461765680e1f61d88e2692e912f8ec677a66ff965854bea6afae69d99cf24

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7d4b800a-14a7-42af-a237-173881caaab7.tmp

                                      Filesize

                                      1KB

                                      MD5

                                      fbc243f2e1b957e134b53600e12630e0

                                      SHA1

                                      db793acc32489671d74ad9c4275cdcdbb5923e4a

                                      SHA256

                                      0884da0e71f84ee7d756bcefc81f75f145589926f8e4ea5e3255f1b60c3c7e3f

                                      SHA512

                                      4cb90f40533dc7a09d8d73158cf72274131246fe92dc307a677ebba146f7bfc8f052e6fbfa112f4323981bf8a88e541e88d0914dca1b57211f35d21c2a24d709

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                      Filesize

                                      21KB

                                      MD5

                                      6ff1a4dbde24234c02a746915c7d8b8d

                                      SHA1

                                      3a97be8e446af5cac8b5eaccd2f238d5173b3cb3

                                      SHA256

                                      2faaca6a253d69be3efb96620ba30e53ecb3de12d5285b83ecdba8cbc36e7311

                                      SHA512

                                      f117b822aeb0a434a0750c44cbf4cdf627bfebc0d59e266993a4fcb17a7a0519659e13b3bcf8706eed7d80d0ce33b0ce5915afe5872c37c010a401dd6bb1187b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000013

                                      Filesize

                                      22KB

                                      MD5

                                      9b5558381a28d410bf93be576c4e1ec6

                                      SHA1

                                      67c25103d7e61f1b482a665fa0d86921876765d4

                                      SHA256

                                      0adaedd1b52daea4ac19cbe9c095eeab8d4f288c1eef838aa416308580cbc665

                                      SHA512

                                      aaf3b065030b0fb7c5a689d4c44d5cc2cb0ca6a79ce7cdeca3c745c01bf4f64e44de2ddf8e06cbb35eafe0e7a005a34178c4185a5d4cd4fdab6fdc20df44e0f9

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000016

                                      Filesize

                                      239KB

                                      MD5

                                      3ad6374a3558149d09d74e6af72344e3

                                      SHA1

                                      e7be9f22578027fc0b6ddb94c09b245ee8ce1620

                                      SHA256

                                      86a391fe7a237f4f17846c53d71e45820411d1a9a6e0c16f22a11ebc491ff9ff

                                      SHA512

                                      21c21b36be200a195bfa648e228c64e52262b06d19d294446b8a544ff1d81f81eb2af74ddbdebc59915168db5dba76d0f0585e83471801d9ee37e59af0620720

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\temp-index

                                      Filesize

                                      1KB

                                      MD5

                                      a29a51c1ed9f15e7faa080c91ad8fb06

                                      SHA1

                                      f90ac5787989fbd50ac76b4e419d4bcfe289b633

                                      SHA256

                                      2f2fd6842ebc0c1b61b8c54ead7485b7453c6d946cdb99088f8e1ceb9c47b0cc

                                      SHA512

                                      055901ab61121cd6d3cdd29dac4b7285c33040480b9765ba63722f9bf8b403f856561ffc798af14ade4d5b2937cb15aa2b8f7bfe69b879f31347a9767bf16b3f

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      1KB

                                      MD5

                                      86793a4be4e0d5fc2f8f6c49c606b6b3

                                      SHA1

                                      338f69433329d63cf0e15acb8605071bbaf450e4

                                      SHA256

                                      c2941b19e2539f3d957398a18adf0e7db973379a7b7ac18f5fc4ef8c783c8d9a

                                      SHA512

                                      dceda4be4014d08ab627150b6c47b7fc180d6603d41564599cef2d231e081765afffd524512197d4717cd02e5f46bd56df787b14d7fd5b8bb855973d1550d1ff

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      1KB

                                      MD5

                                      1293bf86f7eee8c8f8350de713ad2b74

                                      SHA1

                                      8f6e5fcba8d3555b2c7761f20ab4b2b8104ed8e9

                                      SHA256

                                      7e730d1de5da267eea581bb5355d6a561bb76971d88c878278577eb76b9ae79d

                                      SHA512

                                      cf903784d0e0b98b362f081ecdc86bdd48543d1b2c89132bc9c256a42227e5d3af6dd0dd9f90d3dd1207536d2b55c0640fa55dc2f53d04cdb563494db600db7c

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      579B

                                      MD5

                                      2c3cfe899f20d072e031212c5a082792

                                      SHA1

                                      b7b834049dfd605d66777b5136b92b7697ee7105

                                      SHA256

                                      aca82b67baac9fa5df4c61bbaa13f75830e42ec41826a171b395d8707b884458

                                      SHA512

                                      53f5bf67ef27d876d0f9294803bca5727e457ba62892a1ad102b14ed03ba92beb5705c1d89baa8069d2f4a8a76f7141c6e28fdafa4929d1daf8b28b3c9d396e0

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      7KB

                                      MD5

                                      906450982a5b3e9d1d890a2e35842fb2

                                      SHA1

                                      7f46a47fda3090f2ba952ada47e3eba214df8c17

                                      SHA256

                                      5f742c14961ec5dbcf84937cdd3a57e19358a414be8209a85adf2d8cc1db6f46

                                      SHA512

                                      610790eb8440e7b0cc04d9007df2e6ccda0eb4fa60c950710b6a5c653afd6694f09626c050032b5b4ca98b5e8f1e205e8ad416d672daba0b57251bc2b6ea60bb

