Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    456s
  • max time network
    459s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 16:51

General

  • Target

    https://gofile.io/d/hYeotn

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 54 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 6 IoCs
  • Enumerates processes with tasklist 1 TTPs 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 21 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/hYeotn
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa2e9046f8,0x7ffa2e904708,0x7ffa2e904718
      2⤵
        PID:4304
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:2
        2⤵
          PID:5048
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1260
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:8
          2⤵
            PID:1556
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
            2⤵
              PID:3616
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:1
              2⤵
                PID:3148
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:1
                2⤵
                  PID:4980
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:1
                  2⤵
                    PID:1324
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:8
                    2⤵
                      PID:1192
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2496
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:1
                      2⤵
                        PID:4416
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3496 /prefetch:8
                        2⤵
                          PID:1608
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:1
                          2⤵
                            PID:2016
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:1
                            2⤵
                              PID:2628
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:1
                              2⤵
                                PID:2616
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                                2⤵
                                  PID:3140
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6204 /prefetch:1
                                  2⤵
                                    PID:1124
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:1
                                    2⤵
                                      PID:2192
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 /prefetch:2
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:712
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2016,8092241759070094249,6176945303204250771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4900
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3628
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:3172
                                      • C:\Windows\System32\rundll32.exe
                                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                        1⤵
                                          PID:740
                                        • C:\Program Files\7-Zip\7zG.exe
                                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\VantaFN\" -ad -an -ai#7zMap18166:76:7zEvent23812
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1116
                                        • C:\Users\Admin\Downloads\VantaFN\VantaFN.exe
                                          "C:\Users\Admin\Downloads\VantaFN\VantaFN.exe"
                                          1⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2532
                                          • C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe
                                            C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe
                                            2⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Checks processor information in registry
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4444
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /d /s /c "WMIC csproduct get UUID"
                                              3⤵
                                                PID:4580
                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                  WMIC csproduct get UUID
                                                  4⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2132
                                              • C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe
                                                "C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\VantaFN" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1928,i,14596609477249249462,5443102594943526824,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                                                3⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:3228
                                              • C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe
                                                "C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\VantaFN" --mojo-platform-channel-handle=2164 --field-trial-handle=1928,i,14596609477249249462,5443102594943526824,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
                                                3⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:3136
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                                                3⤵
                                                  PID:1664
                                                  • C:\Windows\system32\tasklist.exe
                                                    tasklist
                                                    4⤵
                                                    • Enumerates processes with tasklist
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4836
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                                                  3⤵
                                                    PID:2756
                                                    • C:\Windows\system32\tasklist.exe
                                                      tasklist
                                                      4⤵
                                                      • Enumerates processes with tasklist
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1836
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM msedge.exe /F"
                                                    3⤵
                                                      PID:2296
                                                      • C:\Windows\system32\taskkill.exe
                                                        taskkill /IM msedge.exe /F
                                                        4⤵
                                                        • Kills process with taskkill
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:640
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,27,201,56,127,79,121,27,69,175,124,126,87,89,19,7,241,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,94,118,215,86,104,36,190,210,191,158,213,118,69,65,171,77,134,208,103,139,123,215,32,203,243,251,121,135,219,58,98,7,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,217,107,72,193,90,9,71,240,156,102,155,85,167,17,230,124,188,26,17,11,83,181,231,73,17,24,66,153,246,3,30,213,48,0,0,0,15,49,109,31,45,121,15,98,19,6,96,233,179,52,141,22,48,238,204,202,154,156,95,146,132,221,232,177,191,178,133,7,62,137,116,50,1,225,8,21,127,52,216,165,130,3,213,65,64,0,0,0,0,162,28,187,117,113,235,27,148,77,112,253,157,81,53,20,64,111,73,197,84,131,170,187,105,129,6,90,31,5,83,187,142,34,81,198,165,62,205,34,247,140,67,78,230,75,221,57,211,121,140,116,127,134,133,186,114,166,150,59,86,213,217,158), $null, 'CurrentUser')"
                                                      3⤵
                                                      • An obfuscated cmd.exe command-line is typically used to evade detection.
                                                      PID:1524
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,27,201,56,127,79,121,27,69,175,124,126,87,89,19,7,241,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,94,118,215,86,104,36,190,210,191,158,213,118,69,65,171,77,134,208,103,139,123,215,32,203,243,251,121,135,219,58,98,7,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,217,107,72,193,90,9,71,240,156,102,155,85,167,17,230,124,188,26,17,11,83,181,231,73,17,24,66,153,246,3,30,213,48,0,0,0,15,49,109,31,45,121,15,98,19,6,96,233,179,52,141,22,48,238,204,202,154,156,95,146,132,221,232,177,191,178,133,7,62,137,116,50,1,225,8,21,127,52,216,165,130,3,213,65,64,0,0,0,0,162,28,187,117,113,235,27,148,77,112,253,157,81,53,20,64,111,73,197,84,131,170,187,105,129,6,90,31,5,83,187,142,34,81,198,165,62,205,34,247,140,67,78,230,75,221,57,211,121,140,116,127,134,133,186,114,166,150,59,86,213,217,158), $null, 'CurrentUser')
                                                        4⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1372
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,27,201,56,127,79,121,27,69,175,124,126,87,89,19,7,241,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,0,121,162,92,254,76,172,230,174,98,220,161,66,174,166,47,68,200,13,123,128,152,149,208,91,195,234,47,255,249,175,0,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,198,23,48,245,211,211,228,234,160,218,22,107,134,175,243,65,105,168,182,29,205,235,76,179,178,192,87,255,168,160,6,154,48,0,0,0,211,70,245,94,52,97,38,12,76,52,209,104,240,43,55,96,112,117,226,94,35,26,42,105,44,26,156,248,58,145,131,96,94,67,203,96,14,245,233,144,23,209,209,14,202,112,51,222,64,0,0,0,68,74,159,117,33,69,56,22,210,23,222,252,199,47,128,62,9,191,159,208,97,231,84,22,70,123,16,192,250,122,23,221,132,161,232,25,62,228,100,1,64,199,113,18,19,130,239,242,160,166,49,2,166,90,122,197,119,180,219,215,197,185,125,13), $null, 'CurrentUser')"
                                                      3⤵
                                                      • An obfuscated cmd.exe command-line is typically used to evade detection.
                                                      PID:464
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,27,201,56,127,79,121,27,69,175,124,126,87,89,19,7,241,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,0,121,162,92,254,76,172,230,174,98,220,161,66,174,166,47,68,200,13,123,128,152,149,208,91,195,234,47,255,249,175,0,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,198,23,48,245,211,211,228,234,160,218,22,107,134,175,243,65,105,168,182,29,205,235,76,179,178,192,87,255,168,160,6,154,48,0,0,0,211,70,245,94,52,97,38,12,76,52,209,104,240,43,55,96,112,117,226,94,35,26,42,105,44,26,156,248,58,145,131,96,94,67,203,96,14,245,233,144,23,209,209,14,202,112,51,222,64,0,0,0,68,74,159,117,33,69,56,22,210,23,222,252,199,47,128,62,9,191,159,208,97,231,84,22,70,123,16,192,250,122,23,221,132,161,232,25,62,228,100,1,64,199,113,18,19,130,239,242,160,166,49,2,166,90,122,197,119,180,219,215,197,185,125,13), $null, 'CurrentUser')
                                                        4⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4128
                                                • C:\Users\Admin\Downloads\VantaFN\VantaFN.exe
                                                  "C:\Users\Admin\Downloads\VantaFN\VantaFN.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4600
                                                  • C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe
                                                    C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe
                                                    2⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Checks processor information in registry
                                                    PID:1944
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /d /s /c "WMIC csproduct get UUID"
                                                      3⤵
                                                        PID:224
                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                          WMIC csproduct get UUID
                                                          4⤵
                                                            PID:3844
                                                        • C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\VantaFN" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1900,i,5330084474303616416,12710331691931570894,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          PID:432
                                                        • C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\VantaFN" --mojo-platform-channel-handle=2136 --field-trial-handle=1900,i,5330084474303616416,12710331691931570894,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          PID:2908
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                                                          3⤵
                                                            PID:3872
                                                            • C:\Windows\system32\tasklist.exe
                                                              tasklist
                                                              4⤵
                                                              • Enumerates processes with tasklist
                                                              PID:1964
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                                                            3⤵
                                                              PID:732
                                                              • C:\Windows\system32\tasklist.exe
                                                                tasklist
                                                                4⤵
                                                                • Enumerates processes with tasklist
                                                                PID:3448
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,27,201,56,127,79,121,27,69,175,124,126,87,89,19,7,241,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,94,118,215,86,104,36,190,210,191,158,213,118,69,65,171,77,134,208,103,139,123,215,32,203,243,251,121,135,219,58,98,7,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,217,107,72,193,90,9,71,240,156,102,155,85,167,17,230,124,188,26,17,11,83,181,231,73,17,24,66,153,246,3,30,213,48,0,0,0,15,49,109,31,45,121,15,98,19,6,96,233,179,52,141,22,48,238,204,202,154,156,95,146,132,221,232,177,191,178,133,7,62,137,116,50,1,225,8,21,127,52,216,165,130,3,213,65,64,0,0,0,0,162,28,187,117,113,235,27,148,77,112,253,157,81,53,20,64,111,73,197,84,131,170,187,105,129,6,90,31,5,83,187,142,34,81,198,165,62,205,34,247,140,67,78,230,75,221,57,211,121,140,116,127,134,133,186,114,166,150,59,86,213,217,158), $null, 'CurrentUser')"
