Analysis

  • max time kernel
    592s
  • max time network
    362s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/06/2024, 22:24

General

  • Target

    dolphin-x64-5.0.exe

  • Size

    18.4MB

  • MD5

    eca48982effad82616f206f52336fe4b

  • SHA1

    4d88af3572de650b0b7dccd92dc8de5854edfae6

  • SHA256

    e1b3ae8fc890c6588e5656f77ef2747ae7ddfc90b6530b240c0c5b9d0ab3ce8c

  • SHA512

    778755b2d12c703a2954882a4d333b7cb61ee7ed0482b5cb14c1cbc4b90c8b65f308944a2f9369a89fc54d163c613efc65adf70316c08d447183f65637fcb557

  • SSDEEP

    393216:Y1qyjt4rPX8zs3XxdbHNemtqa7JhnurHTl0WcS4ENyQ4p9Jmm+:Y1qyZePX8khdbtecqa7JhnurHirhENys

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 64 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dolphin-x64-5.0.exe
    "C:\Users\Admin\AppData\Local\Temp\dolphin-x64-5.0.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    PID:2940
    • C:\Users\Admin\AppData\Local\Temp\dxredist\DXSETUP.exe
      "C:\Users\Admin\AppData\Local\Temp\dxredist\DXSETUP.exe" /silent
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Windows directory
      PID:1396
      • C:\Users\Admin\AppData\Local\Temp\DX9627.tmp\infinst.exe
        C:\Users\Admin\AppData\Local\Temp\DX9627.tmp\infinst.exe xinput1_3_x64.inf, Install_Driver
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        PID:3812
    • C:\Users\Admin\AppData\Local\Temp\vcredist\vc_redist.x64.exe
      "C:\Users\Admin\AppData\Local\Temp\vcredist\vc_redist.x64.exe" /install /quiet /norestart
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2860
      • C:\Users\Admin\AppData\Local\Temp\vcredist\vc_redist.x64.exe
        "C:\Users\Admin\AppData\Local\Temp\vcredist\vc_redist.x64.exe" /install /quiet /norestart -burn.unelevated BurnPipe.{C2EC057D-EC0F-4EC6-87DD-796E41A03766} {7EEC1E67-722E-4ECB-9C90-D4BE1018BA2D} 2860
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2224
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2724
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef71b9758,0x7fef71b9768,0x7fef71b9778
      2⤵
        PID:2244
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:2
        2⤵
          PID:2392
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:8
          2⤵
            PID:320
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:8
            2⤵
              PID:2040
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2260 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:1
              2⤵
                PID:2364
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:1
                2⤵
                  PID:1448
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1016 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:2
                  2⤵
                    PID:2976
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3200 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:1
                    2⤵
                      PID:1564
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3476 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:8
                      2⤵
                        PID:1952
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3588 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:8
                        2⤵
                          PID:1376
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3604 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:8
                          2⤵
                            PID:3024
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3760 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:1
                            2⤵
                              PID:2136
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2628 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:8
                              2⤵
                                PID:2556
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:2116
                              • C:\Windows\system32\vssvc.exe
                                C:\Windows\system32\vssvc.exe
                                1⤵
                                  PID:308
                                • C:\Windows\system32\DrvInst.exe
                                  DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000490" "00000000000002FC"
                                  1⤵
                                  • Drops file in Windows directory
                                  • Modifies data under HKEY_USERS
                                  PID:2144
                                • C:\Program Files\Dolphin\Dolphin.exe
                                  "C:\Program Files\Dolphin\Dolphin.exe"
                                  1⤵
                                  • Executes dropped EXE
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SetWindowsHookEx
                                  PID:4952

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Program Files\Dolphin\Languages\it\dolphin-emu.mo

