Analysis

  • max time kernel
    240s
  • max time network
    280s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250211-uk
  • resource tags

    arch:x64arch:x86image:win10v2004-20250211-uklocale:uk-uaos:windows10-2004-x64systemwindows
  • submitted
    12-02-2025 09:28

General

  • Target

    https://lakestreetsolar.com/build.zip?mn=6761

Malware Config

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Netsupport family
  • Downloads MZ/PE file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 50 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://lakestreetsolar.com/build.zip?mn=6761
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf81f46f8,0x7ffdf81f4708,0x7ffdf81f4718
      2⤵
        PID:3620
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
        2⤵
          PID:2480
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2308
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:8
          2⤵
            PID:5028
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
            2⤵
              PID:8
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
              2⤵
                PID:4492
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:8
                2⤵
                  PID:1036
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1928
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:1
                  2⤵
                    PID:3736
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:1
                    2⤵
                      PID:1196
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --service-sandbox-type=collections --mojo-platform-channel-handle=3436 /prefetch:8
                      2⤵
                        PID:1760
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:1
                        2⤵
                          PID:3888
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6188 /prefetch:1
                          2⤵
                            PID:3664
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:1
                            2⤵
                              PID:1504
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2588
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1916
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4072
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3852
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:4868
                                • C:\Program Files\7-Zip\7zG.exe
                                  "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\build\" -spe -an -ai#7zMap12960:72:7zEvent2850
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:4936
                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIwIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODM0MDYiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDI3ODAwNjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzE1MzQyNzYwIi8-PC9hcHA-PC9yZXF1ZXN0Pg
                                  1⤵
                                  • System Location Discovery: System Language Discovery
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  PID:2484
                                • C:\Windows\system32\NOTEPAD.EXE
                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\build\NSM.ini
                                  1⤵
                                  • Opens file in notepad (likely ransom note)
                                  PID:456
                                • C:\Windows\system32\OpenWith.exe
                                  C:\Windows\system32\OpenWith.exe -Embedding
                                  1⤵
                                  • Modifies registry class
                                  • Suspicious use of SetWindowsHookEx
                                  PID:112
                                • C:\Windows\system32\NOTEPAD.EXE
                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\build\nsm_vpro.ini
                                  1⤵
                                  • Opens file in notepad (likely ransom note)
                                  PID:4688
                                • C:\Users\Admin\Downloads\build\client32.exe
                                  "C:\Users\Admin\Downloads\build\client32.exe"
                                  1⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:4424

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  004d3d2aa9e0e8431f47901abb90f0ba

                                  SHA1

                                  ce129345619faf962a256a65da4624854a4e7ece

                                  SHA256

                                  d3b4ec4d327fc45c09cbf9a0ebf587fe7f031e89bea48b9a9b74230b87d168ab

                                  SHA512

                                  3741e30d0d3ac72b645d43e086a294e31091c6b6a80f74b88a1f27e60490a70c17baca25387e0b54f6f90abd1eabdd8ed885bc8d554c7286f07155afdcf01381

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  4cafc69c423e360fae1761e5c427cae9

                                  SHA1

                                  3cebbb7de72319b47f2e9111c50a8db628cf4350

                                  SHA256

                                  d3b9d572d6851da285d9b31ffab1a8fa414bffc689ee4b2c0118c51e26372175

                                  SHA512

                                  549d61aa7a5526bb989de432522a0241e17669c5844b01bc4e6e768398dbe2cc46e3add8f3fc5fc0979f8bd08444ba4a3a1a930958810cd46f2c19f28435c587

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000001

                                  Filesize

                                  2.0MB

                                  MD5

                                  a3438bc1060db9dc6d7d287f43259115

                                  SHA1

                                  df33391e922d4ba353dc76c2f38a0bdac56cd591

                                  SHA256

                                  6c3dec03149c475e7d69059169d3a944ce67559c33228ee45030ac18a061aac9

                                  SHA512

                                  0297a9534795cc47f3dfb30ace3cb77fafa28d8dd2a5843598b71bb7dae3966af645739b6e4056db571322073df3dd23dbe89cddace3471a68f68151cd27fc00

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  05f1cf05c67e5ee5328c49403404d126