                                                              3⤵
                                                              • An obfuscated cmd.exe command-line is typically used to evade detection.
                                                              PID:4916
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,27,201,56,127,79,121,27,69,175,124,126,87,89,19,7,241,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,94,118,215,86,104,36,190,210,191,158,213,118,69,65,171,77,134,208,103,139,123,215,32,203,243,251,121,135,219,58,98,7,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,217,107,72,193,90,9,71,240,156,102,155,85,167,17,230,124,188,26,17,11,83,181,231,73,17,24,66,153,246,3,30,213,48,0,0,0,15,49,109,31,45,121,15,98,19,6,96,233,179,52,141,22,48,238,204,202,154,156,95,146,132,221,232,177,191,178,133,7,62,137,116,50,1,225,8,21,127,52,216,165,130,3,213,65,64,0,0,0,0,162,28,187,117,113,235,27,148,77,112,253,157,81,53,20,64,111,73,197,84,131,170,187,105,129,6,90,31,5,83,187,142,34,81,198,165,62,205,34,247,140,67,78,230,75,221,57,211,121,140,116,127,134,133,186,114,166,150,59,86,213,217,158), $null, 'CurrentUser')
                                                                4⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:1896
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,27,201,56,127,79,121,27,69,175,124,126,87,89,19,7,241,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,0,121,162,92,254,76,172,230,174,98,220,161,66,174,166,47,68,200,13,123,128,152,149,208,91,195,234,47,255,249,175,0,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,198,23,48,245,211,211,228,234,160,218,22,107,134,175,243,65,105,168,182,29,205,235,76,179,178,192,87,255,168,160,6,154,48,0,0,0,211,70,245,94,52,97,38,12,76,52,209,104,240,43,55,96,112,117,226,94,35,26,42,105,44,26,156,248,58,145,131,96,94,67,203,96,14,245,233,144,23,209,209,14,202,112,51,222,64,0,0,0,68,74,159,117,33,69,56,22,210,23,222,252,199,47,128,62,9,191,159,208,97,231,84,22,70,123,16,192,250,122,23,221,132,161,232,25,62,228,100,1,64,199,113,18,19,130,239,242,160,166,49,2,166,90,122,197,119,180,219,215,197,185,125,13), $null, 'CurrentUser')"
                                                              3⤵
                                                              • An obfuscated cmd.exe command-line is typically used to evade detection.
                                                              PID:2056
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,27,201,56,127,79,121,27,69,175,124,126,87,89,19,7,241,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,0,121,162,92,254,76,172,230,174,98,220,161,66,174,166,47,68,200,13,123,128,152,149,208,91,195,234,47,255,249,175,0,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,198,23,48,245,211,211,228,234,160,218,22,107,134,175,243,65,105,168,182,29,205,235,76,179,178,192,87,255,168,160,6,154,48,0,0,0,211,70,245,94,52,97,38,12,76,52,209,104,240,43,55,96,112,117,226,94,35,26,42,105,44,26,156,248,58,145,131,96,94,67,203,96,14,245,233,144,23,209,209,14,202,112,51,222,64,0,0,0,68,74,159,117,33,69,56,22,210,23,222,252,199,47,128,62,9,191,159,208,97,231,84,22,70,123,16,192,250,122,23,221,132,161,232,25,62,228,100,1,64,199,113,18,19,130,239,242,160,166,49,2,166,90,122,197,119,180,219,215,197,185,125,13), $null, 'CurrentUser')
                                                                4⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:4304
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k SDRSVC
                                                          1⤵
                                                            PID:892
                                                          • C:\Users\Admin\Downloads\VantaFN\VantaFN.exe
                                                            "C:\Users\Admin\Downloads\VantaFN\VantaFN.exe"
                                                            1⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • System Location Discovery: System Language Discovery
                                                            PID:464
                                                            • C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe
                                                              C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe
                                                              2⤵
                                                              • Checks computer location settings
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Checks processor information in registry
                                                              PID:4580
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /d /s /c "WMIC csproduct get UUID"
                                                                3⤵
                                                                  PID:2276
                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                    WMIC csproduct get UUID
                                                                    4⤵
                                                                      PID:2748
                                                                  • C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\VantaFN" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1956,i,11493272115206075045,8677533060667526355,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                                                                    3⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    PID:2256
                                                                  • C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\VantaFN" --mojo-platform-channel-handle=2164 --field-trial-handle=1956,i,11493272115206075045,8677533060667526355,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
                                                                    3⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    PID:4384
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                                                                    3⤵
                                                                      PID:1872
                                                                      • C:\Windows\system32\tasklist.exe
                                                                        tasklist
                                                                        4⤵
                                                                        • Enumerates processes with tasklist
                                                                        PID:5016
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                                                                      3⤵
                                                                        PID:3048
                                                                        • C:\Windows\system32\tasklist.exe
                                                                          tasklist
                                                                          4⤵
                                                                          • Enumerates processes with tasklist
                                                                          PID:2368
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,27,201,56,127,79,121,27,69,175,124,126,87,89,19,7,241,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,94,118,215,86,104,36,190,210,191,158,213,118,69,65,171,77,134,208,103,139,123,215,32,203,243,251,121,135,219,58,98,7,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,217,107,72,193,90,9,71,240,156,102,155,85,167,17,230,124,188,26,17,11,83,181,231,73,17,24,66,153,246,3,30,213,48,0,0,0,15,49,109,31,45,121,15,98,19,6,96,233,179,52,141,22,48,238,204,202,154,156,95,146,132,221,232,177,191,178,133,7,62,137,116,50,1,225,8,21,127,52,216,165,130,3,213,65,64,0,0,0,0,162,28,187,117,113,235,27,148,77,112,253,157,81,53,20,64,111,73,197,84,131,170,187,105,129,6,90,31,5,83,187,142,34,81,198,165,62,205,34,247,140,67,78,230,75,221,57,211,121,140,116,127,134,133,186,114,166,150,59,86,213,217,158), $null, 'CurrentUser')"
                                                                        3⤵
                                                                        • An obfuscated cmd.exe command-line is typically used to evade detection.
                                                                        PID:312
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,27,201,56,127,79,121,27,69,175,124,126,87,89,19,7,241,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,94,118,215,86,104,36,190,210,191,158,213,118,69,65,171,77,134,208,103,139,123,215,32,203,243,251,121,135,219,58,98,7,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,217,107,72,193,90,9,71,240,156,102,155,85,167,17,230,124,188,26,17,11,83,181,231,73,17,24,66,153,246,3,30,213,48,0,0,0,15,49,109,31,45,121,15,98,19,6,96,233,179,52,141,22,48,238,204,202,154,156,95,146,132,221,232,177,191,178,133,7,62,137,116,50,1,225,8,21,127,52,216,165,130,3,213,65,64,0,0,0,0,162,28,187,117,113,235,27,148,77,112,253,157,81,53,20,64,111,73,197,84,131,170,187,105,129,6,90,31,5,83,187,142,34,81,198,165,62,205,34,247,140,67,78,230,75,221,57,211,121,140,116,127,134,133,186,114,166,150,59,86,213,217,158), $null, 'CurrentUser')
                                                                          4⤵
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:2680
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,27,201,56,127,79,121,27,69,175,124,126,87,89,19,7,241,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,0,121,162,92,254,76,172,230,174,98,220,161,66,174,166,47,68,200,13,123,128,152,149,208,91,195,234,47,255,249,175,0,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,198,23,48,245,211,211,228,234,160,218,22,107,134,175,243,65,105,168,182,29,205,235,76,179,178,192,87,255,168,160,6,154,48,0,0,0,211,70,245,94,52,97,38,12,76,52,209,104,240,43,55,96,112,117,226,94,35,26,42,105,44,26,156,248,58,145,131,96,94,67,203,96,14,245,233,144,23,209,209,14,202,112,51,222,64,0,0,0,68,74,159,117,33,69,56,22,210,23,222,252,199,47,128,62,9,191,159,208,97,231,84,22,70,123,16,192,250,122,23,221,132,161,232,25,62,228,100,1,64,199,113,18,19,130,239,242,160,166,49,2,166,90,122,197,119,180,219,215,197,185,125,13), $null, 'CurrentUser')"
                                                                        3⤵
                                                                        • An obfuscated cmd.exe command-line is typically used to evade detection.
                                                                        PID:1848
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,27,201,56,127,79,121,27,69,175,124,126,87,89,19,7,241,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,0,121,162,92,254,76,172,230,174,98,220,161,66,174,166,47,68,200,13,123,128,152,149,208,91,195,234,47,255,249,175,0,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,198,23,48,245,211,211,228,234,160,218,22,107,134,175,243,65,105,168,182,29,205,235,76,179,178,192,87,255,168,160,6,154,48,0,0,0,211,70,245,94,52,97,38,12,76,52,209,104,240,43,55,96,112,117,226,94,35,26,42,105,44,26,156,248,58,145,131,96,94,67,203,96,14,245,233,144,23,209,209,14,202,112,51,222,64,0,0,0,68,74,159,117,33,69,56,22,210,23,222,252,199,47,128,62,9,191,159,208,97,231,84,22,70,123,16,192,250,122,23,221,132,161,232,25,62,228,100,1,64,199,113,18,19,130,239,242,160,166,49,2,166,90,122,197,119,180,219,215,197,185,125,13), $null, 'CurrentUser')
                                                                          4⤵
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:1096
                                                                  • C:\Users\Admin\Downloads\VantaFN\VantaFN.exe
                                                                    "C:\Users\Admin\Downloads\VantaFN\VantaFN.exe"
                                                                    1⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:1984
                                                                    • C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe
                                                                      2⤵
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      PID:624
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /d /s /c "WMIC csproduct get UUID"
                                                                        3⤵
                                                                          PID:3196
                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                            WMIC csproduct get UUID
                                                                            4⤵
                                                                              PID:4848
                                                                          • C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\VantaFN" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1880,i,11945231738001686480,13446210164228672711,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                                                                            3⤵
                                                                            • Executes dropped EXE
                                                                            • Loads dropped DLL
                                                                            PID:5028
                                                                          • C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\VantaFN.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\VantaFN" --mojo-platform-channel-handle=2112 --field-trial-handle=1880,i,11945231738001686480,13446210164228672711,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
                                                                            3⤵
                                                                            • Executes dropped EXE
                                                                            • Loads dropped DLL
                                                                            PID:3652
                                                                      • C:\Users\Admin\Downloads\VantaFN\VantaFN.exe
                                                                        "C:\Users\Admin\Downloads\VantaFN\VantaFN.exe"
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:1488

