Malware Analysis Report

2025-08-05 23:33

Sample ID 250119-x825aasqer
Target APMENU.exe
SHA256 7d850c84bec767b95fa63a62bde484dceb7c87727d17af20176abc4fc3ab67ea
Tags
discovery spyware stealer
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

7d850c84bec767b95fa63a62bde484dceb7c87727d17af20176abc4fc3ab67ea

Threat Level: Shows suspicious behavior

The file APMENU.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery spyware stealer

Loads dropped DLL

Reads user/profile data of web browsers

Checks computer location settings

Executes dropped EXE

Legitimate hosting services abused for malware hosting/C2

Enumerates processes with tasklist

An obfuscated cmd.exe command-line is typically used to evade detection.

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-01-19 19:34

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-01-19 19:32

Reported

2025-01-19 19:35

Platform

win10ltsc2021-20250113-en

Max time kernel

19s

Max time network

24s

Command Line

"C:\Users\Admin\AppData\Local\Temp\APMENU.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1581648047-808845429-2272123689-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe N/A

Reads user/profile data of web browsers

spyware stealer

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A raw.githubusercontent.com N/A N/A
N/A discord.com N/A N/A
N/A raw.githubusercontent.com N/A N/A
N/A discord.com N/A N/A

An obfuscated cmd.exe command-line is typically used to evade detection.

Description Indicator Process Target
N/A N/A C:\Windows\system32\cmd.exe N/A
N/A N/A C:\Windows\system32\cmd.exe N/A

Enumerates processes with tasklist

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\tasklist.exe N/A
N/A N/A C:\Windows\system32\tasklist.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\APMENU.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\APMENU.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 324 wrote to memory of 3644 N/A C:\Users\Admin\AppData\Local\Temp\APMENU.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 324 wrote to memory of 3644 N/A C:\Users\Admin\AppData\Local\Temp\APMENU.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 1848 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Windows\system32\cmd.exe
PID 3644 wrote to memory of 1848 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Windows\system32\cmd.exe
PID 1848 wrote to memory of 1732 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\tasklist.exe
PID 1848 wrote to memory of 1732 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\tasklist.exe
PID 3644 wrote to memory of 4684 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Windows\system32\cmd.exe
PID 3644 wrote to memory of 4684 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Windows\system32\cmd.exe
PID 3644 wrote to memory of 4356 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Windows\system32\cmd.exe
PID 3644 wrote to memory of 4356 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Windows\system32\cmd.exe
PID 4684 wrote to memory of 4380 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\tasklist.exe
PID 4684 wrote to memory of 4380 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\tasklist.exe
PID 4356 wrote to memory of 1816 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4356 wrote to memory of 1816 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3644 wrote to memory of 2476 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Windows\system32\cmd.exe
PID 3644 wrote to memory of 2476 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Windows\system32\cmd.exe
PID 2476 wrote to memory of 1300 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2476 wrote to memory of 1300 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 704 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 4192 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe
PID 3644 wrote to memory of 4192 N/A C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe

Processes

C:\Users\Admin\AppData\Local\Temp\APMENU.exe

"C:\Users\Admin\AppData\Local\Temp\APMENU.exe"

C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe

C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,205,149,180,240,131,251,204,73,150,131,206,78,153,66,196,159,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,138,98,23,74,51,199,165,145,174,142,235,31,152,174,120,37,56,27,159,216,33,222,59,85,89,99,89,247,53,101,57,188,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,48,255,241,4,138,153,185,227,161,156,186,11,184,220,178,199,48,80,94,247,200,125,175,216,251,134,20,131,41,198,73,24,48,0,0,0,48,95,165,149,32,188,238,254,24,59,144,194,159,56,72,51,25,41,72,91,18,35,70,88,111,155,124,251,74,196,226,184,31,167,23,241,38,209,235,206,179,146,103,111,195,43,163,132,64,0,0,0,118,159,203,243,72,17,244,115,44,12,65,212,158,148,120,46,165,30,32,94,226,85,141,136,204,85,113,139,244,193,49,46,177,96,64,217,177,74,214,85,75,62,164,28,117,133,25,17,1,57,34,130,213,6,153,192,124,164,185,243,113,255,253,170), $null, 'CurrentUser')"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,205,149,180,240,131,251,204,73,150,131,206,78,153,66,196,159,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,138,98,23,74,51,199,165,145,174,142,235,31,152,174,120,37,56,27,159,216,33,222,59,85,89,99,89,247,53,101,57,188,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,48,255,241,4,138,153,185,227,161,156,186,11,184,220,178,199,48,80,94,247,200,125,175,216,251,134,20,131,41,198,73,24,48,0,0,0,48,95,165,149,32,188,238,254,24,59,144,194,159,56,72,51,25,41,72,91,18,35,70,88,111,155,124,251,74,196,226,184,31,167,23,241,38,209,235,206,179,146,103,111,195,43,163,132,64,0,0,0,118,159,203,243,72,17,244,115,44,12,65,212,158,148,120,46,165,30,32,94,226,85,141,136,204,85,113,139,244,193,49,46,177,96,64,217,177,74,214,85,75,62,164,28,117,133,25,17,1,57,34,130,213,6,153,192,124,164,185,243,113,255,253,170), $null, 'CurrentUser')

