Analysis

  • max time kernel
    1200s
  • max time network
    1198s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    10-12-2024 21:04

General

  • Target

    nsis1.exe

  • Size

    61.9MB

  • MD5

    87c00f1acf63055d91d72e2c3459170a

  • SHA1

    28bdb437225dcc978fd1b037d76a7028437f1205

  • SHA256

    afdc1a1e1e934f18be28465315704a12b2cd43c186fbee94f7464392849a5ad0

  • SHA512

    93feebc77b2ea21aaa9dcac5eba4638fda9b5588adf9c72f2caa381c6455c3296b118a7a4248dc274f8d8234bad10b9a9585bdb28b66d3199d25b9e5296cb419

  • SSDEEP

    1572864:PjddT+kEYRwS3EJrC12ojpoEanXKcIqWKb+zeaV0d:7T+kDwS0RCUEanX/Q8Pd

Malware Config

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://lumquvonee.shop/api

Extracted

Family

lumma

C2

https://lumquvonee.shop/api

https://covery-mover.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 6 IoCs
  • Drops file in Windows directory 23 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 20 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 38 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3532
      • C:\Users\Admin\AppData\Local\Temp\nsis1.exe
        "C:\Users\Admin\AppData\Local\Temp\nsis1.exe"
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3476
        • C:\Users\Admin\AppData\Local\Temp\2pprtBdjzhf5iVtTfAJT5aNsRxD\Scielfic.exe
          C:\Users\Admin\AppData\Local\Temp\2pprtBdjzhf5iVtTfAJT5aNsRxD\Scielfic.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2432
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "chcp"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:536
            • C:\Windows\system32\chcp.com
              chcp
              5⤵
                PID:3700
            • C:\Users\Admin\AppData\Local\Temp\2pprtBdjzhf5iVtTfAJT5aNsRxD\Scielfic.exe
              "C:\Users\Admin\AppData\Local\Temp\2pprtBdjzhf5iVtTfAJT5aNsRxD\Scielfic.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\vidoenziokuqukvw" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1856 --field-trial-handle=1860,i,5145058687882348231,15467994932808998599,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:724
            • C:\Users\Admin\AppData\Local\Temp\2pprtBdjzhf5iVtTfAJT5aNsRxD\Scielfic.exe
              "C:\Users\Admin\AppData\Local\Temp\2pprtBdjzhf5iVtTfAJT5aNsRxD\Scielfic.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\vidoenziokuqukvw" --mojo-platform-channel-handle=2088 --field-trial-handle=1860,i,5145058687882348231,15467994932808998599,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              PID:3552
            • C:\Users\Admin\AppData\Local\Temp\2pprtBdjzhf5iVtTfAJT5aNsRxD\Scielfic.exe
              "C:\Users\Admin\AppData\Local\Temp\2pprtBdjzhf5iVtTfAJT5aNsRxD\Scielfic.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --user-data-dir="C:\Users\Admin\AppData\Roaming\vidoenziokuqukvw" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2564 --field-trial-handle=1860,i,5145058687882348231,15467994932808998599,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              PID:3472
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
              4⤵
                PID:4232
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:1156
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:4456
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:4668
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:684
                • C:\Windows\system32\findstr.exe
                  findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
                  5⤵
                    PID:3740
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3288
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2464
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1572
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5088
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3420
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4592
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4248
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1888
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:436
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3348
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3332
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4524
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3940
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4012
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4172
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5112
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2888
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\W6ck084LEhMqkSo3RL\EducationalDerby.exe""
                  4⤵
                    PID:3140
                    • C:\Users\Admin\AppData\Local\Temp\W6ck084LEhMqkSo3RL\EducationalDerby.exe
                      "C:\Users\Admin\AppData\Local\Temp\W6ck084LEhMqkSo3RL\EducationalDerby.exe"
                      5⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:2644
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c copy Inexpensive Inexpensive.cmd && Inexpensive.cmd
                        6⤵
                        • System Location Discovery: System Language Discovery
                        PID:4928
                        • C:\Windows\SysWOW64\tasklist.exe
                          tasklist
                          7⤵
                          • Enumerates processes with tasklist
                          • System Location Discovery: System Language Discovery
                          PID:1652
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr /I "wrsa opssvc"
                          7⤵
                          • System Location Discovery: System Language Discovery
                          PID:1548
                        • C:\Windows\SysWOW64\tasklist.exe
                          tasklist
                          7⤵
                          • Enumerates processes with tasklist
                          • System Location Discovery: System Language Discovery
                          PID:1996
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                          7⤵
                          • System Location Discovery: System Language Discovery
                          PID:2996
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c md 463551
                          7⤵
                          • System Location Discovery: System Language Discovery
                          PID:3700
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr /V "EzKingstonVaccineDisagreeLiePersonalEndlessMentioned" Hood
                          7⤵
                          • System Location Discovery: System Language Discovery
                          PID:3292
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c copy /b ..\Occasion + ..\Airfare + ..\Handled + ..\April + ..\Wr + ..\Response + ..\Surplus + ..\Optimization + ..\Some r
                          7⤵
                          • System Location Discovery: System Language Discovery
                          PID:1536
                        • C:\Users\Admin\AppData\Local\Temp\463551\Lc.com
                          Lc.com r
                          7⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Checks processor information in registry
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:3412
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\463551\Lc.com" & rd /s /q "C:\ProgramData\E3E3OPZUA1N7" & exit
                            8⤵
                            • System Location Discovery: System Language Discovery
                            PID:2764
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout /t 10
                              9⤵
                              • System Location Discovery: System Language Discovery
                              • Delays execution with timeout.exe
                              PID:4212
                        • C:\Windows\SysWOW64\choice.exe
                          choice /d y /t 5
                          7⤵
                          • System Location Discovery: System Language Discovery
                          PID:4252
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\W6ck084LEhMqkSo3RL\StringsGrill.exe""
                    4⤵
                      PID:944
                      • C:\Users\Admin\AppData\Local\Temp\W6ck084LEhMqkSo3RL\StringsGrill.exe
                        "C:\Users\Admin\AppData\Local\Temp\W6ck084LEhMqkSo3RL\StringsGrill.exe"
                        5⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:3200
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c copy Immigrants Immigrants.cmd && Immigrants.cmd
                          6⤵
                          • System Location Discovery: System Language Discovery
                          PID:2372
                          • C:\Windows\SysWOW64\tasklist.exe
                            tasklist
                            7⤵
                            • Enumerates processes with tasklist
                            • System Location Discovery: System Language Discovery
                            PID:2804
                          • C:\Windows\SysWOW64\findstr.exe
                            findstr /I "wrsa opssvc"
                            7⤵
                            • System Location Discovery: System Language Discovery
                            PID:1816
                          • C:\Windows\SysWOW64\tasklist.exe
                            tasklist
                            7⤵
                            • Enumerates processes with tasklist
                            • System Location Discovery: System Language Discovery
                            PID:3104
                          • C:\Windows\SysWOW64\findstr.exe
                            findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                            7⤵
                            • System Location Discovery: System Language Discovery
                            PID:5056
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c md 556608
                            7⤵
                            • System Location Discovery: System Language Discovery
                            PID:4884
                          • C:\Windows\SysWOW64\findstr.exe
                            findstr /V "DOLLARSPATCHPETROLEUMDELTAMEANINGINCOMEPHILIPPINESTAIWAN" Mounting
                            7⤵
                            • System Location Discovery: System Language Discovery
                            PID:3828
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c copy /b ..\Cities + ..\Cr + ..\Garden + ..\Prime + ..\Cannon + ..\Offered + ..\Perth + ..\Phentermine + ..\Oct + ..\Solar + ..\Is + ..\Jokes + ..\Cholesterol + ..\Mean O
                            7⤵
                            • System Location Discovery: System Language Discovery
                            PID:4808
                          • C:\Users\Admin\AppData\Local\Temp\556608\Agreements.com
                            Agreements.com O
                            7⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:3400
                            • C:\Users\Admin\AppData\Local\Temp\556608\RegAsm.exe
                              C:\Users\Admin\AppData\Local\Temp\556608\RegAsm.exe
                              8⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of SetWindowsHookEx
                              PID:792
                          • C:\Windows\SysWOW64\choice.exe
                            choice /d y /t 5
                            7⤵
                            • System Location Discovery: System Language Discovery
                            PID:1076
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\3VDNJgnl8j1IhDnTdM\CongressionalMechanics.exe""
                      4⤵
                        PID:4748
                        • C:\Users\Admin\AppData\Local\Temp\3VDNJgnl8j1IhDnTdM\CongressionalMechanics.exe
                          "C:\Users\Admin\AppData\Local\Temp\3VDNJgnl8j1IhDnTdM\CongressionalMechanics.exe"
                          5⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:4724
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c copy Calif Calif.cmd && Calif.cmd
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:2156
                            • C:\Windows\SysWOW64\tasklist.exe
                              tasklist
                              7⤵
                              • Enumerates processes with tasklist
                              • System Location Discovery: System Language Discovery
                              PID:4036
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr /I "wrsa opssvc"
                              7⤵
                              • System Location Discovery: System Language Discovery
                              PID:4944
                            • C:\Windows\SysWOW64\tasklist.exe
                              tasklist
                              7⤵
                              • Enumerates processes with tasklist
                              • System Location Discovery: System Language Discovery
                              PID:788
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                              7⤵
                              • System Location Discovery: System Language Discovery
                              PID:648
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c md 646022
                              7⤵
                              • System Location Discovery: System Language Discovery
                              PID:3680
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr /V "CalculatorProcedureSampleDimensionSuchMineGalaxyHawaiian" Also
                              7⤵
                              • System Location Discovery: System Language Discovery
                              PID:3792
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c copy /b ..\Es + ..\Gaps + ..\Passes + ..\Hell + ..\Avenue + ..\Trace + ..\Deserve Y
                              7⤵
                              • System Location Discovery: System Language Discovery
                              PID:4208
                            • C:\Users\Admin\AppData\Local\Temp\646022\Twiki.com
                              Twiki.com Y
                              7⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:2288
                            • C:\Windows\SysWOW64\choice.exe
                              choice /d y /t 5
                              7⤵
                              • System Location Discovery: System Language Discovery
                              PID:472
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CogniFlow.url" & echo URL="C:\Users\Admin\AppData\Local\NeuralTech Dynamics\CogniFlow.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CogniFlow.url" & exit
                    2⤵
                    • Drops startup file
                    • System Location Discovery: System Language Discovery
                    PID:4632