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                        Filesize

                                                                        3KB

                                                                        MD5

                                                                        f48896adf9a23882050cdff97f610a7f

                                                                        SHA1

                                                                        4c5a610df62834d43f470cae7e851946530e3086

                                                                        SHA256

                                                                        3ae35c2828715a2f9a5531d334a0cfffc81396c2dc058ca42a9943f3cdc22e78

                                                                        SHA512

                                                                        16644246f2a35a186fcb5c2b6456ed6a16e8db65ad1383109e06547f9b1f9358f071c30cca541ca4cf7bae66cb534535e88f75f6296a4bfc6c7b22b0684a6ba9

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                        Filesize

                                                                        152B

                                                                        MD5

                                                                        f9664c896e19205022c094d725f820b6

                                                                        SHA1

                                                                        f8f1baf648df755ba64b412d512446baf88c0184

                                                                        SHA256

                                                                        7121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e

                                                                        SHA512

                                                                        3fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                        Filesize

                                                                        152B

                                                                        MD5

                                                                        847d47008dbea51cb1732d54861ba9c9

                                                                        SHA1

                                                                        f2099242027dccb88d6f05760b57f7c89d926c0d

                                                                        SHA256

                                                                        10292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1

                                                                        SHA512

                                                                        bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                        Filesize

                                                                        288B

                                                                        MD5

                                                                        2dfdf2b783727fc485da6a9ffa07fc05

                                                                        SHA1

                                                                        8c0514e6f1b18ad6b6049cf201b5cbd804584dba

                                                                        SHA256

                                                                        53a37fe71d5c5db90d592f2df0f78fb4eab3273a72f55aec20d1d4c75acb62c7

                                                                        SHA512

                                                                        50176601daa74babd7677ddabc6d49f1f30de777bf087ad9d0e47ec630c48dda8c881afb3b574b09b3498fbb0263c6306fdb1007b36b59d40fcfadf571c113d6

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log

                                                                        Filesize

                                                                        509B

                                                                        MD5

                                                                        fd05abde00faddf42ca67108877615b1

                                                                        SHA1

                                                                        e085db03d60ec095bc20a43cb1d04842aa2cf4f6

                                                                        SHA256

                                                                        1f3dff00e3bcd3fcf0ef1f373152d95dddb9a6dc4351bacc5c77b91c2e136085

                                                                        SHA512

                                                                        143232b90140fbfb759895a80d560e9ebd28651f01a4bb6c53c423c3dbc3be3d704d8eee16e44a27688eec446d501355d728c905057ca0a922b88944e1e69bb7

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                        Filesize

                                                                        930B

                                                                        MD5

                                                                        b870fa1048000e79d1eeafad50535222

                                                                        SHA1

                                                                        350cdb7581db4866561f5ff1fef0919cceb0c399

                                                                        SHA256

                                                                        1733833237f643e4a0821d20466cdf46ac26b3e8b8fa5a99b537a59ac966f8b3

                                                                        SHA512

                                                                        693fa2b4354a7a6d3f9f122b9451109c92f17e083bd197908195af5370bc6812a3a8ca4ae825afbd471a51c0f0c603b5ba0f622ad66c2201fb01057b1ad6564e

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        6KB

                                                                        MD5

                                                                        68c456db4c6c5a15fe60022f7c4dce9c

                                                                        SHA1

                                                                        b0dae5bbbec89a2e54c8093f4934f5b75f0549b7

                                                                        SHA256

                                                                        fd4a258a1c00234575c02b3d606236c7573d2eeb51f2de303a412da66bf4fe11

                                                                        SHA512

                                                                        5edee090ba23ff46058ab68ecbe247b24a21e0aa83c2fb859b4483d46dd6a5dda2c8dd9585f2e4d1d8406c90b51d71c4a2c5a5c42eba998b222f219b0da98bc3

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        5KB

                                                                        MD5

                                                                        3ee53fd936c80ffcc261bf1f9664394f

                                                                        SHA1

                                                                        aa817ec795a34b8764169b1ac893fdf755fd934c

                                                                        SHA256

                                                                        0b0961dd2204fc8e8bc429ce4c48b2714a1ce8cd3e8213bab0df2233bdceb505

                                                                        SHA512

                                                                        8b1dbe6bd7b00a9f7095c7d0c5176cfce91cc967f1739bf961d227f375c49611989d407a1683bccf5bf2b332afba0bd143c685ee2a9a7c3d10fa546c36e4d61a

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        6KB

                                                                        MD5

                                                                        4552a4f34e353db4f9ebf71842c1dc12

                                                                        SHA1

                                                                        84e3ecd00eead25c229cba67697f338b4b20fa84

                                                                        SHA256

                                                                        0ba6cb86ad8eeaf567e509369d5e0fa11131771bf8032c89f82413f6791ea66e

                                                                        SHA512

                                                                        0a4b89382611658def893eb4801c061d1828bd8f1764742ccad4846125f45ad3ce0ae28ed0b59fe1e3c3afe6089d1036d299450ff65f6ca5cfbd8e2123c40a61

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        6KB

                                                                        MD5

                                                                        f342e2135025c834118140fa0b204a2b

                                                                        SHA1

                                                                        59b475844b835196a04188246d4cd60d9884a009

                                                                        SHA256

                                                                        90497d9696db572d455fd23bea02ca5444ac18ce5e9151eb0e648173e3c69fbb

                                                                        SHA512

                                                                        bc0b08faec8228d24b5fe99449c1f2300d7c3580fefbeeb73cb7c6a77b3dee299eb9621999f26fa99fbb39c17f79471e2a20247360826cca3302052634bd6ecf

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                        Filesize

                                                                        16B

                                                                        MD5

                                                                        6752a1d65b201c13b62ea44016eb221f

                                                                        SHA1

                                                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                        SHA256

                                                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                        SHA512

                                                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        3448774c776976e74b39276e1285edba

                                                                        SHA1

                                                                        d0987097d65d6423c123bffc6d83be2aedfe20ca

                                                                        SHA256

                                                                        087bddddffc944a2a6742d39f31fb3075f698777f4b7fe76103555a487fbce49

                                                                        SHA512

                                                                        43a7eec66451924590c9e9b525e8c36710268bb778042d101d6dde6faf4239a9c6779328d0afe426be0476d5bd227e3d76f0b743f565e759b49aacf84303b974

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                        Filesize

                                                                        10KB

                                                                        MD5

                                                                        1af2fafecae81a084568c7aad14e44da

                                                                        SHA1

                                                                        ecaf0c631e2ce59c706a8feb5a1e15a6ff486b01

                                                                        SHA256

                                                                        3d2a8ce69f2e92a5d77dcf5163e25f214712a048779a6e754bf69daf1bc5295f

                                                                        SHA512

                                                                        7bac3fb750fae6808b614f81542940141fbc27440121c3bdd7cac0e777dce92061cf71e018b829d287bbc26188d7c2295e6b26fa8c0a1589fd8af847b83ebe74

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        e86a2f4d6dec82df96431112380a87e6

                                                                        SHA1

                                                                        2dc61fae82770528bee4fe5733a8ac3396012e79

                                                                        SHA256

                                                                        dde11341854008e550d48a18f4880f7e462f5a75f0a6f8c09cf7b0761a425f3a

                                                                        SHA512

                                                                        5f127e7c81c480ad134eacfda3f5de738902b879fd4e85ddc663c050c6db748ac3f9d228ca26ddb37df06039df6741d2b774c0201388edf332fe063c464397a5

                                                                      • C:\Users\Admin\AppData\Local\Temp\0dc1b110-48e4-4f97-b76f-cdacc0457a2a.tmp.node

                                                                        Filesize

                                                                        137KB

                                                                        MD5

                                                                        04bfbfec8db966420fe4c7b85ebb506a

                                                                        SHA1

                                                                        939bb742a354a92e1dcd3661a62d69e48030a335

                                                                        SHA256

                                                                        da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd

                                                                        SHA512

                                                                        4ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65

                                                                      • C:\Users\Admin\AppData\Local\Temp\2l82tJSJrZBjMSs1YSIRCFUR72L\chrome_100_percent.pak