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      9de5c791005bbf5418f05218384df2e4

                                      SHA1

                                      2c741f1632a6a608bf1558267c6543e0417a7b5f

                                      SHA256

                                      1ece3456c9c0c9408fc5b7133cfbedfb0863723f9089f0ae6542c790ba7081d2

                                      SHA512

                                      8e49ba1b249b58b61bf1f3b58867b6c691d4f6373b4faff04d295771705af9ea130facca17cf0f6c8fea9466c18d1a06051e1f17c9fecf4ba842de95fb25eb96

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      a17ff28b188457b82a2694022f6acaae

                                      SHA1

                                      215b1a12f8fdb1e03aac332499a6517d7cf602aa

                                      SHA256

                                      f6f5bf5b270b5fdc0d68e7b6f46001931c3ab17b69c0a3626856c66e6d76bd7d

                                      SHA512

                                      75ce2ace7711cecfadee30130a3ce2134de320227d365183f5f4b5dbe0d915d54ac67642095f690410b7dd0a068b2d7267f1f498e660e72a9bee218597f5bfae

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      7c32301405f6e42e6bee99de1526da05

                                      SHA1

                                      06c82aee9e4e559c74070778be2a7949a18b0416

                                      SHA256

                                      5dec0909a50afc602aed91b37e9fa5a64d113cbce37b26dea4bed84cb6daa7af

                                      SHA512

                                      2bc638c3d093729db7703fa1cf3897c7c38ffd1528064a661528b1b84298e6ece9805a51351824d3b6f0d292408e6dbaecf8f02000e1d58e1759184abca96467

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                      Filesize

                                      1KB

                                      MD5

                                      8f21f6f12242feac92cfa3035e5cb519

                                      SHA1

                                      de9a2c4f6e41cedce9e0a6d1b9c3ee929e3c481d

                                      SHA256

                                      58044310fc35e62e9d55b0006fc1553db6ef39f9edb4f37c5dbdf2ec80d32ac6

                                      SHA512

                                      46fa5e4297b8f8cc22dfaceb99f7a87b982106de35da36067506cad173c33d3b7014c08f3db55d8263222dcecc933548162b0c2ec57a6b7a8dd0b30f99577738

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                      Filesize

                                      1KB

                                      MD5

                                      990ee0b94688b8b6cb6e251bf3baec20

                                      SHA1

                                      7a4951adaa78da24b334b71ee3bdf22de9538b07

                                      SHA256

                                      edb7ccdb594eacf460ec343c4e6f385b12873fb817c733d40828c5b57c1c781e

                                      SHA512

                                      439468bb71d0a95a1320fc8ce8d6973a77ef430eb12541ff43792a814a7946b02c963c4295f0211a518419b66085aa73174c6e29da9b6d0d3c85182a9a29df34

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                      Filesize

                                      1KB

                                      MD5

                                      ab57b45b95924dbeb3a7d0ba35312a70

                                      SHA1

                                      7b14244aae25e7814a8654c545873a907bdfd292

                                      SHA256

                                      50b733c412645c74b604abf6261b198ff0bfcda5caf2a8179a370239ce07b2bb

                                      SHA512

                                      84cf4119e803cc8644e0919bcd9afbe56c25236f4f5252edf992a5924b7cdc6beee36df761ec4b4916e32a9c3c75d8a6ac474731072f76779b2a4cd991c1ea0b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                      Filesize

                                      1KB

                                      MD5

                                      ae1cbfa51f292b22096c4bf0820c8570

                                      SHA1

                                      393f04a603903322fbd6ed599e1f9b5caa04a518

                                      SHA256

                                      b015de6dd2eea712fe5f6270f03d88e9dde9c0dd09527ae244ac5c21fcc08b55

                                      SHA512

                                      7d01178367bd16020aad4d12eb8f5a931f03777e23d9ceeb97ce62d47d30b6c0aa02658bab985700f368d6e7474e2a6c8f698c743eff4420ecc1ade554fba0fe

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5807db.TMP

                                      Filesize

                                      1KB

                                      MD5

                                      d0b25d810ca4844911b31466ff7ee84e

                                      SHA1

                                      e29a38de9ceeb8995f6dc8280940e8516c710a2d

                                      SHA256

                                      522e933648a784b99ce716b166b53cea206421762ac2135e8fc55af3c8f03146

                                      SHA512

                                      241f24e9905e5da523f6907f9ed358efd5a73fed66cb0a79178fd358719ad72e6493950a73f4287a5a98fa20f4ef12b8cff19f517cc8f06f594725255ca322eb

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      46295cac801e5d4857d09837238a6394

                                      SHA1

                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                      SHA256

                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                      SHA512

                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      206702161f94c5cd39fadd03f4014d98

                                      SHA1

                                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                      SHA256

                                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                      SHA512

                                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      387b1fc271d2b32fafb9d95ae5afdb10

