Analysis

  • max time kernel
    196s
  • max time network
    209s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    22-09-2021 07:14

General

  • Target

    bc7986f0c9f431b839a13a9a0dfa2711f86e9e9afbed9b9b456066602881ba71.msi

  • Size

    104.4MB

  • MD5

    3ef1e803695ceed8baa27d270b3dc649

  • SHA1

    a0dff2e81809ab07a296d0114174eebff40cfada

  • SHA256

    bc7986f0c9f431b839a13a9a0dfa2711f86e9e9afbed9b9b456066602881ba71

  • SHA512

    4de1b4f6c720b8dd5d0bf4b4a0d4dc6985de45d056c2c1636ecf4757ac18bb76f696fbfd23e2e7d03eb2027fa945de246db3be2a72bcb6ef9a67c9fd19dcc396

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs
  • Blocklisted process makes network request 5 IoCs
  • Executes dropped EXE 15 IoCs
  • Registers new Print Monitor 2 TTPs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 34 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 40 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\bc7986f0c9f431b839a13a9a0dfa2711f86e9e9afbed9b9b456066602881ba71.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Users\Admin\AppData\Local\Temp\MSIA6D6.tmp
      "C:\Users\Admin\AppData\Local\Temp\MSIA6D6.tmp"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Windows\Temp\{0E418D21-DB90-4D72-AB10-EEAFCC533C0C}\.cr\MSIA6D6.tmp
        "C:\Windows\Temp\{0E418D21-DB90-4D72-AB10-EEAFCC533C0C}\.cr\MSIA6D6.tmp" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\MSIA6D6.tmp" -burn.filehandle.attached=540 -burn.filehandle.self=552
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3468
        • C:\Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\.be\nitro_pro13.exe
          "C:\Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\.be\nitro_pro13.exe" -q -burn.elevated BurnPipe.{B89015BE-F957-4593-B716-6427859AC293} {B1988592-3D38-4E76-A53D-4F97D1A66A56} 3468
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Modifies registry class
          PID:1192
        • C:\Program Files\Nitro\Pro\13\NitroPDF.exe
          "C:\Program Files\Nitro\Pro\13\NitroPDF.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:5356
          • C:\Windows\System32\mountvol.exe
            C:\Windows\System32\mountvol.exe C: /L
            5⤵
              PID:5388
            • C:\Program Files\Nitro\Pro\13\nitro_module_loader.exe
              "C:\Program Files\Nitro\Pro\13\nitro_module_loader.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:5480
            • C:\Program Files\Nitro\Pro\13\Nitro_Slider.exe
              "C:\Program Files\Nitro\Pro\13\Nitro_Slider.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2736,7065136462039864169,13490650459049932050,131072 --enable-features=CastMediaRouteProvider --disable-features=CalculateNativeWinOcclusion --lang=en-US --service-sandbox-type=utility --no-sandbox --locales-dir-path="C:\Program Files\Nitro\Pro\13\cef\resources\locales" --log-file="C:\Program Files\Nitro\Pro\13\debug.log" --log-severity=disable --resources-dir-path="C:\Program Files\Nitro\Pro\13\cef\resources" --lang=en-US --log-file="C:\Program Files\Nitro\Pro\13\debug.log" --mojo-platform-channel-handle=2740 /prefetch:8
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:5612
            • C:\Program Files\Nitro\Pro\13\Nitro_Slider.exe
              "C:\Program Files\Nitro\Pro\13\Nitro_Slider.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2736,7065136462039864169,13490650459049932050,131072 --enable-features=CastMediaRouteProvider --disable-features=CalculateNativeWinOcclusion --lang=en-US --service-sandbox-type=network --no-sandbox --locales-dir-path="C:\Program Files\Nitro\Pro\13\cef\resources\locales" --log-file="C:\Program Files\Nitro\Pro\13\debug.log" --log-severity=disable --resources-dir-path="C:\Program Files\Nitro\Pro\13\cef\resources" --lang=en-US --log-file="C:\Program Files\Nitro\Pro\13\debug.log" --mojo-platform-channel-handle=2764 /prefetch:8
              5⤵
              • Executes dropped EXE
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:5624
            • C:\Program Files\Nitro\Pro\13\Nitro_Slider.exe
              "C:\Program Files\Nitro\Pro\13\Nitro_Slider.exe" --type=renderer --no-sandbox --log-file="C:\Program Files\Nitro\Pro\13\debug.log" --field-trial-handle=2736,7065136462039864169,13490650459049932050,131072 --enable-features=CastMediaRouteProvider --disable-features=CalculateNativeWinOcclusion --disable-gpu-compositing --lang=en-US --locales-dir-path="C:\Program Files\Nitro\Pro\13\cef\resources\locales" --log-file="C:\Program Files\Nitro\Pro\13\debug.log" --log-severity=disable --resources-dir-path="C:\Program Files\Nitro\Pro\13\cef\resources" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
              5⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:5968
            • C:\Program Files\Nitro\Pro\13\Nitro_Slider.exe
              "C:\Program Files\Nitro\Pro\13\Nitro_Slider.exe" --type=renderer --no-sandbox --log-file="C:\Program Files\Nitro\Pro\13\debug.log" --field-trial-handle=2736,7065136462039864169,13490650459049932050,131072 --enable-features=CastMediaRouteProvider --disable-features=CalculateNativeWinOcclusion --disable-gpu-compositing --lang=en-US --locales-dir-path="C:\Program Files\Nitro\Pro\13\cef\resources\locales" --log-file="C:\Program Files\Nitro\Pro\13\debug.log" --log-severity=disable --resources-dir-path="C:\Program Files\Nitro\Pro\13\cef\resources" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=2 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
              5⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:2412
            • C:\Program Files\Nitro\Pro\13\Nitro_Slider.exe
              "C:\Program Files\Nitro\Pro\13\Nitro_Slider.exe" --type=renderer --no-sandbox --log-file="C:\Program Files\Nitro\Pro\13\debug.log" --field-trial-handle=2736,7065136462039864169,13490650459049932050,131072 --enable-features=CastMediaRouteProvider --disable-features=CalculateNativeWinOcclusion --disable-gpu-compositing --lang=en-US --locales-dir-path="C:\Program Files\Nitro\Pro\13\cef\resources\locales" --log-file="C:\Program Files\Nitro\Pro\13\debug.log" --log-severity=disable --resources-dir-path="C:\Program Files\Nitro\Pro\13\cef\resources" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
              5⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:5988
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 6BB960A55B44236F6DAA1E083379EA4B C
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3520
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssA784.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiA742.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrA743.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrA744.txt" -propSep " :<->: " -testPrefix "_testValue."
          3⤵
          • Blocklisted process makes network request
          • Drops startup file
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          PID:4088
