Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01-06-2024 20:00

General

  • Target

    droidkit-2-3-0.exe

  • Size

    19.5MB

  • MD5

    9c5c721c156afbcb80dfc81bf5f136eb

  • SHA1

    80e3fe09adc550883eea23e415358ac30591fc8d

  • SHA256

    b320de1ddb0c255b9374c5a0496ebdfb2ea9f7789b26278bb5bf6b52ce3df8e0

  • SHA512

    7c4f25e2096bd227ff6f82e5bf06f14d847942451ad1674d46dd9c6df0bdcf2e95cdc395e3610aa5f94defe63ef1c1538ffe8e2b6984ebcfdf9413b549d5dce9

  • SSDEEP

    393216:rFiVQTXypl8pBja9MnNQLvcjjNUIsBwc6XYbTkrXDTNiDRUGJwPAEWXI:rnTC8pBjMM6CzYUX3NiDRUGJ2YY

Score
4/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 34 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\droidkit-2-3-0.exe
    "C:\Users\Admin\AppData\Local\Temp\droidkit-2-3-0.exe"
    1⤵
    • Drops file in Program Files directory
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Launch App\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4140
      • C:\Windows\SysWOW64\curl.exe
        curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Launch App\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw"
        3⤵
          PID:2424
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Start Download\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4984
        • C:\Windows\SysWOW64\curl.exe
          curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Start Download\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw"
          3⤵
            PID:4348
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Download Successful\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3612
          • C:\Windows\SysWOW64\curl.exe
            curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Download Successful\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw"
            3⤵
              PID:1548
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Install Finished\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2892
            • C:\Windows\SysWOW64\curl.exe
              curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Install Finished\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw"
              3⤵
                PID:4916
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Start Application\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4256
              • C:\Windows\SysWOW64\curl.exe
                curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Start Application\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw"
                3⤵
                  PID:4636
              • C:\Program Files (x86)\iMobie\DroidKit\DroidKit.exe
                "C:\Program Files (x86)\iMobie\DroidKit\DroidKit.exe"
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3984
                • C:\Program Files (x86)\iMobie\DroidKit\DroidKit.Main.exe
                  "C:\Program Files (x86)\iMobie\DroidKit\DroidKit.Main.exe"
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Modifies system certificate store
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3660
                  • C:\Program Files (x86)\iMobie\DroidKit\aapt.exe
                    "C:\Program Files (x86)\iMobie\DroidKit\aapt.exe" dump badging imobieservice.apk
                    4⤵
                    • Executes dropped EXE
                    PID:4968
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.imobie.com/droidkit/thankyou/install-complete.htm
                2⤵
                • Enumerates system info in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:752
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff899153cb8,0x7ff899153cc8,0x7ff899153cd8
                  3⤵
                    PID:4560
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:2
                    3⤵
                      PID:2364
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 /prefetch:3
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4340
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:8
                      3⤵
                        PID:2716
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1
                        3⤵
                          PID:2228
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
                          3⤵
                            PID:3140
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 /prefetch:8
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2036
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:1
                            3⤵
                              PID:3052
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:1
                              3⤵
                                PID:1868
                              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:8
                                3⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1204
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:1
                                3⤵
                                  PID:2520
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:1
                                  3⤵
                                    PID:1316
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:2388
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:2372

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Program Files (x86)\iMobie\DroidKit\Core.Http.dll

                                    Filesize

                                    76KB

                                    MD5

                                    e8b850077bddfe93d36316c346f8259e

                                    SHA1

                                    f5d580d41da59a937ac0888c91347ef12f3c83a9

                                    SHA256

                                    b23b63627685d3bf82229ea57f26cffdd77e2fcd398dacbfc6f327918dd54bd5

                                    SHA512

                                    65394c4ecb3821d953a3e00421ba950d85e8040ef8bfa2753cf9e0d7eb6b0a56fd2bdacb3ea24ed0ad4ac5dae3a384c71b47da7af52b6958c87419a310a59c18

                                  • C:\Program Files (x86)\iMobie\DroidKit\Core.Tracing.GA4.dll

                                    Filesize

                                    360KB

                                    MD5

                                    716134b10d22cc35644e32d7b122ba6b

                                    SHA1

                                    f505be1c58b7121b205f45120e9a2dfc4996ece6

                                    SHA256

                                    bde232cef06ad28e507fabe5ba43d6cb47673925092a1a9c12db10db68f7c4d5

                                    SHA512

                                    d08f9a134ed2e1183543ca430be6851c2b6162f1c5b74174713535587d5e0741cc0f141767c550cbd142769ea58989475d87420e6034fde37c66b4ce734652f0

                                  • C:\Program Files (x86)\iMobie\DroidKit\Core.Tracing.dll

                                    Filesize

                                    43KB

                                    MD5

                                    2cbb5aff6b89858b06c4c14a736437a6

                                    SHA1

                                    61df5e1ec9efab1c9c934b418c2f9be1f24a9857

                                    SHA256

                                    008079ce2b9886bd957d6c75d91f18c0469a485dcabc6f55cdb61282e52d199f

                                    SHA512

                                    72a9acf64ca7f4e35bc7c094a53a017ba01d997e739af902ceac03b85494302b08eebf2cb1f75eef77c06d74c6ef6048b2a7e3286e22cd7da7d3e874d31a7920

                                  • C:\Program Files (x86)\iMobie\DroidKit\DroidKit.Main.exe

                                    Filesize

                                    369KB

                                    MD5

                                    54a92cfe0d35dd76165aebad00a94d2b

                                    SHA1

                                    72d46209d65d02fa041148542bf197f6a21c44cc

                                    SHA256

                                    4475e64459d0003a9980c45776893454006f84c6e5870265c8aaa91a8d78f145

                                    SHA512

                                    62ff9a18cd77fcc3c1eb28fcd767cb7e144a9c567e163db337149fb192cf225d2acfa444588c2e07eaf020329a71ebc91b7aaeb46c0b83e1535962bac062da4f