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  3KB

                  MD5

                  aa67313df8310c9dd658c44d965d923a

                  SHA1

                  a8a2a462eab0df4d117324bcf5475d191f5bdf49

                  SHA256

                  5c861e50cfcbc30a28761ab944a53674e22a59c18e68b074afaf03d4fbe711f9

                  SHA512

                  66696c889f5b0803ce1121af5acb24fb4c4638176acddf3939dc221f372800222596f593ff09a931c5411dc2c6637d8ea1322d0fa05e11195d078e547d19df91

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  432f9dde51413638aa680afc11009cee

                  SHA1

                  3a457e5820bae4e2e8f4c805e020e6431fd90fcd

                  SHA256

                  882b1f9d2025c7bdd95f6bf95011745281f84b65326027b5ad7903e67cb5ca65

                  SHA512

                  b3a7be48d871b29bc995bacd66d66cbc2def0723fe232f3b58826581954c30c95c8c235ab63d026b576294ca7ab45ccded9a6f35a7121f311f71c429cbf59549

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  ece762024ef3ba5a2f91cc9878b0df80

                  SHA1

                  41cca2569965f25ad573e428137485c220929d49

                  SHA256

                  38a18eb4c9f57c6937be4cffcf1fcfd90fa9616741e9dd7ea4d5fd05733b2bbf

                  SHA512

                  df88591ddea6027b3c58cd6bda7438db8a3b3738f9a76cfac06223373455982abeebd866acbf5f8f6dfb0dbaa19feec511254fd889f7042b5e345f1018d876c7

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  983b9e1a2a0d0532264cc4f01a58516b

                  SHA1

                  a2d95eaf2b236d7fd7b1a96034b88647677d2d51

                  SHA256

                  c2bb2a6c590f530f3df9e21d3b1b9e3a5093135c2281a1aee525bf0ba556927a

                  SHA512

                  8888dca50ad22e153cb8100033ceb37924063071d56b0286053180a68463d98f20494a9ed6277801b985175ae004805288131250bcd37eec4283ca302ca63b8a

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  f20ad2f7bd4643f508ff8e63766de192

                  SHA1

                  4e48fd1413d9f4aeeaa0359356451712ff1fbaa3

                  SHA256

                  c2e2e9138fca0361618df081c7d8288481fe3f09a021ffd412d478c070323ca9

                  SHA512

                  c4ce53acdee1fbfab9a4b8b949ddbc3a84793c4345cfaaa736f04133aeb5f76df9c2dcf148ae71051b2d1f76a26fb0b278e92494e83e7f78f38f1393e0bd97bc

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  096920876c942a6a0cdaadb782cb00c8

                  SHA1

                  6365d7af20dac6a590c93145a4845d53dbcbd9be

                  SHA256

                  621deccdee98152ddc8d9cfc8fcec6d1bb0aeaf7a1d17d0c69e07fd11799c237

                  SHA512

                  15db5fa301d03088bfa085e99b176d1d2bbe660198a67be55e7f9c8cb7041e627887b7ae60a9c19e4b735ac9926609c2245911bab258b158a37e51fe4a507065

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  31321c3cfe1544d5e2bf69211d8fe440

                  SHA1

                  8cc0e500677929186f28ccac33e2a002fd0e2872

                  SHA256

                  ffde061d8844aa7d138aabfc0d3fb1bbb85d6c237a47f9ccc7650d92cc0c88fb

                  SHA512

                  7d46c74f1cfa9e564d80ddfea86c3d1656ff1fbe69e24a41e53f113c038aa034643f1fb842f5fecde318dc1194720fdca013596c2e3bebb5670236f2d633aa4a

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  5cc02239587b603cbe580f565001c7ab

                  SHA1

                  503d988d942e5bbe7ff793b7b6b88c4c10cde554

                  SHA256

                  ac40f6734be202350b3afe6857f91a2fc157c03b31ab2a21100278caa6751f90

                  SHA512

                  caf39cbedce07e84cf0d292e8afcccde87a6ee802caa0e1b3b127ca2bbe9fa2b5f19b4af5bef1aab7cc2f92406f8605c6db13cb36209edc6c29252dad746415f

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  875c97a682289b4236c8e3242fbde848

                  SHA1

                  e62a334f6740b55dec41f94cf5ea8d2ca1f3740e

                  SHA256

                  195455e6d9f819cdd0643f4e57088d7d89444c165621cae0fb4481bd3116cbbb

                  SHA512

                  c26a2cfe9ff027a4e976d2bbd563e88120ee56a0610c5f2dbe320ab9af454ec72902c991e6d6323412889a17acfbe94ad9c82a7b356fffdcb570c207b789dc07

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  e846ce4ef14370379b7615b19aef3cb8

                  SHA1

                  192c66495716db56515f4d7443cef1e32d94787f

                  SHA256

                  9d3459b6c3ef04a5a9436c6a3b510f0cf5a740b9234bdb52f1c21edc6197570b

                  SHA512

                  d359c9ecbff8565b5f4b56b0a4a2d3475d9fe52ef492653500c61fbc28454db3698df1e29fc00608248e6b036cd4526af8d357537c0a5087243b834720711e3c

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  b36ad14ffed252aa2f5e097647ac4319

                  SHA1

                  c103f93b769926dccfcfc0425f506ec5ad46e7e9

                  SHA256

                  52291d1a696332feda33d5cb716ab816fd7be938331730be852f67ee58beea84

                  SHA512

                  b43ab5108b792e7e9102d06bda5393c210748c6c0b48dda2dc25fd529e73993785c5b08edbcadee2eb105f7adfdd54120be3183d5ffe366c4bae76faadf7dc8f

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  942ed2fe3eb15266209f9c7bca82b608

                  SHA1

                  c79c2ad1818ebd429f734d54062974130ce9d933

                  SHA256

                  f99a66122d2bb8219779fab6c3caf5935087e8b1d406d6974949f3093de9f7f8

                  SHA512

                  dd94531f7c39ffc31157e0eb256e7673870afe12e738b3fa3efa5be4e71414ff87b9e093c43be4092c864d03328c807a6d5199834af215f7a7d5d1f8a9a6c9b7

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  ef15f94827a93921a3c3d4d44dca0ff4

                  SHA1

                  67a7a938809433305ea02b8c307a7cf20f925618

                  SHA256

                  51586070df86be451d87ac02358442c41548a71cae7b18fa7ee41b6fecde79f2

                  SHA512

                  1e63786a0236bbfb8ba8de4053b553576ee3f8f46b45043160dc9c72467b5e2791490c16e68ad832d767a2fbbf1c5d7d6b76c594747f6ca44afaaf7146c36fc0

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  f758d63209a45c4cafe5f86b20d44637

                  SHA1

                  6a7c54255a7552c7104ef4db17e8e57999d25220

                  SHA256

                  8ac7af32534f18078dc08ac3c10f6585be674bf0f6c62b8a166fbf2a08fc64af

                  SHA512

                  fb8cdb33634c29d13951ee5c20bb963997e5f8ad8a9804e82ccf6516ac0c2778bacddcf540c972bd96bc6d21e7dcee2b6a8ee0cdd056ae718e624d99e30262cb

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  3db25f61738f7204abe803471e1ff67c

                  SHA1

                  d7e379dc4341fe6013d5512facddf7b8a5f787c8

                  SHA256

                  19d059ca8ea5d7089f3f5a8471c7ef3bbcc3632a1fbfa55f3fe361fc511720ff

                  SHA512

                  94cd3a79e2c95209a5cc137fbea6532d11ef8d65df9147f6c59e6274d75d79c1b76e82972fe129866a6348e5f319da9a39bad16dfb31a47611553e62d93241d4

                • C:\Users\Admin\AppData\Local\Temp\3VDNJgnl8j1IhDnTdM\CongressionalMechanics.exe

                  Filesize

                  1.1MB

                  MD5

                  0dd20a33c9916a9a8c6a963c503952b7

                  SHA1

                  4c6c9b54fca2e5fed3c34d9a2bb31d5e0c947ca5

                  SHA256

                  2060509a63180c2f5075faf88ce7079c48903070c1c6b09fa3f9d6db05b8d9da

                  SHA512

                  72e63e09fed9c638207800d55509f5c4ddba43b30d099ce192b6548b0fb4e4647a52d2d66424139fffc8ad0406421e45c963601084009059c059403a3596a8f3

                • C:\Users\Admin\AppData\Local\Temp\646022\Twiki.com

                  Filesize

                  333KB

                  MD5

                  774b5005531ac08cf14a3964679629b5

                  SHA1

                  cef40fa10e5a487c82331ffb97a0eebee90185c9

                  SHA256

                  be985c22d07d190a21c57c5fec14635ac144daaa21df06292ab2152d5822c79b

                  SHA512

                  4aaccf95a0c087a4ede948b85d8fd5a14b6b44ed9e60f25527b81ae49d8b26c25170661d8d9a3a2683978df98835147b3eb29cb69105552e3f804d5331d5a63e

                • C:\Users\Admin\AppData\Local\Temp\Ages

                  Filesize

                  95KB

                  MD5

                  c8f6e372768186361a103f33aa8e7353

                  SHA1

                  a6c36fdc03fe28e6a52832cfe517708561844d0c

                  SHA256

                  8dc09c06df0fcbf260e1b75d0a1355323dfdcb20edb9e127078efe751520316c

                  SHA512

                  b597bc136ecbde715280aee7ced7629ae12377d64a74631d30445de5a4fc5a318701c6e8b8c41c12c05c20c178c6405d3f1e1f76648cb1da52569f908468f9ce