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding C7E06F7187B3F9A1EBA184EDC5F8C106
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4264
        • C:\Windows\system32\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSI7F72.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_229562 2 NitroCA!NitroCA.CustomActions.CheckUniversalCRTInstalled
          3⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:4324
        • C:\Windows\system32\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSI8649.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_231078 7 NitroCA!NitroCA.CustomActions.GetOfficeBinaryType
          3⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:4460
        • C:\Windows\system32\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSI8C16.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_232500 14 NitroCA!NitroCA.CustomActions.ClosePrompt
          3⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          PID:4616
        • C:\Windows\system32\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSI8FC1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_233406 21 NitroCA!NitroCA.CustomActions.ClosePrompt_check
          3⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          PID:4740
        • C:\Windows\system32\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSI9502.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_234750 28 NitroCA!NitroCA.CustomActions.ModifyMsiSourceList
          3⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:4880
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 85CF78DAE17FCA7E91519F92082871B6 E Global\MSI0000
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Windows\syswow64\reg.exe
          "reg.exe" copy HKLM\SOFTWARE\Classes\.fdf HKLM\SOFTWARE\Classes\NitroPDF.fdf\old /f
          3⤵
            PID:4392
          • C:\Windows\syswow64\reg.exe
            "reg.exe" copy HKLM\SOFTWARE\Classes\.pdf HKLM\SOFTWARE\Classes\NitroPDF.pdf\old /f
            3⤵
              PID:4336
            • C:\Windows\syswow64\reg.exe
              "reg.exe" copy HKLM\SOFTWARE\Classes\.xfdf HKLM\SOFTWARE\Classes\NitroPDF.xfdf\old /f
              3⤵
              • Modifies registry class
              PID:4504
          • C:\Windows\System32\MsiExec.exe
            C:\Windows\System32\MsiExec.exe -Embedding AB6FF95F9AACD85341B9AD2B896E8EC9 E Global\MSI0000
            2⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of WriteProcessMemory
            PID:4560
            • C:\Windows\system32\rundll32.exe
              rundll32.exe "C:\Windows\Installer\MSIF0B4.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_258390 45 NitroCA!NitroCA.CustomActions.MoveShellExtensionToCommonFiles
              3⤵
              • Loads dropped DLL
              • Drops file in Program Files directory
              • Drops file in Windows directory
              PID:4440
            • C:\Windows\System32\net.exe
              "C:\Windows\System32\net.exe" stop LPDSVC
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:6020
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 stop LPDSVC
                4⤵
                  PID:4416
              • C:\Windows\System32\net.exe
                "C:\Windows\System32\net.exe" stop spooler
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:4392
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 stop spooler
                  4⤵
                    PID:4444
                • C:\Windows\System32\net.exe
                  "C:\Windows\System32\net.exe" start spooler
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4228
                  • C:\Windows\system32\net1.exe
                    C:\Windows\system32\net1 start spooler
                    4⤵
                      PID:4652
                  • C:\Windows\System32\net.exe
                    "C:\Windows\System32\net.exe" start LPDSVC
                    3⤵
                      PID:4648
                      • C:\Windows\system32\net1.exe
                        C:\Windows\system32\net1 start LPDSVC
                        4⤵
                          PID:4708
                    • C:\Program Files\Nitro\Pro\13\AddinSetupTool.exe
                      "C:\Program Files\Nitro\Pro\13\AddinSetupTool.exe" /InstallExcelAddin 1
                      2⤵
                      • Executes dropped EXE
                      PID:3452
                    • C:\Program Files\Nitro\Pro\13\AddinSetupTool.exe
                      "C:\Program Files\Nitro\Pro\13\AddinSetupTool.exe" /InstallOutlookAddin 1
                      2⤵
                      • Executes dropped EXE
                      PID:4808
                    • C:\Program Files\Nitro\Pro\13\AddinSetupTool.exe
                      "C:\Program Files\Nitro\Pro\13\AddinSetupTool.exe" /InstallPowerPointAddin 1
                      2⤵
                      • Executes dropped EXE
                      PID:4832
                    • C:\Program Files\Nitro\Pro\13\AddinSetupTool.exe
                      "C:\Program Files\Nitro\Pro\13\AddinSetupTool.exe" /InstallWordAddin 1
                      2⤵
                      • Executes dropped EXE
                      PID:4856
                    • C:\Windows\SysWOW64\CertUtil.exe
                      C:\Windows\SysWOW64\CertUtil –addstore –f "ca" "C:\Program Files\Nitro\Pro\13\notarius-certificate-authority.cer"
                      2⤵
                      • Modifies data under HKEY_USERS
                      PID:4772
                    • C:\Windows\SysWOW64\CertUtil.exe
                      C:\Windows\SysWOW64\CertUtil –addstore –f "ca" "C:\Program Files\Nitro\Pro\13\notarius-root-certificate-authority.cer"
                      2⤵
                      • Modifies data under HKEY_USERS
                      PID:4832
                  • C:\Windows\system32\vssvc.exe
                    C:\Windows\system32\vssvc.exe
                    1⤵
                      PID:2320
                    • \??\c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
                      1⤵
                      • Checks SCSI registry key(s)
                      • Modifies data under HKEY_USERS
                      PID:6016
                    • C:\Windows\system32\srtasks.exe
                      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                      1⤵
                        PID:3904
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc
                        1⤵
                        • Checks SCSI registry key(s)
                        • Modifies data under HKEY_USERS
                        PID:3164
                      • C:\Windows\System32\spoolsv.exe
                        C:\Windows\System32\spoolsv.exe
                        1⤵
                        • Checks SCSI registry key(s)
                        • Modifies data under HKEY_USERS
                        PID:4688