                                  SHA1

                                  8926aaa82923ffe952e5a27c7eaac6794433349a

                                  SHA256

                                  9cf98dd101c83ac01ece5f5ec8a6f69b5908cd841f81dc6bb80af5badefc73fd

                                  SHA512

                                  36c3b35ab6aafff6436d552f32ed910a475a88a0b4f82bba8dade4f6169446e9570ca16e1c881df25336c0829660fa98767294df68028c18bba8883550475929

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  52a32ff498df8418ac282c86df56addf

                                  SHA1

                                  585cf6dca6980e666d4a8937104e36af92a4d117

                                  SHA256

                                  802e1d71096c09325922a09c1d6696a5989c53dc858c776c3ab823996cf6027d

                                  SHA512

                                  45173d622044169a5592c32531b5cb1949e7e8df6e6ea1dd8fadfcfa2d6a1f618910343067964b6f613cbccbad99faa6a0233d5e16b66cba5ec7d865d3aaae30

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  6752a1d65b201c13b62ea44016eb221f

                                  SHA1

                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                  SHA256

                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                  SHA512

                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  8a98272320453736bc9f17a69f594012

                                  SHA1

                                  a6f87645d322426bdefe70565a1261402941768c

                                  SHA256

                                  eb49ef3cf66b65324d29f8f90c30a3695f48ce8f6e831a0cee1dbef696b877fb

                                  SHA512

                                  e22d3fd4bc8d87ced753adbc7ff3d25f8871d1ff658ee4711e49eefda96213e145d9401a5624bd702b12b3af04db0144772541b8f4b892abce43721de6f6136b

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  9fcab2dbd924e4515dd1831fe7920d17

                                  SHA1

                                  78c311d8f6a70793b9ed8c455227cfe2dee3dc25

                                  SHA256

                                  53f3f934d827faa6659c50c80860660af5b0d5f0385161c2791c044f71790d39

                                  SHA512

                                  4c6a20798094fec115552656339b71ffd241d8bdf209bb82ec9f8922ab75a9f30c7417d4af6c193027154f67d1fb776206fe8e029b138c204257145b5cf2f42a

                                • C:\Users\Admin\Downloads\build\HTCTL32.DLL

                                  Filesize

                                  306KB

                                  MD5

                                  3eed18b47412d3f91a394ae880b56ed2

                                  SHA1

                                  1b521a3ed4a577a33cce78eee627ae02445694ab

                                  SHA256

                                  13a17f2ad9288aac8941d895251604beb9524fa3c65c781197841ee15480a13f

                                  SHA512

                                  835f35af4fd241caa8b6a639626b8762db8525ccceb43afe8fffc24dffad76ca10852a5a8e9fc114bfbf7d1dc1950130a67037fc09b63a74374517a1f5448990

                                • C:\Users\Admin\Downloads\build\NSM.LIC

                                  Filesize

                                  262B

                                  MD5

                                  b9956282a0fed076ed083892e498ac69

                                  SHA1

                                  d14a665438385203283030a189ff6c5e7c4bf518

                                  SHA256

                                  fcc6afd664a8045bd61c398be3c37a97536a199a48d277e11977f93868ae1acc

                                  SHA512

                                  7daa09113c0e8a36c91cc6d657c65851a20dff6b60ac3d2f40c5737c12c1613c553955f84d131ba2139959973fef9fc616ca5e968cb16c25acf2d4739eed87eb

                                • C:\Users\Admin\Downloads\build\NSM.ini

                                  Filesize

                                  5KB

                                  MD5

                                  99f493dce7fab330dc47f0cab8fe6172

                                  SHA1

                                  16906fb5988303bb462b65ff4ece23539a12f4b5

                                  SHA256

                                  e0ed36c897eaa5352fab181c20020b60df4c58986193d6aaf5bf3e3ecdc4c05d

                                  SHA512

                                  2c58171c30aec8ae131a7c32162856fce551b55f861d0d9fb0e27a91bd7084388df5860392f80cdbc6df6e64e97d8bf2cae587c3d6b7c142ce711ae8e240bb01