                • C:\Users\Admin\AppData\Local\Temp\Babe

                  Filesize

                  51KB

                  MD5

                  822d8c678fe3a787b214d98a8eae5894

                  SHA1

                  b910f6cd570aca361c4a47f5c825bcc8b43fbc9b

                  SHA256

                  745b1f94abc2b0ed6754825b5b93df4afd12eece382ba9d853604cf8a36e12c2

                  SHA512

                  0e80f1fc483e4d61b4dfd7a186dec46d0fa71a7754459bb230d01b07fe81f938e9f31328b1bed42097bb1fccffa03072a0a92a62594bcdd9ee3652604090483e

                • C:\Users\Admin\AppData\Local\Temp\Calif

                  Filesize

                  18KB

                  MD5

                  e40e378023f13c0bfd808eef485749e0

                  SHA1

                  1c8b072e3112a1a54da1a25b690bbdc1362bb1cd

                  SHA256

                  55987ff2de5c9d07f99d96bf8567ea7441ac3d4e5961a2cbd2f93556693d912a

                  SHA512

                  076d318e2cee9a00374073236d651419de4c392ad8b1a5b72a7af85693dee3a632b1e3ce8a0fcadb744b9a5c97d5ba3c881f300f8c141ad81d7816880aa89cc5

                • C:\Users\Admin\AppData\Local\Temp\Cannon

                  Filesize

                  57KB

                  MD5

                  6b480cf1c915f4507e63b9d8451d8cd1

                  SHA1

                  d0a09d249265f78114df31dbbef4aa3335688199

                  SHA256

                  3459340bf84b1fd85f167ed722cc76e80297210e0aa20ae122916f3d564353a6

                  SHA512

                  c677197d067bb642dcb34ca8209e6a4dabb3e35c1dbcc70e16e6c492caf5c3c775537c2bb8443d550882cbbf8b82691cdcb9bbf23c937333ed5f01aa258386d9

                • C:\Users\Admin\AppData\Local\Temp\Cities

                  Filesize

                  83KB

                  MD5

                  d2b9e5b0f9d0f66323452e3e18b322cb

                  SHA1

                  608bbde0d86b79ce60807ae41c82cd628d51cdd5

                  SHA256

                  d3bf5bd398ab4f926e10101a6a6933647337c356daaacf7a92c63fb628a40b96

                  SHA512

                  eaff22d2c566ebc0e80d58e6489879d893e58da639da426d6cf0cef8e82f8a626567a0ef67c62283c806143d7d47dcbab157e0cb7b582c6d269f8d6b8b529070

                • C:\Users\Admin\AppData\Local\Temp\Cr

                  Filesize

                  59KB

                  MD5

                  5d4601becfe0e385ae7b8e98d055b5b0

                  SHA1

                  58cce0d511c55186579f353f4d8f48d5e9f5d098

                  SHA256

                  ac2d5c94dd034bd7a1bf1a2e645efcca0fa886e3f7f67152542ff127805bea8d

                  SHA512

                  edb6988f2f9338056a2c34022dd6ce5ea1580444dbcc377700704af2c1727ec6d60d1d12a4d4ef855c21d3847dfafa5774bd2fb5fa4f40cfff1013422aa8bba5

                • C:\Users\Admin\AppData\Local\Temp\Desire

                  Filesize

                  48KB

                  MD5

                  8cc978b1ab4ae228055447013649787d

                  SHA1

                  5506755c2877d87a97b06dfa00a399e596676d60

                  SHA256

                  0c003bbf5210e2226481ad74e7c4b727aa734ed49f1930387fed223001b82098

                  SHA512

                  dc422472d7525b78093c5975590703b2726176c85b4ddad31c0c56b9c2c7927cc015c11d5b7221010c0908bbce7cbdecf6f9f064fea79083a109835d93e1481b

                • C:\Users\Admin\AppData\Local\Temp\Figured

                  Filesize

                  84KB

                  MD5

                  333c53c4998da4054934f5ab74bf6c3c

                  SHA1

                  1d39f7fe9aadb490a6038e511d69deee88153bd7

                  SHA256

                  5c57d85878ca7502b0bbce4f9e2978a93156fe4ecadc3fb21b6f7e3d1fbc0859

                  SHA512

                  bda47d6ad8a5519e6442ace59374933be7dae600942e70b36aa59650c664a37ebf24bfc6da3e5924aec8dbbbb380a316f765cca2171c98f613f0a7f4f09a9fa6

                • C:\Users\Admin\AppData\Local\Temp\Garden

                  Filesize

                  92KB

                  MD5

                  38687f3253661d4a687b5d9240891749

                  SHA1

                  7d71411f88dfe409ac258e65be52aa3b31108cb0

                  SHA256

                  7ec66a94d504188cf504df629a2d3ba71079f7d1288df719b252136b75e6dbf0

                  SHA512

                  0000b6f06cf21572471899ebe4cbaa316ebfb67d7befa92d7136070f40321cf594c23d6f967e64357bc9376a409f5317c6147e0395039ba94714c0254fd07d45

                • C:\Users\Admin\AppData\Local\Temp\Immigrants

                  Filesize

                  15KB

                  MD5

                  0a4f5658a2fb7e50f57656309494cc64

                  SHA1

                  2be1657a2060d1e79561a3a83e28381f8c143718

                  SHA256

                  fa45cae539bb7b4edfa3ed9e23ce1aa928dcaf444270ee18b59803160c9d51c2

                  SHA512

                  71508c8811814f3b61186e0c15d98da5235a9007be522b139a4d493006664014cbb0a0d453ddea7e93ccb7dd78fb0e56abad47a71da83725b848bc6e46f163d6

                • C:\Users\Admin\AppData\Local\Temp\Inexpensive

                  Filesize

                  18KB

                  MD5

                  a3edcbf2c871e991686f33ef093a7d66

                  SHA1

                  2f20ae5c384d5067a3e69651a81a6ca3561886e2

                  SHA256

                  cd59bc020b25e584d1c449c912eebf62e1961439d4b2c5b8ef0e7a40e2809ab2

                  SHA512

                  066d8dba6000249387ebaf3159660771f899189623b3804750ed7fb905d54567e93902eeeaf2643f7c349c288b0143ff20783e7baf7330ff11be5c4c17bf3e11

                • C:\Users\Admin\AppData\Local\Temp\Laboratory

                  Filesize

                  123KB

                  MD5

                  80a414be230738e26bacf1b324e2ffda

                  SHA1

                  aa258e03a79ea0aa2bfc33616c800569fe83b060

                  SHA256

                  e0be82cc84435ae4fb6162954018f731c21bf75cec4637e0d8318e0a08b66997

                  SHA512

                  51d7f498ef9d453911d0fd497c01e9811a70f0e7b109c40828055354942aab3187eab5202fb186772528a12a9f45e5275c4e6c2d8c47986e12b06a6f61978c21

                • C:\Users\Admin\AppData\Local\Temp\Mounting

                  Filesize

                  92KB

                  MD5

                  68a2a686a703d20ea293269ad6f2eb9a

                  SHA1

                  5ef1292af7f258e3be2483abb13f640d687c7ea5

                  SHA256

                  9e371d86491b495672963d38216da17405127b504624b89058836d08d40b3382

                  SHA512

                  7f239a9f1e3a1b5b1c4b619617197b3795fdc20dfa773149c8dbc91e8ccb7f0124b3d3fd819f311374c18a75f7c37d92e5dd16ff8ce96b2ff83193fdcece291b

                • C:\Users\Admin\AppData\Local\Temp\Oct

                  Filesize

                  94KB

                  MD5

                  3e4bfcbc8fb22ddcf3edbbe3c070e957

                  SHA1

                  fb5ac8d9dd7b26eb1950e7034aeebff594e9b802

                  SHA256

                  f6d81627d1f59e04ff76cab102261da3c6e52d2ff48aa2e84070387c82f2253a

                  SHA512

                  af294f97948bd2c51df7ea8866f8b73220a49c80571b242032f468bca453d7d72a2c5ab21c726a63b5df1b1198f837ad067980a1b6104b3a509056de9246cdda

                • C:\Users\Admin\AppData\Local\Temp\Offered

                  Filesize

                  93KB

                  MD5

                  531e2978cac9067e4200f3cb1affa1c4

                  SHA1

                  7042b8199a729dba3c2e1f58d810e00f35dc4a99

                  SHA256

                  84a5af3bc92fdaa9ca39e588ed964d16a54c32aa54371bb8d6ccf1313b6de506

                  SHA512

                  4e649b338d5b75262e57bf460ff57f3fa1a16fe6beb79a6d5df21542a507bd80ba680428057c5a575cfc7da0b608655b6cc23155b02d411c91be4d744f5c0bf0

                • C:\Users\Admin\AppData\Local\Temp\Perth

                  Filesize

                  60KB

                  MD5

                  85be4150f669d6c03a1c24bbbc23c7b6

                  SHA1

                  e5e62fed5cee70074d0ed0f7bc06f4bb585cd6b6

                  SHA256

                  ee3ac430f00f35942c119cfa8382efa3385a20e646698c6f19da70731ead48ff

                  SHA512

                  5dbabd536e9896291cedeb303143968472c4c675928b060eae7a1b6763ce44437f0a7cbc69ca8c939b51bad455f21b8bb36b1b4e46d7ff4bde4d02c2e323b28b

                • C:\Users\Admin\AppData\Local\Temp\Phentermine

                  Filesize

                  56KB

                  MD5

                  e9f93000c3f3d09d77e15e2b7bc61f3e

                  SHA1

                  9d33929a5bb42e35bb7d1a50cf610e55cc3cc5fc

                  SHA256

                  8bd149a2277338a15d89770a0ef6b438827b1e06ce83ef76d38e3dd6c565e8a4

                  SHA512

                  55046da9ecc398495b5446fb4b9ecd78249bb3d1cf625632efb96d8b2c9537649e746d1619d7acd923f974287ef5af95dc87c275f298e637fef27c21ff3a621e