                                                                        Filesize

                                                                        126KB

                                                                        MD5

                                                                        8626e1d68e87f86c5b4dabdf66591913

                                                                        SHA1

                                                                        4cd7b0ac0d3f72587708064a7b0a3beca3f7b81c

                                                                        SHA256

                                                                        2caa1da9b6a6e87bdb673977fee5dd771591a1b6ed5d3c5f14b024130a5d1a59

                                                                        SHA512

                                                                        03bcd8562482009060f249d6a0dd7382fc94d669a2094dec08e8d119be51bef2c3b7b484bb5b7f805ae98e372dab9383a2c11a63ab0f5644146556b1bb9a4c99

                                                                      • C:\Users\Admin\AppData\Local\Temp\32286475-07f4-4a1f-aab3-d66c59bd68fd.tmp.node

                                                                        Filesize

                                                                        1.6MB

                                                                        MD5

                                                                        20de786f34496656726c9807e5ebfe01

                                                                        SHA1

                                                                        c29529551fd4059cd0360796dfdc6a2be070fedf

                                                                        SHA256

                                                                        dc26c7107eb629e709d697e68efc716a615f6f183fd8b138cd66cb043797f64e

                                                                        SHA512

                                                                        676575ef15102e048c01c625d0de20cc5fd61eee60d541c4ab29b111d7adc4eadad41e50c5f43fdedba1d0e6a768f0a5bcb894513908351de0e3f6699f9a2259

                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mrtn1gum.zjh.ps1

                                                                        Filesize

                                                                        60B

                                                                        MD5

                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                        SHA1

                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                        SHA256

                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                        SHA512

                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\LICENSE.electron.txt

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        4d42118d35941e0f664dddbd83f633c5

                                                                        SHA1

                                                                        2b21ec5f20fe961d15f2b58efb1368e66d202e5c

                                                                        SHA256

                                                                        5154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d

                                                                        SHA512

                                                                        3ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\LICENSES.chromium.html

                                                                        Filesize

                                                                        6.5MB

                                                                        MD5

                                                                        180f8acc70405077badc751453d13625

                                                                        SHA1

                                                                        35dc54acad60a98aeec47c7ade3e6a8c81f06883

                                                                        SHA256

                                                                        0bfa9a636e722107b6192ff35c365d963a54e1de8a09c8157680e8d0fbbfba1c

                                                                        SHA512

                                                                        40d3358b35eb0445127c70deb0cb87ec1313eca285307cda168605a4fd3d558b4be9eb24a59568eca9ee1f761e578c39b2def63ad48e40d31958db82f128e0ec

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\chrome_200_percent.pak

                                                                        Filesize

                                                                        175KB

                                                                        MD5

                                                                        48515d600258d60019c6b9c6421f79f6

                                                                        SHA1

                                                                        0ef0b44641d38327a360aa6954b3b6e5aab2af16

                                                                        SHA256

                                                                        07bee34e189fe9a8789aed78ea59ad41414b6e611e7d74da62f8e6ca36af01ce

                                                                        SHA512

                                                                        b7266bc8abc55bd389f594dac0c0641ecf07703f35d769b87e731b5fdf4353316d44f3782a4329b3f0e260dead6b114426ddb1b0fb8cd4a51e0b90635f1191d9

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\d3dcompiler_47.dll

                                                                        Filesize

                                                                        4.7MB

                                                                        MD5

                                                                        cb9807f6cf55ad799e920b7e0f97df99

                                                                        SHA1

                                                                        bb76012ded5acd103adad49436612d073d159b29

                                                                        SHA256

                                                                        5653bc7b0e2701561464ef36602ff6171c96bffe96e4c3597359cd7addcba88a

                                                                        SHA512

                                                                        f7c65bae4ede13616330ae46a197ebad106920dce6a31fd5a658da29ed1473234ca9e2b39cc9833ff903fb6b52ff19e39e6397fac02f005823ed366ca7a34f62

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\ffmpeg.dll

                                                                        Filesize

                                                                        2.7MB

                                                                        MD5

                                                                        d49e7a8f096ad4722bd0f6963e0efc08

                                                                        SHA1

                                                                        6835f12391023c0c7e3c8cc37b0496e3a93a5985

                                                                        SHA256

                                                                        f11576bf7ffbc3669d1a5364378f35a1ed0811b7831528b6c4c55b0cdc7dc014

                                                                        SHA512

                                                                        ca50c28d6aac75f749ed62eec8acbb53317f6bdcef8794759af3fad861446de5b7fa31622ce67a347949abb1098eccb32689b4f1c54458a125bc46574ad51575

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\icudtl.dat

                                                                        Filesize

                                                                        10.1MB

                                                                        MD5

                                                                        adfd2a259608207f256aeadb48635645

                                                                        SHA1

                                                                        300bb0ae3d6b6514fb144788643d260b602ac6a4

                                                                        SHA256

                                                                        7c8c7b05d70145120b45ccb64bf75bee3c63ff213e3e64d092d500a96afb8050

                                                                        SHA512

                                                                        8397e74c7a85b0a2987cae9f2c66ce446923aa4140686d91a1e92b701e16b73a6ce459540e718858607ecb12659bedac0aa95c2713c811a2bc2d402691ff29dc

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\libEGL.dll

                                                                        Filesize

                                                                        468KB

                                                                        MD5

                                                                        09134e6b407083baaedf9a8c0bce68f2

                                                                        SHA1

                                                                        8847344cceeab35c1cdf8637af9bd59671b4e97d

                                                                        SHA256

                                                                        d2107ba0f4e28e35b22837c3982e53784d15348795b399ad6292d0f727986577

                                                                        SHA512

                                                                        6ff3adcb8be48d0b505a3c44e6550d30a8feaf4aa108982a7992ed1820c06f49e0ad48d9bd92685fb82783dfd643629bd1fe4073300b61346b63320cbdb051ba

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\libGLESv2.dll

                                                                        Filesize

                                                                        7.2MB

                                                                        MD5

                                                                        a5f1921e6dcde9eaf42e2ccc82b3d353

                                                                        SHA1

                                                                        1f6f4df99ae475acec4a7d3910badb26c15919d1

                                                                        SHA256

                                                                        50c4dc73d69b6c0189eab56d27470ee15f99bbbc12bfd87ebe9963a7f9ba404e

                                                                        SHA512

                                                                        0c24ae7d75404adf8682868d0ebf05f02bbf603f7ddd177cf2af5726802d0a5afcf539dc5d68e10dab3fcfba58903871c9c81054560cf08799af1cc88f33c702

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\af.pak

                                                                        Filesize

                                                                        353KB

                                                                        MD5

                                                                        464e5eeaba5eff8bc93995ba2cb2d73f

                                                                        SHA1

                                                                        3b216e0c5246c874ad0ad7d3e1636384dad2255d

                                                                        SHA256

                                                                        0ad547bb1dc57907adeb02e1be3017cce78f6e60b8b39395fe0e8b62285797a1

                                                                        SHA512

                                                                        726d6c41a9dbf1f5f2eff5b503ab68d879b088b801832c13fba7eb853302b16118cacda4748a4144af0f396074449245a42b2fe240429b1afcb7197fa0cb6d41

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\am.pak

                                                                        Filesize

                                                                        569KB

                                                                        MD5

                                                                        2c933f084d960f8094e24bee73fa826c

                                                                        SHA1

                                                                        91dfddc2cff764275872149d454a8397a1a20ab1

                                                                        SHA256

                                                                        fa1e44215bd5acc7342c431a3b1fddb6e8b6b02220b4599167f7d77a29f54450

                                                                        SHA512

                                                                        3c9ecfb0407de2aa6585f4865ad54eeb2ec6519c9d346e2d33ed0e30be6cc3ebfed676a08637d42c2ca8fa6cfefb4091feb0c922ff71f09a2b89cdd488789774

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\ar.pak

                                                                        Filesize

                                                                        624KB

                                                                        MD5

                                                                        fdbad4c84ac66ee78a5c8dd16d259c43

                                                                        SHA1

                                                                        3ce3cd751bb947b19d004bd6916b67e8db5017ac

                                                                        SHA256

                                                                        a62b848a002474a8ea37891e148cbaf4af09bdba7dafebdc0770c9a9651f7e3b

                                                                        SHA512

                                                                        376519c5c2e42d21acedb1ef47184691a2f286332451d5b8d6aac45713861f07c852fb93bd9470ff5ee017d6004aba097020580f1ba253a5295ac1851f281e13

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\bg.pak

                                                                        Filesize

                                                                        652KB

                                                                        MD5

                                                                        38bcabb6a0072b3a5f8b86b693eb545d

                                                                        SHA1

                                                                        d36c8549fe0f69d05ffdaffa427d3ddf68dd6d89

                                                                        SHA256

                                                                        898621731ac3471a41f8b3a7bf52e7f776e8928652b37154bc7c1299f1fd92e1

                                                                        SHA512

                                                                        002adbdc17b6013becc4909daf2febb74ce88733c78e968938b792a52c9c5a62834617f606e4cb3774ae2dad9758d2b8678d7764bb6dcfe468881f1107db13ef

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\bn.pak

                                                                        Filesize

                                                                        838KB

                                                                        MD5

                                                                        9340520696e7cb3c2495a78893e50add

                                                                        SHA1

                                                                        eed5aeef46131e4c70cd578177c527b656d08586

                                                                        SHA256

                                                                        1ea245646a4b4386606f03c8a3916a3607e2adbbc88f000976be36db410a1e39

                                                                        SHA512

                                                                        62507685d5542cfcd394080917b3a92ca197112feea9c2ddc1dfc77382a174c7ddf758d85af66cd322692215cb0402865b2a2b212694a36da6b592028caafcdf