                                      SHA1

                                      b423a2b21045e2d3ccbc9271ccf26384e25e4acd

                                      SHA256

                                      935b2150fe5ab71a1ce69f1725b7671051be2b3a3a662b916ff2808aa1d2d014

                                      SHA512

                                      e8e78d37a2d5e62a67a1ec1ed01d7ed092c83fd8d30fb6ecdd91b3f549ddb3ab369e8a5f79595fd1e9b3b45eed0b6568d780e21c814207c0dbbc7bdaed474b90

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      6417b82e6577c20b63fda652fa2c7088

                                      SHA1

                                      1e7b84fd8e4b3cfc864f5b2758864a1cc153560d

                                      SHA256

                                      e0f371f529ca634cdc3722c5f3627a2c01c6894b5114178b7da56fd40a210620

                                      SHA512

                                      a39dc30a1749927c23d8d92497b4911e882ab988f594454507bc358eb86f2b0e6beab933e219aea69f62028ab9dcfe6f48c430022b812fd7ff0641297e50881c

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      dd8ead51ac0415f7aabaa137d85313b2

                                      SHA1

                                      8148cc4135c414b43e5eb9dc603d7389b11146f2

                                      SHA256

                                      9777f0117899e4913b3d4c8f2700aa2a5dfdb50d7662a76f6957ec980e5b410c

                                      SHA512

                                      a89d77c240e6b499679cdcbbfd4c61f7c15e7a012361fcc099e34a54a8e7e19496fa179e0d6fccb70a92c7f960cd916e706d1987256d14fd5a0a7cb8005559fb

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      882fe7c8bfcee9700bf814fd01a1d923

                                      SHA1

                                      843f04cb97f405af4dec5ec0d78aeff8b69c83be

                                      SHA256

                                      aef65a851c1efe74e091fa675587541c9ff6ed0f9af783c402f1971a2a1a7c4a

                                      SHA512

                                      1c355f257484f4b3f594ab5ba0cb1ad11af1c2477bcb3b64a7a8142f51c8094c744f9caf40ca446390d78e646edfa99376e98a73411d761ade355e9d44a7c789

                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.AccountsControl_cw5n1h2txyewy\Settings\settings.dat.fun

                                      Filesize

                                      8KB

                                      MD5

                                      f22599af9343cac74a6c5412104d748c

                                      SHA1

                                      e2ac4c57fa38f9d99f3d38c2f6582b4334331df5

                                      SHA256

                                      36537e56d60910ab6aa548e64ca4adafdcabde9d60739013993e12ba061dfd65

                                      SHA512

                                      5c8afc025e1d8342d93b7842dc7ef22eca61085857a80a08ba9b3f156ee3b814606bb32bc244bd525a7913e7915bdf3a86771d39577f4a1176ade04dc381c6d4

                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133826157520594683.txt.fun

                                      Filesize

                                      47KB

                                      MD5

                                      949dbe9f1789e3e0dcac7619b6ad350c

                                      SHA1

                                      4c98c1d5edfe97334ffb0fd1dbe3b20affb444c8

                                      SHA256

                                      3bb108c5b8bf3bda2eddeab8e57756935abecb047ee7dd776e7052443062d93e

                                      SHA512

                                      4756daffab73f2494994e496d7be81c25ea59684440f15179e6aa983484a5f61fcaf4432dbea3685f8e92420156bc97caa16fd9104b79afc7596220ea0882687

                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133826166939791019.txt.fun

                                      Filesize

                                      65KB

                                      MD5

                                      5753c0802e10e7def289f5af7f902c55

                                      SHA1

                                      e754d62b95e0552b5eece1064470500fdf1ef13e

                                      SHA256

                                      48023e2c73d98cc3870fcd61d3e4a281809cc49bc4a09b624b3d05f255265cfa

                                      SHA512

                                      ff7c4035a5062c93f18cd105d8b5505c278c944a230e35901e18fc2e01a4eddf84daff447d75c4e084e509ea864cd5776d4df0cadd57ec1ce4d9e1e04c5d00ce

                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133826185445601492.txt.fun

                                      Filesize

                                      75KB

                                      MD5

                                      d018382320c5676c9ea633a64a0e5b8b

                                      SHA1

                                      9fd227710f54036afb472faed65a4546310c848c

                                      SHA256

                                      7a1f9f16f87ada638172f8ffb9553e013c936b359f1a1bb20fb00620eb8dc084

                                      SHA512

                                      26a20159a1476039e6112497f10ce14d7a5435d5fadac00c64cc879a65b65ec6240d9ff027856cd6785edb779ea501d85d26fa6eb9cdfa29f2d93d5d1cb706e3

                                    • C:\Users\Admin\AppData\Local\Temp\.ses

                                      Filesize

                                      53B

                                      MD5

                                      804fe47c51ec658f91fee48d9586975c

                                      SHA1

                                      5cf1923dcd72731f23ece39fea496ec3a4ee16ae

                                      SHA256

                                      108a1feb1d67573b7197a7d4f7d2d7122135a0bc697e78b6a7ff8a91d04872d5

                                      SHA512

                                      09ac3fd05108a6d49f0f3438d5a0801794ea74ee907f5caeb5541a228d4a6a3129107f51b33578824259d988a50729063f0353bdb810cb3297db66f529ec4263