                • C:\Users\Admin\AppData\Local\Temp\Prime

                  Filesize

                  98KB

                  MD5

                  c7855b4258f4361ae1cbe4749012581e

                  SHA1

                  0ee68302ff22f89fccfc1b0c4c89152358e9f258

                  SHA256

                  5d614f1473d5ed7f479aaed24b7ad078f8ac3a87f07149d135323e93656e6dc5

                  SHA512

                  c841086047c848a8fe317bd44d760eae282ef0331c46e008dc46eee2f491e4e10875ce4084451a5098c99cab3d29796825f698e7a6e5cf02bb5b6a78759697c4

                • C:\Users\Admin\AppData\Local\Temp\Reality

                  Filesize

                  94KB

                  MD5

                  fb7b06c2b3acac7f0d8b7aee7759d58c

                  SHA1

                  bf555dfa4d07a791a8d2ead731887d89bb55b385

                  SHA256

                  a454ab8a2597cfcad001eaa9e550ab0bacf9e1f5038a426b7d20ddd758d591e5

                  SHA512

                  91564d2cd9bd1a73904005252aa5cab21d423c8f55e49a61e784dab3f411f2790f8a9aafcca5c08e614f9d799d01bb696271137c55023ecab86fc1eb4275df97

                • C:\Users\Admin\AppData\Local\Temp\Reflected

                  Filesize

                  139KB

                  MD5

                  9b7ea3fe63ec1de73474ed9b07b4c1aa

                  SHA1

                  eaacc3517c7882e60e5167f83689e7f86acb83d2

                  SHA256

                  331815719285a87ec4560557e1b8612e38df726b38ec70dac9f18672a8b2675d

                  SHA512

                  a6281625f68231846228c5319b6c1fc5989a5a3c749b32eeeb1cf56fefc3dd3ae93428dc6d050de2746e42689a347cc8148335b91d3d5933ca8e70d8978998aa

                • C:\Users\Admin\AppData\Local\Temp\Relevant

                  Filesize

                  57KB

                  MD5

                  c799d197bbee60db0224c6195c90f32d

                  SHA1

                  ba32b99e740252e84cd9e593cb72c68a182a7027

                  SHA256

                  fca6eb9017998e3a4827d6919a3a27f7f50e51a5cd0267311a16a984fb09bbd0

                  SHA512

                  5e2ef72181ae236e6d01784a31d9f2c65990868c0e4f110355592952a69ef601fd0fb6f65418f1660e56db1f9482ecf19680c90d1e686baa0e2b7b23d54cd4b1

                • C:\Users\Admin\AppData\Local\Temp\Thoroughly

                  Filesize

                  89KB

                  MD5

                  a2b764758f196585f91535183890a3a6

                  SHA1

                  76b8cc90bcb74299bd896a47aef02c3ce9cc58f2

                  SHA256

                  f7c7ac550fe13bd9a0d496e005ec6a1a09dd5975d60ee7ad488d72487a6aca33

                  SHA512

                  6dd10a3178feadbb6803dc10a8f1254d02ccd708b8250b6fee2fbcc18eee90be157e1549538693385a01ee6cf2589dd3451127b2a8385e4462f6d255483288ec

                • C:\Users\Admin\AppData\Local\Temp\W6ck084LEhMqkSo3RL\EducationalDerby.exe

                  Filesize

                  1.3MB

                  MD5

                  49bb7d2f64d7797decdcdc7d0b351048

                  SHA1

                  503c43060038c16d7b68e5a5fbc8990f59ae7aad

                  SHA256

                  4a9a8c46ff96e4f066f51ff7e64b1c459967e0cdeb74b6de02cf1033e31c1c7b

                  SHA512

                  29debc5ed1b88cc7eeb0418cd87f4af2aec9d394d8beb54f04700559088dcfd39e94521b2627ee433ffc940ec4369313184e69dcc005fd6d32ca804be2a40e2e

                • C:\Users\Admin\AppData\Local\Temp\W6ck084LEhMqkSo3RL\StringsGrill.exe

                  Filesize

                  1.6MB

                  MD5

                  8802e10d9b969bd59b7b690ff39b0cc0

                  SHA1

                  7e70b9013793ed8a94132bd8684b41574b7bd719

                  SHA256

                  f2a8840778484a56f1215f0fa8f6e8b0fb805fce99e62c01ff0a1f541f1d6808

                  SHA512

                  c43f847960911753496365e5b2835099f318d2b991b73c836807011344dc3188f86522495c86eea432b983dba10d10aba3696d1a38f28de8ec9ab9aa271d8b0c

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0oymugsf.jaj.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\LICENSE.electron.txt

                  Filesize

                  1KB

                  MD5

                  4d42118d35941e0f664dddbd83f633c5

                  SHA1

                  2b21ec5f20fe961d15f2b58efb1368e66d202e5c

                  SHA256

                  5154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d

                  SHA512

                  3ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\LICENSES.chromium.html

                  Filesize

                  7.9MB

                  MD5

                  312446edf757f7e92aad311f625cef2a

                  SHA1

                  91102d30d5abcfa7b6ec732e3682fb9c77279ba3

                  SHA256

                  c2656201ac86438d062673771e33e44d6d5e97670c3160e0de1cb0bd5fbbae9b

                  SHA512

                  dce01f2448a49a0e6f08bbde6570f76a87dcc81179bb51d5e2642ad033ee81ae3996800363826a65485ab79085572bbace51409ae7102ed1a12df65018676333

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\chrome_100_percent.pak

                  Filesize

                  124KB

                  MD5

                  acd0fa0a90b43cd1c87a55a991b4fac3

                  SHA1

                  17b84e8d24da12501105b87452f86bfa5f9b1b3c

                  SHA256

                  ccbca246b9a93fa8d4f01a01345e7537511c590e4a8efd5777b1596d10923b4b

                  SHA512

                  3e4c4f31c6c7950d5b886f6a8768077331a8f880d70b905cf7f35f74be204c63200ff4a88fa236abccc72ec0fc102c14f50dd277a30f814f35adfe5a7ae3b774

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\chrome_200_percent.pak

                  Filesize

                  173KB

                  MD5

                  4610337e3332b7e65b73a6ea738b47df

                  SHA1

                  8d824c9cf0a84ab902e8069a4de9bf6c1a9aaf3b

                  SHA256

                  c91abf556e55c29d1ea9f560bb17cc3489cb67a5d0c7a22b58485f5f2fbcf25c

                  SHA512

                  039b50284d28dcd447e0a486a099fa99914d29b543093cccda77bbefdd61f7b7f05bb84b2708ae128c5f2d0c0ab19046d08796d1b5a1cff395a0689ab25ccb51

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\d3dcompiler_47.dll

                  Filesize

                  4.7MB

                  MD5

                  2191e768cc2e19009dad20dc999135a3

                  SHA1

                  f49a46ba0e954e657aaed1c9019a53d194272b6a

                  SHA256

                  7353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d

                  SHA512

                  5adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\ffmpeg.dll

                  Filesize

                  2.7MB

                  MD5

                  e096c168b79a56ded0df1aa142d9f1da

                  SHA1

                  318f20dab294a315bd935160e9417fb5b28300f5

                  SHA256

                  65cc75329d17ec264e7a2db571ea55f918394241445ea64569a56c75d0cfdc60

                  SHA512

                  3dccf6ce85ef7e75690a5851642f10bb5e6e1572e91e933bacb7fcbfe405b0412b94ba0e160c3ba8d68d2b9afc1da268f61c83dccd6453d8c9470931ee900bfd

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\icudtl.dat

                  Filesize

                  10.1MB

                  MD5

                  d89ce8c00659d8e5d408c696ee087ce3

                  SHA1

                  49fc8109960be3bb32c06c3d1256cb66dded19a8

                  SHA256

                  9dfbe0dad5c7021cfe8df7f52458c422cbc5be9e16ff33ec90665bb1e3f182de

                  SHA512

                  db097ce3eb9e132d0444df79b167a7dcb2df31effbbd3df72da3d24ae2230cc5213c6df5e575985a9918fbd0a6576e335b6ebc12b6258bc93fa205399de64c37

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\libEGL.dll

                  Filesize

                  470KB

                  MD5

                  1eecfb04c4434f5a813c8f0c0c8f2c88

                  SHA1

                  6dc3ca4b3f72e7fb33ba26fa488de323edb59add

                  SHA256

                  897ceb95fb164640ddd2426673997b5f6fc2619fd916b038b575a70a0682a706

                  SHA512

                  d7818a42a76508ac3150aea8d4e168b2db36f55f71983a177002086380a82e307624cfe37b01ffc3d7eb407485d182654d0d7c6a0c06ccaae60666630469c7e0

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\libGLESv2.dll

                  Filesize

                  7.3MB

                  MD5

                  cba2436016f7a2838588a52d5b6f30f1

                  SHA1

                  81ddf44b3e122dfbee1a2cd8d4544364f1a621a4

                  SHA256

                  bcb3a3d2fca3c33fa3d1d5dc976aa913cdc8001df8e64c2cd3d2c545245141bf

                  SHA512

                  d92a880b5f83c5ae10ae9a83e38a293bb0e8c7659dd6ece162fc752d57c9fcde8036b81b023cd9f0f4f32b95b06fd4c366e20301010354b6cb904398a3149a44

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\af.pak

                  Filesize

                  368KB

                  MD5

                  7e51349edc7e6aed122bfa00970fab80

                  SHA1

                  eb6df68501ecce2090e1af5837b5f15ac3a775eb

                  SHA256

                  f528e698b164283872f76df2233a47d7d41e1aba980ce39f6b078e577fd14c97

                  SHA512

                  69da19053eb95eef7ab2a2d3f52ca765777bdf976e5862e8cebbaa1d1ce84a7743f50695a3e82a296b2f610475abb256844b6b9eb7a23a60b4a9fc4eae40346d

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\am.pak

                  Filesize

                  599KB

                  MD5

                  2009647c3e7aed2c4c6577ee4c546e19

                  SHA1

                  e2bbacf95ec3695daae34835a8095f19a782cbcf

                  SHA256

                  6d61e5189438f3728f082ad6f694060d7ee8e571df71240dfd5b77045a62954e

                  SHA512

                  996474d73191f2d550c516ed7526c9e2828e2853fcfbe87ca69d8b1242eb0dedf04030bbca3e93236bbd967d39de7f9477c73753af263816faf7d4371f363ba3