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Persistence

                      Registry Run Keys / Startup Folder

                      3
                      T1060

                      Browser Extensions

                      1
                      T1176

                      Defense Evasion

                      Modify Registry

                      4
                      T1112

                      Install Root Certificate

                      1
                      T1130

                      Discovery

                      Query Registry

                      4
                      T1012

                      System Information Discovery

                      4
                      T1082

                      Peripheral Device Discovery

                      2
                      T1120

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\rundll32.exe.log
                        MD5

                        cd6258539a68a12cfd67aa32b47b9524

                        SHA1

                        4694142a8a340a1c8f704ddeca923c838b8fb57f

                        SHA256

                        da7f78245a20604ec25221bc9a2e74909854ee550bdfbe2458b48aaf764ebe98

                        SHA512

                        8c0ede0e8d16fa647eb181979fd44cf384407a40fcc6dc87151b83f8fe1df181ab2d8c4b365b5b771388e83104e519c4df2a3cf411a3a2f8a3a2dfc7c46ae524

                      • C:\Users\Admin\AppData\Local\Temp\MSIA3A8.tmp
                        MD5

                        07ce413b1af6342187514871dc112c74

                        SHA1

                        8008f8bfeae99918b6323a3d1270dea63b3a8394

                        SHA256

                        0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                        SHA512

                        27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                      • C:\Users\Admin\AppData\Local\Temp\MSIA6D6.tmp
                        MD5

                        044a5d8e2f1356de889aedb11fdcc679

                        SHA1

                        4e8416eb12d209509d49998ebe714612709eb4d6

                        SHA256

                        e4492ccb97078cc32ee4437404ce04f4404884800a81fb34243d0a64936f82d7

                        SHA512

                        3cb6beaf46ec6ca3aa5a645b51b1df7a26826d8e65eb8f6cd1be63488f7a372c1e7e266f2950489a3ae8b3c6ca60d72f25504e4942e096c5c2045177557c79b9

                      • C:\Users\Admin\AppData\Local\Temp\MSIA6D6.tmp
                        MD5

                        044a5d8e2f1356de889aedb11fdcc679

                        SHA1

                        4e8416eb12d209509d49998ebe714612709eb4d6

                        SHA256

                        e4492ccb97078cc32ee4437404ce04f4404884800a81fb34243d0a64936f82d7

                        SHA512

                        3cb6beaf46ec6ca3aa5a645b51b1df7a26826d8e65eb8f6cd1be63488f7a372c1e7e266f2950489a3ae8b3c6ca60d72f25504e4942e096c5c2045177557c79b9

                      • C:\Users\Admin\AppData\Local\Temp\MSIA6E6.tmp
                        MD5

                        c26c68e4a79fd2629714b17514411c40

                        SHA1

                        00138d8edea0918c4476da303415be399cf704c6

                        SHA256

                        55434961c0b4bed88ae6bfe6e0e61a3a3dcc392858f0e53c6c14c272200203ed

                        SHA512

                        6fc8028e6e52b6c9e74ac3ea6d19ed750047d46b7e4021d46e581b58367ffc11fb13b696dfa30a15305e94098a7fd12051ee37d32df91ef2ae1e2d9c642b02ea

                      • C:\Users\Admin\AppData\Local\Temp\Nitro_Pro_20210922071546_000_NitroInstallationPackageId_x64_en.log
                        MD5

                        88a5689ed29450e68112c87f6ae88233

                        SHA1

                        4fff49f6e6dd547f3dd163e10d19404235b6fe63

                        SHA256

                        0f0e4b3f2e072e445bb5581ee397d16d8582bb3e50069fd2ee5835f2129870b3

                        SHA512

                        eafcedcad3ad9148b9e004ea870ea91e8b73bb73219f54f81c1a9cea955a590cd04b6a4830c304082669bbf25d7a8a9f967571e87f642d027887e58e118ce8ce

                      • C:\Users\Admin\AppData\Local\Temp\pssA784.ps1
                        MD5

                        0c95bc11cfca37f84a19de0529377e13

                        SHA1

                        41f409dbbab04ef35c4f6489af6f85fceb9c501a

                        SHA256

                        88748aae11029228d84aef0855f4bc084dfd70450db1f7029746d8bc85182f93

                        SHA512

                        8a52f3c40440e3129a367609ee4b6e9e98aa62edec48592be03bad1aadcd389e2e58e095f4ea3d6f9cb458aa7101fcb5afdff66658885bfa0634c74c086db568