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\ca.pak

                                                                        Filesize

                                                                        400KB

                                                                        MD5

                                                                        4cd6b3a91669ddcfcc9eef9b679ab65c

                                                                        SHA1

                                                                        43c41cb00067de68d24f72e0f5c77d3b50b71f83

                                                                        SHA256

                                                                        56efff228ee3e112357d6121b2256a2c3acd718769c89413de82c9d4305459c6

                                                                        SHA512

                                                                        699be9962d8aae241abd1d1f35cd8468ffbd6157bcd6bdf2c599d902768351b247baad6145b9826d87271fd4a19744eb11bf7065db7fefb01d66d2f1f39015a9

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\cs.pak

                                                                        Filesize

                                                                        409KB

                                                                        MD5

                                                                        eeee212072ea6589660c9eb216855318

                                                                        SHA1

                                                                        d50f9e6ca528725ced8ac186072174b99b48ea05

                                                                        SHA256

                                                                        de92f14480770401e39e22dcf3dd36de5ad3ed22e44584c31c37cd99e71c4a43

                                                                        SHA512

                                                                        ea068186a2e611fb98b9580f2c5ba6fd1f31b532e021ef9669e068150c27deee3d60fd9ff7567b9eb5d0f98926b24defabc9b64675b49e02a6f10e71bb714ac8

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\da.pak

                                                                        Filesize

                                                                        371KB

                                                                        MD5

                                                                        e7ba94c827c2b04e925a76cb5bdd262c

                                                                        SHA1

                                                                        abba6c7fcec8b6c396a6374331993c8502c80f91

                                                                        SHA256

                                                                        d8da7ab28992c8299484bc116641e19b448c20adf6a8b187383e2dba5cd29a0b

                                                                        SHA512

                                                                        1f44fce789cf41fd62f4d387b7b8c9d80f1e391edd2c8c901714dd0a6e3af32266e9d3c915c15ad47c95ece4c7d627aa7339f33eea838d1af9901e48edb0187e

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\de.pak

                                                                        Filesize

                                                                        397KB

                                                                        MD5

                                                                        cf22ec11a33be744a61f7de1a1e4514f

                                                                        SHA1

                                                                        73e84848c6d9f1a2abe62020eb8c6797e4c49b36

                                                                        SHA256

                                                                        7cc213e2c9a2d2e2e463083dd030b86da6bba545d5cee4c04df8f80f9a01a641

                                                                        SHA512

                                                                        c10c8446e3041d7c0195da184a53cfbd58288c06eaf8885546d2d188b59667c270d647fa7259f5ce140ec6400031a7fc060d0f2348ab627485e2207569154495

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\el.pak

                                                                        Filesize

                                                                        712KB

                                                                        MD5

                                                                        e66a75680f21ce281995f37099045714

                                                                        SHA1

                                                                        d553e80658ee1eea5b0912db1ecc4e27b0ed4790

                                                                        SHA256

                                                                        21d1d273124648a435674c7877a98110d997cf6992469c431fe502bbcc02641f

                                                                        SHA512

                                                                        d3757529dd85ef7989d9d4cecf3f7d87c9eb4beda965d8e2c87ee23b8baaec3fdff41fd53ba839215a37404b17b8fe2586b123557f09d201b13c7736c736b096

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\en-GB.pak

                                                                        Filesize

                                                                        324KB

                                                                        MD5

                                                                        825ed4c70c942939ffb94e77a4593903

                                                                        SHA1

                                                                        7a3faee9bf4c915b0f116cb90cec961dda770468

                                                                        SHA256

                                                                        e11e8db78ae12f8d735632ba9fd078ec66c83529cb1fd86a31ab401f6f833c16

                                                                        SHA512

                                                                        41325bec22af2e5ef8e9b26c48f2dfc95763a249ccb00e608b7096ec6236ab9a955de7e2340fd9379d09ac2234aee69aed2a24fe49382ffd48742d72a929c56a

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\en-US.pak

                                                                        Filesize

                                                                        326KB

                                                                        MD5

                                                                        19d18f8181a4201d542c7195b1e9ff81

                                                                        SHA1

                                                                        7debd3cf27bbe200c6a90b34adacb7394cb5929c

                                                                        SHA256

                                                                        1d20e626444759c2b72aa6e998f14a032408d2b32f957c12ec3abd52831338fb

                                                                        SHA512

                                                                        af07e1b08bbf2dd032a5a51a88ee2923650955873753629a086cad3b1600ce66ca7f9ed31b8ca901c126c10216877b24e123144bb0048f2a1e7757719aae73f2

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\es-419.pak

                                                                        Filesize

                                                                        395KB

                                                                        MD5

                                                                        7da3e8aa47ba35d014e1d2a32982a5bb

                                                                        SHA1

                                                                        8e35320b16305ad9f16cb0f4c881a89818cd75bb

                                                                        SHA256

                                                                        7f85673cf80d1e80acfc94fb7568a8c63de79a13a1bb6b9d825b7e9f338ef17c

                                                                        SHA512

                                                                        1fca90888eb067972bccf74dd5d09bb3fce2ceb153589495088d5056ed4bdede15d54318af013c2460f0e8b5b1a5c6484adf0ed84f4b0b3c93130b086da5c3bf

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\es.pak

                                                                        Filesize

                                                                        394KB

                                                                        MD5

                                                                        04a9ba7316dc81766098e238a667de87

                                                                        SHA1

                                                                        24d7eb4388ecdfecada59c6a791c754181d114de

                                                                        SHA256

                                                                        7fa148369c64bc59c2832d617357879b095357fe970bab9e0042175c9ba7cb03

                                                                        SHA512

                                                                        650856b6187df41a50f9bed29681c19b4502de6af8177b47bad0bf12e86a25e92aa728311310c28041a18e4d9f48ef66d5ad5d977b6662c44b49bfd1da84522b

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\et.pak

                                                                        Filesize

                                                                        356KB

                                                                        MD5

                                                                        ccc71f88984a7788c8d01add2252d019

                                                                        SHA1

                                                                        6a87752eac3044792a93599428f31d25debea369

                                                                        SHA256

                                                                        d69489a723b304e305cb1767e6c8da5d5d1d237e50f6ddc76e941dcb01684944

                                                                        SHA512

                                                                        d35ccd639f2c199862e178a9fab768d7db10d5a654bc3bc1fab45d00ceb35a01119a5b4d199e2db3c3576f512b108f4a1df7faf6624d961c0fc4bca5af5f0e07

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\fa.pak

                                                                        Filesize

                                                                        577KB

                                                                        MD5

                                                                        2e37fd4e23a1707a1eccea3264508dff

                                                                        SHA1

                                                                        e00e58ed06584b19b18e9d28b1d52dbfc36d70f3

                                                                        SHA256

                                                                        b9ee861e1bdecffe6a197067905279ea77c180844a793f882c42f2b70541e25e

                                                                        SHA512

                                                                        7c467f434eb0ce8e4a851761ae9bd7a9e292aab48e8e653e996f8ca598d0eb5e07ec34e2b23e544f3b38439dc3b8e3f7a0dfd6a8e28169aa95ceff42bf534366

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\fi.pak

                                                                        Filesize

                                                                        365KB

                                                                        MD5

                                                                        21e534869b90411b4f9ea9120ffb71c8

                                                                        SHA1

                                                                        cc91ffbd19157189e44172392b2752c5f73984c5

                                                                        SHA256

                                                                        2d337924139ffe77804d2742eda8e58d4e548e65349f827840368e43d567810b

                                                                        SHA512

                                                                        3ca3c0adaf743f92277452b7bd82db4cf3f347de5568a20379d8c9364ff122713befd547fbd3096505ec293ae6771ada4cd3dadac93cc686129b9e5aacf363bd

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\fil.pak

                                                                        Filesize

                                                                        410KB

                                                                        MD5

                                                                        d7df2ea381f37d6c92e4f18290c6ffe0

                                                                        SHA1

                                                                        7cacf08455aa7d68259fcba647ee3d9ae4c7c5e4

                                                                        SHA256

                                                                        db4a63fa0d5b2baba71d4ba0923caed540099db6b1d024a0d48c3be10c9eed5a

                                                                        SHA512

                                                                        96fc028455f1cea067b3a3dd99d88a19a271144d73dff352a3e08b57338e513500925787f33495cd744fe4122dff2d2ee56e60932fc02e04feed2ec1e0c3533f

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\fr.pak

                                                                        Filesize

                                                                        426KB

                                                                        MD5

                                                                        3ee48a860ecf45bafa63c9284dfd63e2

                                                                        SHA1

                                                                        1cb51d14964f4dced8dea883bf9c4b84a78f8eb6

                                                                        SHA256

                                                                        1923e0edf1ef6935a4a718e3e2fc9a0a541ea0b4f3b27553802308f9fd4fc807

                                                                        SHA512

                                                                        eb6105faca13c191fef0c51c651a406b1da66326bb5705615770135d834e58dee9bed82aa36f2dfb0fe020e695c192c224ec76bb5c21a1c716e5f26dfe02f763

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\gu.pak

                                                                        Filesize

                                                                        813KB

                                                                        MD5

                                                                        308619d65b677d99f48b74ccfe060567

                                                                        SHA1

                                                                        9f834df93fd48f4fb4ca30c4058e23288cf7d35e

                                                                        SHA256

                                                                        e40ee4f24839f9e20b48d057bf3216bc58542c2e27cb40b9d2f3f8a1ea5bfbb4

                                                                        SHA512

                                                                        3ca84ad71f00b9f7cc61f3906c51b263f18453fce11ec6c7f9edfe2c7d215e3550c336e892bd240a68a6815af599cc20d60203294f14adb133145ca01fe4608f

