Analysis

  • max time kernel
    1193s
  • max time network
    1193s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    26-09-2021 17:01

General

  • Target

    Acsc-Joint-Planning-Jpex-Answers.msi

  • Size

    108.5MB

  • MD5

    82dbf0d2b49de42dc700df7c96b41eb1

  • SHA1

    509c08fd9805cf2034fec547c0fc962423a96a3b

  • SHA256

    7ada6e666c34aacaf7c93d11ca2e563ec53da37fb23a181631809d0d5ef14387

  • SHA512

    3d256fba291eb2f4a81ef53d8db8a333f3fb26a9a2c90e3c28bb0a944dc8bba2a2c8902232b14e6a9debdf93a2ff100faabb2be2053aac7fc2ccbdbd2f98fc83

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs
  • Blocklisted process makes network request 8 IoCs
  • Executes dropped EXE 7 IoCs
  • Registers new Print Monitor 2 TTPs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 46 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 34 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 40 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Acsc-Joint-Planning-Jpex-Answers.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Users\Admin\AppData\Local\Temp\MSI8F5B.tmp
      "C:\Users\Admin\AppData\Local\Temp\MSI8F5B.tmp"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Windows\Temp\{D8BE2C38-9063-4414-97FB-847943A15DA5}\.cr\MSI8F5B.tmp
        "C:\Windows\Temp\{D8BE2C38-9063-4414-97FB-847943A15DA5}\.cr\MSI8F5B.tmp" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\MSI8F5B.tmp" -burn.filehandle.attached=544 -burn.filehandle.self=524
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2516
        • C:\Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\.be\nitro_pro13.exe
          "C:\Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\.be\nitro_pro13.exe" -q -burn.elevated BurnPipe.{BCC81081-5627-41E0-A0E6-8F2F58CD781E} {81256765-AC3F-44CE-A2A7-A1AC7DDA8D19} 2516
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:1312
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B5BA3DD88A3BE7075351DFC018FBB1FE C
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1700
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss9067.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi9044.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr9045.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr9046.txt" -propSep " :<->: " -testPrefix "_testValue."
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        PID:2456
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell"
          4⤵
          • Blocklisted process makes network request
          PID:6768
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding 0B6732D1C8EAC6806EC1B2038A24299E
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:8708
      • C:\Windows\system32\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIAEE.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_199953 2 NitroCA!NitroCA.CustomActions.CheckUniversalCRTInstalled
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:8768
      • C:\Windows\system32\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI11C5.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_201218 7 NitroCA!NitroCA.CustomActions.GetOfficeBinaryType
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:8908
      • C:\Windows\system32\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI165A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_202343 14 NitroCA!NitroCA.CustomActions.ClosePrompt
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:9052
      • C:\Windows\system32\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI1997.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_203203 21 NitroCA!NitroCA.CustomActions.ClosePrompt_check
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:6184
      • C:\Windows\system32\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI1CB5.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_204015 28 NitroCA!NitroCA.CustomActions.ModifyMsiSourceList
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:9328
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 81755D09EA20B1AA9E197B356790B605 E Global\MSI0000
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4156
      • C:\Windows\syswow64\reg.exe
        "reg.exe" copy HKLM\SOFTWARE\Classes\.fdf HKLM\SOFTWARE\Classes\NitroPDF.fdf\old /f
        3⤵
          PID:6172
        • C:\Windows\syswow64\reg.exe
          "reg.exe" copy HKLM\SOFTWARE\Classes\.pdf HKLM\SOFTWARE\Classes\NitroPDF.pdf\old /f
          3⤵
          • Modifies registry class
          PID:8404
        • C:\Windows\syswow64\reg.exe
          "reg.exe" copy HKLM\SOFTWARE\Classes\.xfdf HKLM\SOFTWARE\Classes\NitroPDF.xfdf\old /f
          3⤵
          • Modifies registry class
          PID:9520
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding 7C41D29706637FEC3847769C629A597E E Global\MSI0000
        2⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:9096
        • C:\Windows\system32\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSI9CA9.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_236781 45 NitroCA!NitroCA.CustomActions.MoveShellExtensionToCommonFiles
          3⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:9236
        • C:\Windows\System32\net.exe
          "C:\Windows\System32\net.exe" stop LPDSVC
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:8076
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop LPDSVC
            4⤵
              PID:8124
          • C:\Windows\System32\net.exe
            "C:\Windows\System32\net.exe" stop spooler
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:8148
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 stop spooler
              4⤵
                PID:7128
            • C:\Windows\System32\net.exe
              "C:\Windows\System32\net.exe" start spooler
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:5432
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 start spooler
                4⤵
                  PID:5480
              • C:\Windows\System32\net.exe
                "C:\Windows\System32\net.exe" start LPDSVC
                3⤵
                  PID:5616
                  • C:\Windows\system32\net1.exe
                    C:\Windows\system32\net1 start LPDSVC
                    4⤵
                      PID:5664
                • C:\Program Files\Nitro\Pro\13\AddinSetupTool.exe
                  "C:\Program Files\Nitro\Pro\13\AddinSetupTool.exe" /InstallExcelAddin 1
                  2⤵
                  • Executes dropped EXE
                  PID:9388
                • C:\Program Files\Nitro\Pro\13\AddinSetupTool.exe
                  "C:\Program Files\Nitro\Pro\13\AddinSetupTool.exe" /InstallOutlookAddin 1
                  2⤵
                  • Executes dropped EXE
                  PID:9352
                • C:\Program Files\Nitro\Pro\13\AddinSetupTool.exe
                  "C:\Program Files\Nitro\Pro\13\AddinSetupTool.exe" /InstallPowerPointAddin 1
                  2⤵
                  • Executes dropped EXE
                  PID:2792
                • C:\Program Files\Nitro\Pro\13\AddinSetupTool.exe
                  "C:\Program Files\Nitro\Pro\13\AddinSetupTool.exe" /InstallWordAddin 1
                  2⤵
                  • Executes dropped EXE
                  PID:8620
                • C:\Windows\SysWOW64\CertUtil.exe
                  C:\Windows\SysWOW64\CertUtil –addstore –f "ca" "C:\Program Files\Nitro\Pro\13\notarius-certificate-authority.cer"
                  2⤵
                  • Modifies data under HKEY_USERS
                  PID:5688
                • C:\Windows\SysWOW64\CertUtil.exe
                  C:\Windows\SysWOW64\CertUtil –addstore –f "ca" "C:\Program Files\Nitro\Pro\13\notarius-root-certificate-authority.cer"
                  2⤵
                  • Modifies data under HKEY_USERS
                  PID:5768
              • C:\Windows\system32\vssvc.exe
                C:\Windows\system32\vssvc.exe
                1⤵
                  PID:3744
                • \??\c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
                  1⤵
                  • Checks SCSI registry key(s)
                  • Modifies data under HKEY_USERS
                  PID:6716
                • C:\Windows\system32\srtasks.exe
                  C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                  1⤵
                    PID:6828
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc
                    1⤵
                    • Modifies data under HKEY_USERS
                    PID:8012
                  • C:\Windows\System32\spoolsv.exe
                    C:\Windows\System32\spoolsv.exe
                    1⤵
                    • Loads dropped DLL
                    • Checks SCSI registry key(s)
                    • Modifies data under HKEY_USERS
                    PID:5500