                                  • C:\Program Files (x86)\iMobie\DroidKit\DroidKit.exe

                                    Filesize

                                    134KB

                                    MD5

                                    4bff532cb6c7a95533879c93acf657f8

                                    SHA1

                                    e59a9758b459ac0381f9d83707a49759d4b88967

                                    SHA256

                                    0be4dab72c61e9c255337786cfe9cb147decf5deba3c8e74517da2d5b4ac8db5

                                    SHA512

                                    7a8edf224aaf43fb338f7386960e5556e6ebb89d7b00ab718bcf3fee62e4ca5665988e043b0490438fab494bad5ac059142a8ab9bc8ab29293a3c1469cb311a3

                                  • C:\Program Files (x86)\iMobie\DroidKit\DroidKit.exe.config

                                    Filesize

                                    1KB

                                    MD5

                                    37c8496f8bb31c32b20a12465731e134

                                    SHA1

                                    2f9f4e6b75bcc6bb8cae2505150acd2e61244adf

                                    SHA256

                                    3bbfeb77ee305c4ee95362d2caca743af8e34ac1cb752487c1c2a14edf3dce51

                                    SHA512

                                    458150c1937d0fc4d3f3ba7d9fe2ddc2a446f370c568018b1a02ee477bbd4843883518a4b9def4c3f2d566a5636bf304c9c657bb960870c5cb35ed955d8f20d4

                                  • C:\Program Files (x86)\iMobie\DroidKit\Help.ico

                                    Filesize

                                    187KB

                                    MD5

                                    9ca6d8dcdc3a93521270fcb52c33e491

                                    SHA1

                                    42da181d0f73676197f50f3a2203708dd2543c0c

                                    SHA256

                                    7056eda1128f8a3a0c7217885972359cee99b6a62a62d4bd7bad79b04d7db227

                                    SHA512

                                    d28bce4de41036f25493ea28c64e840f8b62325eee6dbad03a4bb32439396aef16cf73eaaa95e975b82786c2aeac4eba86c13a6d703e616ef3ec82f41e463e28

                                  • C:\Program Files (x86)\iMobie\DroidKit\Language.Default.dll

                                    Filesize

                                    195KB

                                    MD5

                                    8ad392268a27d055700e7f672fe1e928

                                    SHA1

                                    19bcaa4685842883eed1cb0488a41da182ba3af8

                                    SHA256

                                    6120cc40b8518e51f1dd2d255961538d6fdf230a55ea7e651e705823be019179

                                    SHA512

                                    01448e2ca748076ebb29bf2298ef25bfeaa38cef8897745e63f23aa9df1ef7f4623036cd0c599fb4c04407db4180e96b7e20113e4d3e4db4336f59d4bf98f8f5

                                  • C:\Program Files (x86)\iMobie\DroidKit\Prism.Unity.Wpf.dll

                                    Filesize

                                    29KB

                                    MD5

                                    cce587b8ff219b482e304e8d1105335d

                                    SHA1

                                    349e075ed476d9ebef6f939848a04221ab740151

                                    SHA256

                                    5429cd9cca2e972c2d0607767967b7e78db3dc4c74c874c96be66bf11c2c95cc

                                    SHA512

                                    fe3286efe04d229484f9a56b591409884c0cc58413bd54d0d10d245efee88f6060d0dd2d326ef02176c90a9c5f1e7245415515cdee43c8681c1555bdaeb7e312

                                  • C:\Program Files (x86)\iMobie\DroidKit\Prism.Wpf.dll

                                    Filesize

                                    143KB

                                    MD5

                                    f9fcc9bf77158750f4dc5f3ae063378f

                                    SHA1

                                    63b6c36c7d30e02abf873049e41a505f671e6c4a

                                    SHA256

                                    39849a5ad96c2f524c653e423a466aac1412d462f18a7c5264956b23c7f57d01

                                    SHA512

                                    8a5acf576ad98804ff258f2833d5f4bdbfeb8b181469d4ad37e5306fa116caba57c7de979bec37967ee78498268c8359e0a15aa813b07f3194dcfbd52cdba525

                                  • C:\Program Files (x86)\iMobie\DroidKit\Prism.dll

                                    Filesize

                                    74KB

                                    MD5

                                    3512d7bd528fa43472d63e413791784a

                                    SHA1

                                    103456791eaa487742bd71e1d4892d20dc46bbd1

                                    SHA256

                                    8c635d69f8b1e9bea6940d0f1fdf5a6604be8532018d9712cde0df1389d23a8c

                                    SHA512

                                    f923409e03419ccaeecf40d782dac50c016d06726b658b73e641182d0467c4cec478d75a3231107e6aa731c18693e344ba48869086a7a15da8852c9e3faf8b91

                                  • C:\Program Files (x86)\iMobie\DroidKit\ResourcesBridge.dll

                                    Filesize

                                    109KB

                                    MD5

                                    e01458c0341ce2e620de53d7ecae642e

                                    SHA1

                                    8c3874c5c5e0f1a7e1df1fd6a620e9811ecf570a

                                    SHA256

                                    991ad3eeb4cb4cfd37a53d621d8a40c2180c85958465b2726265a1c31bcedb20

                                    SHA512

                                    894bb3a91abb7b67121ae6922037a993577df08700ea5177342eef7bcb49d63ef598fa750a00095e4c8f05c3f881a4cd0e7bfd4a4586db96a59b4a9a7d994cff

                                  • C:\Program Files (x86)\iMobie\DroidKit\Theme.Default.dll

                                    Filesize

                                    36.1MB

                                    MD5

                                    f1740c63effee7bf9d766cdfc48a20d2

                                    SHA1

                                    a8316f298d969e9c5d61c1e36999eac6d083a150

                                    SHA256

                                    86bff28d1fc5f4e5c330af898ea34a7f04a5174c76d9a5616fe6e91aede0736b

                                    SHA512

                                    0268e561095cf7c9881e0b8b1370d91d268f8f0a26bbb3d26a4667bd44bfa2c3bda41affd8aeeec38a703ad9640e47e92cc6f01cce59e36783fd714c2ade94f2