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,205,149,180,240,131,251,204,73,150,131,206,78,153,66,196,159,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,39,212,44,42,206,43,170,118,109,169,59,135,25,38,34,193,70,61,104,225,12,62,61,80,125,170,78,164,244,85,8,197,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,150,145,255,26,200,122,18,78,216,181,136,65,97,53,31,137,74,132,70,125,1,198,85,215,254,162,209,144,56,98,56,7,48,0,0,0,179,33,201,138,10,60,17,149,14,166,92,246,219,216,112,179,229,150,143,253,157,183,87,82,71,186,73,97,207,108,165,75,151,244,95,15,152,183,218,31,35,242,115,146,44,11,246,202,64,0,0,0,222,30,228,3,185,60,128,91,209,41,134,50,86,126,237,71,212,91,56,164,42,245,215,136,23,61,96,79,248,133,204,35,227,2,72,213,32,170,242,13,90,164,216,220,130,136,218,131,9,6,24,247,0,154,37,155,251,38,224,126,224,239,68,118), $null, 'CurrentUser')"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,205,149,180,240,131,251,204,73,150,131,206,78,153,66,196,159,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,39,212,44,42,206,43,170,118,109,169,59,135,25,38,34,193,70,61,104,225,12,62,61,80,125,170,78,164,244,85,8,197,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,150,145,255,26,200,122,18,78,216,181,136,65,97,53,31,137,74,132,70,125,1,198,85,215,254,162,209,144,56,98,56,7,48,0,0,0,179,33,201,138,10,60,17,149,14,166,92,246,219,216,112,179,229,150,143,253,157,183,87,82,71,186,73,97,207,108,165,75,151,244,95,15,152,183,218,31,35,242,115,146,44,11,246,202,64,0,0,0,222,30,228,3,185,60,128,91,209,41,134,50,86,126,237,71,212,91,56,164,42,245,215,136,23,61,96,79,248,133,204,35,227,2,72,213,32,170,242,13,90,164,216,220,130,136,218,131,9,6,24,247,0,154,37,155,251,38,224,126,224,239,68,118), $null, 'CurrentUser')

C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe

"C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\buil" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 --field-trial-handle=1968,i,3180320659955161910,10680844176780547317,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe

"C:\Users\Admin\AppData\Local\Temp\2Ycuvd0RRrDsah5WTCnWq4EVRBZ\buil.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\buil" --mojo-platform-channel-handle=2204 --field-trial-handle=1968,i,3180320659955161910,10680844176780547317,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 167.173.78.104.in-addr.arpa udp
US 8.8.8.8:53 raw.githubusercontent.com udp
US 8.8.8.8:53 discord.com udp
US 8.8.8.8:53 api.gofile.io udp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 162.159.135.232:443 discord.com tcp
FR 51.91.7.6:443 api.gofile.io tcp
FR 51.91.7.6:443 api.gofile.io tcp
FR 51.91.7.6:443 api.gofile.io tcp
US 8.8.8.8:53 232.135.159.162.in-addr.arpa udp
US 8.8.8.8:53 6.7.91.51.in-addr.arpa udp
US 8.8.8.8:53 133.108.199.185.in-addr.arpa udp
US 8.8.8.8:53 dns.google udp
US 8.8.8.8:53 dns.google udp
US 8.8.4.4:443 dns.google tcp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\System.dll

MD5 0d7ad4f45dc6f5aa87f606d0331c6901
SHA1 48df0911f0484cbe2a8cdd5362140b63c41ee457
SHA256 3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512 c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\nsis7z.dll

MD5 80e44ce4895304c6a3a831310fbf8cd0
SHA1 36bd49ae21c460be5753a904b4501f1abca53508
SHA256 b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
SHA512 c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\chrome_100_percent.pak

MD5 8626e1d68e87f86c5b4dabdf66591913
SHA1 4cd7b0ac0d3f72587708064a7b0a3beca3f7b81c
SHA256 2caa1da9b6a6e87bdb673977fee5dd771591a1b6ed5d3c5f14b024130a5d1a59
SHA512 03bcd8562482009060f249d6a0dd7382fc94d669a2094dec08e8d119be51bef2c3b7b484bb5b7f805ae98e372dab9383a2c11a63ab0f5644146556b1bb9a4c99

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\chrome_200_percent.pak

MD5 48515d600258d60019c6b9c6421f79f6
SHA1 0ef0b44641d38327a360aa6954b3b6e5aab2af16
SHA256 07bee34e189fe9a8789aed78ea59ad41414b6e611e7d74da62f8e6ca36af01ce
SHA512 b7266bc8abc55bd389f594dac0c0641ecf07703f35d769b87e731b5fdf4353316d44f3782a4329b3f0e260dead6b114426ddb1b0fb8cd4a51e0b90635f1191d9

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\d3dcompiler_47.dll

MD5 cb9807f6cf55ad799e920b7e0f97df99
SHA1 bb76012ded5acd103adad49436612d073d159b29
SHA256 5653bc7b0e2701561464ef36602ff6171c96bffe96e4c3597359cd7addcba88a
SHA512 f7c65bae4ede13616330ae46a197ebad106920dce6a31fd5a658da29ed1473234ca9e2b39cc9833ff903fb6b52ff19e39e6397fac02f005823ed366ca7a34f62

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\ffmpeg.dll

MD5 d49e7a8f096ad4722bd0f6963e0efc08
SHA1 6835f12391023c0c7e3c8cc37b0496e3a93a5985
SHA256 f11576bf7ffbc3669d1a5364378f35a1ed0811b7831528b6c4c55b0cdc7dc014
SHA512 ca50c28d6aac75f749ed62eec8acbb53317f6bdcef8794759af3fad861446de5b7fa31622ce67a347949abb1098eccb32689b4f1c54458a125bc46574ad51575

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\libEGL.dll

MD5 09134e6b407083baaedf9a8c0bce68f2
SHA1 8847344cceeab35c1cdf8637af9bd59671b4e97d
SHA256 d2107ba0f4e28e35b22837c3982e53784d15348795b399ad6292d0f727986577
SHA512 6ff3adcb8be48d0b505a3c44e6550d30a8feaf4aa108982a7992ed1820c06f49e0ad48d9bd92685fb82783dfd643629bd1fe4073300b61346b63320cbdb051ba