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\ar.pak

                  Filesize

                  655KB

                  MD5

                  47a6d10b4112509852d4794229c0a03b

                  SHA1

                  2fb49a0b07fbdf8d4ce51a7b5a7f711f47a34951

                  SHA256

                  857fe3ab766b60a8d82b7b6043137e3a7d9f5cfb8ddd942316452838c67d0495

                  SHA512

                  5f5b280261195b8894efae9df2bece41c6c6a72199d65ba633c30d50a579f95fa04916a30db77831f517b22449196d364d6f70d10d6c5b435814184b3bcf1667

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\bg.pak

                  Filesize

                  685KB

                  MD5

                  a19269683a6347e07c55325b9ecc03a4

                  SHA1

                  d42989daf1c11fcfff0978a4fb18f55ec71630ec

                  SHA256

                  ad65351a240205e881ef5c4cf30ad1bc6b6e04414343583597086b62d48d8a24

                  SHA512

                  1660e487df3f3f4ec1cea81c73dca0ab86aaf121252fbd54c7ac091a43d60e1afd08535b082efd7387c12616672e78aa52dddfca01f833abef244284482f2c76

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\bn.pak

                  Filesize

                  883KB

                  MD5

                  5cdd07fa357c846771058c2db67eb13b

                  SHA1

                  deb87fc5c13da03be86f67526c44f144cc65f6f6

                  SHA256

                  01c830b0007b8ce6aca46e26d812947c3df818927b826f7d8c5ffd0008a32384

                  SHA512

                  2ac29a3aa3278bd9a8fe1ba28e87941f719b14fbf8b52e0b7dc9d66603c9c147b9496bf7be4d9e3aa0231c024694ef102dcc094c80c42be5d68d3894c488098c

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\cs.pak

                  Filesize

                  425KB

                  MD5

                  04a680847c4a66ad9f0a88fb9fb1fc7b

                  SHA1

                  2afcdf4234a9644fb128b70182f5a3df1ee05be1

                  SHA256

                  1cc44c5fbe1c0525df37c5b6267a677f79c9671f86eda75b6fc13abf5d5356eb

                  SHA512

                  3a8a409a3c34149a977dea8a4cb0e0822281aed2b0a75b02479c95109d7d51f6fb2c2772ccf1486ca4296a0ac2212094098f5ce6a1265fa6a7eb941c0cfef83e

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\da.pak

                  Filesize

                  386KB

                  MD5

                  1a53d374b9c37f795a462aac7a3f118f

                  SHA1

                  154be9cf05042eced098a20ff52fa174798e1fea

                  SHA256

                  d0c38eb889ee27d81183a0535762d8ef314f0fdeb90ccca9176a0ce9ab09b820

                  SHA512

                  395279c9246bd30a0e45d775d9f9c36353bd11d9463282661c2abd876bdb53be9c9b617bb0c2186592cd154e9353ea39e3feed6b21a07b6850ab8ecd57e1ed29

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\de.pak

                  Filesize

                  414KB

                  MD5

                  8e6654b89ed4c1dc02e1e2d06764805a

                  SHA1

                  ff660bc85bb4a0fa3b2637050d2b2d1aecc37ad8

                  SHA256

                  61cbce9a31858ddf70cc9b0c05fb09ce7032bfb8368a77533521722465c57475

                  SHA512

                  5ac71eda16f07f3f2b939891eda2969c443440350fd88ab3a9b3180b8b1a3ecb11e79e752cf201f21b3dbfba00bcc2e4f796f347e6137a165c081e86d970ee61

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\el.pak

                  Filesize

                  751KB

                  MD5

                  9528d21e8a3f5bad7ca273999012ebe8

                  SHA1

                  58cd673ce472f3f2f961cf8b69b0c8b8c01d457c

                  SHA256

                  e79c1e7a47250d88581e8e3baf78dcaf31fe660b74a1e015be0f4bafdfd63e12

                  SHA512

                  165822c49ce0bdb82f3c3221e6725dac70f53cfdad722407a508fa29605bc669fb5e5070f825f02d830e0487b28925644438305372a366a3d60b55da039633d7

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\en-GB.pak

                  Filesize

                  336KB

                  MD5

                  d59e613e8f17bdafd00e0e31e1520d1f

                  SHA1

                  529017d57c4efed1d768ab52e5a2bc929fdfb97c

                  SHA256

                  90e585f101cf0bb77091a9a9a28812694cee708421ce4908302bbd1bc24ac6fd

                  SHA512

                  29ff3d42e5d0229f3f17bc0ed6576c147d5c61ce2bd9a2e658a222b75d993230de3ce35ca6b06f5afa9ea44cfc67817a30a87f4faf8dc3a5c883b6ee30f87210

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\en-US.pak

                  Filesize

                  338KB

                  MD5

                  5e3813e616a101e4a169b05f40879a62

                  SHA1

                  615e4d94f69625dda81dfaec7f14e9ee320a2884

                  SHA256

                  4d207c5c202c19c4daca3fddb2ae4f747f943a8faf86a947eef580e2f2aee687

                  SHA512

                  764a271a9cfb674cce41ee7aed0ad75f640ce869efd3c865d1b2d046c9638f4e8d9863a386eba098f5dcedd20ea98bad8bca158b68eb4bdd606d683f31227594

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\es-419.pak

                  Filesize

                  411KB

                  MD5

                  7f6696cc1e71f84d9ec24e9dc7bd6345

                  SHA1

                  36c1c44404ee48fc742b79173f2c7699e1e0301f

                  SHA256

                  d1f17508f3a0106848c48a240d49a943130b14bd0feb5ed7ae89605c7b7017d1

                  SHA512

                  b226f94f00978f87b7915004a13cdbd23de2401a8afaa2517498538967df89b735f8ecc46870c92e3022cac795218a60ad2b8fff1efad9feea4ec193704a568a

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\es.pak

                  Filesize

                  411KB

                  MD5

                  a36992d320a88002697da97cd6a4f251

                  SHA1

                  c1f88f391a40ccf2b8a7b5689320c63d6d42935f

                  SHA256

                  c5566b661675b613d69a507cbf98768bc6305b80e6893dc59651a4be4263f39d

                  SHA512

                  9719709229a4e8f63247b3efe004ecfeb5127f5a885234a5f78ee2b368f9e6c44eb68a071e26086e02aa0e61798b7e7b9311d35725d3409ffc0e740f3aa3b9b5

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\et.pak

                  Filesize

                  371KB

                  MD5

                  a94e1775f91ea8622f82ae5ab5ba6765

                  SHA1

                  ff17accdd83ac7fcc630e9141e9114da7de16fdb

                  SHA256

                  1606b94aef97047863481928624214b7e0ec2f1e34ec48a117965b928e009163

                  SHA512

                  a2575d2bd50494310e8ef9c77d6c1749420dfbe17a91d724984df025c47601976af7d971ecae988c99723d53f240e1a6b3b7650a17f3b845e3daeefaaf9fe9b9

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\fa.pak

                  Filesize

                  607KB

                  MD5

                  9d273af70eafd1b5d41f157dbfb94fdc

                  SHA1

                  da98bde34b59976d4514ff518bd977a713ea4f2e

                  SHA256

                  319d1e20150d4e3f496309ba82fce850e91378ee4b0c7119a003a510b14f878b

                  SHA512

                  0a892071bea92cc7f1a914654bc4f9da6b9c08e3cb29bb41e9094f6120ddc7a08a257c0d2b475c98e7cdcf604830e582cf2a538cc184056207f196ffc43f29ad

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\fi.pak

                  Filesize

                  379KB

                  MD5

                  d4b776267efebdcb279162c213f3db22

                  SHA1

                  7236108af9e293c8341c17539aa3f0751000860a

                  SHA256

                  297e3647eaf9b3b95cf833d88239919e371e74cc345a2e48a5033ebe477cd54e

                  SHA512

                  1dc7d966d12e0104aacb300fd4e94a88587a347db35ad2327a046ef833fb354fd9cbe31720b6476db6c01cfcb90b4b98ce3cd995e816210b1438a13006624e8f

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\fil.pak

                  Filesize

                  427KB

                  MD5

                  3165351c55e3408eaa7b661fa9dc8924

                  SHA1

                  181bee2a96d2f43d740b865f7e39a1ba06e2ca2b

                  SHA256

                  2630a9d5912c8ef023154c6a6fb5c56faf610e1e960af66abef533af19b90caa

                  SHA512

                  3b1944ea3cfcbe98d4ce390ea3a8ff1f6730eb8054e282869308efe91a9ddcd118290568c1fc83bd80e8951c4e70a451e984c27b400f2bde8053ea25b9620655

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\fr.pak

                  Filesize

                  444KB

                  MD5

                  0bf28aff31e8887e27c4cd96d3069816

                  SHA1

                  b5313cf6b5fbce7e97e32727a3fae58b0f2f5e97

                  SHA256

                  2e1d413442def9cae2d93612e3fd04f3afaf3dd61e4ed7f86400d320af5500c2

                  SHA512

                  95172b3b1153b31fceb4b53681635a881457723cd1000562463d2f24712267b209b3588c085b89c985476c82d9c27319cb6378619889379da4fae1595cb11992

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\gu.pak

                  Filesize

                  858KB

                  MD5

                  7b5f52f72d3a93f76337d5cf3168ebd1

                  SHA1

                  00d444b5a7f73f566e98abadf867e6bb27433091

                  SHA256

                  798ea5d88a57d1d78fa518bf35c5098cbeb1453d2cb02ef98cd26cf85d927707

                  SHA512

                  10c6f4faab8ccb930228c1d9302472d0752be19af068ec5917249675b40f22ab24c3e29ec3264062826113b966c401046cff70d91e7e05d8aadcc0b4e07fec9b