                                  Filesize

                                  121KB

                                  MD5

                                  f00a5461ba0b2c95f801923fef70c266

                                  SHA1

                                  f7717e3f341e1b56c46407df643d4ac6dcc09885

                                  SHA256

                                  19c8af2231c12fe7969e63595f818baf9421542d1e4f3ea64ac2ff79352a6f12

                                  SHA512

                                  a9977db27df94510bc75ee961924804c59c0005b9bc9b8961d63b01359c72920a6a6f0f3b014c715f3b0c4208038deb65f114f83dee157422dc035b84a267315

                                • C:\Program Files\Dolphin\Sys\Resources\toolbar_debugger_step_over.png

                                  Filesize

                                  988B

                                  MD5

                                  926a446e9de7d51c34ae548673386417

                                  SHA1

                                  5a0a2666b270eca354f1632de8f98fc966864d08

                                  SHA256

                                  85f27cf7d073c5931530c102d4c39ff731a3eb30c67d506c6626b0ad72f26539

                                  SHA512

                                  d5117a0a76c22b06aa91f7586f866387ad74b4962e569cab64d6abeb83d701c8b66331dc6193478f36faef616a95f404cb15a7a0b0b86f863c93ab09f908ea53

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\1708604c-67a9-46d1-91d2-42967ace72d8.tmp

                                  Filesize

                                  283KB

                                  MD5

                                  cf900343f194cafbac25ef1d3cd47cd7

                                  SHA1

                                  82fb88ca9ad51fc4e2ad6f7ccdbe6544be585d39

                                  SHA256

                                  57db544036344fc6bf39f4ffae263224b60efd87ba4225d06ace035b03409e2e

                                  SHA512

                                  063e96d50dd78052f4f1d4988d61ebe0fe49f545c34263137645ac5e9e62b2f058f954c2e979b26835903fe4a60e94875d836e34da02fc466affee17c179bd32

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                  Filesize

                                  264KB

                                  MD5

                                  f50f89a0a91564d0b8a211f8921aa7de

                                  SHA1

                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                  SHA256

                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                  SHA512

                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  aefd77f47fb84fae5ea194496b44c67a

                                  SHA1

                                  dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                  SHA256

                                  4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                  SHA512

                                  b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  b7fe8536bf44bb906743e82a6a6aa73e

                                  SHA1

                                  4f2e170547b08d6c03244465399b35a67febd77a

                                  SHA256

                                  9234714be11f5b4f2f4846d953f6c10dc0c41b9f2e322223e580536e871da8f8

                                  SHA512

                                  3d0602cd5103443653fb207bd6dbd9ede4e97a4026e2601bcf52a32b3e0a8b1fe4ab27f9e45c2c42dc62fc3a37651b6ceb0c3f4fa1a9ff2f8e46ce129887cffa

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  c6f42a02b8454805af5beed0d506342b

                                  SHA1

                                  9baa3b30b89df023a5a7785bc1678aa55dc57e4f

                                  SHA256

                                  cb9e2bc35aeb1f2d4bc4539af88ef9c9b718294f67f5b986ec07a2acea9b7539

                                  SHA512

                                  bf492a659d4fd0e55b81c4101a15926ef8968c825c87cd136d4f26fea2aa419209993daea9c3d8a9938b5e82fb10fa18bc1772f921dac86584a5cbe28a7bdf60

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  18e723571b00fb1694a3bad6c78e4054

                                  SHA1

                                  afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                  SHA256

                                  8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                  SHA512

                                  43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  283KB

                                  MD5

                                  694c2b7ecc52eec9e194aa26cdae40fd

                                  SHA1

                                  f328750491faea28e626204eb9fee23577d171b4

                                  SHA256

                                  d526b7a932da5ee4338ef5869afec9930721243b0ab9cf4a5ebaf43666a0b4fb

                                  SHA512

                                  46ae93684ad791cf8ed151fce5da841307be050d3f44f3f977d684cc4c49115f1a193bb7ad084343e94f0b9aa7eca0895f4ca58818b7a0389eaeca24e5fb3623