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\icudtl.dat

MD5 adfd2a259608207f256aeadb48635645
SHA1 300bb0ae3d6b6514fb144788643d260b602ac6a4
SHA256 7c8c7b05d70145120b45ccb64bf75bee3c63ff213e3e64d092d500a96afb8050
SHA512 8397e74c7a85b0a2987cae9f2c66ce446923aa4140686d91a1e92b701e16b73a6ce459540e718858607ecb12659bedac0aa95c2713c811a2bc2d402691ff29dc

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\libGLESv2.dll

MD5 a5f1921e6dcde9eaf42e2ccc82b3d353
SHA1 1f6f4df99ae475acec4a7d3910badb26c15919d1
SHA256 50c4dc73d69b6c0189eab56d27470ee15f99bbbc12bfd87ebe9963a7f9ba404e
SHA512 0c24ae7d75404adf8682868d0ebf05f02bbf603f7ddd177cf2af5726802d0a5afcf539dc5d68e10dab3fcfba58903871c9c81054560cf08799af1cc88f33c702

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\LICENSE.electron.txt

MD5 4d42118d35941e0f664dddbd83f633c5
SHA1 2b21ec5f20fe961d15f2b58efb1368e66d202e5c
SHA256 5154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d
SHA512 3ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\LICENSES.chromium.html

MD5 180f8acc70405077badc751453d13625
SHA1 35dc54acad60a98aeec47c7ade3e6a8c81f06883
SHA256 0bfa9a636e722107b6192ff35c365d963a54e1de8a09c8157680e8d0fbbfba1c
SHA512 40d3358b35eb0445127c70deb0cb87ec1313eca285307cda168605a4fd3d558b4be9eb24a59568eca9ee1f761e578c39b2def63ad48e40d31958db82f128e0ec

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\resources.pak

MD5 7971a016aed2fb453c87eb1b8e3f5eb2
SHA1 92b91e352be8209fadcf081134334dea147e23b8
SHA256 9cfd5d29cde3de2f042e5e1da629743a7c95c1211e1b0b001e4eebc0f0741e06
SHA512 42082ac0c033655f2edae876425a320d96cdaee6423b85449032c63fc0f7d30914aa3531e65428451c07912265b85f5fee2ed0bbdb362994d3a1fa7b14186013

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\snapshot_blob.bin

MD5 8fef5a96dbcc46887c3ff392cbdb1b48
SHA1 ed592d75222b7828b7b7aab97b83516f60772351
SHA256 4de0f720c416776423add7ada621da95d0d188d574f08e36e822ad10d85c3ece
SHA512 e52c7820c69863ecc1e3b552b7f20da2ad5492b52cac97502152ebff45e7a45b00e6925679fd7477cdc79c68b081d6572eeed7aed773416d42c9200accc7230e

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\v8_context_snapshot.bin

MD5 a373d83d4c43ba957693ad57172a251b
SHA1 8e0fdb714df2f4cb058beb46c06aa78f77e5ff86
SHA256 43b58ca4057cf75063d3b4a8e67aa9780d9a81d3a21f13c64b498be8b3ba6e0c
SHA512 07fbd84dc3e0ec1536ccb54d5799d5ed61b962251ece0d48e18b20b0fc9dd92de06e93957f3efc7d9bed88db7794fe4f2bec1e9b081825e41c6ac3b4f41eab18

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\vk_swiftshader.dll

MD5 a0845e0774702da9550222ab1b4fded7
SHA1 65d5bd6c64090f0774fd0a4c9b215a868b48e19b
SHA256 6150a413ebe00f92f38737bdccf493d19921ef6329fcd48e53de9dbde4780810
SHA512 4be0cb1e3c942a1695bae7b45d21c5f70e407132ecc65efb5b085a50cdab3c33c26e90bd7c86198ec40fb2b18d026474b6c649776a3ca2ca5bff6f922de2319b

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\vk_swiftshader_icd.json

MD5 8642dd3a87e2de6e991fae08458e302b
SHA1 9c06735c31cec00600fd763a92f8112d085bd12a
SHA256 32d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9
SHA512 f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\vulkan-1.dll

MD5 0e4e0f481b261ea59f196e5076025f77
SHA1 c73c1f33b5b42e9d67d819226db69e60d2262d7b
SHA256 f681844896c084d2140ac210a974d8db099138fe75edb4df80e233d4b287196a
SHA512 e6127d778ec73acbeb182d42e5cf36c8da76448fbdab49971de88ec4eb13ce63140a2a83fc3a1b116e41f87508ff546c0d7c042b8f4cdd9e07963801f3156ba2

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\af.pak

MD5 464e5eeaba5eff8bc93995ba2cb2d73f
SHA1 3b216e0c5246c874ad0ad7d3e1636384dad2255d
SHA256 0ad547bb1dc57907adeb02e1be3017cce78f6e60b8b39395fe0e8b62285797a1
SHA512 726d6c41a9dbf1f5f2eff5b503ab68d879b088b801832c13fba7eb853302b16118cacda4748a4144af0f396074449245a42b2fe240429b1afcb7197fa0cb6d41

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\am.pak

MD5 2c933f084d960f8094e24bee73fa826c
SHA1 91dfddc2cff764275872149d454a8397a1a20ab1
SHA256 fa1e44215bd5acc7342c431a3b1fddb6e8b6b02220b4599167f7d77a29f54450
SHA512 3c9ecfb0407de2aa6585f4865ad54eeb2ec6519c9d346e2d33ed0e30be6cc3ebfed676a08637d42c2ca8fa6cfefb4091feb0c922ff71f09a2b89cdd488789774

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\ar.pak

MD5 fdbad4c84ac66ee78a5c8dd16d259c43
SHA1 3ce3cd751bb947b19d004bd6916b67e8db5017ac
SHA256 a62b848a002474a8ea37891e148cbaf4af09bdba7dafebdc0770c9a9651f7e3b
SHA512 376519c5c2e42d21acedb1ef47184691a2f286332451d5b8d6aac45713861f07c852fb93bd9470ff5ee017d6004aba097020580f1ba253a5295ac1851f281e13