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  Registry Run Keys / Startup Folder

                  3
                  T1060

                  Browser Extensions

                  1
                  T1176

                  Defense Evasion

                  Modify Registry

                  3
                  T1112

                  Discovery

                  Query Registry

                  3
                  T1012

                  Peripheral Device Discovery

                  2
                  T1120

                  System Information Discovery

                  3
                  T1082

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\rundll32.exe.log
                    MD5

                    cd6258539a68a12cfd67aa32b47b9524

                    SHA1

                    4694142a8a340a1c8f704ddeca923c838b8fb57f

                    SHA256

                    da7f78245a20604ec25221bc9a2e74909854ee550bdfbe2458b48aaf764ebe98

                    SHA512

                    8c0ede0e8d16fa647eb181979fd44cf384407a40fcc6dc87151b83f8fe1df181ab2d8c4b365b5b771388e83104e519c4df2a3cf411a3a2f8a3a2dfc7c46ae524

                  • C:\Users\Admin\AppData\Local\Temp\MSI86FD.tmp
                    MD5

                    07ce413b1af6342187514871dc112c74

                    SHA1

                    8008f8bfeae99918b6323a3d1270dea63b3a8394

                    SHA256

                    0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                    SHA512

                    27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                  • C:\Users\Admin\AppData\Local\Temp\MSI8F5B.tmp
                    MD5

                    044a5d8e2f1356de889aedb11fdcc679

                    SHA1

                    4e8416eb12d209509d49998ebe714612709eb4d6

                    SHA256

                    e4492ccb97078cc32ee4437404ce04f4404884800a81fb34243d0a64936f82d7

                    SHA512

                    3cb6beaf46ec6ca3aa5a645b51b1df7a26826d8e65eb8f6cd1be63488f7a372c1e7e266f2950489a3ae8b3c6ca60d72f25504e4942e096c5c2045177557c79b9

                  • C:\Users\Admin\AppData\Local\Temp\MSI8F5B.tmp
                    MD5

                    044a5d8e2f1356de889aedb11fdcc679

                    SHA1

                    4e8416eb12d209509d49998ebe714612709eb4d6

                    SHA256

                    e4492ccb97078cc32ee4437404ce04f4404884800a81fb34243d0a64936f82d7

                    SHA512

                    3cb6beaf46ec6ca3aa5a645b51b1df7a26826d8e65eb8f6cd1be63488f7a372c1e7e266f2950489a3ae8b3c6ca60d72f25504e4942e096c5c2045177557c79b9

                  • C:\Users\Admin\AppData\Local\Temp\MSI8F6C.tmp
                    MD5

                    c26c68e4a79fd2629714b17514411c40

                    SHA1

                    00138d8edea0918c4476da303415be399cf704c6

                    SHA256

                    55434961c0b4bed88ae6bfe6e0e61a3a3dcc392858f0e53c6c14c272200203ed

                    SHA512

                    6fc8028e6e52b6c9e74ac3ea6d19ed750047d46b7e4021d46e581b58367ffc11fb13b696dfa30a15305e94098a7fd12051ee37d32df91ef2ae1e2d9c642b02ea