                                • C:\Users\Admin\AppData\Local\Temp\DX9627.tmp\apr2007_xinput_x64.inf

                                  Filesize

                                  860B

                                  MD5

                                  94563a3b9affb41d2bfd41a94b81e08d

                                  SHA1

                                  17cad981ef428e132aa1d571e0c77091e750e0dd

                                  SHA256

                                  0d6e1c0e961d878b319ac30d3439056883448dcf26774003b73920f3377ecac8

                                  SHA512

                                  53cac179d7e11c74772e7b9bd7dd94ffbc810cfc25e28326e4d0844f3f59fd10d9089b44a88358ac6dbd09fb8b456a0937778f78ecc442645764f693ccd620b8

                                • C:\Users\Admin\AppData\Local\Temp\DX9627.tmp\apr2007_xinput_x86.inf

                                  Filesize

                                  1KB

                                  MD5

                                  e188f534500688cec2e894d3533997b4

                                  SHA1

                                  f073f8515b94cb23b703ab5cdb3a5cfcc10b3333

                                  SHA256

                                  1c798cb80e9e46ce03356ea7316e1eff5d3a88ccdd7cbfbfcdce73cded23b4e5

                                  SHA512

                                  332ccb25c5ed92ae48c5805a330534d985d6b41f9220af0844d407b2019396fcefea7076b409439f5ab8a9ca6819b65c07ada7bd3aa1222429966dc5a440d4f7

                                • C:\Users\Admin\AppData\Local\Temp\DX9627.tmp\dxupdate.inf

                                  Filesize

                                  12KB

                                  MD5

                                  e6a74342f328afa559d5b0544e113571

                                  SHA1

                                  a08b053dfd061391942d359c70f9dd406a968b7d

                                  SHA256

                                  93f5589499ee4ee2812d73c0d8feacbbcfe8c47b6d98572486bc0eff3c5906ca

                                  SHA512

                                  1e35e5bdff1d551da6c1220a1a228c657a56a70dedf5be2d9273fc540f9c9f0bb73469595309ea1ff561be7480ee92d16f7acbbd597136f4fc5f9b8b65ecdfad

                                • C:\Users\Admin\AppData\Local\Temp\DX9627.tmp\xinput1_3.dll

                                  Filesize

                                  79KB

                                  MD5

                                  77f595dee5ffacea72b135b1fce1312e

                                  SHA1

                                  d2a710b332de3ef7a576e0aed27b0ae66892b7e9

                                  SHA256

                                  8d540d484ea41e374fd0107d55d253f87ded4ce780d515d8fd59bbe8c98970a7

                                  SHA512

                                  a8683050d7758c248052c11ac6a46c9a0b3b3773902cca478c1961b6d9d2d57c75a8c925ba5af4499989c0f44b34eaf57abafafa26506c31e5e4769fb3439746

                                • C:\Users\Admin\AppData\Local\Temp\DX9627.tmp\xinput1_3.dll

                                  Filesize

                                  104KB

                                  MD5

                                  bfb3091b167550ec6e6454813d3db244

                                  SHA1

                                  87e86a7c783f607697a4880e7e063ab87bf63034

                                  SHA256

                                  756cad002e1553cfa1a91ebe8c1b9380ffabe0b4b1916c4a4db802396ddfbef8

                                  SHA512

                                  ce2ead2480a3942081af4df4baee32de18862b5f0288169b9e8135cc710eb128f9a2b8a36bda87212c53fd4317359349c94d38b5da082638230dcb5669efede9

                                • C:\Users\Admin\AppData\Local\Temp\DX9627.tmp\xinput1_3_x64.inf

                                  Filesize

                                  669B

                                  MD5

                                  c9635b7617d68d95f9113282472218c9

                                  SHA1

                                  e3da3f2600a0f5cd0e28722ee313e04fc29dfc60

                                  SHA256

                                  0d411d9424128f19fed2daa95a2983b4b29197f022a754f59d0c7740ad654cca

                                  SHA512

                                  0481e008619d3b3a45d0a90825b576e4c03f27668b0792762cb9165b15955645667392f23eac5e5c4eb8a7fe6fa47cae4c319323b02225289af0cffaf1ca8c83