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\bg.pak

MD5 38bcabb6a0072b3a5f8b86b693eb545d
SHA1 d36c8549fe0f69d05ffdaffa427d3ddf68dd6d89
SHA256 898621731ac3471a41f8b3a7bf52e7f776e8928652b37154bc7c1299f1fd92e1
SHA512 002adbdc17b6013becc4909daf2febb74ce88733c78e968938b792a52c9c5a62834617f606e4cb3774ae2dad9758d2b8678d7764bb6dcfe468881f1107db13ef

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\bn.pak

MD5 9340520696e7cb3c2495a78893e50add
SHA1 eed5aeef46131e4c70cd578177c527b656d08586
SHA256 1ea245646a4b4386606f03c8a3916a3607e2adbbc88f000976be36db410a1e39
SHA512 62507685d5542cfcd394080917b3a92ca197112feea9c2ddc1dfc77382a174c7ddf758d85af66cd322692215cb0402865b2a2b212694a36da6b592028caafcdf

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\ca.pak

MD5 4cd6b3a91669ddcfcc9eef9b679ab65c
SHA1 43c41cb00067de68d24f72e0f5c77d3b50b71f83
SHA256 56efff228ee3e112357d6121b2256a2c3acd718769c89413de82c9d4305459c6
SHA512 699be9962d8aae241abd1d1f35cd8468ffbd6157bcd6bdf2c599d902768351b247baad6145b9826d87271fd4a19744eb11bf7065db7fefb01d66d2f1f39015a9

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\cs.pak

MD5 eeee212072ea6589660c9eb216855318
SHA1 d50f9e6ca528725ced8ac186072174b99b48ea05
SHA256 de92f14480770401e39e22dcf3dd36de5ad3ed22e44584c31c37cd99e71c4a43
SHA512 ea068186a2e611fb98b9580f2c5ba6fd1f31b532e021ef9669e068150c27deee3d60fd9ff7567b9eb5d0f98926b24defabc9b64675b49e02a6f10e71bb714ac8

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\da.pak

MD5 e7ba94c827c2b04e925a76cb5bdd262c
SHA1 abba6c7fcec8b6c396a6374331993c8502c80f91
SHA256 d8da7ab28992c8299484bc116641e19b448c20adf6a8b187383e2dba5cd29a0b
SHA512 1f44fce789cf41fd62f4d387b7b8c9d80f1e391edd2c8c901714dd0a6e3af32266e9d3c915c15ad47c95ece4c7d627aa7339f33eea838d1af9901e48edb0187e

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\de.pak

MD5 cf22ec11a33be744a61f7de1a1e4514f
SHA1 73e84848c6d9f1a2abe62020eb8c6797e4c49b36
SHA256 7cc213e2c9a2d2e2e463083dd030b86da6bba545d5cee4c04df8f80f9a01a641
SHA512 c10c8446e3041d7c0195da184a53cfbd58288c06eaf8885546d2d188b59667c270d647fa7259f5ce140ec6400031a7fc060d0f2348ab627485e2207569154495

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\el.pak

MD5 e66a75680f21ce281995f37099045714
SHA1 d553e80658ee1eea5b0912db1ecc4e27b0ed4790
SHA256 21d1d273124648a435674c7877a98110d997cf6992469c431fe502bbcc02641f
SHA512 d3757529dd85ef7989d9d4cecf3f7d87c9eb4beda965d8e2c87ee23b8baaec3fdff41fd53ba839215a37404b17b8fe2586b123557f09d201b13c7736c736b096

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\en-GB.pak

MD5 825ed4c70c942939ffb94e77a4593903
SHA1 7a3faee9bf4c915b0f116cb90cec961dda770468
SHA256 e11e8db78ae12f8d735632ba9fd078ec66c83529cb1fd86a31ab401f6f833c16
SHA512 41325bec22af2e5ef8e9b26c48f2dfc95763a249ccb00e608b7096ec6236ab9a955de7e2340fd9379d09ac2234aee69aed2a24fe49382ffd48742d72a929c56a

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\en-US.pak

MD5 19d18f8181a4201d542c7195b1e9ff81
SHA1 7debd3cf27bbe200c6a90b34adacb7394cb5929c
SHA256 1d20e626444759c2b72aa6e998f14a032408d2b32f957c12ec3abd52831338fb
SHA512 af07e1b08bbf2dd032a5a51a88ee2923650955873753629a086cad3b1600ce66ca7f9ed31b8ca901c126c10216877b24e123144bb0048f2a1e7757719aae73f2

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\es-419.pak

MD5 7da3e8aa47ba35d014e1d2a32982a5bb
SHA1 8e35320b16305ad9f16cb0f4c881a89818cd75bb
SHA256 7f85673cf80d1e80acfc94fb7568a8c63de79a13a1bb6b9d825b7e9f338ef17c
SHA512 1fca90888eb067972bccf74dd5d09bb3fce2ceb153589495088d5056ed4bdede15d54318af013c2460f0e8b5b1a5c6484adf0ed84f4b0b3c93130b086da5c3bf

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\es.pak

MD5 04a9ba7316dc81766098e238a667de87
SHA1 24d7eb4388ecdfecada59c6a791c754181d114de
SHA256 7fa148369c64bc59c2832d617357879b095357fe970bab9e0042175c9ba7cb03
SHA512 650856b6187df41a50f9bed29681c19b4502de6af8177b47bad0bf12e86a25e92aa728311310c28041a18e4d9f48ef66d5ad5d977b6662c44b49bfd1da84522b