                                • C:\Users\Admin\Downloads\build\PCICHEK.DLL

                                  Filesize

                                  27KB

                                  MD5

                                  e311935a26ee920d5b7176cfa469253c

                                  SHA1

                                  eda6c815a02c4c91c9aacd819dc06e32ececf8f0

                                  SHA256

                                  0038ab626624fa2df9f65dd5e310b1206a9cd4d8ab7e65fb091cc25f13ebd34e

                                  SHA512

                                  48164e8841cfc91f4cbf4d3291d4f359518d081d9079a7995378f970e4085b534f4bafc15b83f4824cc79b5a1e54457b879963589b1acbcfe727a03eb3dffd1c

                                • C:\Users\Admin\Downloads\build\PCICL32.DLL

                                  Filesize

                                  3.3MB

                                  MD5

                                  77b3988cbae5a2550caec42cc5e8ec35

                                  SHA1

                                  5fa1eeb60e881bfd82eb7c3d9e911587982aaa38

                                  SHA256

                                  650382fe6596c8dc0c1739713c2076d4ddff32d5c177210b1241550bb8148cfd

                                  SHA512

                                  480f3abef7b799bd604ba9825e2b8cf681e7850373761c579ef181607980d5159c225fb486996e3088f39662f873743d25b52368045d3ae5bd8d45e44d1e8bec

                                • C:\Users\Admin\Downloads\build\client32.exe

                                  Filesize

                                  117KB

                                  MD5

                                  1c19c2e97c5e6b30de69ee684e6e5589

                                  SHA1

                                  5734ef7f9e4dba0639c98881e00f03eea35a62ee

                                  SHA256

                                  312a0e4db34a40cb95ba1fac8bf87deb45d0c5f048d38ac65eb060273b07df67

                                  SHA512

                                  ab7240b81be04f1bced47701a5791bbeedcba6037ee936327478c304aa1ce5ae75856ca7f568f909f847e27db2a6b9c08db7cc1057a18fab14a39a5854f15cba

                                • C:\Users\Admin\Downloads\build\client32.ini

                                  Filesize

                                  731B

                                  MD5

                                  9ff762ddf8745986af8d1644963d34ff

                                  SHA1

                                  2d15dca3f43a0b91f87520db813329142452236a

                                  SHA256

                                  6859ad91454f4afe277821949caa4172661541b8d02e780c31faaea2ebcafd75

                                  SHA512

                                  9990cac92e4671435a964a57cb1e9ee1776a3f605c5be40a258f7058785f7f373bc22b49a427af81c99d096b395bd1a388d443175c5ccfc4a06942019d4fd26d

                                • C:\Users\Admin\Downloads\build\msvcr100.dll

                                  Filesize

                                  755KB

                                  MD5

                                  0e37fbfa79d349d672456923ec5fbbe3

                                  SHA1

                                  4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

                                  SHA256

                                  8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

                                  SHA512

                                  2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

                                • C:\Users\Admin\Downloads\build\nsm_vpro.ini

                                  Filesize

                                  46B

                                  MD5

                                  3be27483fdcdbf9ebae93234785235e3

                                  SHA1

                                  360b61fe19cdc1afb2b34d8c25d8b88a4c843a82

                                  SHA256

                                  4bfa4c00414660ba44bddde5216a7f28aeccaa9e2d42df4bbff66db57c60522b

                                  SHA512

                                  edbe8cf1cbc5fed80fedf963ade44e08052b19c064e8bca66fa0fe1b332141fbe175b8b727f8f56978d1584baaf27d331947c0b3593aaff5632756199dc470e5

                                • C:\Users\Admin\Downloads\build\pcicapi.dll

                                  Filesize

                                  44KB

                                  MD5

                                  9daa86d91a18131d5caf49d14fb8b6f2

                                  SHA1

                                  6b2f7ceb6157909e114a2b05a48a1a2606b5caf1

                                  SHA256

                                  1716640cce74322f7ee3e3e02b75cd53b91686f66e389d606dab01bd9f88c557

                                  SHA512

                                  9a98e0d9e2dda8aefa54bddb3c7b71501d638dff68863939de6caa117b0e7bf15e581a75419ef8a0da3f1c56a19f1b0f4c86d65f8581773ab88ff5764b9bb3aa