                  • C:\Users\Admin\AppData\Local\Temp\Nitro_Pro_20210926190138_000_NitroInstallationPackageId_x64_en.log
                    MD5

                    6714e8b197e1cc73dce725b9b7b41700

                    SHA1

                    c24ae137bdcff90a0bd3c016d1b9ba64c87fdf08

                    SHA256

                    ca9e65a87692e30f99f5a67edc0420aaf5604550366de50ac343c35b35b9b9dd

                    SHA512

                    29341133c4535f50d3abb93aeb6a6af84d1188f2c38a0e6870ebae8d6c1e3d03a3ab967a0753ef6f05abd6b58c83a13686a2ea2ed9ae449b7a46fe2ff74cd0f8

                  • C:\Users\Admin\AppData\Local\Temp\pss9067.ps1
                    MD5

                    0c95bc11cfca37f84a19de0529377e13

                    SHA1

                    41f409dbbab04ef35c4f6489af6f85fceb9c501a

                    SHA256

                    88748aae11029228d84aef0855f4bc084dfd70450db1f7029746d8bc85182f93

                    SHA512

                    8a52f3c40440e3129a367609ee4b6e9e98aa62edec48592be03bad1aadcd389e2e58e095f4ea3d6f9cb458aa7101fcb5afdff66658885bfa0634c74c086db568

                  • C:\Users\Admin\AppData\Local\Temp\scr9045.ps1
                    MD5

                    c803797d8af1ef2779336e1c31743a44

                    SHA1

                    66b903d47f23a52a428daf3f358ff9522a1761b0

                    SHA256

                    f8ffeda0cf4e3519a3af952f17ac137aa59b7d547612e5b6595dad4e26165027

                    SHA512

                    086b7ea1b3d07e2f3d2aa10927c9cd61a659cc168ccb67226cf3d142e9b14ce861ac866997838c1295904da86ec0d50873c0c359add2bf829f59596fde1d3385

                  • C:\Windows\Installer\MSI11C5.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • C:\Windows\Installer\MSI165A.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • C:\Windows\Installer\MSI1997.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • C:\Windows\Installer\MSI1CB5.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • C:\Windows\Installer\MSI59A1.tmp
                    MD5

                    d773d9bd091e712df7560f576da53de8

                    SHA1

                    165cfbdce1811883360112441f7237b287cf0691

                    SHA256

                    e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7

                    SHA512

                    15a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd

                  • C:\Windows\Installer\MSI5B19.tmp
                    MD5

                    d773d9bd091e712df7560f576da53de8

                    SHA1

                    165cfbdce1811883360112441f7237b287cf0691

                    SHA256

                    e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7

                    SHA512

                    15a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd

                  • C:\Windows\Installer\MSI5B78.tmp
                    MD5

                    d773d9bd091e712df7560f576da53de8

                    SHA1

                    165cfbdce1811883360112441f7237b287cf0691

                    SHA256

                    e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7

                    SHA512

                    15a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd

                  • C:\Windows\Installer\MSI9CA9.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • C:\Windows\Installer\MSIAEE.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • C:\Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\.be\nitro_pro13.exe
                    MD5

                    044a5d8e2f1356de889aedb11fdcc679

                    SHA1

                    4e8416eb12d209509d49998ebe714612709eb4d6

                    SHA256

                    e4492ccb97078cc32ee4437404ce04f4404884800a81fb34243d0a64936f82d7

                    SHA512

                    3cb6beaf46ec6ca3aa5a645b51b1df7a26826d8e65eb8f6cd1be63488f7a372c1e7e266f2950489a3ae8b3c6ca60d72f25504e4942e096c5c2045177557c79b9

                  • C:\Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\.be\nitro_pro13.exe
                    MD5

                    044a5d8e2f1356de889aedb11fdcc679

                    SHA1

                    4e8416eb12d209509d49998ebe714612709eb4d6

                    SHA256

                    e4492ccb97078cc32ee4437404ce04f4404884800a81fb34243d0a64936f82d7

                    SHA512

                    3cb6beaf46ec6ca3aa5a645b51b1df7a26826d8e65eb8f6cd1be63488f7a372c1e7e266f2950489a3ae8b3c6ca60d72f25504e4942e096c5c2045177557c79b9

                  • C:\Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\NitroInstallationPackageId_x64_en
                    MD5

                    ebb262917d5d14ef901d9de3c29e7527

                    SHA1

                    5f7bfb2d88879aa626ef16c56602d774eaddfff5

                    SHA256

                    45302c7f44a4f94854bfcf38790e5bbfe19ce549b1cea265243a7a67d6f39ddb

                    SHA512

                    420feb3dc10b30cecb85991a247bf4ff8d8dbca8a84254540d0ed9a760fa1b22846278558efa08bade32cfc9997b53c227a5b1b37834765ca5e1bbdb8310bb04