                                  • C:\Program Files (x86)\iMobie\DroidKit\Utilities.UI.dll

                                    Filesize

                                    76KB

                                    MD5

                                    e8f53cacc10bc0731fa5dde221e3c8df

                                    SHA1

                                    7c9a1dfc60144dba2452166dadbf81d72f5588fc

                                    SHA256

                                    6544afbae436d116d26f766ccf024d0160fbcf689859294aae3d133de2b8a07f

                                    SHA512

                                    2be6c069060c013ef679d9b22fe1b87ff1d136be9ab421c2ab26100725b43a1e42694f742a11e3fc8c5759242d4cf5662c572a5c2817a9e694b0b92898439a33

                                  • C:\Program Files (x86)\iMobie\DroidKit\Utilities.dll

                                    Filesize

                                    4.7MB

                                    MD5

                                    15da831e042c6691bb461fb3476d655e

                                    SHA1

                                    15b5788d3fe43840e0cdbb9fa7f8aa7bfef4f80e

                                    SHA256

                                    909f5924f39c9c018aa8b972bc0b86262c0f959f76d9be4a86a6340dde7585b9

                                    SHA512

                                    660a7a0df431ffa08141a510947ebc9e882aaa7ace4c07e6374629d071e03d6d321dbb56ba82e7ea30a9ac43414361cd2c239b8047e5ade4f5bb56b1599e42ae

                                  • C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.desktop\ADDITIONAL_LICENSE_INFO

                                    Filesize

                                    49B

                                    MD5

                                    19c9d1d2aad61ce9cb8fb7f20ef1ca98

                                    SHA1

                                    2db86ab706d9b73feeb51a904be03b63bee92baf

                                    SHA256

                                    ebf9777bd307ed789ceabf282a9aca168c391c7f48e15a60939352efb3ea33f9

                                    SHA512

                                    7ec63b59d8f87a42689f544c2e8e7700da5d8720b37b41216cbd1372c47b1bc3b892020f0dd3a44a05f2a7c07471ff484e4165427f1a9cad0d2393840cd94e5b

                                  • C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.desktop\ASSEMBLY_EXCEPTION

                                    Filesize

                                    44B

                                    MD5

                                    7caf4cdbb99569deb047c20f1aad47c4

                                    SHA1

                                    24e7497426d27fe3c17774242883ccbed8f54b4d

                                    SHA256

                                    b998cda101e5a1ebcfb5ff9cddd76ed43a2f2169676592d428b7c0d780665f2a

                                    SHA512

                                    a1435e6f1e4e9285476a0e7bc3b4f645bbafb01b41798a2450390e16b18b242531f346373e01d568f6cc052932a3256e491a65e8b94b118069853f2b0c8cd619

                                  • C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.desktop\LICENSE

                                    Filesize

                                    33B

                                    MD5

                                    16989bab922811e28b64ac30449a5d05

                                    SHA1

                                    51ab20e8c19ee570bf6c496ec7346b7cf17bd04a

                                    SHA256

                                    86e0516b888276a492b19f9a84f5a866ed36925fae1510b3a94a0b6213e69192

                                    SHA512

                                    86571f127a6755a7339a9ed06e458c8dc5898e528de89e369a13c183711831af0646474986bae6573bc5155058d5f38348d6bfdeb3fd9318e98e0bf7916e6608

                                  • C:\Program Files (x86)\iMobie\DroidKit\libusbK.dll

                                    Filesize

                                    166KB

                                    MD5

                                    3935ec3158d0e488da1929b77edd1633

                                    SHA1

                                    bd6d94704b29b6cef3927796bfe22a2d09ee4fe7

                                    SHA256

                                    87cbd1f3bf5ab72089a879df110263784602a574c0ae83f428df57ae2f8115db

                                    SHA512

                                    5173891b1dfad2298910236a786c7b9bbcfce641491a25f933022088c81465fb93fd2385d270e9a0632f674355538da464d1edacf511140d6f31d91d1afe64fc

                                  • C:\Program Files (x86)\iMobie\DroidKit\log4net.dll

                                    Filesize

                                    264KB

                                    MD5

                                    27fe8d18682fd9901e589e65ef429b23

                                    SHA1

                                    6426e96243911beab547f2bc98a252a26692f11f

                                    SHA256

                                    896ab9cac41e3977792ba2034ea8730610c2779fa51bab6bed426094ea8d3ecd

                                    SHA512

                                    9d6bc8c77c72cbad15e808281818c2768f1b44aa6ea1d54a979c91218b8fbf2a02fee49fa97db6cfa6087ddc363d6cdd6407e4494934b4568c514437030a2615

                                  • C:\Program Files (x86)\iMobie\DroidKit\x86\libusb0.dll

                                    Filesize

                                    45KB

                                    MD5

                                    8574627d4a5415c36176bf4ab9058183

                                    SHA1

                                    a50ab8e8983ce2afa54cb23e4629c83889cd0c56

                                    SHA256

                                    3b8c37db1af7f30a2baff39b587ecf7edd30027ee3e91d5e596e39dd0f0e3908

                                    SHA512

                                    ea27c071f047d200f45c5c82943e39df05bf5755aa72c44983ed367fc1d2ba30781cd24a0ff4e4da6224106d9f639f0872848d0fa7058f088467d1b4b5205954

                                  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\iMobie\DroidKit\DroidKit Online Help.url

                                    Filesize

                                    213B

                                    MD5

                                    cc99a9c0b700052a7902f697b58ed058

                                    SHA1

                                    30cb88fe7f8171e82c824df40b0b9afa379abfac

                                    SHA256

                                    3f6dcf365afec198abe4c2358bf937bc2ea9ff558d3cfa8a1bce75969d208667

                                    SHA512

                                    059bdd6164ac6f5af32a8419853e7d6ab6bf757a7ff3093849b9be55b2d6e9e9866722aa5d213097f2f47481fcbb4a2407c29ae936cfa16dc64b617ea5c99029

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                                    Filesize