                                    • C:\Users\Admin\AppData\Local\Temp\{97A89DE4-CD45-4D3C-8053-E00298E3E116} - OProcSessId.dat.fun

                                      Filesize

                                      16B

                                      MD5

                                      8ebcc5ca5ac09a09376801ecdd6f3792

                                      SHA1

                                      81187142b138e0245d5d0bc511f7c46c30df3e14

                                      SHA256

                                      619e246fc0ac11320ff9e322a979948d949494b0c18217f4d794e1b398818880

                                      SHA512

                                      cec50bfc6ad2f57f16da99459f40f2d424c6d5691685fa1053284f46c8c8c8a975d7bcb1f3521c4f3fbdc310cf4714e29404aa23be6021e2e267c97b090dc650

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\107261738573077.bat

                                      Filesize

                                      370B

                                      MD5

                                      9c515b34133166e21b954955327b63a7

                                      SHA1

                                      d86a36235cc50c36770f6bb5ba3823015273629f

                                      SHA256

                                      202c95fca243aa92b98583eb45dd14d4919aab279d715a68e3be9af950db9a0b

                                      SHA512

                                      087e97f3050151b313a8bcc02c6aef1ae90780a72edd63be6ea4080b7456c1fe6d6c2c4ea3b4e2c67d7e5ba3be5c5f33f10e64b1c44e50dd047a907f197bd0ac

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\@[email protected]

                                      Filesize

                                      933B

                                      MD5

                                      7e6b6da7c61fcb66f3f30166871def5b

                                      SHA1

                                      00f699cf9bbc0308f6e101283eca15a7c566d4f9

                                      SHA256

                                      4a25d98c121bb3bd5b54e0b6a5348f7b09966bffeec30776e5a731813f05d49e

                                      SHA512

                                      e5a56137f325904e0c7de1d0df38745f733652214f0cdb6ef173fa0743a334f95bed274df79469e270c9208e6bdc2e6251ef0cdd81af20fa1897929663e2c7d3

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\TaskData\Tor\tor.exe

                                      Filesize

                                      3.0MB

                                      MD5

                                      fe7eb54691ad6e6af77f8a9a0b6de26d

                                      SHA1

                                      53912d33bec3375153b7e4e68b78d66dab62671a

                                      SHA256

                                      e48673680746fbe027e8982f62a83c298d6fb46ad9243de8e79b7e5a24dcd4eb

                                      SHA512

                                      8ac6dc5bb016afc869fcbb713f6a14d3692e866b94f4f1ee83b09a7506a8cb58768bd47e081cf6e97b2dacf9f9a6a8ca240d7d20d0b67dbd33238cc861deae8f

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\b.wnry

                                      Filesize

                                      1.4MB

                                      MD5

                                      c17170262312f3be7027bc2ca825bf0c

                                      SHA1

                                      f19eceda82973239a1fdc5826bce7691e5dcb4fb

                                      SHA256

                                      d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa

                                      SHA512

                                      c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\c.wnry

                                      Filesize

                                      780B

                                      MD5

                                      93f33b83f1f263e2419006d6026e7bc1

                                      SHA1

                                      1a4b36c56430a56af2e0ecabd754bf00067ce488

                                      SHA256

                                      ef0ed0b717d1b956eb6c42ba1f4fd2283cf7c8416bed0afd1e8805ee0502f2b4

                                      SHA512

                                      45bdd1a9a3118ee4d3469ee65a7a8fdb0f9315ca417821db058028ffb0ed145209f975232a9e64aba1c02b9664c854232221eb041d09231c330ae510f638afac

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_bulgarian.wnry

                                      Filesize

                                      46KB

                                      MD5

                                      95673b0f968c0f55b32204361940d184

                                      SHA1

                                      81e427d15a1a826b93e91c3d2fa65221c8ca9cff

                                      SHA256

                                      40b37e7b80cf678d7dd302aaf41b88135ade6ddf44d89bdba19cf171564444bd

                                      SHA512

                                      7601f1883edbb4150a9dc17084012323b3bfa66f6d19d3d0355cf82b6a1c9dce475d758da18b6d17a8b321bf6fca20915224dbaedcb3f4d16abfaf7a5fc21b92

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_chinese (simplified).wnry

                                      Filesize

                                      53KB

                                      MD5

                                      0252d45ca21c8e43c9742285c48e91ad

                                      SHA1

                                      5c14551d2736eef3a1c1970cc492206e531703c1

                                      SHA256

                                      845d0e178aeebd6c7e2a2e9697b2bf6cf02028c50c288b3ba88fe2918ea2834a

                                      SHA512

                                      1bfcf6c0e7c977d777f12bd20ac347630999c4d99bd706b40de7ff8f2f52e02560d68093142cc93722095657807a1480ce3fb6a2e000c488550548c497998755

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_chinese (traditional).wnry

                                      Filesize

                                      77KB

                                      MD5

                                      2efc3690d67cd073a9406a25005f7cea

                                      SHA1

                                      52c07f98870eabace6ec370b7eb562751e8067e9

                                      SHA256

                                      5c7f6ad1ec4bc2c8e2c9c126633215daba7de731ac8b12be10ca157417c97f3a

                                      SHA512

                                      0766c58e64d9cda5328e00b86f8482316e944aa2c26523a3c37289e22c34be4b70937033bebdb217f675e40db9fecdce0a0d516f9065a170e28286c2d218487c