                                • C:\Users\Admin\AppData\Local\Temp\dxredist\Apr2007_xinput_x64.cab

                                  Filesize

                                  94KB

                                  MD5

                                  743b333c2db3d4cf190fb39c29f3c346

                                  SHA1

                                  26b3616d7321978bd45656391a75ee231196a4a2

                                  SHA256

                                  e7a09f8235cc587cc63f583e39fbc75008d9677c8bb4dcc11cb8d0178a5153ac

                                  SHA512

                                  77fbdb86c79d7228bca2982a3285a417a365af980488a5ac2d470b532fa59fcc15e0e8dbee6eb1a3a5256fc29e0e3391529cd2ac13e0f72987ee0da136000957

                                • C:\Users\Admin\AppData\Local\Temp\dxredist\Apr2007_xinput_x86.cab

                                  Filesize

                                  52KB

                                  MD5

                                  c234df417c9b12e2d31c7fd1e17e4786

                                  SHA1

                                  92f32e74944e5166db72d3bfe8e6401d9f7521dd

                                  SHA256

                                  2acea6c8b9f6f7f89ec51365a1e49fbd0d8c42c53418bd0783dbf3f74a744e6d

                                  SHA512

                                  6cbae19794533ad9401f92b10bd9549638ba20ce38375de4f9d0e20af20d78819e46856151cc6818325af9ac774b8128e18fbebd2da5da4efbd417fc2af51dab

                                • C:\Users\Admin\AppData\Local\Temp\dxredist\dxupdate.cab

                                  Filesize

                                  94KB

                                  MD5

                                  d495680aba28caafc4c071a6d0fe55ac

                                  SHA1

                                  5885ece90970eb10b6b95d6c52d934674835929e

                                  SHA256

                                  e18a5404b612e88fa8b403c9b33f064c0a89528db7ef9a79aa116908d0e6afed

                                  SHA512

                                  a25c647678661473b99462d7433c1d05af54823d404476e35315c11c93b3f5ece92c912560af0d9efe8f07e36ae68594362d73abf5d5de409a3f0a146fe31a10

                                • C:\Users\Admin\AppData\Local\Temp\nsi19F8.tmp\InstallOptions.dll

                                  Filesize

                                  14KB

                                  MD5

                                  d753362649aecd60ff434adf171a4e7f

                                  SHA1

                                  3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

                                  SHA256

                                  8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

                                  SHA512

                                  41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

                                • C:\Users\Admin\AppData\Local\Temp\nsi19F8.tmp\ioSpecial.ini

                                  Filesize

                                  504B

                                  MD5

                                  cc80660a4a689229bf0547a52c06f065

                                  SHA1

                                  6423de0a4ecd6747b7b1459cbd08d12638772097

                                  SHA256

                                  f3156d226a7dc22e96554f03edac2b90456ea2bf7823932b0edaab355f8ef12a

                                  SHA512

                                  7f11c3be925d4a063d2d0660cc3154b89a06ce31b99862f254294b2606f8d736635bd0cf5d65ca3c3fcb3a8949eb01f31980389bb78f9da7d6ce09493f58c993

                                • C:\Users\Admin\AppData\Local\Temp\nsi19F8.tmp\ioSpecial.ini

                                  Filesize

                                  543B

                                  MD5

                                  bdfbc05af8bb60162b5f612474a43dd0

                                  SHA1

                                  203e100b6728ea58e3f3afa7215463124580355d

                                  SHA256

                                  853bca36798812e07d8777fb58ca474a75a712e76960dee9e2d55d9d662d5b57

                                  SHA512

                                  83934a5322b97bb0c0db0157b315f12b3d9e7c659ee8915e22083479d2a9823a0b0344a92e74c4d13b8cac19036016f394692bc0408e345859e293ef1246d8d0