                      • C:\Users\Admin\AppData\Local\Temp\scrA743.ps1
                        MD5

                        6a251db4fad4a2248b0cc2e74461b07c

                        SHA1

                        190aab8b9badd7a4fc75a1b925f0e1135af44230

                        SHA256

                        e34af1b6edf33b155ca9854d084577c30e1bc9d96eee10014277a0e55a47beef

                        SHA512

                        b37ba8374dc9acf92520142e0c71f48c1fc94199ef85749d08d0b9e0367f78719dc1ce3786b05a2068bc79cf76df3283a8e38e1f06f6185516adfd6e43796b13

                      • C:\Windows\Installer\MSI7F72.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • C:\Windows\Installer\MSI8649.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • C:\Windows\Installer\MSI8C16.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • C:\Windows\Installer\MSI8FC1.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • C:\Windows\Installer\MSI9502.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • C:\Windows\Installer\MSIC3A6.tmp
                        MD5

                        d773d9bd091e712df7560f576da53de8

                        SHA1

                        165cfbdce1811883360112441f7237b287cf0691

                        SHA256

                        e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7

                        SHA512

                        15a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd

                      • C:\Windows\Installer\MSIC443.tmp
                        MD5

                        d773d9bd091e712df7560f576da53de8

                        SHA1

                        165cfbdce1811883360112441f7237b287cf0691

                        SHA256

                        e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7

                        SHA512

                        15a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd

                      • C:\Windows\Installer\MSIC4B2.tmp
                        MD5

                        d773d9bd091e712df7560f576da53de8

                        SHA1

                        165cfbdce1811883360112441f7237b287cf0691

                        SHA256

                        e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7

                        SHA512

                        15a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd

                      • C:\Windows\Installer\MSIF0B4.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • C:\Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\.be\nitro_pro13.exe
                        MD5

                        044a5d8e2f1356de889aedb11fdcc679

                        SHA1

                        4e8416eb12d209509d49998ebe714612709eb4d6

                        SHA256

                        e4492ccb97078cc32ee4437404ce04f4404884800a81fb34243d0a64936f82d7

                        SHA512

                        3cb6beaf46ec6ca3aa5a645b51b1df7a26826d8e65eb8f6cd1be63488f7a372c1e7e266f2950489a3ae8b3c6ca60d72f25504e4942e096c5c2045177557c79b9

                      • C:\Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\.be\nitro_pro13.exe
                        MD5

                        044a5d8e2f1356de889aedb11fdcc679

                        SHA1

                        4e8416eb12d209509d49998ebe714612709eb4d6

                        SHA256

                        e4492ccb97078cc32ee4437404ce04f4404884800a81fb34243d0a64936f82d7

                        SHA512

                        3cb6beaf46ec6ca3aa5a645b51b1df7a26826d8e65eb8f6cd1be63488f7a372c1e7e266f2950489a3ae8b3c6ca60d72f25504e4942e096c5c2045177557c79b9

                      • C:\Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\NitroInstallationPackageId_x64_en
                        MD5

                        ebb262917d5d14ef901d9de3c29e7527

                        SHA1

                        5f7bfb2d88879aa626ef16c56602d774eaddfff5

                        SHA256

                        45302c7f44a4f94854bfcf38790e5bbfe19ce549b1cea265243a7a67d6f39ddb

                        SHA512

                        420feb3dc10b30cecb85991a247bf4ff8d8dbca8a84254540d0ed9a760fa1b22846278558efa08bade32cfc9997b53c227a5b1b37834765ca5e1bbdb8310bb04

                      • C:\Windows\Temp\{0E418D21-DB90-4D72-AB10-EEAFCC533C0C}\.cr\MSIA6D6.tmp
                        MD5

                        044a5d8e2f1356de889aedb11fdcc679

                        SHA1

                        4e8416eb12d209509d49998ebe714612709eb4d6

                        SHA256

                        e4492ccb97078cc32ee4437404ce04f4404884800a81fb34243d0a64936f82d7

                        SHA512

                        3cb6beaf46ec6ca3aa5a645b51b1df7a26826d8e65eb8f6cd1be63488f7a372c1e7e266f2950489a3ae8b3c6ca60d72f25504e4942e096c5c2045177557c79b9

                      • C:\Windows\Temp\{0E418D21-DB90-4D72-AB10-EEAFCC533C0C}\.cr\MSIA6D6.tmp
                        MD5

                        044a5d8e2f1356de889aedb11fdcc679

                        SHA1

                        4e8416eb12d209509d49998ebe714612709eb4d6

                        SHA256

                        e4492ccb97078cc32ee4437404ce04f4404884800a81fb34243d0a64936f82d7

                        SHA512

                        3cb6beaf46ec6ca3aa5a645b51b1df7a26826d8e65eb8f6cd1be63488f7a372c1e7e266f2950489a3ae8b3c6ca60d72f25504e4942e096c5c2045177557c79b9

                      • \Users\Admin\AppData\Local\Temp\MSIA3A8.tmp
                        MD5

                        07ce413b1af6342187514871dc112c74

                        SHA1

                        8008f8bfeae99918b6323a3d1270dea63b3a8394

                        SHA256

                        0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                        SHA512

                        27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                      • \Users\Admin\AppData\Local\Temp\MSIA6E6.tmp
                        MD5