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_croatian.wnry

                                      Filesize

                                      38KB

                                      MD5

                                      17194003fa70ce477326ce2f6deeb270

                                      SHA1

                                      e325988f68d327743926ea317abb9882f347fa73

                                      SHA256

                                      3f33734b2d34cce83936ce99c3494cd845f1d2c02d7f6da31d42dfc1ca15a171

                                      SHA512

                                      dcf4ccf0b352a8b271827b3b8e181f7d6502ca0f8c9dda3dc6e53441bb4ae6e77b49c9c947cc3ede0bf323f09140a0c068a907f3c23ea2a8495d1ad96820051c

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_czech.wnry

                                      Filesize

                                      39KB

                                      MD5

                                      537efeecdfa94cc421e58fd82a58ba9e

                                      SHA1

                                      3609456e16bc16ba447979f3aa69221290ec17d0

                                      SHA256

                                      5afa4753afa048c6d6c39327ce674f27f5f6e5d3f2a060b7a8aed61725481150

                                      SHA512

                                      e007786ffa09ccd5a24e5c6504c8de444929a2faaafad3712367c05615b7e1b0fbf7fbfff7028ed3f832ce226957390d8bf54308870e9ed597948a838da1137b

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_danish.wnry

                                      Filesize

                                      36KB

                                      MD5

                                      2c5a3b81d5c4715b7bea01033367fcb5

                                      SHA1

                                      b548b45da8463e17199daafd34c23591f94e82cd

                                      SHA256

                                      a75bb44284b9db8d702692f84909a7e23f21141866adf3db888042e9109a1cb6

                                      SHA512

                                      490c5a892fac801b853c348477b1140755d4c53ca05726ac19d3649af4285c93523393a3667e209c71c80ac06ffd809f62dd69ae65012dcb00445d032f1277b3

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_dutch.wnry

                                      Filesize

                                      36KB

                                      MD5

                                      7a8d499407c6a647c03c4471a67eaad7

                                      SHA1

                                      d573b6ac8e7e04a05cbbd6b7f6a9842f371d343b

                                      SHA256

                                      2c95bef914da6c50d7bdedec601e589fbb4fda24c4863a7260f4f72bd025799c

                                      SHA512

                                      608ef3ff0a517fe1e70ff41aeb277821565c5a9bee5103aa5e45c68d4763fce507c2a34d810f4cd242d163181f8341d9a69e93fe32aded6fbc7f544c55743f12

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_english.wnry

                                      Filesize

                                      36KB

                                      MD5

                                      fe68c2dc0d2419b38f44d83f2fcf232e

                                      SHA1

                                      6c6e49949957215aa2f3dfb72207d249adf36283

                                      SHA256

                                      26fd072fda6e12f8c2d3292086ef0390785efa2c556e2a88bd4673102af703e5

                                      SHA512

                                      941fa0a1f6a5756ed54260994db6158a7ebeb9e18b5c8ca2f6530c579bc4455918df0b38c609f501ca466b3cc067b40e4b861ad6513373b483b36338ae20a810

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_filipino.wnry

                                      Filesize

                                      36KB

                                      MD5

                                      08b9e69b57e4c9b966664f8e1c27ab09

                                      SHA1

                                      2da1025bbbfb3cd308070765fc0893a48e5a85fa

                                      SHA256

                                      d8489f8c16318e524b45de8b35d7e2c3cd8ed4821c136f12f5ef3c9fc3321324

                                      SHA512

                                      966b5ed68be6b5ccd46e0de1fa868cfe5432d9bf82e1e2f6eb99b2aef3c92f88d96f4f4eec5e16381b9c6db80a68071e7124ca1474d664bdd77e1817ec600cb4

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_finnish.wnry

                                      Filesize

                                      37KB

                                      MD5

                                      35c2f97eea8819b1caebd23fee732d8f

                                      SHA1

                                      e354d1cc43d6a39d9732adea5d3b0f57284255d2

                                      SHA256

                                      1adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e

                                      SHA512

                                      908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_french.wnry

                                      Filesize

                                      37KB

                                      MD5

                                      4e57113a6bf6b88fdd32782a4a381274

                                      SHA1

                                      0fccbc91f0f94453d91670c6794f71348711061d

                                      SHA256

                                      9bd38110e6523547aed50617ddc77d0920d408faeed2b7a21ab163fda22177bc

                                      SHA512

                                      4f1918a12269c654d44e9d394bc209ef0bc32242be8833a2fba437b879125177e149f56f2fb0c302330dec328139b34982c04b3fefb045612b6cc9f83ec85aa9

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_german.wnry

                                      Filesize

                                      36KB

                                      MD5

                                      3d59bbb5553fe03a89f817819540f469

                                      SHA1

                                      26781d4b06ff704800b463d0f1fca3afd923a9fe

                                      SHA256

                                      2adc900fafa9938d85ce53cb793271f37af40cf499bcc454f44975db533f0b61

                                      SHA512

                                      95719ae80589f71209bb3cb953276538040e7111b994d757b0a24283aefe27aadbbe9eef3f1f823ce4cabc1090946d4a2a558607ac6cac6faca5971529b34dac