                                    717B

                                    MD5

                                    822467b728b7a66b081c91795373789a

                                    SHA1

                                    d8f2f02e1eef62485a9feffd59ce837511749865

                                    SHA256

                                    af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

                                    SHA512

                                    bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61

                                    Filesize

                                    299B

                                    MD5

                                    5ae8478af8dd6eec7ad4edf162dd3df1

                                    SHA1

                                    55670b9fd39da59a9d7d0bb0aecb52324cbacc5a

                                    SHA256

                                    fe42ac92eae3b2850370b73c3691ccf394c23ab6133de39f1697a6ebac4bedca

                                    SHA512

                                    a5ed33ecec5eecf5437c14eba7c65c84b6f8b08a42df7f18c8123ee37f6743b0cf8116f4359efa82338b244b28938a6e0c8895fcd7f7563bf5777b7d8ee86296

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                    Filesize

                                    1KB

                                    MD5

                                    367be39f0f0bd10ee528276085ebdf48

                                    SHA1

                                    bd2d8f3b91e3d0e5dcca4c0734f27ca4b0f257ce

                                    SHA256

                                    6568d4a4c638ae3fec4d5bef16d7f5378195466005a7d7de3667b501878e566c

                                    SHA512

                                    1e33cbeabbf89c1d5f5320be70459a27b2b4fdbbb4e5bd8fdcd4f4dea5b5b7761e49ca4cc72dd0a33423e4ce15353495eeef01472c7cb005c9d9dd4ea9d4a606

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

                                    Filesize

                                    724B

                                    MD5

                                    ac89a852c2aaa3d389b2d2dd312ad367

                                    SHA1

                                    8f421dd6493c61dbda6b839e2debb7b50a20c930

                                    SHA256

                                    0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

                                    SHA512

                                    c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_58B04C7F2B427798A9D4E10FBBBAEBE8

                                    Filesize

                                    471B

                                    MD5

                                    b7c5776f549c99697a2c1d6cdf52ba28

                                    SHA1

                                    b5960ff8171247901c0ef10fbe18619b58f90dec

                                    SHA256

                                    ac01195b04bf5b2a293b144238c8c4d649b4d9c1987686784b28a3596e36e654

                                    SHA512

                                    8bb0a996c31014dec2ba2621972538f4ee5fc20caddf8c055af01d4dbe20438d209013db180266fbf21ed1ab1e042e060adf863c2f0a759b1274378250748fa8

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                                    Filesize

                                    192B

                                    MD5

                                    da5bb5e19aafb6ae0865453e3e1b9e01

                                    SHA1

                                    daa2b50d5bc9292dcfe31f8c15aebb862a7f204e

                                    SHA256

                                    6d8d4e6442b2cebd201bf6b3fe8de960750a715df5817b00180c93c5249b52f6

                                    SHA512

                                    30cad7eb8b828ba74b10b48d2ba97d021f06966a56e3ac9e3081c1f5d41079a1101e5f9d206910bcd219e4d0d9d5c32558e5abcbcd998a4663b925d128bd9879

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61

                                    Filesize

                                    192B

                                    MD5

                                    80d5d675191a09071fdae8f8a9e094c8

                                    SHA1

                                    23ffa3fabf1d529dba8f86bf82ab1ba87aff77d6

                                    SHA256

                                    0c5b4954c950b72049191a827a68b671f7dfa45606783365d92773f200aaaf65

                                    SHA512

                                    c0c0f7646b2535c103d9484e9930731036bfc66d5ede4618b812454dab1939cfb22b970798a2756b3ece4354ad226e50b80734d5562f2124934cd9522997b683

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                    Filesize

                                    410B

                                    MD5

                                    57c52353695f5a034a3290e06029716d

                                    SHA1

                                    7d6b964a9a3c673a4f713cc018cfcabfdf2ff504

                                    SHA256

                                    f9ceb0d880e97aee5e0c3fd077e4f8d50f200e1ad338064015aa55d3a644fc36

                                    SHA512

                                    ec9c492af414f00da60e63d283a333a20a41021a3ee3cf65732520611388467b3322e97f46b58ee97baec0b6e3382de647257a77d446fd49f0916d394bee4842

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

                                    Filesize

                                    392B

                                    MD5

                                    45b539c2858a953a885ea3fc6f79decc

                                    SHA1

                                    85f2cda332a85cf78b1f3ff970cc9051ead2620f

                                    SHA256

                                    ec3eba853fe7453648bd93eb94b3733d2ab0e12b821b01323080e93d3cd0a17c

                                    SHA512

                                    2f37f62c78d7a7f2a359bb025c83713e188ba498bb55b5de7f46851d9bcf682d17149c192f61f82bdab7131bb85da069aeec5498d803212fe0a437f1e3829aaa

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_58B04C7F2B427798A9D4E10FBBBAEBE8

                                    Filesize

                                    410B

                                    MD5

                                    092dc63ec1669b6b4b08b528bca23d6b

                                    SHA1

                                    c9b6c43f3f3a54ebb167402c9aad1160737ba6bf

                                    SHA256

                                    0c59651a80aec4367b3800c7150404b03d36d86b2631f6ed6996589e4d906b9f

                                    SHA512

                                    4fd75a11e871934d8dc30ebe9c441d5aa665d87c4cfadcb739d498544bbf7e1a14f2196dff8cbc9ae9fa7f83794de9a46ab2421dd85a2a4f9d3729fe3070cd26

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    8ff8bdd04a2da5ef5d4b6a687da23156

                                    SHA1

                                    247873c114f3cc780c3adb0f844fc0bb2b440b6d

                                    SHA256

                                    09b7b20bfec9608a6d737ef3fa03f95dcbeaca0f25953503a321acac82a5e5ae

                                    SHA512

                                    5633ad84b5a003cd151c4c24b67c1e5de965fdb206b433ca759d9c62a4785383507cbd5aca92089f6e0a50a518c6014bf09a0972b4311464aa6a26f76648345e

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    1e4ed4a50489e7fc6c3ce17686a7cd94

                                    SHA1

                                    eac4e98e46efc880605a23a632e68e2c778613e7

                                    SHA256

                                    fc9e8224722cb738d8b32420c05006de87161e1d28bc729b451759096f436c1a

                                    SHA512

                                    5c4e637ac4da37ba133cb1fba8fa2ff3e24fc4ca15433a94868f2b6e0259705634072e5563da5f7cf1fd783fa8fa0c584c00f319f486565315e87cdea8ed1c28