                  • C:\Windows\Temp\{D8BE2C38-9063-4414-97FB-847943A15DA5}\.cr\MSI8F5B.tmp
                    MD5

                    044a5d8e2f1356de889aedb11fdcc679

                    SHA1

                    4e8416eb12d209509d49998ebe714612709eb4d6

                    SHA256

                    e4492ccb97078cc32ee4437404ce04f4404884800a81fb34243d0a64936f82d7

                    SHA512

                    3cb6beaf46ec6ca3aa5a645b51b1df7a26826d8e65eb8f6cd1be63488f7a372c1e7e266f2950489a3ae8b3c6ca60d72f25504e4942e096c5c2045177557c79b9

                  • C:\Windows\Temp\{D8BE2C38-9063-4414-97FB-847943A15DA5}\.cr\MSI8F5B.tmp
                    MD5

                    044a5d8e2f1356de889aedb11fdcc679

                    SHA1

                    4e8416eb12d209509d49998ebe714612709eb4d6

                    SHA256

                    e4492ccb97078cc32ee4437404ce04f4404884800a81fb34243d0a64936f82d7

                    SHA512

                    3cb6beaf46ec6ca3aa5a645b51b1df7a26826d8e65eb8f6cd1be63488f7a372c1e7e266f2950489a3ae8b3c6ca60d72f25504e4942e096c5c2045177557c79b9

                  • \Users\Admin\AppData\Local\Temp\MSI86FD.tmp
                    MD5

                    07ce413b1af6342187514871dc112c74

                    SHA1

                    8008f8bfeae99918b6323a3d1270dea63b3a8394

                    SHA256

                    0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                    SHA512

                    27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                  • \Users\Admin\AppData\Local\Temp\MSI8F6C.tmp
                    MD5

                    c26c68e4a79fd2629714b17514411c40

                    SHA1

                    00138d8edea0918c4476da303415be399cf704c6

                    SHA256

                    55434961c0b4bed88ae6bfe6e0e61a3a3dcc392858f0e53c6c14c272200203ed

                    SHA512

                    6fc8028e6e52b6c9e74ac3ea6d19ed750047d46b7e4021d46e581b58367ffc11fb13b696dfa30a15305e94098a7fd12051ee37d32df91ef2ae1e2d9c642b02ea

                  • \Windows\Installer\MSI11C5.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • \Windows\Installer\MSI11C5.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • \Windows\Installer\MSI11C5.tmp-\NitroCA.dll
                    MD5

                    81cfdfc9cde37b8a847d8bc5326dc9d9

                    SHA1

                    dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                    SHA256

                    2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                    SHA512

                    983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                  • \Windows\Installer\MSI11C5.tmp-\NitroCA.dll
                    MD5

                    81cfdfc9cde37b8a847d8bc5326dc9d9

                    SHA1

                    dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                    SHA256

                    2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                    SHA512

                    983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                  • \Windows\Installer\MSI165A.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • \Windows\Installer\MSI165A.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • \Windows\Installer\MSI165A.tmp-\NitroCA.dll
                    MD5

                    81cfdfc9cde37b8a847d8bc5326dc9d9

                    SHA1

                    dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                    SHA256

                    2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                    SHA512

                    983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                  • \Windows\Installer\MSI165A.tmp-\NitroCA.dll
                    MD5

                    81cfdfc9cde37b8a847d8bc5326dc9d9

                    SHA1

                    dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                    SHA256

                    2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                    SHA512

                    983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                  • \Windows\Installer\MSI1997.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • \Windows\Installer\MSI1997.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • \Windows\Installer\MSI1997.tmp-\NitroCA.dll
                    MD5

                    81cfdfc9cde37b8a847d8bc5326dc9d9

                    SHA1

                    dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                    SHA256

                    2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                    SHA512

                    983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                  • \Windows\Installer\MSI1997.tmp-\NitroCA.dll
                    MD5

                    81cfdfc9cde37b8a847d8bc5326dc9d9

                    SHA1

                    dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                    SHA256

                    2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                    SHA512

                    983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                  • \Windows\Installer\MSI1CB5.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • \Windows\Installer\MSI1CB5.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • \Windows\Installer\MSI1CB5.tmp-\NitroCA.dll
                    MD5

                    81cfdfc9cde37b8a847d8bc5326dc9d9

                    SHA1

                    dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                    SHA256

                    2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                    SHA512

                    983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                  • \Windows\Installer\MSI1CB5.tmp-\NitroCA.dll
                    MD5

                    81cfdfc9cde37b8a847d8bc5326dc9d9

                    SHA1

                    dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                    SHA256

                    2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                    SHA512

                    983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                  • \Windows\Installer\MSI59A1.tmp
                    MD5

                    d773d9bd091e712df7560f576da53de8

                    SHA1

                    165cfbdce1811883360112441f7237b287cf0691

                    SHA256

                    e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7

                    SHA512

                    15a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd

                  • \Windows\Installer\MSI5B19.tmp
                    MD5

                    d773d9bd091e712df7560f576da53de8

                    SHA1

                    165cfbdce1811883360112441f7237b287cf0691

                    SHA256

                    e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7

                    SHA512

                    15a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd

                  • \Windows\Installer\MSI5B78.tmp
                    MD5

                    d773d9bd091e712df7560f576da53de8

                    SHA1

                    165cfbdce1811883360112441f7237b287cf0691

                    SHA256

                    e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7

                    SHA512

                    15a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd

                  • \Windows\Installer\MSI9CA9.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • \Windows\Installer\MSI9CA9.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • \Windows\Installer\MSI9CA9.tmp-\NitroCA.dll
                    MD5