                        c26c68e4a79fd2629714b17514411c40

                        SHA1

                        00138d8edea0918c4476da303415be399cf704c6

                        SHA256

                        55434961c0b4bed88ae6bfe6e0e61a3a3dcc392858f0e53c6c14c272200203ed

                        SHA512

                        6fc8028e6e52b6c9e74ac3ea6d19ed750047d46b7e4021d46e581b58367ffc11fb13b696dfa30a15305e94098a7fd12051ee37d32df91ef2ae1e2d9c642b02ea

                      • \Windows\Installer\MSI7F72.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • \Windows\Installer\MSI7F72.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • \Windows\Installer\MSI7F72.tmp-\NitroCA.dll
                        MD5

                        81cfdfc9cde37b8a847d8bc5326dc9d9

                        SHA1

                        dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                        SHA256

                        2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                        SHA512

                        983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                      • \Windows\Installer\MSI7F72.tmp-\NitroCA.dll
                        MD5

                        81cfdfc9cde37b8a847d8bc5326dc9d9

                        SHA1

                        dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                        SHA256

                        2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                        SHA512

                        983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                      • \Windows\Installer\MSI8649.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • \Windows\Installer\MSI8649.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • \Windows\Installer\MSI8649.tmp-\NitroCA.dll
                        MD5

                        81cfdfc9cde37b8a847d8bc5326dc9d9

                        SHA1

                        dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                        SHA256

                        2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                        SHA512

                        983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                      • \Windows\Installer\MSI8649.tmp-\NitroCA.dll
                        MD5

                        81cfdfc9cde37b8a847d8bc5326dc9d9

                        SHA1

                        dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                        SHA256

                        2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                        SHA512

                        983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                      • \Windows\Installer\MSI8C16.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • \Windows\Installer\MSI8C16.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • \Windows\Installer\MSI8C16.tmp-\NitroCA.dll
                        MD5

                        81cfdfc9cde37b8a847d8bc5326dc9d9

                        SHA1

                        dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                        SHA256

                        2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                        SHA512

                        983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                      • \Windows\Installer\MSI8C16.tmp-\NitroCA.dll
                        MD5

                        81cfdfc9cde37b8a847d8bc5326dc9d9

                        SHA1

                        dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                        SHA256

                        2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                        SHA512

                        983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                      • \Windows\Installer\MSI8FC1.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • \Windows\Installer\MSI8FC1.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • \Windows\Installer\MSI8FC1.tmp-\NitroCA.dll
                        MD5

                        81cfdfc9cde37b8a847d8bc5326dc9d9

                        SHA1

                        dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                        SHA256

                        2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                        SHA512

                        983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                      • \Windows\Installer\MSI8FC1.tmp-\NitroCA.dll
                        MD5

                        81cfdfc9cde37b8a847d8bc5326dc9d9

                        SHA1

                        dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                        SHA256

                        2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                        SHA512

                        983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                      • \Windows\Installer\MSI9502.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • \Windows\Installer\MSI9502.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • \Windows\Installer\MSI9502.tmp-\NitroCA.dll
                        MD5

                        81cfdfc9cde37b8a847d8bc5326dc9d9

                        SHA1

                        dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                        SHA256

                        2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                        SHA512

                        983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                      • \Windows\Installer\MSI9502.tmp-\NitroCA.dll
                        MD5

                        81cfdfc9cde37b8a847d8bc5326dc9d9

                        SHA1

                        dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                        SHA256

                        2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                        SHA512

                        983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                      • \Windows\Installer\MSIC3A6.tmp
                        MD5

                        d773d9bd091e712df7560f576da53de8

                        SHA1

                        165cfbdce1811883360112441f7237b287cf0691

                        SHA256

                        e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7

                        SHA512

                        15a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd

                      • \Windows\Installer\MSIC443.tmp
                        MD5

                        d773d9bd091e712df7560f576da53de8

                        SHA1

                        165cfbdce1811883360112441f7237b287cf0691

                        SHA256

                        e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7

                        SHA512

                        15a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd

                      • \Windows\Installer\MSIC4B2.tmp
                        MD5

                        d773d9bd091e712df7560f576da53de8

                        SHA1

                        165cfbdce1811883360112441f7237b287cf0691

                        SHA256

                        e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7

                        SHA512

                        15a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd

                      • \Windows\Installer\MSIF0B4.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • \Windows\Installer\MSIF0B4.tmp
                        MD5

                        c2894c0391639b486ddb8f8c9dc3873e

                        SHA1

                        fdbef2279fe4fb323749d30998cd239b51e4a2a2

                        SHA256

                        0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                        SHA512

                        c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                      • \Windows\Installer\MSIF0B4.tmp-\NitroCA.dll
                        MD5

                        81cfdfc9cde37b8a847d8bc5326dc9d9

                        SHA1

                        dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                        SHA256

                        2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                        SHA512

                        983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                      • \Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\.ba\BootstrapperCore.dll
                        MD5

                        c4f7146ddc56763ccdb1cb3c09478708

                        SHA1

                        bca088ab33cfb69adeae11a272e9c8a83f39a8c9

                        SHA256

                        886cb2a994461f091752fc7b21e3143c212efd8841c757909e74ac32761880da

                        SHA512

                        df2ca029e95f80fc5870e541db8b1d5a03266307bb5f7680ad630868a9a3c584b3a702fbec09c26fef7287c99f5d9d1f59cd59b74dcf740c9a8e7508e07d18b5

                      • \Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\.ba\BootstrapperCore.dll
                        MD5