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    264B

                                    MD5

                                    84f06d58321cee1100aac6627a3bb1d1

                                    SHA1

                                    9a9bc4ae4c4e24bf22e6818663d7cea4880ead1f

                                    SHA256

                                    c5757ff98902f37788a12bb20691ab0d2e12ed2c50cc450c8c022fdc157d8c4b

                                    SHA512

                                    2428132ae5033d5431f135b4ad9b9cf8701c42d20d64b39adf9d37233a008d57ffc0581723859695a63993cbb43fe2d9383dcbe3d15aa0a42d38912e412d5fdb

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    1KB

                                    MD5

                                    a8846d133eac11033ec264be88937401

                                    SHA1

                                    3120e3c1f0a30818b7f9f4f7e93368385b03cd4c

                                    SHA256

                                    40b9e264ebde015b75c2aa7f1c7efe9c9b9aea9e4fd27097c0941d7a99bf78c7

                                    SHA512

                                    fb193ce5106ce3e1eb0d1cf289bcab27951e11230982bc61e4161c9ee2f368f90fd1bbb7b617cbbed4324887acda0b8a5457892aba9c693961dd4644d4bf0f90

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    7KB

                                    MD5

                                    f8be0bbec4aaf90f7853f801258bee37

                                    SHA1

                                    76a3e05b0c2cccc17fc38eab25f5a203d6d0be2b

                                    SHA256

                                    245f73147954cc5d8c9fd58b43eedcbb059f3fae15da593d3aae275c6c55f2d0

                                    SHA512

                                    0c1563789fc45756994c227f6884a92cb7588680a48acb072a1a52f249afdca94f378d5e81f7fea99bf2e6656ad9ebe9b527468541effb3963af050c8a04c9a2

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    fc9f9163cddc605d0bdce038940aa207

                                    SHA1

                                    c3e06d83c84cdd1f4e963e9af9e2fea28e4f1a5e

                                    SHA256

                                    e6540c2b1d90ee90ec73bc2e62acbc47bdb0a5b9e9f237bd875d952ce419d2bd

                                    SHA512

                                    70752a65d312200903c97a6aae449b6cd5be84aec74e9ab81cf8413c444ac90435f979d7246ddedf90a82a72840492d641ecc566844eb1510f16c1bb68ec8500

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    cb79cb29de916823cc1d2e35710bb2ad

                                    SHA1

                                    12e67a507d5618bb0370de638f28141a6f4772f6

                                    SHA256

                                    c4fbd6bb274f301a430b36ab1bf3315c505c3350debc47b131f619883dd183f4

                                    SHA512

                                    5548656a8b603b75690d040b1291e20eb3749185d29965e4d8c59c5be56b98f752ea00f9e09b0e1e58565da3c5c71f23d7d4b5ce804844711719f28a0af48f87

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    46295cac801e5d4857d09837238a6394

                                    SHA1

                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                    SHA256

                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                    SHA512

                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    206702161f94c5cd39fadd03f4014d98

                                    SHA1

                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                    SHA256

                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                    SHA512

                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    adff071fe898a5d04f7563fe9cd2bfb2

                                    SHA1

                                    e7c48d8c7e524e9a406cb22e94b0108df8f93276

                                    SHA256

                                    b5811e007908e1b42b03c3d540384a1c91dd7675f241fa04f38a8500a2e099e1

                                    SHA512

                                    6008d788b56708729d8497ab2790fb200d705c777ebeac038c0895bb67ec85ed53f931aa752d2a8c4929979cb4b3ebae352e2841a3f5eecf53d362bba0ab6e61

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    259f0a2e6c75128ee3126c097e099a9f

                                    SHA1

                                    7d411ac3c7875a722e9b5f04739e78f44ba2fbb4

                                    SHA256

                                    1ebe8a2bc9b21811f93b8a76d7c63bf20a76bba00503819b56053ce21776d729

                                    SHA512

                                    3ce21a0c0aa1ab44508d0dd90ac89dca3c31a73a73d62c13dc979ebf30fdee9b98f54b968d3a98b627e920d0c110832a18c8401ee6d635b15f6ff3427e5b475d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    f81e33f15d1e5e0d5c0b40c73f63fdc5

                                    SHA1

                                    f80c2aaf3de50d74eefc48a4b8b15ddf0e6ad5ab

                                    SHA256

                                    2b9e6e8fe7a6dceae7cfc36536e44c6e8fdb9f5085019cf25b5a474b5f578c60

                                    SHA512

                                    a1f216f49c163e12f5668f237e1553721e442250f5eb1bbdaf2a84567240e92ef449f674b4487e63e6c36fcb9abd09f603d2c499eb676a4605d7b47e1bf927b7

                                  • C:\Users\Admin\AppData\Local\Temp\nsu3A2B.tmp\BgWorker.dll

                                    Filesize

                                    2KB

                                    MD5

                                    33ec04738007e665059cf40bc0f0c22b

                                    SHA1

                                    4196759a922e333d9b17bda5369f14c33cd5e3bc

                                    SHA256

                                    50f735ab8f3473423e6873d628150bbc0777be7b4f6405247cddf22bb00fb6be

                                    SHA512

                                    2318b01f0c2f2f021a618ca3e6e5c24a94df5d00154766b77160203b8b0a177c8581c7b688ffe69be93a69bc7fd06b8a589844d42447f5060fb4bcf94d8a9aef

                                  • C:\Users\Admin\AppData\Local\Temp\nsu3A2B.tmp\CheckProVs.dll

                                    Filesize

                                    7KB

                                    MD5

                                    62e85098ce43cb3d5c422e49390b7071

                                    SHA1

                                    df6722f155ce2a1379eff53a9ad1611ddecbb3bf

                                    SHA256

                                    ee7e26894cbf89c93ae4df15bdb12cd9a21f5deacedfa99a01eefe8fa52daec2

                                    SHA512

                                    dfe7438c2b46f822e2a810bc355e5226043547608d19d1c70314e4325c06ad9ad63a797905e30d19f5d9a86ee1a6d9c28f525a298731e79dbf6f3d6441179a8e