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_greek.wnry

                                      Filesize

                                      47KB

                                      MD5

                                      fb4e8718fea95bb7479727fde80cb424

                                      SHA1

                                      1088c7653cba385fe994e9ae34a6595898f20aeb

                                      SHA256

                                      e13cc9b13aa5074dc45d50379eceb17ee39a0c2531ab617d93800fe236758ca9

                                      SHA512

                                      24db377af1569e4e2b2ebccec42564cea95a30f1ff43bcaf25a692f99567e027bcef4aacef008ec5f64ea2eef0c04be88d2b30bcadabb3919b5f45a6633940cb

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_indonesian.wnry

                                      Filesize

                                      36KB

                                      MD5

                                      3788f91c694dfc48e12417ce93356b0f

                                      SHA1

                                      eb3b87f7f654b604daf3484da9e02ca6c4ea98b7

                                      SHA256

                                      23e5e738aad10fb8ef89aa0285269aff728070080158fd3e7792fe9ed47c51f4

                                      SHA512

                                      b7dd9e6dc7c2d023ff958caf132f0544c76fae3b2d8e49753257676cc541735807b4befdf483bcae94c2dcde3c878c783b4a89dca0fecbc78f5bbf7c356f35cd

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_italian.wnry

                                      Filesize

                                      36KB

                                      MD5

                                      30a200f78498990095b36f574b6e8690

                                      SHA1

                                      c4b1b3c087bd12b063e98bca464cd05f3f7b7882

                                      SHA256

                                      49f2c739e7d9745c0834dc817a71bf6676ccc24a4c28dcddf8844093aab3df07

                                      SHA512

                                      c0da2aae82c397f6943a0a7b838f60eeef8f57192c5f498f2ecf05db824cfeb6d6ca830bf3715da7ee400aa8362bd64dc835298f3f0085ae7a744e6e6c690511

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_japanese.wnry

                                      Filesize

                                      79KB

                                      MD5

                                      b77e1221f7ecd0b5d696cb66cda1609e

                                      SHA1

                                      51eb7a254a33d05edf188ded653005dc82de8a46

                                      SHA256

                                      7e491e7b48d6e34f916624c1cda9f024e86fcbec56acda35e27fa99d530d017e

                                      SHA512

                                      f435fd67954787e6b87460db026759410fbd25b2f6ea758118749c113a50192446861a114358443a129be817020b50f21d27b1ebd3d22c7be62082e8b45223fc

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_korean.wnry

                                      Filesize

                                      89KB

                                      MD5

                                      6735cb43fe44832b061eeb3f5956b099

                                      SHA1

                                      d636daf64d524f81367ea92fdafa3726c909bee1

                                      SHA256

                                      552aa0f82f37c9601114974228d4fc54f7434fe3ae7a276ef1ae98a0f608f1d0

                                      SHA512

                                      60272801909dbba21578b22c49f6b0ba8cd0070f116476ff35b3ac8347b987790e4cc0334724244c4b13415a246e77a577230029e4561ae6f04a598c3f536c7e

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_latvian.wnry

                                      Filesize

                                      40KB

                                      MD5

                                      c33afb4ecc04ee1bcc6975bea49abe40

                                      SHA1

                                      fbea4f170507cde02b839527ef50b7ec74b4821f

                                      SHA256

                                      a0356696877f2d94d645ae2df6ce6b370bd5c0d6db3d36def44e714525de0536

                                      SHA512

                                      0d435f0836f61a5ff55b78c02fa47b191e5807a79d8a6e991f3115743df2141b3db42ba8bdad9ad259e12f5800828e9e72d7c94a6a5259312a447d669b03ec44

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_norwegian.wnry

                                      Filesize

                                      36KB

                                      MD5

                                      ff70cc7c00951084175d12128ce02399

                                      SHA1

                                      75ad3b1ad4fb14813882d88e952208c648f1fd18

                                      SHA256

                                      cb5da96b3dfcf4394713623dbf3831b2a0b8be63987f563e1c32edeb74cb6c3a

                                      SHA512

                                      f01df3256d49325e5ec49fd265aa3f176020c8ffec60eb1d828c75a3fa18ff8634e1de824d77dfdd833768acff1f547303104620c70066a2708654a07ef22e19

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_polish.wnry

                                      Filesize

                                      38KB

                                      MD5

                                      e79d7f2833a9c2e2553c7fe04a1b63f4

                                      SHA1

                                      3d9f56d2381b8fe16042aa7c4feb1b33f2baebff

                                      SHA256

                                      519ad66009a6c127400c6c09e079903223bd82ecc18ad71b8e5cd79f5f9c053e

                                      SHA512

                                      e0159c753491cac7606a7250f332e87bc6b14876bc7a1cf5625fa56ab4f09c485f7b231dd52e4ff0f5f3c29862afb1124c0efd0741613eb97a83cbe2668af5de

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_portuguese.wnry

                                      Filesize

                                      37KB

                                      MD5

                                      fa948f7d8dfb21ceddd6794f2d56b44f

                                      SHA1

                                      ca915fbe020caa88dd776d89632d7866f660fc7a

                                      SHA256

                                      bd9f4b3aedf4f81f37ec0a028aabcb0e9a900e6b4de04e9271c8db81432e2a66

                                      SHA512

                                      0d211bfb0ae953081dca00cd07f8c908c174fd6c47a8001fadc614203f0e55d9fbb7fa9b87c735d57101341ab36af443918ee00737ed4c19ace0a2b85497f41a