                        c4f7146ddc56763ccdb1cb3c09478708

                        SHA1

                        bca088ab33cfb69adeae11a272e9c8a83f39a8c9

                        SHA256

                        886cb2a994461f091752fc7b21e3143c212efd8841c757909e74ac32761880da

                        SHA512

                        df2ca029e95f80fc5870e541db8b1d5a03266307bb5f7680ad630868a9a3c584b3a702fbec09c26fef7287c99f5d9d1f59cd59b74dcf740c9a8e7508e07d18b5

                      • \Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\.ba\GalaSoft.MvvmLight.WPF4.dll
                        MD5

                        1e40431b501d55fe8ba59cabb3ce5c17

                        SHA1

                        b8aef0f6829345d844960c3eaf96c41f76142f6c

                        SHA256

                        92ef1bdf8c8140e34e5ae1eb8d9b7afba9921e5ada6317c6cdd0da2712f7e000

                        SHA512

                        2ab5d887e717add46959a7193cbf1dbf73f2792130025e5712ae76058ce5923be8afdf3ed8d11ea6859b13126f88bb9e1099741c799ca90e3f7713955dd9638d

                      • \Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\.ba\GalaSoft.MvvmLight.WPF4.dll
                        MD5

                        1e40431b501d55fe8ba59cabb3ce5c17

                        SHA1

                        b8aef0f6829345d844960c3eaf96c41f76142f6c

                        SHA256

                        92ef1bdf8c8140e34e5ae1eb8d9b7afba9921e5ada6317c6cdd0da2712f7e000

                        SHA512

                        2ab5d887e717add46959a7193cbf1dbf73f2792130025e5712ae76058ce5923be8afdf3ed8d11ea6859b13126f88bb9e1099741c799ca90e3f7713955dd9638d

                      • \Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\.ba\NitroBA.dll
                        MD5

                        6726d4b46346ef40dd3ea4376ae7d259

                        SHA1

                        ffdaa10e1e3d1c7d7411f799a0889ce66014bc29

                        SHA256

                        3e96b189fa7a160396742cdc93564dfce3ad3993a3e21118cf9114c8cb45e963

                        SHA512

                        cd2a68f1ce4bc161b26466fa8f472803d7a10b339dff6c599e64863236ef59d9a0ed1b2f4168f8557b35d81d92edccdfd9d313096a88415838b6351af1ae249a

                      • \Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\.ba\NitroBA.dll
                        MD5

                        6726d4b46346ef40dd3ea4376ae7d259

                        SHA1

                        ffdaa10e1e3d1c7d7411f799a0889ce66014bc29

                        SHA256

                        3e96b189fa7a160396742cdc93564dfce3ad3993a3e21118cf9114c8cb45e963

                        SHA512

                        cd2a68f1ce4bc161b26466fa8f472803d7a10b339dff6c599e64863236ef59d9a0ed1b2f4168f8557b35d81d92edccdfd9d313096a88415838b6351af1ae249a

                      • \Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\.ba\PageTransitions.dll
                        MD5

                        ad69d408b05b98180b25d23b0a790f01

                        SHA1

                        5fdbdae2979685db500d2b031e2a430ce16e592e

                        SHA256

                        14090b63240c63bfe118a24b6f0112095f331ac46819f6f4ab62d8e9bbe4c646

                        SHA512

                        12323f7190fd785277965996cffe141a5b2d5b11679961db6aa6744b8157df7f9bd7b5b935d3ca2a7e0be7ca5f0f60fd8885b94ae7cd70aea1572e90a2599eac

                      • \Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\.ba\PageTransitions.dll
                        MD5

                        ad69d408b05b98180b25d23b0a790f01

                        SHA1

                        5fdbdae2979685db500d2b031e2a430ce16e592e

                        SHA256

                        14090b63240c63bfe118a24b6f0112095f331ac46819f6f4ab62d8e9bbe4c646

                        SHA512

                        12323f7190fd785277965996cffe141a5b2d5b11679961db6aa6744b8157df7f9bd7b5b935d3ca2a7e0be7ca5f0f60fd8885b94ae7cd70aea1572e90a2599eac

                      • \Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\.ba\mbahost.dll
                        MD5

                        d7c697ceb6f40ce91dabfcbe8df08e22

                        SHA1

                        49cd0213a1655dcdb493668083ab2d7f55135381

                        SHA256

                        b925d9d3e1e2c49bf05a1b0713e2750ee6e0c43c7adc9d3c3a1b9fb8c557c3df

                        SHA512

                        22ca87979ca68f10b5fda64c27913d0f2a12c359b04e4a6caa3645303fbd47cd598c805fd9a43c8f3e0934e9d2db85f7a4e1eff26cb33d233efc05ee2613cfc1

                      • \Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\.ba\metrics.dll
                        MD5

                        aed8280e90f672f631d2aedebd6452bf

                        SHA1

                        390b96ce6b4b1a47c12d8932c5e8da6e51fdd38a

                        SHA256

                        a82332e0a9c9cee34f9a46d5e984901fa57a011f54e7b37b9716acf834746ced

                        SHA512

                        23a223fc4da00038ff6b584f0a2a4186f49eaf4d8cb28dfdfa795048a4a977aa39848cb83bbfd8f0555412fd04c802b122267266e33a5ddc49d3e0ff1e2eca4f

                      • \Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\.ba\metrics.dll
                        MD5

                        aed8280e90f672f631d2aedebd6452bf

                        SHA1

                        390b96ce6b4b1a47c12d8932c5e8da6e51fdd38a

                        SHA256

                        a82332e0a9c9cee34f9a46d5e984901fa57a011f54e7b37b9716acf834746ced

                        SHA512

                        23a223fc4da00038ff6b584f0a2a4186f49eaf4d8cb28dfdfa795048a4a977aa39848cb83bbfd8f0555412fd04c802b122267266e33a5ddc49d3e0ff1e2eca4f