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\he.pak

                                                                        Filesize

                                                                        507KB

                                                                        MD5

                                                                        fc84ea7dc7b9408d1eea11beeb72b296

                                                                        SHA1

                                                                        de9118194952c2d9f614f8e0868fb273ddfac255

                                                                        SHA256

                                                                        15951767dafa7bdbedac803d842686820de9c6df478416f34c476209b19d2d8c

                                                                        SHA512

                                                                        49d13976dddb6a58c6fdcd9588e243d705d99dc1325c1d9e411a1d68d8ee47314dfcb661d36e2c4963c249a1542f95715f658427810afcabdf9253aa27eb3b24

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\hi.pak

                                                                        Filesize

                                                                        848KB

                                                                        MD5

                                                                        b5dfce8e3ba0aec2721cc1692b0ad698

                                                                        SHA1

                                                                        c5d6fa21a9ba3d526f3e998e3f627afb8d1eecf3

                                                                        SHA256

                                                                        b1c7fb6909c8a416b513d6de21eea0b5a6b13c7f0a94cabd0d9154b5834a5e8b

                                                                        SHA512

                                                                        facf0a9b81af6bb35d0fc5e69809d5c986a2c91a166e507784bdad115644b96697fe504b8d70d9bbb06f0c558f746c085d37e385eef41f0a1c29729d3d97980f

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\hr.pak

                                                                        Filesize

                                                                        397KB

                                                                        MD5

                                                                        255f808210dbf995446d10ff436e0946

                                                                        SHA1

                                                                        1785d3293595f0b13648fb28aec6936c48ea3111

                                                                        SHA256

                                                                        4df972b7f6d81aa7bdc39e2441310a37f746ae5015146b4e434a878d1244375b

                                                                        SHA512

                                                                        8b1a4d487b0782055717b718d58cd21e815b874e2686cdfd2087876b70ae75f9182f783c70bf747cf4ca17a3afc68517a9db4c99449fa09bef658b5e68087f2a

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\hu.pak

                                                                        Filesize

                                                                        427KB

                                                                        MD5

                                                                        2aa0a175df21583a68176742400c6508

                                                                        SHA1

                                                                        3c25ba31c2b698e0c88e7d01b2cc241f0916e79a

                                                                        SHA256

                                                                        b59f932df822ab1a87e8aab4bbb7c549db15899f259f4c50ae28f8d8c7ce1e72

                                                                        SHA512

                                                                        03a16feb0601407e96bcb43af9bdb21e5218c2700c9f3cfd5f9690d0b4528f9dc17e4cc690d8c9132d4e0b26d7faafd90aa3f5e57237e06fb81aab7ab77f6c03

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\id.pak

                                                                        Filesize

                                                                        350KB

                                                                        MD5

                                                                        b6fcd5160a3a1ae1f65b0540347a13f2

                                                                        SHA1

                                                                        4cf37346318efb67908bba7380dbad30229c4d3d

                                                                        SHA256

                                                                        7fd715914e3b0cf2048d4429f3236e0660d5bd5e61623c8fef9b8e474c2ac313

                                                                        SHA512

                                                                        a8b4a96e8f9a528b2df3bd1251b72ab14feccf491dd254a7c6ecba831dfaba328adb0fd0b4acddb89584f58f94b123e97caa420f9d7b34131cc51bdbdbf3ed73

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\it.pak

                                                                        Filesize

                                                                        388KB

                                                                        MD5

                                                                        745f16ca860ee751f70517c299c4ab0e

                                                                        SHA1

                                                                        54d933ad839c961dd63a47c92a5b935eef208119

                                                                        SHA256

                                                                        10e65f42ce01ba19ebf4b074e8b2456213234482eadf443dfad6105faf6cde4c

                                                                        SHA512

                                                                        238343d6c80b82ae900f5abf4347e542c9ea016d75fb787b93e41e3c9c471ab33f6b4584387e5ee76950424e25486dd74b9901e7f72876960c0916c8b9cee9a6

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\ja.pak

                                                                        Filesize

                                                                        472KB

                                                                        MD5

                                                                        38cd3ef9b7dff9efbbe086fa39541333

                                                                        SHA1

                                                                        321ef69a298d2f9830c14140b0b3b0b50bd95cb0

                                                                        SHA256

                                                                        d8fab5714dafecb89b3e5fce4c4d75d2b72893e685e148e9b60f7c096e5b3337

                                                                        SHA512

                                                                        40785871032b222a758f29e0c6ec696fbe0f6f5f3274cc80085961621bec68d7e0fb47c764649c4dd0c27c6ee02460407775fae9d3a2a8a59362d25a39266ce0

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\kn.pak

                                                                        Filesize

                                                                        938KB

                                                                        MD5

                                                                        caab4deb1c40507848f9610d849834cf

                                                                        SHA1

                                                                        1bc87ff70817ba1e1fdd1b5cb961213418680cbe

                                                                        SHA256

                                                                        7a34483e6272f9b8881f0f5a725b477540166561c75b9e7ab627815d4be1a8a4

                                                                        SHA512

                                                                        dc4b63e5a037479bb831b0771aec0fe6eb016723bcd920b41ab87ef11505626632877073ce4e5e0755510fe19ba134a7b5899332ecef854008b15639f915860c

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\ko.pak

                                                                        Filesize

                                                                        398KB

                                                                        MD5

                                                                        d6194fc52e962534b360558061de2a25

                                                                        SHA1

                                                                        98ed833f8c4beac685e55317c452249579610ff8

                                                                        SHA256

                                                                        1a5884bd6665b2f404b7328de013522ee7c41130e57a53038fc991ec38290d21

                                                                        SHA512

                                                                        5207a07426c6ceb78f0504613b6d2b8dadf9f31378e67a61091f16d72287adbc7768d1b7f2a923369197e732426d15a872c091cf88680686581d48a7f94988ab

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\lt.pak

                                                                        Filesize

                                                                        429KB

                                                                        MD5

                                                                        64b08ffc40a605fe74ecc24c3024ee3b

                                                                        SHA1

                                                                        516296e8a3114ddbf77601a11faf4326a47975ab

                                                                        SHA256

                                                                        8a5d6e29833374e0f74fd7070c1b20856cb6b42ed30d18a5f17e6c2e4a8d783e

                                                                        SHA512

                                                                        05d207413186ac2b87a59681efe4fdf9dc600d0f3e8327e7b9802a42306d80d0ddd9ee07d103b17caf0518e42ab25b7ca9da4713941abc7bced65961671164ac

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\lv.pak

                                                                        Filesize

                                                                        427KB

                                                                        MD5

                                                                        a8cbd741a764f40b16afea275f240e7e

                                                                        SHA1

                                                                        317d30bbad8fd0c30de383998ea5be4eec0bb246

                                                                        SHA256

                                                                        a1a9d84fd3af571a57be8b1a9189d40b836808998e00ec9bd15557b83d0e3086

                                                                        SHA512

                                                                        3da91c0ca20165445a2d283db7dc749fcf73e049bfff346b1d79b03391aefc7f1310d3ac2c42109044cfb50afcf178dcf3a34b4823626228e591f328dd7afe95

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\ml.pak

                                                                        Filesize

                                                                        974KB

                                                                        MD5

                                                                        1c81104ac2cbf7f7739af62eb77d20d5

                                                                        SHA1

                                                                        0f0d564f1860302f171356ea35b3a6306c051c10

                                                                        SHA256

                                                                        66005bc01175a4f6560d1e9768dbc72b46a4198f8e435250c8ebc232d2dac108

                                                                        SHA512

                                                                        969294eae8c95a1126803a35b8d3f1fc3c9d22350aa9cc76b2323b77ad7e84395d6d83b89deb64565783405d6f7eae40def7bdaf0d08da67845ae9c7dbb26926

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\mr.pak

                                                                        Filesize

                                                                        797KB

                                                                        MD5

                                                                        2cf9f07ddf7a3a70a48e8b524a5aed43

                                                                        SHA1

                                                                        974c1a01f651092f78d2d20553c3462267ddf4e9

                                                                        SHA256

                                                                        23058c0f71d9e40f927775d980524d866f70322e0ef215aa5748c239707451e7

                                                                        SHA512

                                                                        0b21570deefa41defc3c25c57b3171635bcb5593761d48a8116888ce8be34c1499ff79c7a3ebbe13b5a565c90027d294c6835e92e6254d582a86750640fe90f2

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\ms.pak

                                                                        Filesize

                                                                        365KB

                                                                        MD5

                                                                        aee105366a1870b9d10f0f897e9295db

                                                                        SHA1

                                                                        eee9d789a8eeafe593ce77a7c554f92a26a2296f

                                                                        SHA256

                                                                        c6471aee5f34f31477d57f593b09cb1de87f5fd0f9b5e63d8bab4986cf10d939

                                                                        SHA512

                                                                        240688a0054bfebe36ea2b056194ee07e87bbbeb7e385131c73a64aa7967984610fcb80638dd883837014f9bc920037069d0655e3e92a5922f76813aedb185fa