                    81cfdfc9cde37b8a847d8bc5326dc9d9

                    SHA1

                    dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                    SHA256

                    2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                    SHA512

                    983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                  • \Windows\Installer\MSI9CA9.tmp-\NitroCA.dll
                    MD5

                    81cfdfc9cde37b8a847d8bc5326dc9d9

                    SHA1

                    dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                    SHA256

                    2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                    SHA512

                    983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                  • \Windows\Installer\MSIAEE.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • \Windows\Installer\MSIAEE.tmp
                    MD5

                    c2894c0391639b486ddb8f8c9dc3873e

                    SHA1

                    fdbef2279fe4fb323749d30998cd239b51e4a2a2

                    SHA256

                    0590f42b227c3f2726954521e85527668fe49b2de81abed53e738aed15746b0c

                    SHA512

                    c4fb09eb6b58f588eac6d7a65587468e2adba4ffa9a95f490d889d77181071b19ac808e26ae5222a057fe0c00b36c90425dc289147949b502757293ce955d2db

                  • \Windows\Installer\MSIAEE.tmp-\NitroCA.dll
                    MD5

                    81cfdfc9cde37b8a847d8bc5326dc9d9

                    SHA1

                    dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                    SHA256

                    2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                    SHA512

                    983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                  • \Windows\Installer\MSIAEE.tmp-\NitroCA.dll
                    MD5

                    81cfdfc9cde37b8a847d8bc5326dc9d9

                    SHA1

                    dabcd11ca3dc797e39c2b1db28adba365b99c0d2

                    SHA256

                    2cbbbbebb66f535edea0fd4f2116e97802c84f1dce222cbbae1ede40b8ce5099

                    SHA512

                    983b38b7e49072bb32067e4a6500c6978ca26d95354b781546e1ad421f61e01e0d66ed3c3f85c2f30d49c4a2037f4c4dbd3e4d272963c215970e74b9c5010143

                  • \Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\.ba\BootstrapperCore.dll
                    MD5

                    c4f7146ddc56763ccdb1cb3c09478708

                    SHA1

                    bca088ab33cfb69adeae11a272e9c8a83f39a8c9

                    SHA256

                    886cb2a994461f091752fc7b21e3143c212efd8841c757909e74ac32761880da

                    SHA512

                    df2ca029e95f80fc5870e541db8b1d5a03266307bb5f7680ad630868a9a3c584b3a702fbec09c26fef7287c99f5d9d1f59cd59b74dcf740c9a8e7508e07d18b5

                  • \Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\.ba\BootstrapperCore.dll
                    MD5

                    c4f7146ddc56763ccdb1cb3c09478708

                    SHA1

                    bca088ab33cfb69adeae11a272e9c8a83f39a8c9

                    SHA256

                    886cb2a994461f091752fc7b21e3143c212efd8841c757909e74ac32761880da

                    SHA512

                    df2ca029e95f80fc5870e541db8b1d5a03266307bb5f7680ad630868a9a3c584b3a702fbec09c26fef7287c99f5d9d1f59cd59b74dcf740c9a8e7508e07d18b5

                  • \Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\.ba\GalaSoft.MvvmLight.WPF4.dll
                    MD5

                    1e40431b501d55fe8ba59cabb3ce5c17

                    SHA1

                    b8aef0f6829345d844960c3eaf96c41f76142f6c

                    SHA256

                    92ef1bdf8c8140e34e5ae1eb8d9b7afba9921e5ada6317c6cdd0da2712f7e000

                    SHA512

                    2ab5d887e717add46959a7193cbf1dbf73f2792130025e5712ae76058ce5923be8afdf3ed8d11ea6859b13126f88bb9e1099741c799ca90e3f7713955dd9638d

                  • \Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\.ba\GalaSoft.MvvmLight.WPF4.dll
                    MD5

                    1e40431b501d55fe8ba59cabb3ce5c17

                    SHA1

                    b8aef0f6829345d844960c3eaf96c41f76142f6c

                    SHA256

                    92ef1bdf8c8140e34e5ae1eb8d9b7afba9921e5ada6317c6cdd0da2712f7e000

                    SHA512

                    2ab5d887e717add46959a7193cbf1dbf73f2792130025e5712ae76058ce5923be8afdf3ed8d11ea6859b13126f88bb9e1099741c799ca90e3f7713955dd9638d

                  • \Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\.ba\NitroBA.dll
                    MD5