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\et.pak

MD5 ccc71f88984a7788c8d01add2252d019
SHA1 6a87752eac3044792a93599428f31d25debea369
SHA256 d69489a723b304e305cb1767e6c8da5d5d1d237e50f6ddc76e941dcb01684944
SHA512 d35ccd639f2c199862e178a9fab768d7db10d5a654bc3bc1fab45d00ceb35a01119a5b4d199e2db3c3576f512b108f4a1df7faf6624d961c0fc4bca5af5f0e07

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\fa.pak

MD5 2e37fd4e23a1707a1eccea3264508dff
SHA1 e00e58ed06584b19b18e9d28b1d52dbfc36d70f3
SHA256 b9ee861e1bdecffe6a197067905279ea77c180844a793f882c42f2b70541e25e
SHA512 7c467f434eb0ce8e4a851761ae9bd7a9e292aab48e8e653e996f8ca598d0eb5e07ec34e2b23e544f3b38439dc3b8e3f7a0dfd6a8e28169aa95ceff42bf534366

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\fil.pak

MD5 d7df2ea381f37d6c92e4f18290c6ffe0
SHA1 7cacf08455aa7d68259fcba647ee3d9ae4c7c5e4
SHA256 db4a63fa0d5b2baba71d4ba0923caed540099db6b1d024a0d48c3be10c9eed5a
SHA512 96fc028455f1cea067b3a3dd99d88a19a271144d73dff352a3e08b57338e513500925787f33495cd744fe4122dff2d2ee56e60932fc02e04feed2ec1e0c3533f

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\fi.pak

MD5 21e534869b90411b4f9ea9120ffb71c8
SHA1 cc91ffbd19157189e44172392b2752c5f73984c5
SHA256 2d337924139ffe77804d2742eda8e58d4e548e65349f827840368e43d567810b
SHA512 3ca3c0adaf743f92277452b7bd82db4cf3f347de5568a20379d8c9364ff122713befd547fbd3096505ec293ae6771ada4cd3dadac93cc686129b9e5aacf363bd

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\fr.pak

MD5 3ee48a860ecf45bafa63c9284dfd63e2
SHA1 1cb51d14964f4dced8dea883bf9c4b84a78f8eb6
SHA256 1923e0edf1ef6935a4a718e3e2fc9a0a541ea0b4f3b27553802308f9fd4fc807
SHA512 eb6105faca13c191fef0c51c651a406b1da66326bb5705615770135d834e58dee9bed82aa36f2dfb0fe020e695c192c224ec76bb5c21a1c716e5f26dfe02f763

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\gu.pak

MD5 308619d65b677d99f48b74ccfe060567
SHA1 9f834df93fd48f4fb4ca30c4058e23288cf7d35e
SHA256 e40ee4f24839f9e20b48d057bf3216bc58542c2e27cb40b9d2f3f8a1ea5bfbb4
SHA512 3ca84ad71f00b9f7cc61f3906c51b263f18453fce11ec6c7f9edfe2c7d215e3550c336e892bd240a68a6815af599cc20d60203294f14adb133145ca01fe4608f

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\he.pak

MD5 fc84ea7dc7b9408d1eea11beeb72b296
SHA1 de9118194952c2d9f614f8e0868fb273ddfac255
SHA256 15951767dafa7bdbedac803d842686820de9c6df478416f34c476209b19d2d8c
SHA512 49d13976dddb6a58c6fdcd9588e243d705d99dc1325c1d9e411a1d68d8ee47314dfcb661d36e2c4963c249a1542f95715f658427810afcabdf9253aa27eb3b24

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\hi.pak

MD5 b5dfce8e3ba0aec2721cc1692b0ad698
SHA1 c5d6fa21a9ba3d526f3e998e3f627afb8d1eecf3
SHA256 b1c7fb6909c8a416b513d6de21eea0b5a6b13c7f0a94cabd0d9154b5834a5e8b
SHA512 facf0a9b81af6bb35d0fc5e69809d5c986a2c91a166e507784bdad115644b96697fe504b8d70d9bbb06f0c558f746c085d37e385eef41f0a1c29729d3d97980f

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\hr.pak

MD5 255f808210dbf995446d10ff436e0946
SHA1 1785d3293595f0b13648fb28aec6936c48ea3111
SHA256 4df972b7f6d81aa7bdc39e2441310a37f746ae5015146b4e434a878d1244375b
SHA512 8b1a4d487b0782055717b718d58cd21e815b874e2686cdfd2087876b70ae75f9182f783c70bf747cf4ca17a3afc68517a9db4c99449fa09bef658b5e68087f2a

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\hu.pak

MD5 2aa0a175df21583a68176742400c6508
SHA1 3c25ba31c2b698e0c88e7d01b2cc241f0916e79a
SHA256 b59f932df822ab1a87e8aab4bbb7c549db15899f259f4c50ae28f8d8c7ce1e72
SHA512 03a16feb0601407e96bcb43af9bdb21e5218c2700c9f3cfd5f9690d0b4528f9dc17e4cc690d8c9132d4e0b26d7faafd90aa3f5e57237e06fb81aab7ab77f6c03

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\id.pak

MD5 b6fcd5160a3a1ae1f65b0540347a13f2
SHA1 4cf37346318efb67908bba7380dbad30229c4d3d
SHA256 7fd715914e3b0cf2048d4429f3236e0660d5bd5e61623c8fef9b8e474c2ac313
SHA512 a8b4a96e8f9a528b2df3bd1251b72ab14feccf491dd254a7c6ecba831dfaba328adb0fd0b4acddb89584f58f94b123e97caa420f9d7b34131cc51bdbdbf3ed73