                      • \Windows\Temp\{083A93A4-C82F-4FC2-A81E-61350A35B2FB}\.ba\metrics.dll
                        MD5

                        aed8280e90f672f631d2aedebd6452bf

                        SHA1

                        390b96ce6b4b1a47c12d8932c5e8da6e51fdd38a

                        SHA256

                        a82332e0a9c9cee34f9a46d5e984901fa57a011f54e7b37b9716acf834746ced

                        SHA512

                        23a223fc4da00038ff6b584f0a2a4186f49eaf4d8cb28dfdfa795048a4a977aa39848cb83bbfd8f0555412fd04c802b122267266e33a5ddc49d3e0ff1e2eca4f

                      • memory/1192-187-0x0000000000000000-mapping.dmp
                      • memory/1832-329-0x0000000000000000-mapping.dmp
                      • memory/2112-126-0x0000000000000000-mapping.dmp
                      • memory/2412-392-0x0000000000000000-mapping.dmp
                      • memory/3452-365-0x0000000000000000-mapping.dmp
                      • memory/3468-169-0x0000000009470000-0x0000000009471000-memory.dmp
                        Filesize

                        4KB

                      • memory/3468-170-0x0000000006118000-0x0000000006119000-memory.dmp
                        Filesize

                        4KB

                      • memory/3468-130-0x0000000000000000-mapping.dmp
                      • memory/3468-140-0x0000000006010000-0x0000000006011000-memory.dmp
                        Filesize

                        4KB

                      • memory/3468-143-0x0000000006110000-0x0000000006111000-memory.dmp
                        Filesize

                        4KB

                      • memory/3468-144-0x0000000006111000-0x0000000006112000-memory.dmp
                        Filesize

                        4KB

                      • memory/3468-145-0x0000000006113000-0x0000000006114000-memory.dmp
                        Filesize

                        4KB

                      • memory/3468-149-0x0000000006490000-0x0000000006491000-memory.dmp
                        Filesize

                        4KB

                      • memory/3468-153-0x0000000006470000-0x0000000006471000-memory.dmp
                        Filesize

                        4KB

                      • memory/3468-161-0x00000000069A0000-0x00000000069A1000-memory.dmp
                        Filesize

                        4KB

                      • memory/3468-164-0x0000000006114000-0x0000000006115000-memory.dmp
                        Filesize

                        4KB

                      • memory/3468-165-0x0000000006117000-0x0000000006118000-memory.dmp
                        Filesize

                        4KB

                      • memory/3468-188-0x0000000006119000-0x000000000611A000-memory.dmp
                        Filesize

                        4KB

                      • memory/3468-167-0x0000000006B40000-0x0000000006B41000-memory.dmp
                        Filesize

                        4KB

                      • memory/3520-119-0x0000000000000000-mapping.dmp
                      • memory/4088-163-0x0000000007EC0000-0x0000000007EC1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-129-0x0000000000000000-mapping.dmp
                      • memory/4088-142-0x0000000007162000-0x0000000007163000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-154-0x00000000076E0000-0x00000000076E1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-141-0x0000000007160000-0x0000000007161000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-155-0x0000000007DD0000-0x0000000007DD1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-178-0x0000000009530000-0x0000000009531000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-156-0x0000000008020000-0x0000000008021000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-177-0x00000000094C0000-0x00000000094C1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-176-0x0000000009810000-0x0000000009811000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-179-0x0000000009DB0000-0x0000000009DB1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-184-0x000000000A930000-0x000000000A931000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-168-0x0000000008810000-0x0000000008811000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-137-0x00000000077A0000-0x00000000077A1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-186-0x0000000007163000-0x0000000007164000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-166-0x00000000084F0000-0x00000000084F1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-135-0x0000000007010000-0x0000000007011000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-157-0x0000000008090000-0x0000000008091000-memory.dmp
                        Filesize

                        4KB

                      • memory/4088-191-0x0000000009B10000-0x0000000009B1A000-memory.dmp
                        Filesize

                        40KB

                      • memory/4228-373-0x0000000000000000-mapping.dmp
                      • memory/4264-201-0x0000000000000000-mapping.dmp
                      • memory/4324-206-0x0000000000000000-mapping.dmp
                      • memory/4324-219-0x00000207E7C69000-0x00000207E7C6A000-memory.dmp
                        Filesize

                        4KB

                      • memory/4324-216-0x00000207E7C64000-0x00000207E7C66000-memory.dmp
                        Filesize

                        8KB

                      • memory/4324-218-0x00000207E7C67000-0x00000207E7C69000-memory.dmp
                        Filesize

                        8KB

                      • memory/4324-223-0x00000207CF500000-0x00000207CF501000-memory.dmp
                        Filesize

                        4KB

                      • memory/4324-214-0x00000207E7C60000-0x00000207E7C62000-memory.dmp
                        Filesize

                        8KB

                      • memory/4324-215-0x00000207E7C62000-0x00000207E7C64000-memory.dmp
                        Filesize

                        8KB

                      • memory/4324-211-0x00000207CF520000-0x00000207CF521000-memory.dmp
                        Filesize