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\he.pak

                  Filesize

                  531KB

                  MD5

                  6d787dc113adfb6a539674af7d6195db

                  SHA1

                  f966461049d54c61cdd1e48ef1ea0d3330177768

                  SHA256

                  a976fad1cc4eb29709018c5ffcc310793a7ceb2e69c806454717ccae9cbc4d21

                  SHA512

                  6748dad2813fc544b50ddea0481b5ace3eb5055fb2d985ca357403d3b799618d051051b560c4151492928d6d40fce9bb33b167217c020bdcc3ed4cae58f6b676

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\hi.pak

                  Filesize

                  900KB

                  MD5

                  1766a05be4dc634b3321b5b8a142c671

                  SHA1

                  b959bcadc3724ae28b5fe141f3b497f51d1e28cf

                  SHA256

                  0eee8e751b5b0af1e226106beb09477634f9f80774ff30894c0f5a12b925ac35

                  SHA512

                  faec1d6166133674a56b5e38a68f9e235155cc910b5cceb3985981b123cc29eda4cd60b9313ab787ec0a8f73bf715299d9bf068e4d52b766a7ab8808bd146a39

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\hr.pak

                  Filesize

                  413KB

                  MD5

                  8f9498d18d90477ad24ea01a97370b08

                  SHA1

                  3868791b549fc7369ab90cd27684f129ebd628be

                  SHA256

                  846943f77a425f3885689dcf12d62951c5b7646e68eadc533b8b5c2a1373f02e

                  SHA512

                  3c66a84592debe522f26c48b55c04198ad8a16c0dcfa05816825656c76c1c6cccf5767b009f20ecb77d5a589ee44b0a0011ec197fec720168a6c72c71ebf77fd

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\hu.pak

                  Filesize

                  446KB

                  MD5

                  f5e1ca8a14c75c6f62d4bff34e27ddb5

                  SHA1

                  7aba6bff18bdc4c477da603184d74f054805c78f

                  SHA256

                  c0043d9fa0b841da00ec1672d60015804d882d4765a62b6483f2294c3c5b83e0

                  SHA512

                  1050f96f4f79f681b3eaf4012ec0e287c5067b75ba7a2cbe89d9b380c07698099b156a0eb2cbc5b8aa336d2daa98e457b089935b534c4d6636987e7e7e32b169

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\id.pak

                  Filesize

                  365KB

                  MD5

                  7b39423028da71b4e776429bb4f27122

                  SHA1

                  cb052ab5f734d7a74a160594b25f8a71669c38f2

                  SHA256

                  3d95c5819f57a0ad06a118a07e0b5d821032edcf622df9b10a09da9aa974885f

                  SHA512

                  e40679b01ab14b6c8dfdce588f3b47bcaff55dbb1539b343f611b3fcbd1d0e7d8c347a2b928215a629f97e5f68d19c51af775ec27c6f906cac131beae646ce1a

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\it.pak

                  Filesize

                  404KB

                  MD5

                  d58a43068bf847c7cd6284742c2f7823

                  SHA1

                  497389765143fac48af2bd7f9a309bfe65f59ed9

                  SHA256

                  265d8b1bc479ad64fa7a41424c446139205af8029a2469d558813edd10727f9c

                  SHA512

                  547a1581dda28c5c1a0231c736070d8a7b53a085a0ce643a4a1510c63a2d4670ff2632e9823cd25ae2c7cdc87fa65883e0a193853890d4415b38056cb730ab54

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\ja.pak

                  Filesize

                  493KB

                  MD5

                  d10d536bcd183030ba07ff5c61bf5e3a

                  SHA1

                  44dd78dba9f098ac61222eb9647d111ad1608960

                  SHA256

                  2a3d3abc9f80bad52bd6da5769901e7b9e9f052b6a58a7cc95ce16c86a3aa85a

                  SHA512

                  c67aede9ded1100093253e350d6137ab8b2a852bd84b6c82ba1853f792e053cecd0ea0519319498aed5759bedc66d75516a4f2f7a07696a0cef24d5f34ef9dd2

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\kn.pak

                  Filesize

                  988KB

                  MD5

                  c548a5f1fb5753408e44f3f011588594

                  SHA1

                  e064ab403972036dad1b35abe9794e95dbe4cc00

                  SHA256

                  890f50a57b862f482d367713201e1e559ac778fc3a36322d1dfbbef2535dd9cb

                  SHA512

                  6975e4bb1a90e0906cf6266f79da6cc4ae32f72a6141943bcfcf9b33f791e9751a9aafde9ca537f33f6ba8e4d697125fbc2ec4ffd3bc35851f406567dae7e631

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\ko.pak

                  Filesize

                  415KB

                  MD5

                  b4fbff56e4974a7283d564c6fc0365be

                  SHA1

                  de68bd097def66d63d5ff04046f3357b7b0e23ac

                  SHA256

                  8c9acde13edcd40d5b6eb38ad179cc27aa3677252a9cd47990eba38ad42833e5

                  SHA512

                  0698aa058561bb5a8fe565bb0bec21548e246dbb9d38f6010e9b0ad9de0f59bce9e98841033ad3122a163dd321ee4b11ed191277cdcb8e0b455d725593a88aa5

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\lt.pak

                  Filesize

                  446KB

                  MD5

                  980c27fd74cc3560b296fe8e7c77d51f

                  SHA1

                  f581efa1b15261f654588e53e709a2692d8bb8a3

                  SHA256

                  41e0f3619cda3b00abbbf07b9cd64ec7e4785ed4c8a784c928e582c3b6b8b7db

                  SHA512

                  51196f6f633667e849ef20532d57ec81c5f63bab46555cea8fab2963a078acdfa84843eded85c3b30f49ef3ceb8be9e4ef8237e214ef9ecff6373a84d395b407

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\lv.pak

                  Filesize

                  445KB

                  MD5

                  e4f7d9e385cb525e762ece1aa243e818

                  SHA1

                  689d784379bac189742b74cd8700c687feeeded1

                  SHA256

                  523d141e59095da71a41c14aec8fe9ee667ae4b868e0477a46dd18a80b2007ef

                  SHA512

                  e4796134048cd12056d746f6b8f76d9ea743c61fee5993167f607959f11fd3b496429c3e61ed5464551fd1931de4878ab06f23a3788ee34bb56f53db25bcb6df

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\ml.pak

                  Filesize

                  1.0MB

                  MD5

                  8b38c65fc30210c7af9b6fa0424266f4

                  SHA1

                  116413710ffcf94fbfa38cb97a47731e43a306f5

                  SHA256

                  e8df9a74417c5839c531d7ccab63884a80afb731cc62cbbb3fd141779086ac7d

                  SHA512

                  0fd349c644ac1a2e7ed0247e40900d3a9957f5bef1351b872710d02687c934a8e63d3a7585e91f7df78054aeff8f7abd8c93a94fcd20c799779a64278bab2097

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\mr.pak

                  Filesize

                  843KB

                  MD5

                  c0ef1866167d926fb351e9f9bf13f067

                  SHA1

                  6092d04ef3ce62be44c29da5d0d3a04985e2bc04

                  SHA256

                  88df231cf2e506db3453f90a797194662a5f85e23bbac2ed3169d91a145d2091

                  SHA512

                  9e2b90f3ac1ae5744c22c2442fbcd86a8496afc2c58f6ca060d6dbb08af6f7411ef910a7c8ca5aedee99b5443d4dff709c7935e8322cb32f8b071ee59caee733

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\ms.pak

                  Filesize

                  381KB

                  MD5

                  9b3e2f3c49897228d51a324ab625eb45

                  SHA1

                  8f3daec46e9a99c3b33e3d0e56c03402ccc52b9d

                  SHA256

                  61a3daae72558662851b49175c402e9fe6fd1b279e7b9028e49506d9444855c5

                  SHA512

                  409681829a861cd4e53069d54c80315e0c8b97e5db4cd74985d06238be434a0f0c387392e3f80916164898af247d17e8747c6538f08c0ef1c5e92a7d1b14f539

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\nb.pak

                  Filesize

                  374KB

                  MD5

                  af0fd9179417ba1d7fcca3cc5bee1532

                  SHA1

                  f746077bbf6a73c6de272d5855d4f1ca5c3af086

                  SHA256

                  e900f6d0dd9d5a05b5297618f1fe1600c189313da931a9cb390ee42383eb070f

                  SHA512

                  c94791d6b84200b302073b09357abd2a1d7576b068bae01dccda7bc154a6487145c83c9133848ccf4cb9e6dc6c5a9d4be9d818e5a0c8f440a4e04ae8eabd4a29

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\nl.pak

                  Filesize

                  385KB

                  MD5

                  181d2a0ece4b67281d9d2323e9b9824d

                  SHA1

                  e8bdc53757e96c12f3cd256c7812532dd524a0ea

                  SHA256

                  6629e68c457806621ed23aa53b3675336c3e643f911f8485118a412ef9ed14ce

                  SHA512

                  10d8cc9411ca475c9b659a2cc88d365e811217d957c82d9c144d94843bc7c7a254ee2451a6f485e92385a660fa01577cffa0d64b6e9e658a87bef8fccbbeaf7e

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\pl.pak

                  Filesize

                  429KB

                  MD5

                  18d49d5376237bb8a25413b55751a833

                  SHA1

                  0b47a7381de61742ac2184850822c5fa2afa559e

                  SHA256

                  1729aa5c8a7e24a0db98febcc91df8b7b5c16f9b6bb13a2b0795038f2a14b981

                  SHA512

                  45344a533cc35c8ce05cf29b11da6c0f97d8854dae46cf45ef7d090558ef95c3bd5fdc284d9a7809f0b2bf30985002be2aa6a4749c0d9ae9bdff4ad13de4e570

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\pt-BR.pak

                  Filesize

                  405KB

                  MD5

                  0d9dea9e24645c2a3f58e4511c564a36

                  SHA1

                  dcd2620a1935c667737eea46ca7bb2bdcb31f3a6

                  SHA256

                  ca7b880391fcd319e976fcc9b5780ea71de655492c4a52448c51ab2170eeef3b

                  SHA512

                  8fcf871f8be7727e2368df74c05ca927c5f0bc3484c4934f83c0abc98ecaf774ad7aba56e1bf17c92b1076c0b8eb9c076cc949cd5427efcade9ddf14f6b56bc5