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\it.pak

MD5 745f16ca860ee751f70517c299c4ab0e
SHA1 54d933ad839c961dd63a47c92a5b935eef208119
SHA256 10e65f42ce01ba19ebf4b074e8b2456213234482eadf443dfad6105faf6cde4c
SHA512 238343d6c80b82ae900f5abf4347e542c9ea016d75fb787b93e41e3c9c471ab33f6b4584387e5ee76950424e25486dd74b9901e7f72876960c0916c8b9cee9a6

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\ja.pak

MD5 38cd3ef9b7dff9efbbe086fa39541333
SHA1 321ef69a298d2f9830c14140b0b3b0b50bd95cb0
SHA256 d8fab5714dafecb89b3e5fce4c4d75d2b72893e685e148e9b60f7c096e5b3337
SHA512 40785871032b222a758f29e0c6ec696fbe0f6f5f3274cc80085961621bec68d7e0fb47c764649c4dd0c27c6ee02460407775fae9d3a2a8a59362d25a39266ce0

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\kn.pak

MD5 caab4deb1c40507848f9610d849834cf
SHA1 1bc87ff70817ba1e1fdd1b5cb961213418680cbe
SHA256 7a34483e6272f9b8881f0f5a725b477540166561c75b9e7ab627815d4be1a8a4
SHA512 dc4b63e5a037479bb831b0771aec0fe6eb016723bcd920b41ab87ef11505626632877073ce4e5e0755510fe19ba134a7b5899332ecef854008b15639f915860c

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\ko.pak

MD5 d6194fc52e962534b360558061de2a25
SHA1 98ed833f8c4beac685e55317c452249579610ff8
SHA256 1a5884bd6665b2f404b7328de013522ee7c41130e57a53038fc991ec38290d21
SHA512 5207a07426c6ceb78f0504613b6d2b8dadf9f31378e67a61091f16d72287adbc7768d1b7f2a923369197e732426d15a872c091cf88680686581d48a7f94988ab

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\lt.pak

MD5 64b08ffc40a605fe74ecc24c3024ee3b
SHA1 516296e8a3114ddbf77601a11faf4326a47975ab
SHA256 8a5d6e29833374e0f74fd7070c1b20856cb6b42ed30d18a5f17e6c2e4a8d783e
SHA512 05d207413186ac2b87a59681efe4fdf9dc600d0f3e8327e7b9802a42306d80d0ddd9ee07d103b17caf0518e42ab25b7ca9da4713941abc7bced65961671164ac

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\lv.pak

MD5 a8cbd741a764f40b16afea275f240e7e
SHA1 317d30bbad8fd0c30de383998ea5be4eec0bb246
SHA256 a1a9d84fd3af571a57be8b1a9189d40b836808998e00ec9bd15557b83d0e3086
SHA512 3da91c0ca20165445a2d283db7dc749fcf73e049bfff346b1d79b03391aefc7f1310d3ac2c42109044cfb50afcf178dcf3a34b4823626228e591f328dd7afe95

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\ml.pak

MD5 1c81104ac2cbf7f7739af62eb77d20d5
SHA1 0f0d564f1860302f171356ea35b3a6306c051c10
SHA256 66005bc01175a4f6560d1e9768dbc72b46a4198f8e435250c8ebc232d2dac108
SHA512 969294eae8c95a1126803a35b8d3f1fc3c9d22350aa9cc76b2323b77ad7e84395d6d83b89deb64565783405d6f7eae40def7bdaf0d08da67845ae9c7dbb26926

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\mr.pak

MD5 2cf9f07ddf7a3a70a48e8b524a5aed43
SHA1 974c1a01f651092f78d2d20553c3462267ddf4e9
SHA256 23058c0f71d9e40f927775d980524d866f70322e0ef215aa5748c239707451e7
SHA512 0b21570deefa41defc3c25c57b3171635bcb5593761d48a8116888ce8be34c1499ff79c7a3ebbe13b5a565c90027d294c6835e92e6254d582a86750640fe90f2

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\ms.pak

MD5 aee105366a1870b9d10f0f897e9295db
SHA1 eee9d789a8eeafe593ce77a7c554f92a26a2296f
SHA256 c6471aee5f34f31477d57f593b09cb1de87f5fd0f9b5e63d8bab4986cf10d939
SHA512 240688a0054bfebe36ea2b056194ee07e87bbbeb7e385131c73a64aa7967984610fcb80638dd883837014f9bc920037069d0655e3e92a5922f76813aedb185fa

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\nb.pak

MD5 55d5ad4eacb12824cfcd89470664c856
SHA1 f893c00d8d4fdb2f3e7a74a8be823e5e8f0cd673
SHA256 4f44789a2c38edc396a31aba5cc09d20fb84cd1e06f70c49f0664289c33cd261
SHA512 555d87be8c97f466c6b3e7b23ec0210335846398c33dba71e926ff7e26901a3908dbb0f639c93db2d090c9d8bda48eddf196b1a09794d0e396b2c02b4720f37e

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\nl.pak

MD5 0f04bac280035fab018f634bcb5f53ae
SHA1 4cad76eaecd924b12013e98c3a0e99b192be8936
SHA256 be254bcda4dbe167cb2e57402a4a0a814d591807c675302d2ce286013b40799b
SHA512 1256a6acac5a42621cb59eb3da42ddeeacfe290f6ae4a92d00ebd4450a8b7ccb6f0cd5c21cf0f18fe4d43d0d7aee87b6991fef154908792930295a3871fa53df

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\pl.pak

MD5 f1d48a7dcd4880a27e39b7561b6eb0ab
SHA1 353c3ba213cd2e1f7423c6ba857a8d8be40d8302
SHA256 2593c8b59849fbc690cbd513f06685ea3292cd0187fcf6b9069cbf3c9b0e8a85
SHA512 132da2d3c1a4dad5ccb399b107d7b6d9203a4b264ef8a65add11c5e8c75859115443e1c65ece2e690c046a82687829f54ec855f99d4843f859ab1dd7c71f35a5