                        4KB

                      • memory/4336-337-0x0000000000000000-mapping.dmp
                      • memory/4392-334-0x0000000000000000-mapping.dmp
                      • memory/4392-371-0x0000000000000000-mapping.dmp
                      • memory/4416-370-0x0000000000000000-mapping.dmp
                      • memory/4440-364-0x00000226658A9000-0x00000226658AA000-memory.dmp
                        Filesize

                        4KB

                      • memory/4440-346-0x0000000000000000-mapping.dmp
                      • memory/4440-362-0x00000226658A4000-0x00000226658A6000-memory.dmp
                        Filesize

                        8KB

                      • memory/4440-360-0x00000226658A0000-0x00000226658A2000-memory.dmp
                        Filesize

                        8KB

                      • memory/4440-363-0x00000226658A7000-0x00000226658A9000-memory.dmp
                        Filesize

                        8KB

                      • memory/4440-361-0x00000226658A2000-0x00000226658A4000-memory.dmp
                        Filesize

                        8KB

                      • memory/4444-372-0x0000000000000000-mapping.dmp
                      • memory/4460-230-0x0000000000000000-mapping.dmp
                      • memory/4460-247-0x0000028FBF872000-0x0000028FBF874000-memory.dmp
                        Filesize

                        8KB

                      • memory/4460-246-0x0000028FBF870000-0x0000028FBF872000-memory.dmp
                        Filesize

                        8KB

                      • memory/4460-248-0x0000028FBF874000-0x0000028FBF876000-memory.dmp
                        Filesize

                        8KB

                      • memory/4460-249-0x0000028FBF877000-0x0000028FBF879000-memory.dmp
                        Filesize

                        8KB

                      • memory/4460-250-0x0000028FBF879000-0x0000028FBF87A000-memory.dmp
                        Filesize

                        4KB

                      • memory/4504-340-0x0000000000000000-mapping.dmp
                      • memory/4560-341-0x0000000000000000-mapping.dmp
                      • memory/4616-279-0x000001FC7CF02000-0x000001FC7CF04000-memory.dmp
                        Filesize

                        8KB

                      • memory/4616-282-0x000001FC7CF09000-0x000001FC7CF0A000-memory.dmp
                        Filesize

                        4KB

                      • memory/4616-256-0x0000000000000000-mapping.dmp
                      • memory/4616-280-0x000001FC7CF04000-0x000001FC7CF06000-memory.dmp
                        Filesize

                        8KB

                      • memory/4616-278-0x000001FC7CF00000-0x000001FC7CF02000-memory.dmp
                        Filesize

                        8KB

                      • memory/4616-281-0x000001FC7CF07000-0x000001FC7CF09000-memory.dmp
                        Filesize

                        8KB

                      • memory/4648-375-0x0000000000000000-mapping.dmp
                      • memory/4652-374-0x0000000000000000-mapping.dmp
                      • memory/4708-376-0x0000000000000000-mapping.dmp
                      • memory/4740-305-0x0000016144854000-0x0000016144856000-memory.dmp
                        Filesize

                        8KB

                      • memory/4740-302-0x0000016144850000-0x0000016144852000-memory.dmp
                        Filesize

                        8KB

                      • memory/4740-303-0x0000016144852000-0x0000016144854000-memory.dmp
                        Filesize

                        8KB

                      • memory/4740-306-0x0000016144857000-0x0000016144859000-memory.dmp
                        Filesize

                        8KB

                      • memory/4740-307-0x0000016144859000-0x000001614485A000-memory.dmp
                        Filesize

                        4KB

                      • memory/4740-276-0x0000000000000000-mapping.dmp
                      • memory/4772-377-0x0000000000000000-mapping.dmp
                      • memory/4808-366-0x0000000000000000-mapping.dmp
                      • memory/4832-367-0x0000000000000000-mapping.dmp
                      • memory/4832-378-0x0000000000000000-mapping.dmp
                      • memory/4856-368-0x0000000000000000-mapping.dmp
                      • memory/4880-301-0x0000000000000000-mapping.dmp
                      • memory/4880-328-0x000002437F559000-0x000002437F55A000-memory.dmp
                        Filesize

                        4KB

                      • memory/4880-327-0x000002437F557000-0x000002437F559000-memory.dmp
                        Filesize

                        8KB

                      • memory/4880-326-0x000002437F554000-0x000002437F556000-memory.dmp
                        Filesize

                        8KB

                      • memory/4880-325-0x000002437F552000-0x000002437F554000-memory.dmp
                        Filesize

                        8KB

                      • memory/4880-324-0x000002437F550000-0x000002437F552000-memory.dmp
                        Filesize

                        8KB

                      • memory/5356-380-0x00007FF7967E0000-0x00007FF7973B1000-memory.dmp
                        Filesize

                        11.8MB

                      • memory/5356-381-0x0000016D79DD0000-0x0000016D79DD1000-memory.dmp
                        Filesize

                        4KB

                      • memory/5356-387-0x0000016D7E3D0000-0x0000016D7E47F000-memory.dmp
                        Filesize

                        700KB

                      • memory/5356-390-0x0000016D7E810000-0x0000016D7E8E9000-memory.dmp
                        Filesize

                        868KB

                      • memory/5356-379-0x0000000000000000-mapping.dmp
                      • memory/5388-382-0x0000000000000000-mapping.dmp
                      • memory/5480-383-0x0000000000000000-mapping.dmp
                      • memory/5612-385-0x0000000000000000-mapping.dmp
                      • memory/5624-386-0x0000000000000000-mapping.dmp
                      • memory/5968-391-0x0000000000000000-mapping.dmp
                      • memory/5988-394-0x0000000000000000-mapping.dmp
                      • memory/6020-369-0x0000000000000000-mapping.dmp