                                  • C:\Users\Admin\AppData\Local\Temp\nsu3A2B.tmp\GoogleTracingLib.dll

                                    Filesize

                                    36KB

                                    MD5

                                    d8fca35ff95fe00a7174177181f8bd13

                                    SHA1

                                    fbafea4d2790dd2c0d022dfb08ded91de7f5265e

                                    SHA256

                                    ad873f1e51e6d033e5507235ec735957256ebeeb0d3f22aa0b57bb4bd0846e4c

                                    SHA512

                                    eb530b10f137cb0cdfdcd2c11fd9f50f774e0ce44e9d2da3e755f6a6df24fe6e7525c27b109e3e68e9d3e49a889937a22f4d9d78703b1055a83b8a58808a58ba

                                  • C:\Users\Admin\AppData\Local\Temp\nsu3A2B.tmp\System.dll

                                    Filesize

                                    11KB

                                    MD5

                                    ca332bb753b0775d5e806e236ddcec55

                                    SHA1

                                    f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f

                                    SHA256

                                    df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d

                                    SHA512

                                    2de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00

                                  • C:\Users\Admin\AppData\Local\Temp\nsu3A2B.tmp\msvcp100.dll

                                    Filesize

                                    593KB

                                    MD5

                                    d029339c0f59cf662094eddf8c42b2b5

                                    SHA1

                                    a0b6de44255ce7bfade9a5b559dd04f2972bfdc8

                                    SHA256

                                    934d882efd3c0f3f1efbc238ef87708f3879f5bb456d30af62f3368d58b6aa4c

                                    SHA512

                                    021d9af52e68cb7a3b0042d9ed6c9418552ee16df966f9ccedd458567c47d70471cb8851a69d3982d64571369664faeeae3be90e2e88a909005b9cdb73679c82

                                  • C:\Users\Admin\AppData\Local\Temp\nsu3A2B.tmp\msvcr100.dll

                                    Filesize

                                    809KB

                                    MD5

                                    366fd6f3a451351b5df2d7c4ecf4c73a

                                    SHA1

                                    50db750522b9630757f91b53df377fd4ed4e2d66

                                    SHA256

                                    ae3cb6c6afba9a4aa5c85f66023c35338ca579b30326dd02918f9d55259503d5

                                    SHA512

                                    2de764772b68a85204b7435c87e9409d753c2196cf5b2f46e7796c99a33943e167f62a92e8753eaa184cd81fb14361e83228eb1b474e0c3349ed387ec93e6130

                                  • C:\Users\Admin\AppData\Local\Temp\nsu3A2B.tmp\nsDui.dll

                                    Filesize

                                    10.0MB

                                    MD5

                                    368841af8b0074e348418f106716e603

                                    SHA1

                                    75469510665b651b38e3b4fb7c4240722c756126

                                    SHA256

                                    3be54dea5aedc0d8d16d6c4bd4e046e2d93bfc550a1a035a94768c2d5901e327

                                    SHA512

                                    3804afa3930a90f258a2b4e7106e1d0211e5d4ca6a7f5ba23da11e3908b4e202295ddbcb1ecf1e15215bc9a0aece1a46efad07ad94feddd4f316b0de674c50d5

                                  • C:\Users\Admin\AppData\Local\Temp\nsu3A2B.tmp\nsProcess.dll

                                    Filesize

                                    4KB

                                    MD5

                                    f0438a894f3a7e01a4aae8d1b5dd0289

                                    SHA1

                                    b058e3fcfb7b550041da16bf10d8837024c38bf6

                                    SHA256

                                    30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

                                    SHA512

                                    f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

                                  • C:\Users\Admin\AppData\Local\Temp\nsu3A2B.tmp\nsis7z.dll

                                    Filesize

                                    313KB

                                    MD5

                                    06a47571ac922f82c098622b2f5f6f63

                                    SHA1

                                    8a581c33b7f2029c41edaad55d024fc0d2d7c427

                                    SHA256

                                    e4ab3064f2e094910ae80104ef9d371ccb74ebbeeed592582cf099acd83f5fe9

                                    SHA512

                                    04b3d18042f1faa536e1393179f412a5644d2cf691fbc14970f79df5c0594eeedb0826b495807a3243f27aaa0380423c1f975fe857f32e057309bb3f2a529a83

                                  • C:\Users\Admin\AppData\Local\Temp\nsu3A2B.tmp\registry.dll

                                    Filesize

                                    24KB

                                    MD5

                                    2b7007ed0262ca02ef69d8990815cbeb

                                    SHA1

                                    2eabe4f755213666dbbbde024a5235ddde02b47f

                                    SHA256

                                    0b25b20f26de5d5bd795f934c70447112b4981343fcb2dfab3374a4018d28c2d

                                    SHA512

                                    aa75ee59ca0b8530eb7298b74e5f334ae9d14129f603b285a3170b82103cfdcc175af8185317e6207142517769e69a24b34fcdf0f58ed50a4960cbe8c22a0aca

                                  • C:\Users\Admin\AppData\Local\Temp\nsu3A2B.tmp\track_Official-es.txt

                                    Filesize

                                    31B

                                    MD5

                                    f54fc12cec48ef26292c26de6c74b266

                                    SHA1

                                    851372eb1efb727c12d7483c28216d2591b4cc4f

                                    SHA256

                                    c238a16a30e777602432f60932c4c2ecb908b5d9aece661c4926eb02e2230d04

                                    SHA512

                                    3505827e76813220ba53984c340d48cbb059f3549253c8871028c0675aa2ae486a11bd49d73fcac5ae50318804d51f704f8da003e3d3efd64561ceb390bc28df