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\pt-BR.pak

MD5 8e931ffbded8933891fb27d2cca7f37d
SHA1 ab0a49b86079d3e0eb9b684ca36eb98d1d1fd473
SHA256 6632bd12f04a5385012b5cdebe8c0dad4a06750dc91c974264d8fe60e8b6951d
SHA512 cf0f6485a65c13cf5ddd6457d34cdea222708b0bb5ca57034ed2c4900fd22765385547af2e2391e78f02dcf00b7a2b3ac42a3509dd4237581cfb87b8f389e48d

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\pt-PT.pak

MD5 b4954b064e3f6a9ba546dda5fa625927
SHA1 584686c6026518932991f7de611e2266d8523f9d
SHA256 ee1e014550b85e3d18fb5128984a713d9f6de2258001b50ddd18391e7307b4a1
SHA512 cb3b465b311f83b972eca1c66862b2c5d6ea6ac15282e0094aea455123ddf32e85df24a94a0aedbe1b925ff3ed005ba1e00d5ee820676d7a5a366153ade90ef7

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\ro.pak

MD5 d2758f6adbaeea7cd5d95f4ad6dde954
SHA1 d7476db23d8b0e11bbabf6a59fde7609586bdc8a
SHA256 2b7906f33bfbe8e9968bcd65366e2e996cdf2f3e1a1fc56ad54baf261c66954c
SHA512 8378032d6febea8b5047ada667cb19e6a41f890cb36305acc2500662b4377caef3dc50987c925e05f21c12e32c3920188a58ee59d687266d70b8bfb1b0169a6e

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\ru.pak

MD5 2885bde990ee3b30f2c54a4067421b68
SHA1 ae16c4d534b120fdd68d33c091a0ec89fd58793f
SHA256 9fcda0d1fab7fff7e2f27980de8d94ff31e14287f58bd5d35929de5dd9cbcdca
SHA512 f7781f5c07fbf128399b88245f35055964ff0cde1cc6b35563abc64f520971ce9916827097ca18855b46ec6397639f5416a6e8386a9390afba4332d47d21693f

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\sk.pak

MD5 b7e97cc98b104053e5f1d6a671c703b7
SHA1 0f7293f1744ae2cd858eb3431ee016641478ae7d
SHA256 b0d38869275d9d295e42b0b90d0177e0ca56a393874e4bb454439b8ce25d686f
SHA512 ef3247c6f0f4065a4b68db6bf7e28c8101a9c6c791b3f771ed67b5b70f2c9689cec67a1c864f423382c076e4cbb6019c1c0cb9ad0204454e28f749a69b6b0de0

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\sl.pak

MD5 ca763e801de642e4d68510900ff6fabb
SHA1 c32a871831ce486514f621b3ab09387548ee1cff
SHA256 340e0babe5fddbfda601c747127251cf111dd7d79d0d6a5ec4e8443b835027de
SHA512 e2847ce75de57deb05528dd9557047edcd15d86bf40a911eb97e988a8fdbda1cd0e0a81320eadf510c91c826499a897c770c007de936927df7a1cc82fa262039

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\sr.pak

MD5 c68c235d8e696c098cf66191e648196b
SHA1 5c967fbbd90403a755d6c4b2411e359884dc8317
SHA256 ab96a18177af90495e2e3c96292638a775aa75c1d210ca6a6c18fbc284cd815b
SHA512 34d14d8cb851df1ea8cd3cc7e9690eaf965d8941cfcac1c946606115ad889630156c5ff47011b27c1288f8df70e8a7dc41909a9fa98d75b691742ec1d1a5e653

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\sv.pak

MD5 272f8a8b517c7283eab83ba6993eea63
SHA1 ad4175331b948bd4f1f323a4938863472d9b700c
SHA256 d15b46bc9b5e31449b11251df19cd2ba4920c759bd6d4fa8ca93fd3361fdd968
SHA512 3a0930b7f228a779f727ebfb6ae8820ab5cc2c9e04c986bce7b0f49f9bf124f349248ecdf108edf8870f96b06d58dea93a3e0e2f2da90537632f2109e1aa65f0

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\sw.pak

MD5 67a443a5c2eaad32625edb5f8deb7852
SHA1 a6137841e8e7736c5ede1d0dc0ce3a44dc41013f
SHA256 41dfb772ae4c6f9e879bf7b4fa776b2877a2f8740fa747031b3d6f57f34d81dd
SHA512 e0fdff1c3c834d8af8634f43c2f16ba5b883a8d88dfd322593a13830047568faf9f41d0bf73cd59e2e33c38fa58998d4702d2b0c21666717a86945d18b3f29e5

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\ta.pak

MD5 18ec8ff3c0701a6a8c48f341d368bab5
SHA1 8bff8aee26b990cf739a29f83efdf883817e59d8
SHA256 052bcdb64a80e504bb6552b97881526795b64e0ab7ee5fc031f3edf87160dee9
SHA512 a0e997fc9d316277de3f4773388835c287ab1a35770c01e376fb7428ff87683a425f6a6a605d38dd7904ca39c50998cd85f855cb33ae6abad47ac85a1584fe4e

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\te.pak

MD5 a17f16d7a038b0fa3a87d7b1b8095766
SHA1 b2f845e52b32c513e6565248f91901ab6874e117
SHA256 d39716633228a5872630522306f89af8585f8092779892087c3f1230d21a489e
SHA512 371fb44b20b8aba00c4d6f17701fa4303181ad628f60c7b4218e33be7026f118f619d66d679bffcb0213c48700fafd36b2e704499a362f715f63ea9a75d719e7