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\pt-PT.pak

                  Filesize

                  407KB

                  MD5

                  6a7232f316358d8376a1667426782796

                  SHA1

                  8b70fe0f3ab2d73428f19ecd376c5deba4a0bb6c

                  SHA256

                  6a526cd5268b80df24104a7f40f55e4f1068185febbbb5876ba2cb7f78410f84

                  SHA512

                  40d24b3d01e20ae150083b00bb6e10bca81737c48219bce22fa88faaad85bdc8c56ac9b1eb01854173b0ed792e34bdfbac26d3605b6a35c14cf2824c000d0da1

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\ro.pak

                  Filesize

                  420KB

                  MD5

                  99eaa3d101354088379771fd85159de1

                  SHA1

                  a32db810115d6dcf83a887e71d5b061b5eefe41f

                  SHA256

                  33f4c20f7910bc3e636bc3bec78f4807685153242dd4bc77648049772cf47423

                  SHA512

                  c6f87da1b5c156aa206dc21a9da3132cbfb0e12e10da7dc3b60363089de9e0124bbad00a233e61325348223fc5953d4f23e46fe47ec8e7ca07702ac73f3fd2e9

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\ru.pak

                  Filesize

                  687KB

                  MD5

                  ab9902025dcf7d5408bf6377b046272b

                  SHA1

                  c9496e5af3e2a43377290a4883c0555e27b1f10f

                  SHA256

                  983b15dcc31d0e9a3da78cd6021e5add2a3c2247322aded9454a5d148d127aae

                  SHA512

                  d255d5f5b6b09af2cdec7b9c171eebb1de1094cc5b4ddf43a3d4310f8f5f223ac48b8da97a07764d1b44f1d4a14fe3a0c92a0ce6fe9a4ae9a6b4a342e038f842

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\sk.pak

                  Filesize

                  432KB

                  MD5

                  c6c7396dbfb989f034d50bd053503366

                  SHA1

                  089f176b88235cce5bca7abfcc78254e93296d61

                  SHA256

                  439f7d6c23217c965179898754edcef8fd1248bdd9b436703bf1ff710701117a

                  SHA512

                  1476963f47b45d2d26536706b7eeba34cfae124a3087f7727c4efe0f19610f94393012cda462060b1a654827e41f463d7226afa977654dcd85b27b7f8d1528eb

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\sl.pak

                  Filesize

                  417KB

                  MD5

                  d4bd9f20fd29519d6b017067e659442c

                  SHA1

                  782283b65102de4a0a61b901dea4e52ab6998f22

                  SHA256

                  f33afa6b8df235b09b84377fc3c90403c159c87edd8cd8004b7f6edd65c85ce6

                  SHA512

                  adf8d8ec17e8b05771f47b19e8027f88237ad61bca42995f424c1f5bd6efa92b23c69d363264714c1550b9cd0d03f66a7cfb792c3fbf9d5c173175b0a8c039dc

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\sr.pak

                  Filesize

                  644KB

                  MD5

                  cbb817a58999d754f99582b72e1ae491

                  SHA1

                  6ec3fd06dee0b1fe5002cb0a4fe8ec533a51f9fd

                  SHA256

                  4bd7e466cb5f5b0a451e1192aa1abaaf9526855a86d655f94c9ce2183ec80c25

                  SHA512

                  efef29cedb7b08d37f9df1705d36613f423e994a041b137d5c94d2555319ffb068bb311884c9d4269b0066746dacd508a7d01df40a8561590461d5f02cb52f8b

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\sv.pak

                  Filesize

                  376KB

                  MD5

                  502e4a8b3301253abe27c4fd790fbe90

                  SHA1

                  17abcd7a84da5f01d12697e0dffc753ffb49991a

                  SHA256

                  7d72e3adb35e13ec90f2f4271ad2a9b817a2734da423d972517f3cff299165fd

                  SHA512

                  bd270abaf9344c96b0f63fc8cec04f0d0ac9fc343ab5a80f5b47e4b13b8b1c0c4b68f19550573a1d965bb18a27edf29f5dd592944d754b80ea9684dbcedea822

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\sw.pak

                  Filesize

                  394KB

                  MD5

                  39277ae2d91fdc1bd38bea892b388485

                  SHA1

                  ff787fb0156c40478d778b2a6856ad7b469bd7cb

                  SHA256

                  6d6d095a1b39c38c273be35cd09eb1914bd3a53f05180a3b3eb41a81ae31d5d3

                  SHA512

                  be2d8fbedaa957f0c0823e7beb80de570edd0b8e7599cf8f2991dc671bdcbbbe618c15b36705d83be7b6e9a0d32ec00f519fc8543b548422ca8dcf07c0548ab4

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\ta.pak

                  Filesize

                  1019KB

                  MD5

                  7006691481966109cce413f48a349ff2

                  SHA1

                  6bd243d753cf66074359abe28cfae75bcedd2d23

                  SHA256

                  24ea4028da66a293a43d27102012235198f42a1e271fe568c7fd78490a3ee647

                  SHA512

                  e12c0d1792a28bf4885e77185c2a0c5386438f142275b8f77317eb8a5cee994b3241bb264d9502d60bfbce9cf8b3b9f605c798d67819259f501719d054083bea

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\te.pak

                  Filesize

                  942KB

                  MD5

                  f809bf5184935c74c8e7086d34ea306c

                  SHA1

                  709ab3decff033cf2fa433ecc5892a7ac2e3752e

                  SHA256

                  9bbfa7a9f2116281bf0af1e8ffb279d1aa97ac3ed9ebc80c3ade19e922d7e2d4

                  SHA512

                  de4b14dd6018fdbdf5033abda4da2cb9f5fcf26493788e35d88c07a538b84fdd663ee20255dfd9c1aac201f0cce846050d2925c55bf42d4029cb78b057930acd

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\th.pak

                  Filesize

                  792KB

                  MD5

                  2c41616dfe7fcdb4913cfafe5d097f95

                  SHA1

                  cf7d9e8ad3aa47d683e47f116528c0e4a9a159b0

                  SHA256

                  f11041c48831c93aa11bbf885d330739a33a42db211daccf80192668e2186ed3

                  SHA512

                  97329717e11bc63456c56022a7b7f5da730da133e3fc7b2cc660d63a955b1a639c556b857c039a004f92e5f35be61bf33c035155be0a361e3cd6d87b549df811

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\tr.pak

                  Filesize

                  401KB

                  MD5

                  3a858619502c68d5f7de599060f96db9

                  SHA1

                  80a66d9b5f1e04cda19493ffc4a2f070200e0b62

                  SHA256

                  d81f28f69da0036f9d77242b2a58b4a76f0d5c54b3e26ee96872ac54d7abb841

                  SHA512

                  39a7ec0dfe62bcb3f69ce40100e952517b5123f70c70b77b4c9be3d98296772f10d3083276bc43e1db66ed4d9bfa385a458e829ca2a7d570825d7a69e8fbb5f4

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\uk.pak

                  Filesize

                  688KB

                  MD5

                  ee70e9f3557b9c8c67bfb8dfcb51384d

                  SHA1

                  fc4dfc35cde1a00f97eefe5e0a2b9b9c0149751e

                  SHA256

                  54324671a161f6d67c790bfd29349db2e2d21f5012dc97e891f8f5268bdf7e22

                  SHA512

                  f4e1da71cb0485851e8ebcd5d5cf971961737ad238353453db938b4a82a68a6bbaf3de7553f0ff1f915a0e6640a3e54f5368d9154b0a4ad38e439f5808c05b9f

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\ur.pak

                  Filesize

                  602KB

                  MD5

                  ff0a23974aef88afc86ecc806dbf1d60

                  SHA1

                  e7bae97cbb8692a0d106644dfaa9b7d7ea6fcef0

                  SHA256

                  f245ab242aafeef37db736c780476534fad0706aa66dcb8b6b8cd181b4778385

                  SHA512

                  aabe8160fac7e0eb8e8eb80963fe995fa4a802147d1b8f605bc0fe3f8e2474463c1d313471c11c85eb5578112232fdc8e89b8a6d43dbe38a328538ff30a78d08

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\vi.pak

                  Filesize

                  476KB

                  MD5

                  3fe6f90f1f990aed508deda3810ce8c2

                  SHA1

                  3b86f00666d55e984b4aca1a5e8319ffa8f411ff

                  SHA256

                  5eebb23221aebcf0be01bfc2695f7dd35b17f6769be1e28e5610d35c9717854b

                  SHA512

                  9aa9d55f112c8b32aa636086cfd2161d97ea313cac1a44101014128124a03504c992ac8efd265aba4e91787aef7134a14507a600f5ec96ff82df950a8883828c

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\zh-CN.pak

                  Filesize

                  345KB

                  MD5

                  20f315d38e3b2edc5832931e7770b62a

                  SHA1

                  2390bd585dec1e884873454bb98b6f1467dcf7bb

                  SHA256

                  53a803724bbf2e7f40aab860325c348f786eeca1ea5ca39a76b4c4a616e3233f

                  SHA512

                  c338e241de3561707c7c275b7d6e0fb16185a8cd7112057c08b74ffce122148ef693fe310c839ff93f102726a78e61de3e68c8e324f445a07a98ee9c4fdd4e13

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\locales\zh-TW.pak

                  Filesize

                  341KB

                  MD5

                  524711882cbfb5b95a63ef48f884cff0

                  SHA1

                  1078037687cfc5d038eeb8b63d295239e0edc47a

                  SHA256

                  9e16499cd96a155d410c8df4c812c52ff2a750f8c4db87fd891c1e58c1428c78

                  SHA512

                  16d45a81f7f4606eda9d12a8b1da06e3c866b11bdc0c92a4022bfb8d02b885d8f028457cf23e3f7589dfd191ed7f7fbc68c81b6e1411834edfcbc9cc85e0dc4d