                                  • C:\Users\Admin\AppData\Local\Temp\nsu3A2B.tmp\uninstall.exe

                                    Filesize

                                    8.1MB

                                    MD5

                                    8cf66dc36cb0bc65799819060cd4fe5e

                                    SHA1

                                    834e9d6c79d99baa1592705c01dd2dd2a91f93f4

                                    SHA256

                                    d01e365210b9d7040322e568fc1fb036487da4848f293e83cedc962a3eed2c70

                                    SHA512

                                    f45eb7b920578fb3fffd2021231b3063aa47928855530f9019aeb9b4cfceabe6fb176d642fbfb9b64bda83f926b4d771616189e45ba688eb6f1264f4495f3a96

                                  • C:\Users\Admin\AppData\Local\Temp\nsu3A2B.tmp\uninstall.ini

                                    Filesize

                                    52B

                                    MD5

                                    e978a46d7e23c139e4df7b526f86745f

                                    SHA1

                                    f280d921ff3bbf5e171b0f6aa9e48e9914e32dd6

                                    SHA256

                                    435288e587018aa375e8a4bf3f35cd8dfffd559053f5ca6a0e487a61ff23e5db

                                    SHA512

                                    7b7150f3b2385d7a7264839d626e9b7c7026868d57f9f5df7d42ddb01688a7bf3008937ef2aa06c3f49089cb4cfbbfb8b6d9661fbc6a4f8e555305552759a75f

                                  • C:\Users\Admin\AppData\Local\lang_info.xml

                                    Filesize

                                    3KB

                                    MD5

                                    b36489cb554c11a7bf85cd14c7c1cb84

                                    SHA1

                                    c7349c67c34aa9d536dba6c20e5aaa65095db710

                                    SHA256

                                    85ced2c6b72c435ca255179c6136c8b25061fe1a6981c9b7fdfd8c7d359955d2

                                    SHA512

                                    fd3adc41759e7f789110a8d13a60a5503ea45fccd3fe7d773ad44a284dc3eed89585c76422678051a390266711c11cc5a3bb9aff569f0ddced3bc359b3054922

                                  • C:\Users\Admin\AppData\Roaming\iMobie\DroidKit\ErrorLog\log_system.log

                                    Filesize

                                    2KB

                                    MD5

                                    80eea9cdf4bf1c3fd53b237959a0ac7c

                                    SHA1

                                    f1d4249cccdfd5929e441aa593263e0a62d42c1b

                                    SHA256

                                    52e424e4bd3f6a5b79d030c10815b22fc55fe33a4ec28eb133ec9b292bc49257

                                    SHA512

                                    8b0623ce0f94fa9458236db5294b3d1d4aaed47dd3fe816dc2e5f2caa90502ef3c1452692b4deb4a2a5748e08200a49d96eef61fa38db10e822fd9c4328207e1

                                  • F:\iMobie\DroidKit\settings

                                    Filesize

                                    1KB

                                    MD5

                                    f9e7bd7f460010ad6e0928bfc7c158f7

                                    SHA1

                                    9591ea28790605219347d5c76b3c8a924f193609

                                    SHA256

                                    f2178b13663f6dde182d855d3e724c28dd64c3693efde7593f20d126b0c6640b

                                    SHA512

                                    ec55df0e8ebc36e857dd710ab9a1b70a3c63d016cfb950ec916860f484d8ae50d6a312a31b8363613864414c9e6cdcec9ff52e09e30fb63b88fe4fc9f2884a3b

                                  • memory/3660-1690-0x0000012AFA690000-0x0000012AFA698000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/3660-1728-0x0000012AFC000000-0x0000012AFC17C000-memory.dmp

                                    Filesize

                                    1.5MB

                                  • memory/3660-1612-0x0000012AFA180000-0x0000012AFA1B4000-memory.dmp

                                    Filesize

                                    208KB

                                  • memory/3660-1604-0x0000012AE18D0000-0x0000012AE1916000-memory.dmp

                                    Filesize

                                    280KB

                                  • memory/3660-1602-0x0000012AFA6A0000-0x0000012AFAB50000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3660-1977-0x0000012AFB030000-0x0000012AFB038000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/3660-1652-0x0000012AFCF70000-0x0000012AFF384000-memory.dmp

                                    Filesize

                                    36.1MB

                                  • memory/3660-1655-0x0000012AE1920000-0x0000012AE1936000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/3660-1600-0x0000012ADFF40000-0x0000012ADFF56000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/3660-1656-0x0000012AFA420000-0x0000012AFA454000-memory.dmp

                                    Filesize

                                    208KB

                                  • memory/3660-1657-0x0000012AE17A0000-0x0000012AE17AE000-memory.dmp

                                    Filesize

                                    56KB

                                  • memory/3660-1663-0x0000012AFA4C0000-0x0000012AFA51E000-memory.dmp

                                    Filesize

                                    376KB

                                  • memory/3660-1662-0x0000012AFA3E0000-0x0000012AFA3F4000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/3660-1664-0x0000012AFAB50000-0x0000012AFAC2A000-memory.dmp

                                    Filesize

                                    872KB

                                  • memory/3660-1972-0x0000012AFBA10000-0x0000012AFBBB6000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3660-1688-0x0000012AFA5D0000-0x0000012AFA5E6000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/3660-1691-0x0000012AFAFE0000-0x0000012AFAFE8000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/3660-1597-0x0000012AE1710000-0x0000012AE1738000-memory.dmp

                                    Filesize

                                    160KB

                                  • memory/3660-1689-0x0000012AFA4B0000-0x0000012AFA4BC000-memory.dmp

                                    Filesize

                                    48KB

                                  • memory/3660-1692-0x0000012AFB010000-0x0000012AFB026000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/3660-1693-0x0000012AFAFF0000-0x0000012AFB000000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3660-1694-0x0000012AFB000000-0x0000012AFB00E000-memory.dmp

                                    Filesize

                                    56KB

                                  • memory/3660-1695-0x0000012AFB070000-0x0000012AFB0A8000-memory.dmp

                                    Filesize

                                    224KB

                                  • memory/3660-1696-0x0000012AFB120000-0x0000012AFB184000-memory.dmp

                                    Filesize

                                    400KB

                                  • memory/3660-1697-0x0000012AFB190000-0x0000012AFB1DC000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/3660-1698-0x0000012AFB1E0000-0x0000012AFB226000-memory.dmp