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\th.pak

MD5 a32ba63feeed9b91f6d6800b51e5aeae
SHA1 2fbf6783996e8315a4fb94b7d859564350ee5918
SHA256 e32e37ca0ab30f1816fe6df37e3168e1022f1d3737c94f5472ab6600d97a45f6
SHA512 adebde0f929820d8368096a9c30961ba7b33815b0f124ca56ca05767ba6d081adf964088cb2b9fcaa07f756b946fffa701f0b64b07d457c99fd2b498cbd1e8a5

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\tr.pak

MD5 5ff2e5c95067a339e3d6b8985156ec1f
SHA1 7525b25c7b07f54b63b6459a0d8c8c720bd8a398
SHA256 14a131ba318274cf10de533a19776db288f08a294cf7e564b7769fd41c7f2582
SHA512 2414386df8d7ab75dcbd6ca2b9ae62ba8e953ddb8cd8661a9f984eb5e573637740c7a79050b2b303af3d5b1d4d1bb21dc658283638718fdd04fc6e5891949d1b

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\uk.pak

MD5 361a0e1f665b9082a457d36209b92a25
SHA1 3c89e1b70b51820bb6baa64365c64da6a9898e2f
SHA256 bd02966f6c6258b66eae7ff014710925e53fe26e8254d7db4e9147266025cc3a
SHA512 d4d25fc58053f8cce4c073846706dc1ecbc0dc19308ba35501e19676f3e7ed855d7b57ae22a5637f81cefc1aa032bf8770d0737df1924f3504813349387c08cf

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\ur.pak

MD5 1ca4fa13bd0089d65da7cd2376feb4c6
SHA1 b1ba777e635d78d1e98e43e82d0f7a3dd7e97f9c
SHA256 3941364d0278e2c4d686faa4a135d16a457b4bc98c5a08e62aa12f3adc09aa7f
SHA512 d0d9eb1aa029bd4c34953ee5f4b60c09cf1d4f0b21c061db4ede1b5ec65d7a07fc2f780ade5ce51f2f781d272ac32257b95eedf471f7295ba70b5ba51db6c51d

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\vi.pak

MD5 db0eb3183007de5aae10f934fffacc59
SHA1 e9ea7aeffe2b3f5cf75ab78630da342c6f8b7fd9
SHA256 ddabb225b671b989789e9c2ccd1b5a8f22141a7d9364d4e6ee9b8648305e7897
SHA512 703efd12fcace8172c873006161712de1919572c58d98b11de7834c5628444229f5143d231c41da5b9cf729e32de58dee3603cb3d18c6cdd94aa9aa36fbf5de0

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\zh-CN.pak

MD5 82326e465e3015c64ca1db77dc6a56bc
SHA1 e8abe12a8dd2cc741b9637fa8f0e646043bbfe3d
SHA256 6655fd9dcdfaf2abf814ffb6c524d67495aed4d923a69924c65abeab30bc74fb
SHA512 4989789c0b2439666dda4c4f959dffc0ddcb77595b1f817c13a95ed97619c270151597160320b3f2327a7daffc8b521b68878f9e5e5fb3870eb0c43619060407

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\locales\zh-TW.pak

MD5 2456bf42275f15e016689da166df9008
SHA1 70f7de47e585dfea3f5597b5bba1f436510decd7
SHA256 adf8df051b55507e5a79fa47ae88c7f38707d02dfac0cc4a3a7e8e17b58c6479
SHA512 7e622afa15c70785aaf7c19604d281efe0984f621d6599058c97c19d3c0379b2ee2e03b3a7ec597040a4eee250a782d7ec55c335274dd7db7c7ca97ddcfd378a

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\resources\app.asar

MD5 c8007d169cf121e4f4eee5706f18c112
SHA1 0a5405740fc68d445a65cd0e20e95c6ca5270d5b
SHA256 6821821b2cd9c564b16af944e1c24de9975e18be24e235d39b713f3d6573347e
SHA512 83b8ee8eb67dd6b10e922229319164a774bd5113ed05beb4a05b2e96b5583ba3999fa812c1d5fd38631c2542634a0f73f60f26b0a05ca6f52d8b6acd11fa039f

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\7z-out\resources\elevate.exe

MD5 792b92c8ad13c46f27c7ced0810694df
SHA1 d8d449b92de20a57df722df46435ba4553ecc802
SHA256 9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37
SHA512 6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40

C:\Users\Admin\AppData\Local\Temp\nst8EC4.tmp\StdUtils.dll

MD5 c6a6e03f77c313b267498515488c5740
SHA1 3d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256 b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA512 9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

C:\Users\Admin\AppData\Local\Temp\af497feb-982c-4f44-ab45-7391a51c4e16.tmp.node

MD5 3072b68e3c226aff39e6782d025f25a8
SHA1 cf559196d74fa490ac8ce192db222c9f5c5a006a
SHA256 7fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01
SHA512 61ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_elkz5esz.2dd.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1816-393-0x0000022676490000-0x00000226764B2000-memory.dmp

memory/1816-398-0x0000022678F10000-0x0000022678F60000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 75d3270d83488175de2adf44338de49f
SHA1 bbd4e3b65c64c3033a3e3d8f04479e7f2e97185f
SHA256 acc67f43c9c3fb1b828c7f091d152d00e7438ff18d9d9c7b546050300a77d082
SHA512 c89ef72ca57539add6813b468a53b14823b1ce1d005c95b65fc6b8e08f2e27cf571bf699e577aa26b424e52936f218daa7f5276cd360995a482baddd8adf8c9f

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 a82cfe4502bcd9e91f17d9ddfd98063e
SHA1 7b52d3868b2b368bdd9a45155bb3a026bda8f4a0
SHA256 17d8b2d7a036fe94f78c11465bde0ab6cb8c8b514b6dca37c264416d80f183e9
SHA512 4cc349932f108071adbf76cccde34ab37c0f5e7eab2baf63c25a6ed0d1658262a76560e07c608ed21ff213dac8a366bdfdf51b6fb4d574cc214203fc02f478b8