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_romanian.wnry

                                      Filesize

                                      50KB

                                      MD5

                                      313e0ececd24f4fa1504118a11bc7986

                                      SHA1

                                      e1b9ae804c7fb1d27f39db18dc0647bb04e75e9d

                                      SHA256

                                      70c0f32ed379ae899e5ac975e20bbbacd295cf7cd50c36174d2602420c770ac1

                                      SHA512

                                      c7500363c61baf8b77fce796d750f8f5e6886ff0a10f81c3240ea3ad4e5f101b597490dea8ab6bd9193457d35d8fd579fce1b88a1c8d85ebe96c66d909630730

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_russian.wnry

                                      Filesize

                                      46KB

                                      MD5

                                      452615db2336d60af7e2057481e4cab5

                                      SHA1

                                      442e31f6556b3d7de6eb85fbac3d2957b7f5eac6

                                      SHA256

                                      02932052fafe97e6acaaf9f391738a3a826f5434b1a013abbfa7a6c1ade1e078

                                      SHA512

                                      7613dc329abe7a3f32164c9a6b660f209a84b774ab9c008bf6503c76255b30ea9a743a6dc49a8de8df0bcb9aea5a33f7408ba27848d9562583ff51991910911f

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_slovak.wnry

                                      Filesize

                                      40KB

                                      MD5

                                      c911aba4ab1da6c28cf86338ab2ab6cc

                                      SHA1

                                      fee0fd58b8efe76077620d8abc7500dbfef7c5b0

                                      SHA256

                                      e64178e339c8e10eac17a236a67b892d0447eb67b1dcd149763dad6fd9f72729

                                      SHA512

                                      3491ed285a091a123a1a6d61aafbb8d5621ccc9e045a237a2f9c2cf6049e7420eb96ef30fdcea856b50454436e2ec468770f8d585752d73fafd676c4ef5e800a

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_spanish.wnry

                                      Filesize

                                      36KB

                                      MD5

                                      8d61648d34cba8ae9d1e2a219019add1

                                      SHA1

                                      2091e42fc17a0cc2f235650f7aad87abf8ba22c2

                                      SHA256

                                      72f20024b2f69b45a1391f0a6474e9f6349625ce329f5444aec7401fe31f8de1

                                      SHA512

                                      68489c33ba89edfe2e3aebaacf8ef848d2ea88dcbef9609c258662605e02d12cfa4ffdc1d266fc5878488e296d2848b2cb0bbd45f1e86ef959bab6162d284079

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_swedish.wnry

                                      Filesize

                                      37KB

                                      MD5

                                      c7a19984eb9f37198652eaf2fd1ee25c

                                      SHA1

                                      06eafed025cf8c4d76966bf382ab0c5e1bd6a0ae

                                      SHA256

                                      146f61db72297c9c0facffd560487f8d6a2846ecec92ecc7db19c8d618dbc3a4

                                      SHA512

                                      43dd159f9c2eac147cbff1dda83f6a83dd0c59d2d7acac35ba8b407a04ec9a1110a6a8737535d060d100ede1cb75078cf742c383948c9d4037ef459d150f6020

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_turkish.wnry

                                      Filesize

                                      41KB

                                      MD5

                                      531ba6b1a5460fc9446946f91cc8c94b

                                      SHA1

                                      cc56978681bd546fd82d87926b5d9905c92a5803

                                      SHA256

                                      6db650836d64350bbde2ab324407b8e474fc041098c41ecac6fd77d632a36415

                                      SHA512

                                      ef25c3cf4343df85954114f59933c7cc8107266c8bcac3b5ea7718eb74dbee8ca8a02da39057e6ef26b64f1dfccd720dd3bf473f5ae340ba56941e87d6b796c9

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\msg\m_vietnamese.wnry

                                      Filesize

                                      91KB

                                      MD5

                                      8419be28a0dcec3f55823620922b00fa

                                      SHA1

                                      2e4791f9cdfca8abf345d606f313d22b36c46b92

                                      SHA256

                                      1f21838b244c80f8bed6f6977aa8a557b419cf22ba35b1fd4bf0f98989c5bdf8

                                      SHA512

                                      8fca77e54480aea3c0c7a705263ed8fb83c58974f5f0f62f12cc97c8e0506ba2cdb59b70e59e9a6c44dd7cde6adeeec35b494d31a6a146ff5ba7006136ab9386

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\r.wnry

                                      Filesize

                                      864B

                                      MD5

                                      3e0020fc529b1c2a061016dd2469ba96

                                      SHA1

                                      c3a91c22b63f6fe709e7c29cafb29a2ee83e6ade

                                      SHA256

                                      402751fa49e0cb68fe052cb3db87b05e71c1d950984d339940cf6b29409f2a7c

                                      SHA512

                                      5ca3c134201ed39d96d72911c0498bae6f98701513fd7f1dc8512819b673f0ea580510fa94ed9413ccc73da18b39903772a7cbfa3478176181cee68c896e14cf