                    6726d4b46346ef40dd3ea4376ae7d259

                    SHA1

                    ffdaa10e1e3d1c7d7411f799a0889ce66014bc29

                    SHA256

                    3e96b189fa7a160396742cdc93564dfce3ad3993a3e21118cf9114c8cb45e963

                    SHA512

                    cd2a68f1ce4bc161b26466fa8f472803d7a10b339dff6c599e64863236ef59d9a0ed1b2f4168f8557b35d81d92edccdfd9d313096a88415838b6351af1ae249a

                  • \Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\.ba\NitroBA.dll
                    MD5

                    6726d4b46346ef40dd3ea4376ae7d259

                    SHA1

                    ffdaa10e1e3d1c7d7411f799a0889ce66014bc29

                    SHA256

                    3e96b189fa7a160396742cdc93564dfce3ad3993a3e21118cf9114c8cb45e963

                    SHA512

                    cd2a68f1ce4bc161b26466fa8f472803d7a10b339dff6c599e64863236ef59d9a0ed1b2f4168f8557b35d81d92edccdfd9d313096a88415838b6351af1ae249a

                  • \Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\.ba\PageTransitions.dll
                    MD5

                    ad69d408b05b98180b25d23b0a790f01

                    SHA1

                    5fdbdae2979685db500d2b031e2a430ce16e592e

                    SHA256

                    14090b63240c63bfe118a24b6f0112095f331ac46819f6f4ab62d8e9bbe4c646

                    SHA512

                    12323f7190fd785277965996cffe141a5b2d5b11679961db6aa6744b8157df7f9bd7b5b935d3ca2a7e0be7ca5f0f60fd8885b94ae7cd70aea1572e90a2599eac

                  • \Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\.ba\PageTransitions.dll
                    MD5

                    ad69d408b05b98180b25d23b0a790f01

                    SHA1

                    5fdbdae2979685db500d2b031e2a430ce16e592e

                    SHA256

                    14090b63240c63bfe118a24b6f0112095f331ac46819f6f4ab62d8e9bbe4c646

                    SHA512

                    12323f7190fd785277965996cffe141a5b2d5b11679961db6aa6744b8157df7f9bd7b5b935d3ca2a7e0be7ca5f0f60fd8885b94ae7cd70aea1572e90a2599eac

                  • \Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\.ba\mbahost.dll
                    MD5

                    d7c697ceb6f40ce91dabfcbe8df08e22

                    SHA1

                    49cd0213a1655dcdb493668083ab2d7f55135381

                    SHA256

                    b925d9d3e1e2c49bf05a1b0713e2750ee6e0c43c7adc9d3c3a1b9fb8c557c3df

                    SHA512

                    22ca87979ca68f10b5fda64c27913d0f2a12c359b04e4a6caa3645303fbd47cd598c805fd9a43c8f3e0934e9d2db85f7a4e1eff26cb33d233efc05ee2613cfc1

                  • \Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\.ba\metrics.dll
                    MD5

                    aed8280e90f672f631d2aedebd6452bf

                    SHA1

                    390b96ce6b4b1a47c12d8932c5e8da6e51fdd38a

                    SHA256

                    a82332e0a9c9cee34f9a46d5e984901fa57a011f54e7b37b9716acf834746ced

                    SHA512

                    23a223fc4da00038ff6b584f0a2a4186f49eaf4d8cb28dfdfa795048a4a977aa39848cb83bbfd8f0555412fd04c802b122267266e33a5ddc49d3e0ff1e2eca4f

                  • \Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\.ba\metrics.dll
                    MD5

                    aed8280e90f672f631d2aedebd6452bf

                    SHA1

                    390b96ce6b4b1a47c12d8932c5e8da6e51fdd38a

                    SHA256

                    a82332e0a9c9cee34f9a46d5e984901fa57a011f54e7b37b9716acf834746ced

                    SHA512

                    23a223fc4da00038ff6b584f0a2a4186f49eaf4d8cb28dfdfa795048a4a977aa39848cb83bbfd8f0555412fd04c802b122267266e33a5ddc49d3e0ff1e2eca4f

                  • \Windows\Temp\{AD4FDA9A-4F4E-4F4A-91BB-9A70136B84D8}\.ba\metrics.dll
                    MD5

                    aed8280e90f672f631d2aedebd6452bf

                    SHA1

                    390b96ce6b4b1a47c12d8932c5e8da6e51fdd38a

                    SHA256

                    a82332e0a9c9cee34f9a46d5e984901fa57a011f54e7b37b9716acf834746ced

                    SHA512

                    23a223fc4da00038ff6b584f0a2a4186f49eaf4d8cb28dfdfa795048a4a977aa39848cb83bbfd8f0555412fd04c802b122267266e33a5ddc49d3e0ff1e2eca4f

                  • memory/1312-2407-0x0000000000000000-mapping.dmp
                  • memory/1700-118-0x0000000000000000-mapping.dmp
                  • memory/2080-125-0x0000000000000000-mapping.dmp
                  • memory/2456-182-0x0000000009E90000-0x0000000009E91000-memory.dmp
                    Filesize

                    4KB

                  • memory/2456-176-0x0000000008D00000-0x0000000008D01000-memory.dmp
                    Filesize

                    4KB

                  • memory/2456-156-0x0000000007650000-0x0000000007651000-memory.dmp
                    Filesize