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\nb.pak

                                                                        Filesize

                                                                        358KB

                                                                        MD5

                                                                        55d5ad4eacb12824cfcd89470664c856

                                                                        SHA1

                                                                        f893c00d8d4fdb2f3e7a74a8be823e5e8f0cd673

                                                                        SHA256

                                                                        4f44789a2c38edc396a31aba5cc09d20fb84cd1e06f70c49f0664289c33cd261

                                                                        SHA512

                                                                        555d87be8c97f466c6b3e7b23ec0210335846398c33dba71e926ff7e26901a3908dbb0f639c93db2d090c9d8bda48eddf196b1a09794d0e396b2c02b4720f37e

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\nl.pak

                                                                        Filesize

                                                                        370KB

                                                                        MD5

                                                                        0f04bac280035fab018f634bcb5f53ae

                                                                        SHA1

                                                                        4cad76eaecd924b12013e98c3a0e99b192be8936

                                                                        SHA256

                                                                        be254bcda4dbe167cb2e57402a4a0a814d591807c675302d2ce286013b40799b

                                                                        SHA512

                                                                        1256a6acac5a42621cb59eb3da42ddeeacfe290f6ae4a92d00ebd4450a8b7ccb6f0cd5c21cf0f18fe4d43d0d7aee87b6991fef154908792930295a3871fa53df

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\pl.pak

                                                                        Filesize

                                                                        412KB

                                                                        MD5

                                                                        f1d48a7dcd4880a27e39b7561b6eb0ab

                                                                        SHA1

                                                                        353c3ba213cd2e1f7423c6ba857a8d8be40d8302

                                                                        SHA256

                                                                        2593c8b59849fbc690cbd513f06685ea3292cd0187fcf6b9069cbf3c9b0e8a85

                                                                        SHA512

                                                                        132da2d3c1a4dad5ccb399b107d7b6d9203a4b264ef8a65add11c5e8c75859115443e1c65ece2e690c046a82687829f54ec855f99d4843f859ab1dd7c71f35a5

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\pt-BR.pak

                                                                        Filesize

                                                                        389KB

                                                                        MD5

                                                                        8e931ffbded8933891fb27d2cca7f37d

                                                                        SHA1

                                                                        ab0a49b86079d3e0eb9b684ca36eb98d1d1fd473

                                                                        SHA256

                                                                        6632bd12f04a5385012b5cdebe8c0dad4a06750dc91c974264d8fe60e8b6951d

                                                                        SHA512

                                                                        cf0f6485a65c13cf5ddd6457d34cdea222708b0bb5ca57034ed2c4900fd22765385547af2e2391e78f02dcf00b7a2b3ac42a3509dd4237581cfb87b8f389e48d

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\pt-PT.pak

                                                                        Filesize

                                                                        390KB

                                                                        MD5

                                                                        b4954b064e3f6a9ba546dda5fa625927

                                                                        SHA1

                                                                        584686c6026518932991f7de611e2266d8523f9d

                                                                        SHA256

                                                                        ee1e014550b85e3d18fb5128984a713d9f6de2258001b50ddd18391e7307b4a1

                                                                        SHA512

                                                                        cb3b465b311f83b972eca1c66862b2c5d6ea6ac15282e0094aea455123ddf32e85df24a94a0aedbe1b925ff3ed005ba1e00d5ee820676d7a5a366153ade90ef7

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\ro.pak

                                                                        Filesize

                                                                        403KB

                                                                        MD5

                                                                        d2758f6adbaeea7cd5d95f4ad6dde954

                                                                        SHA1

                                                                        d7476db23d8b0e11bbabf6a59fde7609586bdc8a

                                                                        SHA256

                                                                        2b7906f33bfbe8e9968bcd65366e2e996cdf2f3e1a1fc56ad54baf261c66954c

                                                                        SHA512

                                                                        8378032d6febea8b5047ada667cb19e6a41f890cb36305acc2500662b4377caef3dc50987c925e05f21c12e32c3920188a58ee59d687266d70b8bfb1b0169a6e

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\ru.pak

                                                                        Filesize

                                                                        657KB

                                                                        MD5

                                                                        2885bde990ee3b30f2c54a4067421b68

                                                                        SHA1

                                                                        ae16c4d534b120fdd68d33c091a0ec89fd58793f

                                                                        SHA256

                                                                        9fcda0d1fab7fff7e2f27980de8d94ff31e14287f58bd5d35929de5dd9cbcdca

                                                                        SHA512

                                                                        f7781f5c07fbf128399b88245f35055964ff0cde1cc6b35563abc64f520971ce9916827097ca18855b46ec6397639f5416a6e8386a9390afba4332d47d21693f

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\sk.pak

                                                                        Filesize

                                                                        416KB

                                                                        MD5

                                                                        b7e97cc98b104053e5f1d6a671c703b7

                                                                        SHA1

                                                                        0f7293f1744ae2cd858eb3431ee016641478ae7d

                                                                        SHA256

                                                                        b0d38869275d9d295e42b0b90d0177e0ca56a393874e4bb454439b8ce25d686f

                                                                        SHA512

                                                                        ef3247c6f0f4065a4b68db6bf7e28c8101a9c6c791b3f771ed67b5b70f2c9689cec67a1c864f423382c076e4cbb6019c1c0cb9ad0204454e28f749a69b6b0de0

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\sl.pak

                                                                        Filesize

                                                                        401KB

                                                                        MD5

                                                                        ca763e801de642e4d68510900ff6fabb

                                                                        SHA1

                                                                        c32a871831ce486514f621b3ab09387548ee1cff

                                                                        SHA256

                                                                        340e0babe5fddbfda601c747127251cf111dd7d79d0d6a5ec4e8443b835027de

                                                                        SHA512

                                                                        e2847ce75de57deb05528dd9557047edcd15d86bf40a911eb97e988a8fdbda1cd0e0a81320eadf510c91c826499a897c770c007de936927df7a1cc82fa262039

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\sr.pak

                                                                        Filesize

                                                                        616KB

                                                                        MD5

                                                                        c68c235d8e696c098cf66191e648196b

                                                                        SHA1

                                                                        5c967fbbd90403a755d6c4b2411e359884dc8317

                                                                        SHA256

                                                                        ab96a18177af90495e2e3c96292638a775aa75c1d210ca6a6c18fbc284cd815b

                                                                        SHA512

                                                                        34d14d8cb851df1ea8cd3cc7e9690eaf965d8941cfcac1c946606115ad889630156c5ff47011b27c1288f8df70e8a7dc41909a9fa98d75b691742ec1d1a5e653

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\sv.pak

                                                                        Filesize

                                                                        361KB

                                                                        MD5

                                                                        272f8a8b517c7283eab83ba6993eea63

                                                                        SHA1

                                                                        ad4175331b948bd4f1f323a4938863472d9b700c

                                                                        SHA256

                                                                        d15b46bc9b5e31449b11251df19cd2ba4920c759bd6d4fa8ca93fd3361fdd968

                                                                        SHA512

                                                                        3a0930b7f228a779f727ebfb6ae8820ab5cc2c9e04c986bce7b0f49f9bf124f349248ecdf108edf8870f96b06d58dea93a3e0e2f2da90537632f2109e1aa65f0

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\sw.pak

                                                                        Filesize

                                                                        379KB

                                                                        MD5

                                                                        67a443a5c2eaad32625edb5f8deb7852

                                                                        SHA1

                                                                        a6137841e8e7736c5ede1d0dc0ce3a44dc41013f

                                                                        SHA256

                                                                        41dfb772ae4c6f9e879bf7b4fa776b2877a2f8740fa747031b3d6f57f34d81dd

                                                                        SHA512

                                                                        e0fdff1c3c834d8af8634f43c2f16ba5b883a8d88dfd322593a13830047568faf9f41d0bf73cd59e2e33c38fa58998d4702d2b0c21666717a86945d18b3f29e5

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\ta.pak

                                                                        Filesize

                                                                        964KB

                                                                        MD5

                                                                        18ec8ff3c0701a6a8c48f341d368bab5

                                                                        SHA1

                                                                        8bff8aee26b990cf739a29f83efdf883817e59d8

                                                                        SHA256

                                                                        052bcdb64a80e504bb6552b97881526795b64e0ab7ee5fc031f3edf87160dee9

                                                                        SHA512

                                                                        a0e997fc9d316277de3f4773388835c287ab1a35770c01e376fb7428ff87683a425f6a6a605d38dd7904ca39c50998cd85f855cb33ae6abad47ac85a1584fe4e

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\te.pak

                                                                        Filesize

                                                                        894KB

                                                                        MD5

                                                                        a17f16d7a038b0fa3a87d7b1b8095766

                                                                        SHA1

                                                                        b2f845e52b32c513e6565248f91901ab6874e117

                                                                        SHA256

                                                                        d39716633228a5872630522306f89af8585f8092779892087c3f1230d21a489e

                                                                        SHA512

                                                                        371fb44b20b8aba00c4d6f17701fa4303181ad628f60c7b4218e33be7026f118f619d66d679bffcb0213c48700fafd36b2e704499a362f715f63ea9a75d719e7

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\th.pak

                                                                        Filesize

                                                                        753KB

                                                                        MD5

                                                                        a32ba63feeed9b91f6d6800b51e5aeae

                                                                        SHA1

                                                                        2fbf6783996e8315a4fb94b7d859564350ee5918

                                                                        SHA256

                                                                        e32e37ca0ab30f1816fe6df37e3168e1022f1d3737c94f5472ab6600d97a45f6

                                                                        SHA512

                                                                        adebde0f929820d8368096a9c30961ba7b33815b0f124ca56ca05767ba6d081adf964088cb2b9fcaa07f756b946fffa701f0b64b07d457c99fd2b498cbd1e8a5