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\s.wnry

                                      Filesize

                                      2.9MB

                                      MD5

                                      ad4c9de7c8c40813f200ba1c2fa33083

                                      SHA1

                                      d1af27518d455d432b62d73c6a1497d032f6120e

                                      SHA256

                                      e18fdd912dfe5b45776e68d578c3af3547886cf1353d7086c8bee037436dff4b

                                      SHA512

                                      115733d08e5f1a514808a20b070db7ff453fd149865f49c04365a8c6502fa1e5c3a31da3e21f688ab040f583cf1224a544aea9708ffab21405dde1c57f98e617

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\t.wnry

                                      Filesize

                                      64KB

                                      MD5

                                      5dcaac857e695a65f5c3ef1441a73a8f

                                      SHA1

                                      7b10aaeee05e7a1efb43d9f837e9356ad55c07dd

                                      SHA256

                                      97ebce49b14c46bebc9ec2448d00e1e397123b256e2be9eba5140688e7bc0ae6

                                      SHA512

                                      06eb5e49d19b71a99770d1b11a5bb64a54bf3352f36e39a153469e54205075c203b08128dc2317259db206ab5323bdd93aaa252a066f57fb5c52ff28deedb5e2

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\taskdl.exe

                                      Filesize

                                      20KB

                                      MD5

                                      4fef5e34143e646dbf9907c4374276f5

                                      SHA1

                                      47a9ad4125b6bd7c55e4e7da251e23f089407b8f

                                      SHA256

                                      4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79

                                      SHA512

                                      4550dd1787deb353ebd28363dd2cdccca861f6a5d9358120fa6aa23baa478b2a9eb43cef5e3f6426f708a0753491710ac05483fac4a046c26bec4234122434d5

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\taskse.exe

                                      Filesize

                                      20KB

                                      MD5

                                      8495400f199ac77853c53b5a3f278f3e

                                      SHA1

                                      be5d6279874da315e3080b06083757aad9b32c23

                                      SHA256

                                      2ca2d550e603d74dedda03156023135b38da3630cb014e3d00b1263358c5f00d

                                      SHA512

                                      0669c524a295a049fa4629b26f89788b2a74e1840bcdc50e093a0bd40830dd1279c9597937301c0072db6ece70adee4ace67c3c8a4fb2db6deafd8f1e887abe4

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry (1)\u.wnry

                                      Filesize

                                      240KB

                                      MD5

                                      7bf2b57f2a205768755c07f238fb32cc

                                      SHA1

                                      45356a9dd616ed7161a3b9192e2f318d0ab5ad10

                                      SHA256

                                      b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25

                                      SHA512

                                      91a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9

                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry.zip

                                      Filesize

                                      3.3MB

                                      MD5

                                      efe76bf09daba2c594d2bc173d9b5cf0

                                      SHA1

                                      ba5de52939cb809eae10fdbb7fac47095a9599a7

                                      SHA256

                                      707a9f323556179571bc832e34fa592066b1d5f2cac4a7426fe163597e3e618a

                                      SHA512

                                      4a1df71925cf2eb49c38f07c6a95bea17752b025f0114c6fd81bc0841c1d1f2965b5dda1469e454b9e8207c2e0dfd3df0959e57166620ccff86eeeb5cf855029

                                    • memory/792-4851-0x0000000073D70000-0x0000000073DE7000-memory.dmp

                                      Filesize

                                      476KB

                                    • memory/792-4852-0x0000000073D50000-0x0000000073D6C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/792-4853-0x0000000073CC0000-0x0000000073D42000-memory.dmp

                                      Filesize

                                      520KB

                                    • memory/792-4850-0x0000000073DF0000-0x0000000073E72000-memory.dmp

                                      Filesize

                                      520KB

                                    • memory/792-4834-0x0000000073CC0000-0x0000000073D42000-memory.dmp

                                      Filesize

                                      520KB

                                    • memory/792-4835-0x0000000073C90000-0x0000000073CB2000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/792-4833-0x0000000073A70000-0x0000000073C8C000-memory.dmp

                                      Filesize

                                      2.1MB

                                    • memory/792-4832-0x0000000073DF0000-0x0000000073E72000-memory.dmp

                                      Filesize

                                      520KB

                                    • memory/792-4836-0x0000000000860000-0x0000000000B5E000-memory.dmp

                                      Filesize

                                      3.0MB

                                    • memory/792-4849-0x0000000000860000-0x0000000000B5E000-memory.dmp

                                      Filesize

                                      3.0MB

                                    • memory/792-4855-0x0000000073A70000-0x0000000073C8C000-memory.dmp

                                      Filesize

                                      2.1MB

                                    • memory/792-4854-0x0000000073C90000-0x0000000073CB2000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/1584-363-0x000000001BB90000-0x000000001BB98000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3528-339-0x0000000000D50000-0x0000000000D88000-memory.dmp

                                      Filesize

                                      224KB

                                    • memory/3528-340-0x000000001B930000-0x000000001BDFE000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/3528-341-0x000000001BEA0000-0x000000001BF3C000-memory.dmp

                                      Filesize

                                      624KB

                                    • memory/4836-1560-0x0000000010000000-0x0000000010010000-memory.dmp

                                      Filesize

                                      64KB