                    4KB

                  • memory/2456-2402-0x00000000090A0000-0x00000000090AB000-memory.dmp
                    Filesize

                    44KB

                  • memory/2456-147-0x0000000000E42000-0x0000000000E43000-memory.dmp
                    Filesize

                    4KB

                  • memory/2456-187-0x0000000000E43000-0x0000000000E44000-memory.dmp
                    Filesize

                    4KB

                  • memory/2456-158-0x0000000007D10000-0x0000000007D11000-memory.dmp
                    Filesize

                    4KB

                  • memory/2456-151-0x0000000006D40000-0x0000000006D41000-memory.dmp
                    Filesize

                    4KB

                  • memory/2456-177-0x0000000009310000-0x0000000009311000-memory.dmp
                    Filesize

                    4KB

                  • memory/2456-157-0x00000000074D0000-0x00000000074D1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2456-175-0x0000000008A70000-0x0000000008A71000-memory.dmp
                    Filesize

                    4KB

                  • memory/2456-174-0x0000000008D70000-0x0000000008D71000-memory.dmp
                    Filesize

                    4KB

                  • memory/2456-137-0x0000000006DD0000-0x0000000006DD1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2456-136-0x0000000000E40000-0x0000000000E41000-memory.dmp
                    Filesize

                    4KB

                  • memory/2456-150-0x0000000006BA0000-0x0000000006BA1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2456-134-0x0000000000DA0000-0x0000000000DA1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2456-164-0x0000000007DE0000-0x0000000007DE1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2456-128-0x0000000000000000-mapping.dmp
                  • memory/2456-155-0x0000000007400000-0x0000000007401000-memory.dmp
                    Filesize

                    4KB

                  • memory/2516-165-0x00000000048B4000-0x00000000048B5000-memory.dmp
                    Filesize

                    4KB

                  • memory/2516-144-0x0000000006D20000-0x0000000006D21000-memory.dmp
                    Filesize

                    4KB

                  • memory/2516-162-0x0000000007200000-0x0000000007201000-memory.dmp
                    Filesize

                    4KB

                  • memory/2516-166-0x00000000048B7000-0x00000000048B8000-memory.dmp
                    Filesize

                    4KB

                  • memory/2516-170-0x00000000073A0000-0x00000000073A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2516-173-0x000000000A1E0000-0x000000000A1E1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2516-154-0x00000000048C0000-0x00000000048C1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2516-149-0x00000000048B3000-0x00000000048B4000-memory.dmp
                    Filesize

                    4KB

                  • memory/2516-148-0x00000000048B1000-0x00000000048B2000-memory.dmp
                    Filesize

                    4KB

                  • memory/2516-146-0x00000000048B0000-0x00000000048B1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2516-186-0x00000000048B8000-0x00000000048B9000-memory.dmp
                    Filesize

                    4KB

                  • memory/2516-2410-0x00000000048B9000-0x00000000048BA000-memory.dmp
                    Filesize

                    4KB

                  • memory/2516-140-0x0000000004870000-0x0000000004871000-memory.dmp
                    Filesize

                    4KB

                  • memory/2516-129-0x0000000000000000-mapping.dmp
                  • memory/2792-2583-0x0000000000000000-mapping.dmp
                  • memory/4156-2542-0x0000000000000000-mapping.dmp
                  • memory/5432-2589-0x0000000000000000-mapping.dmp
                  • memory/5480-2590-0x0000000000000000-mapping.dmp
                  • memory/5616-2591-0x0000000000000000-mapping.dmp
                  • memory/5664-2592-0x0000000000000000-mapping.dmp
                  • memory/5688-2593-0x0000000000000000-mapping.dmp
                  • memory/5768-2594-0x0000000000000000-mapping.dmp
                  • memory/6172-2547-0x0000000000000000-mapping.dmp
                  • memory/6184-2528-0x0000021D11917000-0x0000021D11919000-memory.dmp
                    Filesize

                    8KB

                  • memory/6184-2527-0x0000021D11914000-0x0000021D11916000-memory.dmp
                    Filesize

                    8KB

                  • memory/6184-2525-0x0000021D11912000-0x0000021D11914000-memory.dmp
                    Filesize

                    8KB

                  • memory/6184-2491-0x0000000000000000-mapping.dmp
                  • memory/6184-2523-0x0000021D11910000-0x0000021D11912000-memory.dmp
                    Filesize

                    8KB

                  • memory/6184-2533-0x0000021D11919000-0x0000021D1191A000-memory.dmp
                    Filesize

                    4KB

                  • memory/6768-2637-0x0000000006DE3000-0x0000000006DE4000-memory.dmp
                    Filesize

                    4KB

                  • memory/6768-2636-0x0000000006FD0000-0x0000000006FDB000-memory.dmp
                    Filesize

                    44KB

                  • memory/6768-2595-0x0000000000000000-mapping.dmp
                  • memory/6768-2606-0x0000000006DE0000-0x0000000006DE1000-memory.dmp
                    Filesize