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\resources.pak

                  Filesize

                  5.0MB

                  MD5

                  7d5065ecba284ed704040fca1c821922

                  SHA1

                  095fcc890154a52ad1998b4b1e318f99b3e5d6b8

                  SHA256

                  a10c3d236246e001cb9d434a65fc3e8aa7acddddd9608008db5c5c73dee0ba1f

                  SHA512

                  521b2266e3257adaa775014f77b0d512ff91b087c2572359d68ffe633b57a423227e3d5af8ee4494538f1d09aa45ffa1fe8e979814178512c37f7088ddd7995d

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\resources\app.asar

                  Filesize

                  8.6MB

                  MD5

                  e7221b017b85b8056a8d9c2d8ce62920

                  SHA1

                  d0c85c90eebc5875aa6269ebc9611b1d1d09b01d

                  SHA256

                  996386972125a6d4a0bc02f2da984954d84035f33bbd25bbcf054eddfb92aa9f

                  SHA512

                  ba7397e24d49da390d0db5c14233e3407327d5fd6e397db7f6db8c9c543211059c2d0aa43558d5633c8aa4bb3a9169c1593eac44bf4791df14809c28e26dbe9d

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\resources\elevate.exe

                  Filesize

                  105KB

                  MD5

                  792b92c8ad13c46f27c7ced0810694df

                  SHA1

                  d8d449b92de20a57df722df46435ba4553ecc802

                  SHA256

                  9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37

                  SHA512

                  6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\snapshot_blob.bin

                  Filesize

                  266KB

                  MD5

                  8915dd2a6d6b4ebf9a16c77fe063d8de

                  SHA1

                  a03132adcb99a82ba269d56ab6577ccfd1bb08e5

                  SHA256

                  c1802b29b13663a8890031411270866834246931f71f41397682dd88fa16d485

                  SHA512

                  abd93cdd634ad4d38b7e3714b183335cddb9e3ad14660247cc7285066c95342ac8595d68cd0868b8512e73bb656ab54386045533f998576b2cd6501bf456cd2c

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\v8_context_snapshot.bin

                  Filesize

                  574KB

                  MD5

                  4cd37ea771ea4fe2f3ad46217cc02206

                  SHA1

                  31680e26869b007e62550e96dbf846b3980d5b2b

                  SHA256

                  95f7b8664306da8d0073a795e86590ed6fdaede5f489132e56c8779f53cf1ed5

                  SHA512

                  e1369734cbe17aaf6dd3ceefb57f056c5a9346d2887a7d3ee7ed177386d7f5e624407869d53902b56ab350e4ded5612c3b0f52c2dd3efa307e9947701068a2a0

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\vk_swiftshader.dll

                  Filesize

                  5.1MB

                  MD5

                  524b0d85d992f86a7f26c162f3dbb91c

                  SHA1

                  bc9c862fd01f6134a0514dcb63f9fab7a61ce269

                  SHA256

                  5b2ffb78fa963f2dea5a7fcf7676fc3aba243c4372d7528c8f1fc8f726d0a3fa

                  SHA512

                  422a18af294d7551224e05f5f4f5dcfa51b3455c2e61fc285fd2b95b50274eb77ff317647e17b0e7d47459b4fed19c7c88c90e0878f2269a78d598b1196401d8

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\vk_swiftshader_icd.json

                  Filesize

                  106B

                  MD5

                  8642dd3a87e2de6e991fae08458e302b

                  SHA1

                  9c06735c31cec00600fd763a92f8112d085bd12a

                  SHA256

                  32d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9

                  SHA512

                  f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\7z-out\vulkan-1.dll

                  Filesize

                  906KB

                  MD5

                  6d4adf9a48dbce2e480ef10b1338ca3c

                  SHA1

                  ceb77d5768c6eda84ec8e0b43821b8027764de81

                  SHA256

                  4cca7e6c05b2d988926e4b4d0c8ff91d6356f18de8bf40b440251180e5cad6a7

                  SHA512

                  106db7309b40afabb1cca911b204c83129683dc116aec198568c4228c581bf0de5963bffc0b50df8f43ec355264f271fc383f4155be45350c0d7dd429c7f7f09

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\StdUtils.dll

                  Filesize

                  100KB

                  MD5

                  c6a6e03f77c313b267498515488c5740

                  SHA1

                  3d49fc2784b9450962ed6b82b46e9c3c957d7c15

                  SHA256

                  b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

                  SHA512

                  9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\System.dll

                  Filesize

                  12KB

                  MD5

                  0d7ad4f45dc6f5aa87f606d0331c6901

                  SHA1

                  48df0911f0484cbe2a8cdd5362140b63c41ee457

                  SHA256

                  3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

                  SHA512

                  c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

                • C:\Users\Admin\AppData\Local\Temp\nsa6D13.tmp\nsis7z.dll

                  Filesize

                  424KB

                  MD5

                  80e44ce4895304c6a3a831310fbf8cd0

                  SHA1

                  36bd49ae21c460be5753a904b4501f1abca53508

                  SHA256

                  b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592

                  SHA512

                  c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

                • memory/792-831-0x00000000053D0000-0x0000000005420000-memory.dmp

                  Filesize

                  320KB

                • memory/792-826-0x0000000000C10000-0x0000000000CD6000-memory.dmp

                  Filesize

                  792KB

                • memory/792-841-0x0000000007C30000-0x0000000007C3A000-memory.dmp

                  Filesize

                  40KB

                • memory/792-835-0x0000000006110000-0x0000000006176000-memory.dmp

                  Filesize

                  408KB

                • memory/792-834-0x0000000006040000-0x000000000605E000-memory.dmp

                  Filesize

                  120KB

                • memory/792-833-0x00000000063F0000-0x000000000691C000-memory.dmp

                  Filesize

                  5.2MB

                • memory/792-832-0x0000000005230000-0x000000000523A000-memory.dmp

                  Filesize

                  40KB

                • memory/792-830-0x00000000052E0000-0x0000000005356000-memory.dmp

                  Filesize

                  472KB

                • memory/792-829-0x00000000055A0000-0x0000000005762000-memory.dmp

                  Filesize

                  1.8MB

                • memory/792-828-0x0000000005810000-0x0000000005DB6000-memory.dmp

                  Filesize

                  5.6MB

                • memory/792-827-0x0000000005190000-0x0000000005222000-memory.dmp

                  Filesize

                  584KB

                • memory/1156-418-0x000001CCF1400000-0x000001CCF1422000-memory.dmp

                  Filesize

                  136KB

                • memory/2288-824-0x0000000004D70000-0x0000000004DC6000-memory.dmp

                  Filesize

                  344KB

                • memory/2288-823-0x0000000004D70000-0x0000000004DC6000-memory.dmp

                  Filesize

                  344KB

                • memory/2288-825-0x0000000004D70000-0x0000000004DC6000-memory.dmp

                  Filesize

                  344KB

                • memory/2288-820-0x0000000004D70000-0x0000000004DC6000-memory.dmp

                  Filesize

                  344KB

                • memory/2288-821-0x0000000004D70000-0x0000000004DC6000-memory.dmp

                  Filesize

                  344KB

                • memory/2288-822-0x0000000004D70000-0x0000000004DC6000-memory.dmp

                  Filesize

                  344KB

                • memory/3412-855-0x0000000005A30000-0x0000000005CBB000-memory.dmp

                  Filesize

                  2.5MB

                • memory/3412-843-0x0000000005A30000-0x0000000005CBB000-memory.dmp

                  Filesize

                  2.5MB

                • memory/3412-856-0x0000000005A30000-0x0000000005CBB000-memory.dmp

                  Filesize

                  2.5MB

                • memory/3412-848-0x0000000005A30000-0x0000000005CBB000-memory.dmp

                  Filesize

                  2.5MB

                • memory/3412-847-0x0000000005A30000-0x0000000005CBB000-memory.dmp

                  Filesize

                  2.5MB

                • memory/3412-846-0x0000000005A30000-0x0000000005CBB000-memory.dmp

                  Filesize

                  2.5MB

                • memory/3412-845-0x0000000005A30000-0x0000000005CBB000-memory.dmp

                  Filesize

                  2.5MB

                • memory/3412-844-0x0000000005A30000-0x0000000005CBB000-memory.dmp

                  Filesize

                  2.5MB

                • memory/3472-398-0x0000011D3CAE0000-0x0000011D3CAE1000-memory.dmp

                  Filesize

                  4KB

                • memory/3472-405-0x0000011D3CAE0000-0x0000011D3CAE1000-memory.dmp

                  Filesize

                  4KB

                • memory/3472-400-0x0000011D3CAE0000-0x0000011D3CAE1000-memory.dmp

                  Filesize

                  4KB

                • memory/3472-399-0x0000011D3CAE0000-0x0000011D3CAE1000-memory.dmp

                  Filesize

                  4KB

                • memory/3472-404-0x0000011D3CAE0000-0x0000011D3CAE1000-memory.dmp

                  Filesize

                  4KB

                • memory/3472-410-0x0000011D3CAE0000-0x0000011D3CAE1000-memory.dmp

                  Filesize

                  4KB

                • memory/3472-409-0x0000011D3CAE0000-0x0000011D3CAE1000-memory.dmp

                  Filesize

                  4KB

                • memory/3472-408-0x0000011D3CAE0000-0x0000011D3CAE1000-memory.dmp

                  Filesize

                  4KB

                • memory/3472-407-0x0000011D3CAE0000-0x0000011D3CAE1000-memory.dmp

                  Filesize

                  4KB

                • memory/3472-406-0x0000011D3CAE0000-0x0000011D3CAE1000-memory.dmp

                  Filesize

                  4KB

                • memory/4456-442-0x00000185EF8B0000-0x00000185EF926000-memory.dmp

                  Filesize

                  472KB

                • memory/4456-441-0x00000185EF450000-0x00000185EF494000-memory.dmp

                  Filesize

                  272KB

                • memory/4456-446-0x00000185EF4A0000-0x00000185EF4C4000-memory.dmp

                  Filesize

                  144KB

                • memory/4456-445-0x00000185EF4A0000-0x00000185EF4CA000-memory.dmp

                  Filesize

                  168KB