                                • C:\Users\Admin\AppData\Local\Temp\{dab68466-3a7d-41a8-a5cf-415e3ff8ef71}\.ba1\logo.png

                                  Filesize

                                  1KB

                                  MD5

                                  d6bd210f227442b3362493d046cea233

                                  SHA1

                                  ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

                                  SHA256

                                  335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

                                  SHA512

                                  464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

                                • C:\Users\Admin\Documents\Dolphin Emulator\Config\Dolphin.ini~RFf77d652.TMP

                                  Filesize

                                  2KB

                                  MD5

                                  58d74b5740dd8a12e35ec33996984285

                                  SHA1

                                  f29f20572bcb1b14c36e08c7c1ee7f04858aa71b

                                  SHA256

                                  b10326bfe25c647c858676b0a3b3d69c190a68cb2567d23afebe5f917f925f6e

                                  SHA512

                                  09725f5431e410798ccbbecdb39b55335372098676c73649ff61a23b87aa05795e665d55e0d18f9959a3179867854c9c60723789310ab0d00c7a16502e5f9cfe

                                • C:\Users\Admin\Documents\Dolphin Emulator\Wii\shared2\ec\shopsetu.log

                                  Filesize

                                  32B

                                  MD5

                                  70bc8f4b72a86921468bf8e8441dce51

                                  SHA1

                                  de8a847bff8c343d69b853a215e6ee775ef2ef96

                                  SHA256

                                  66687aadf862bd776c8fc18b8e9f8e20089714856ee233b3902a591d0d5f2925

                                  SHA512

                                  5046adc1dba838867b2bbbfdd0c3423e58b57970b5267a90f57960924a87f1960a6a85eaa642dac835424b5d7c8d637c00408c7a73da672b7f498521420b6dd3

                                • C:\Users\Admin\Documents\Dolphin Emulator\Wii\shared2\sys\SYSCONF

                                  Filesize

                                  16KB

                                  MD5

                                  9473c879a5e51040e7a202b4538773a7

                                  SHA1

                                  3256c026284a24fb99d2ec1558d95db3b5dcc2e9

                                  SHA256

                                  a8ec1ec377ee3a3c93a27f74dadf9edf95112ce167fc23d1abdbeb4fa15eb179

                                  SHA512

                                  139dbb6648a1c8b7e5224e52ca8f8093f069b7d5f83e2b84099688b927eb77cb8445bc46f9da98ce56d3b883bfe8e38905b5e252c87a5295a334fc8b6890bff3

                                • C:\Users\Admin\Documents\Dolphin Emulator\Wii\shared2\wc24\nwc24msg.cbk

                                  Filesize

                                  1024B

                                  MD5

                                  0c425c24e91335f18a3246b1d611a8ca

                                  SHA1

                                  caf8a96a36573d7e67f086f73fec675a5d1c4245

                                  SHA256

                                  7afebf33eeb0035397cc74e15e892e700cd2903641d26562f5d46cfbb6171109

                                  SHA512

                                  001e0d8dd5e5b2e2d8b8357bba7d8c20ac33dca3a6b7897f11a1f01f391118da4f457d5a5c6531eedabebd6883dcde0bb3526b97ed7b3357a7e6d768d9c322af

                                • C:\Windows\Logs\DirectX.log

                                  Filesize

                                  474B

                                  MD5

                                  476c6a2d1769a13dac1be89205cb6253

                                  SHA1

                                  e66beb80001e3053034003de2f16fe3a7b488606

                                  SHA256

                                  dc1e6eb0e656daa0dfc71db8761d73fe42b51d355943b09dea08decdd1662a1c

                                  SHA512

                                  cc05ddbd6e08ebe5d6a4abb8d3b387c06e05ba6273697c3d8ae972a39183920f4ec272d1339b3380bc3ea0bf7c43f30b8e43cf503ec70df22c9e97128af793e0