                    4KB

                  • memory/6768-2616-0x0000000008720000-0x0000000008721000-memory.dmp
                    Filesize

                    4KB

                  • memory/6768-2607-0x0000000006DE2000-0x0000000006DE3000-memory.dmp
                    Filesize

                    4KB

                  • memory/7128-2588-0x0000000000000000-mapping.dmp
                  • memory/8076-2585-0x0000000000000000-mapping.dmp
                  • memory/8124-2586-0x0000000000000000-mapping.dmp
                  • memory/8148-2587-0x0000000000000000-mapping.dmp
                  • memory/8404-2550-0x0000000000000000-mapping.dmp
                  • memory/8620-2584-0x0000000000000000-mapping.dmp
                  • memory/8708-2416-0x0000000000000000-mapping.dmp
                  • memory/8768-2427-0x000001DE47240000-0x000001DE47241000-memory.dmp
                    Filesize

                    4KB

                  • memory/8768-2441-0x000001DE5F9A4000-0x000001DE5F9A6000-memory.dmp
                    Filesize

                    8KB

                  • memory/8768-2434-0x000001DE47220000-0x000001DE47221000-memory.dmp
                    Filesize

                    4KB

                  • memory/8768-2439-0x000001DE5F9A0000-0x000001DE5F9A2000-memory.dmp
                    Filesize

                    8KB

                  • memory/8768-2440-0x000001DE5F9A2000-0x000001DE5F9A4000-memory.dmp
                    Filesize

                    8KB

                  • memory/8768-2421-0x0000000000000000-mapping.dmp
                  • memory/8768-2442-0x000001DE5F9A7000-0x000001DE5F9A9000-memory.dmp
                    Filesize

                    8KB

                  • memory/8768-2444-0x000001DE5F9A9000-0x000001DE5F9AA000-memory.dmp
                    Filesize

                    4KB

                  • memory/8908-2446-0x0000000000000000-mapping.dmp
                  • memory/8908-2466-0x000001D7AA9F2000-0x000001D7AA9F4000-memory.dmp
                    Filesize

                    8KB

                  • memory/8908-2468-0x000001D7AA9F7000-0x000001D7AA9F9000-memory.dmp
                    Filesize

                    8KB

                  • memory/8908-2469-0x000001D7AA9F9000-0x000001D7AA9FA000-memory.dmp
                    Filesize

                    4KB

                  • memory/8908-2465-0x000001D7AA9F0000-0x000001D7AA9F2000-memory.dmp
                    Filesize

                    8KB

                  • memory/8908-2467-0x000001D7AA9F4000-0x000001D7AA9F6000-memory.dmp
                    Filesize

                    8KB

                  • memory/9052-2493-0x0000015D9B560000-0x0000015D9B562000-memory.dmp
                    Filesize

                    8KB

                  • memory/9052-2472-0x0000000000000000-mapping.dmp
                  • memory/9052-2499-0x0000015D9B569000-0x0000015D9B56A000-memory.dmp
                    Filesize

                    4KB

                  • memory/9052-2496-0x0000015D9B567000-0x0000015D9B569000-memory.dmp
                    Filesize

                    8KB

                  • memory/9052-2495-0x0000015D9B564000-0x0000015D9B566000-memory.dmp
                    Filesize

                    8KB

                  • memory/9052-2494-0x0000015D9B562000-0x0000015D9B564000-memory.dmp
                    Filesize

                    8KB

                  • memory/9096-2554-0x0000000000000000-mapping.dmp
                  • memory/9236-2559-0x0000000000000000-mapping.dmp
                  • memory/9236-2579-0x000001834CA77000-0x000001834CA79000-memory.dmp
                    Filesize

                    8KB

                  • memory/9236-2577-0x000001834CA72000-0x000001834CA74000-memory.dmp
                    Filesize

                    8KB

                  • memory/9236-2578-0x000001834CA74000-0x000001834CA76000-memory.dmp
                    Filesize

                    8KB

                  • memory/9236-2580-0x000001834CA79000-0x000001834CA7A000-memory.dmp
                    Filesize

                    4KB

                  • memory/9236-2576-0x000001834CA70000-0x000001834CA72000-memory.dmp
                    Filesize

                    8KB

                  • memory/9328-2538-0x0000014702FE9000-0x0000014702FEA000-memory.dmp
                    Filesize

                    4KB

                  • memory/9328-2535-0x0000014702FE2000-0x0000014702FE4000-memory.dmp
                    Filesize

                    8KB

                  • memory/9328-2515-0x0000000000000000-mapping.dmp
                  • memory/9328-2534-0x0000014702FE0000-0x0000014702FE2000-memory.dmp
                    Filesize

                    8KB

                  • memory/9328-2537-0x0000014702FE7000-0x0000014702FE9000-memory.dmp
                    Filesize

                    8KB

                  • memory/9328-2536-0x0000014702FE4000-0x0000014702FE6000-memory.dmp
                    Filesize

                    8KB

                  • memory/9352-2582-0x0000000000000000-mapping.dmp
                  • memory/9388-2581-0x0000000000000000-mapping.dmp
                  • memory/9520-2553-0x0000000000000000-mapping.dmp