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\tr.pak

                                                                        Filesize

                                                                        385KB

                                                                        MD5

                                                                        5ff2e5c95067a339e3d6b8985156ec1f

                                                                        SHA1

                                                                        7525b25c7b07f54b63b6459a0d8c8c720bd8a398

                                                                        SHA256

                                                                        14a131ba318274cf10de533a19776db288f08a294cf7e564b7769fd41c7f2582

                                                                        SHA512

                                                                        2414386df8d7ab75dcbd6ca2b9ae62ba8e953ddb8cd8661a9f984eb5e573637740c7a79050b2b303af3d5b1d4d1bb21dc658283638718fdd04fc6e5891949d1b

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\uk.pak

                                                                        Filesize

                                                                        657KB

                                                                        MD5

                                                                        361a0e1f665b9082a457d36209b92a25

                                                                        SHA1

                                                                        3c89e1b70b51820bb6baa64365c64da6a9898e2f

                                                                        SHA256

                                                                        bd02966f6c6258b66eae7ff014710925e53fe26e8254d7db4e9147266025cc3a

                                                                        SHA512

                                                                        d4d25fc58053f8cce4c073846706dc1ecbc0dc19308ba35501e19676f3e7ed855d7b57ae22a5637f81cefc1aa032bf8770d0737df1924f3504813349387c08cf

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\ur.pak

                                                                        Filesize

                                                                        571KB

                                                                        MD5

                                                                        1ca4fa13bd0089d65da7cd2376feb4c6

                                                                        SHA1

                                                                        b1ba777e635d78d1e98e43e82d0f7a3dd7e97f9c

                                                                        SHA256

                                                                        3941364d0278e2c4d686faa4a135d16a457b4bc98c5a08e62aa12f3adc09aa7f

                                                                        SHA512

                                                                        d0d9eb1aa029bd4c34953ee5f4b60c09cf1d4f0b21c061db4ede1b5ec65d7a07fc2f780ade5ce51f2f781d272ac32257b95eedf471f7295ba70b5ba51db6c51d

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\vi.pak

                                                                        Filesize

                                                                        455KB

                                                                        MD5

                                                                        db0eb3183007de5aae10f934fffacc59

                                                                        SHA1

                                                                        e9ea7aeffe2b3f5cf75ab78630da342c6f8b7fd9

                                                                        SHA256

                                                                        ddabb225b671b989789e9c2ccd1b5a8f22141a7d9364d4e6ee9b8648305e7897

                                                                        SHA512

                                                                        703efd12fcace8172c873006161712de1919572c58d98b11de7834c5628444229f5143d231c41da5b9cf729e32de58dee3603cb3d18c6cdd94aa9aa36fbf5de0

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\zh-CN.pak

                                                                        Filesize

                                                                        332KB

                                                                        MD5

                                                                        82326e465e3015c64ca1db77dc6a56bc

                                                                        SHA1

                                                                        e8abe12a8dd2cc741b9637fa8f0e646043bbfe3d

                                                                        SHA256

                                                                        6655fd9dcdfaf2abf814ffb6c524d67495aed4d923a69924c65abeab30bc74fb

                                                                        SHA512

                                                                        4989789c0b2439666dda4c4f959dffc0ddcb77595b1f817c13a95ed97619c270151597160320b3f2327a7daffc8b521b68878f9e5e5fb3870eb0c43619060407

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\locales\zh-TW.pak

                                                                        Filesize

                                                                        330KB

                                                                        MD5

                                                                        2456bf42275f15e016689da166df9008

                                                                        SHA1

                                                                        70f7de47e585dfea3f5597b5bba1f436510decd7

                                                                        SHA256

                                                                        adf8df051b55507e5a79fa47ae88c7f38707d02dfac0cc4a3a7e8e17b58c6479

                                                                        SHA512

                                                                        7e622afa15c70785aaf7c19604d281efe0984f621d6599058c97c19d3c0379b2ee2e03b3a7ec597040a4eee250a782d7ec55c335274dd7db7c7ca97ddcfd378a

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\resources.pak

                                                                        Filesize

                                                                        5.2MB

                                                                        MD5

                                                                        7971a016aed2fb453c87eb1b8e3f5eb2

                                                                        SHA1

                                                                        92b91e352be8209fadcf081134334dea147e23b8

                                                                        SHA256

                                                                        9cfd5d29cde3de2f042e5e1da629743a7c95c1211e1b0b001e4eebc0f0741e06

                                                                        SHA512

                                                                        42082ac0c033655f2edae876425a320d96cdaee6423b85449032c63fc0f7d30914aa3531e65428451c07912265b85f5fee2ed0bbdb362994d3a1fa7b14186013

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\resources\elevate.exe

                                                                        Filesize

                                                                        105KB

                                                                        MD5

                                                                        792b92c8ad13c46f27c7ced0810694df

                                                                        SHA1

                                                                        d8d449b92de20a57df722df46435ba4553ecc802

                                                                        SHA256

                                                                        9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37

                                                                        SHA512

                                                                        6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\snapshot_blob.bin

                                                                        Filesize

                                                                        158KB

                                                                        MD5

                                                                        8fef5a96dbcc46887c3ff392cbdb1b48

                                                                        SHA1

                                                                        ed592d75222b7828b7b7aab97b83516f60772351

                                                                        SHA256

                                                                        4de0f720c416776423add7ada621da95d0d188d574f08e36e822ad10d85c3ece

                                                                        SHA512

                                                                        e52c7820c69863ecc1e3b552b7f20da2ad5492b52cac97502152ebff45e7a45b00e6925679fd7477cdc79c68b081d6572eeed7aed773416d42c9200accc7230e

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\v8_context_snapshot.bin

                                                                        Filesize

                                                                        465KB

                                                                        MD5

                                                                        a373d83d4c43ba957693ad57172a251b

                                                                        SHA1

                                                                        8e0fdb714df2f4cb058beb46c06aa78f77e5ff86

                                                                        SHA256

                                                                        43b58ca4057cf75063d3b4a8e67aa9780d9a81d3a21f13c64b498be8b3ba6e0c

                                                                        SHA512

                                                                        07fbd84dc3e0ec1536ccb54d5799d5ed61b962251ece0d48e18b20b0fc9dd92de06e93957f3efc7d9bed88db7794fe4f2bec1e9b081825e41c6ac3b4f41eab18

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\vk_swiftshader.dll

                                                                        Filesize

                                                                        5.0MB

                                                                        MD5

                                                                        a0845e0774702da9550222ab1b4fded7

                                                                        SHA1

                                                                        65d5bd6c64090f0774fd0a4c9b215a868b48e19b

                                                                        SHA256

                                                                        6150a413ebe00f92f38737bdccf493d19921ef6329fcd48e53de9dbde4780810

                                                                        SHA512

                                                                        4be0cb1e3c942a1695bae7b45d21c5f70e407132ecc65efb5b085a50cdab3c33c26e90bd7c86198ec40fb2b18d026474b6c649776a3ca2ca5bff6f922de2319b

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\vk_swiftshader_icd.json

                                                                        Filesize

                                                                        106B

                                                                        MD5

                                                                        8642dd3a87e2de6e991fae08458e302b

                                                                        SHA1

                                                                        9c06735c31cec00600fd763a92f8112d085bd12a

                                                                        SHA256

                                                                        32d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9

                                                                        SHA512

                                                                        f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\7z-out\vulkan-1.dll

                                                                        Filesize

                                                                        899KB

                                                                        MD5

                                                                        0e4e0f481b261ea59f196e5076025f77

                                                                        SHA1

                                                                        c73c1f33b5b42e9d67d819226db69e60d2262d7b

                                                                        SHA256

                                                                        f681844896c084d2140ac210a974d8db099138fe75edb4df80e233d4b287196a

                                                                        SHA512

                                                                        e6127d778ec73acbeb182d42e5cf36c8da76448fbdab49971de88ec4eb13ce63140a2a83fc3a1b116e41f87508ff546c0d7c042b8f4cdd9e07963801f3156ba2

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\StdUtils.dll

                                                                        Filesize

                                                                        100KB

                                                                        MD5

                                                                        c6a6e03f77c313b267498515488c5740

                                                                        SHA1

                                                                        3d49fc2784b9450962ed6b82b46e9c3c957d7c15

                                                                        SHA256

                                                                        b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

                                                                        SHA512

                                                                        9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\System.dll

                                                                        Filesize

                                                                        12KB

                                                                        MD5

                                                                        0d7ad4f45dc6f5aa87f606d0331c6901

                                                                        SHA1

                                                                        48df0911f0484cbe2a8cdd5362140b63c41ee457

                                                                        SHA256

                                                                        3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

                                                                        SHA512

                                                                        c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsjDFAA.tmp\nsis7z.dll

                                                                        Filesize

                                                                        424KB

                                                                        MD5

                                                                        80e44ce4895304c6a3a831310fbf8cd0

                                                                        SHA1

                                                                        36bd49ae21c460be5753a904b4501f1abca53508

                                                                        SHA256

                                                                        b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592

                                                                        SHA512

                                                                        c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

                                                                      • memory/1372-900-0x0000024955860000-0x0000024955882000-memory.dmp

                                                                        Filesize

                                                                        136KB

                                                                      • memory/1372-905-0x0000024955D90000-0x0000024955DE0000-memory.dmp

                                                                        Filesize

                                                                        320KB