                                • C:\Windows\Logs\DirectX.log

                                  Filesize

                                  2KB

                                  MD5

                                  abde69e162b67ec7385ed0257dd41f21

                                  SHA1

                                  dc722ac72cc0a8dbc782522b50b9b3163fa38524

                                  SHA256

                                  269f49caa26d441673d32a86c75b9cb9ee2a558184268ff81ac08e05e3f90a50

                                  SHA512

                                  fbde00df7e258a224daa50590baa9352d53a79147726f8748cd13fd8cfad79b56d889f1257f0f1bd5180b623ad4fe67b57f8c09fd1a5e56b8bb6eef0249bdaef

                                • C:\Windows\Logs\DirectX.log

                                  Filesize

                                  4KB

                                  MD5

                                  324b01605da85e7562a663a7837dddce

                                  SHA1

                                  655b949d3996f5325a43fad23e40c28a53d6d4e9

                                  SHA256

                                  3cc6f52e2fa6263ef5f324db6badd985a918a24315817ab96231b64d2970f480

                                  SHA512

                                  a0bc71334af4b6932f7e4ac65b54afd88aa21b82c55e6574af020cc0c27067252de107952f481372f593f7cff6f4f89b2997703ce15d1186807c46efc6b1e552

                                • \Program Files\Dolphin\Dolphin.exe

                                  Filesize

                                  14.9MB

                                  MD5

                                  9660ec7cddf093a1807cb25fe0946b8e

                                  SHA1

                                  5986661c62d689380476db238d7c18fa37d1b616

                                  SHA256

                                  19d5c382204d7e40a764e116967aec610f502b9be60b9d3b095073827aa93c66

                                  SHA512

                                  5213c828d4f0742c3cde59ceea7b111a1402779602f09fa5e898083b07f2860bb33119f97741bc049fefc0cd745879d22a12dc37ece8e0dd8b308dcc84079755

                                • \Users\Admin\AppData\Local\Temp\DX9627.tmp\dxupdate.dll

                                  Filesize

                                  173KB

                                  MD5

                                  7ed554b08e5b69578f9de012822c39c9

                                  SHA1

                                  036d04513e134786b4758def5aff83d19bf50c6e

                                  SHA256

                                  fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2

                                  SHA512

                                  7af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9

                                • \Users\Admin\AppData\Local\Temp\DX9627.tmp\infinst.exe

                                  Filesize

                                  68KB

                                  MD5

                                  45d4dac07aa361bcd77aa815d1724a16

                                  SHA1

                                  3bbdf7da5d51211ae269572961b5ebf508ada28d

                                  SHA256

                                  34ab99536ea59ad60ba6efda3ea6d18291ef096a0bab3664248d6045805da0ec

                                  SHA512

                                  d940002a8e0112a3b56a909008403b447e9cbb80e38b9bbd508f40aa68224f7e5d9681e1039e747ae939e0829a25be2319b9f9d0862cebb042e4c525ccbc20be

                                • \Users\Admin\AppData\Local\Temp\dxredist\DSETUP.dll

                                  Filesize

                                  93KB

                                  MD5

                                  eb701def7d0809e8da765a752ab42be5

                                  SHA1

                                  7897418f0fae737a3ebe4f7954118d71c6c8b426

                                  SHA256

                                  2a61679eeedabf7d0d0ac14e5447486575622d6b7cfa56f136c1576ff96da21f

                                  SHA512

                                  6ff8433c0dadc0e87d18f04289ab6f48624c908acbda506708f5e0f3c9522e9316e587e71f568938067ba9f37f96640b793fdfaa580caedc3bf9873dc221271f

                                • \Users\Admin\AppData\Local\Temp\dxredist\DXSETUP.exe

                                  Filesize

                                  505KB

                                  MD5

                                  bf3f290275c21bdd3951955c9c3cf32c

                                  SHA1

                                  9fd00f3bb8a870112dae464f555fcd5e7f9200c0

                                  SHA256

                                  8f47d7121ef6532ad9ad9901e44e237f5c30448b752028c58a9d19521414e40d

                                  SHA512

                                  d2c354ee8b6977d01f23c6d2bb4977812bf653eae25e7a75a7d0a36b588c89fcdbdc2a8087c24d6ff687afebd086d4b7d0c92203ce39691b21dab71eafd1d249

                                • \Users\Admin\AppData\Local\Temp\dxredist\dsetup32.dll

                                  Filesize

                                  1.5MB

                                  MD5

                                  d8fa7bb4fe10251a239ed75055dd6f73

                                  SHA1

                                  76c4bd2d8f359f7689415efc15e3743d35673ae8

                                  SHA256

                                  fb0e534f9b0926e518f1c2980640dfd29f14217cdfa37cf3a0c13349127ed9a8

                                  SHA512

                                  73f633179b1340c1c14d0002b72e44cab1919d0ef174f307e4bfe6de240b0b6ef233e67a8b0a0cd677556865ee7b88c6de152045a580ab9fbf1a50d2db0673b4

                                • \Users\Admin\AppData\Local\Temp\nsi19F8.tmp\LangDLL.dll

                                  Filesize

                                  5KB

                                  MD5

                                  e447e49175c0db1f27888aede301084f

                                  SHA1

                                  f5946c743265cd8e81f3e7b6376dada57f99877f

                                  SHA256

                                  fd26ef21d72797fedecd3d15f2001cea793383aceb3cee19a5ae2a3d30e197b6

                                  SHA512

                                  e6543bf81bedce94a58f48cd6f9daaec891775e01ff76b771c22d459a778490f9bba0bebbf111b1ca3091b3ca69bca806a9b5e68ce12df03abbaa6ce5c4b7cec

                                • \Users\Admin\AppData\Local\Temp\nsi19F8.tmp\System.dll

                                  Filesize

                                  10KB

                                  MD5

                                  56a321bd011112ec5d8a32b2f6fd3231

                                  SHA1

                                  df20e3a35a1636de64df5290ae5e4e7572447f78

                                  SHA256

                                  bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

                                  SHA512

                                  5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

                                • \Users\Admin\AppData\Local\Temp\vcredist\vc_redist.x64.exe

                                  Filesize

                                  14.1MB

                                  MD5

                                  883c499d04c145a69622f7658e353265

                                  SHA1

                                  bb64084762abd4a06b2fddd16f0092860bc3043f

                                  SHA256

                                  df58f4aa566a10776c864c1007e0ac0987835fa1e9f7445bed8ba21a9101d414

                                  SHA512

                                  ce840c9420e928c9da6c30c3cd97eeb047d34ee7046b8cfcd20b512fbddfe885329ab4db3ca53f7094bf1caeb600c834cb2db10797ceade859c21786144206c9

                                • \Users\Admin\AppData\Local\Temp\{dab68466-3a7d-41a8-a5cf-415e3ff8ef71}\.ba1\wixstdba.dll

                                  Filesize

                                  118KB

                                  MD5

                                  4d20a950a3571d11236482754b4a8e76

                                  SHA1

                                  e68bd784ac143e206d52ecaf54a7e3b8d4d75c9c

                                  SHA256

                                  a9295ad4e909f979e2b6cb2b2495c3d35c8517e689cd64a918c690e17b49078b

                                  SHA512

                                  8b9243d1f9edbcbd6bdaf6874dc69c806bb29e909bd733781fde8ac80ca3fff574d786ca903871d1e856e73fd58403bebb58c9f23083ea7cd749ba3e890af3d2

                                • memory/4952-9600-0x000000006B600000-0x000000006B69F000-memory.dmp

                                  Filesize

                                  636KB