                                    Filesize

                                    280KB

                                  • memory/3660-1699-0x0000012AFB230000-0x0000012AFB274000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/3660-1700-0x0000012AFB280000-0x0000012AFB2C4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/3660-1702-0x0000012AFB320000-0x0000012AFB368000-memory.dmp

                                    Filesize

                                    288KB

                                  • memory/3660-1701-0x0000012AFB2D0000-0x0000012AFB312000-memory.dmp

                                    Filesize

                                    264KB

                                  • memory/3660-1704-0x0000012AFB0B0000-0x0000012AFB0F0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/3660-1703-0x0000012AFB370000-0x0000012AFB3B4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/3660-1707-0x0000012AFB3C0000-0x0000012AFB3FA000-memory.dmp

                                    Filesize

                                    232KB

                                  • memory/3660-1706-0x0000012AFB460000-0x0000012AFB4A2000-memory.dmp

                                    Filesize

                                    264KB

                                  • memory/3660-1714-0x0000012AFB0F0000-0x0000012AFB11A000-memory.dmp

                                    Filesize

                                    168KB

                                  • memory/3660-1705-0x0000012AFB410000-0x0000012AFB452000-memory.dmp

                                    Filesize

                                    264KB

                                  • memory/3660-1715-0x0000012AFB4B0000-0x0000012AFB4C4000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/3660-1716-0x0000012AFB050000-0x0000012AFB058000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/3660-1717-0x0000012AFB060000-0x0000012AFB06A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/3660-1718-0x0000012AFB400000-0x0000012AFB408000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/3660-1719-0x0000012AFB8F0000-0x0000012AFB90C000-memory.dmp

                                    Filesize

                                    112KB

                                  • memory/3660-1720-0x0000012AFB8D0000-0x0000012AFB8DA000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/3660-1721-0x0000012AFBBE0000-0x0000012AFBBFA000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/3660-1724-0x0000012AFF390000-0x0000012AFFE6E000-memory.dmp

                                    Filesize

                                    10.9MB

                                  • memory/3660-1725-0x0000012AFC130000-0x0000012AFC660000-memory.dmp

                                    Filesize

                                    5.2MB

                                  • memory/3660-1726-0x0000012AFC210000-0x0000012AFC812000-memory.dmp

                                    Filesize

                                    6.0MB

                                  • memory/3660-1727-0x0000012AFBD40000-0x0000012AFBE80000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/3660-1610-0x0000012AE1780000-0x0000012AE179E000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/3660-1729-0x0000012AFCB90000-0x0000012AFCEF6000-memory.dmp

                                    Filesize

                                    3.4MB

                                  • memory/3660-1730-0x0000012A80380000-0x0000012A806FB000-memory.dmp

                                    Filesize

                                    3.5MB

                                  • memory/3660-1731-0x0000012AFBCA0000-0x0000012AFBD3C000-memory.dmp

                                    Filesize

                                    624KB

                                  • memory/3660-1732-0x0000012AFBE80000-0x0000012AFBEE6000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/3660-1733-0x0000012AFBC00000-0x0000012AFBC20000-memory.dmp

                                    Filesize

                                    128KB

                                  • memory/3660-1734-0x0000012B00000000-0x0000012B00286000-memory.dmp

                                    Filesize

                                    2.5MB

                                  • memory/3660-1735-0x0000012AFBC60000-0x0000012AFBCA0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/3660-1736-0x0000012AFBF60000-0x0000012AFBFC6000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/3660-1737-0x00007FF87CC60000-0x00007FF87CFCC000-memory.dmp

                                    Filesize

                                    3.4MB

                                  • memory/3660-1743-0x0000012AFC1D0000-0x0000012AFC20E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/3660-1742-0x0000012AFC180000-0x0000012AFC1D0000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/3660-1741-0x0000012AFBBC0000-0x0000012AFBBD0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3660-1749-0x0000012AFC840000-0x0000012AFC856000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/3660-1748-0x0000012AFC820000-0x0000012AFC834000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/3660-1747-0x0000012AFBF30000-0x0000012AFBF48000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/3660-1746-0x0000012AFBF10000-0x0000012AFBF24000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/3660-1745-0x0000012AFBFD0000-0x0000012AFC000000-memory.dmp

                                    Filesize

                                    192KB

                                  • memory/3660-1744-0x0000012AFBEF0000-0x0000012AFBF0A000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/3660-1740-0x0000012AFBC20000-0x0000012AFBC36000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/3660-1751-0x0000012AFBBC0000-0x0000012AFBBC8000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/3660-1750-0x0000012AFBC60000-0x0000012AFBC74000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/3660-1752-0x0000012AFBCC0000-0x0000012AFBCC8000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/3660-1754-0x0000012AFBD30000-0x0000012AFBD3A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/3660-1760-0x0000012AFBF30000-0x0000012AFC034000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/3660-1761-0x0000012AFBE80000-0x0000012AFBED2000-memory.dmp

                                    Filesize

                                    328KB

                                  • memory/3660-1758-0x0000012AFBDB0000-0x0000012AFBDB8000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/3660-1757-0x0000012AFBDA0000-0x0000012AFBDAC000-memory.dmp

                                    Filesize

                                    48KB

                                  • memory/3660-1753-0x0000012AFBD20000-0x0000012AFBD2E000-memory.dmp

                                    Filesize

                                    56KB

                                  • memory/3660-1764-0x0000012A83700000-0x0000012A8373A000-memory.dmp

                                    Filesize

                                    232KB

                                  • memory/3660-1967-0x0000012AFA4A0000-0x0000012AFA4A8000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/3660-1766-0x0000012AFBE50000-0x0000012AFBE72000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3660-1765-0x0000012A836C0000-0x0000012A836E6000-memory.dmp

                                    Filesize

                                    152KB

                                  • memory/3660-1763-0x0000012AFC0D0000-0x0000012AFC156000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/3660-1595-0x0000012ADFF10000-0x0000012ADFF1C000-memory.dmp

                                    Filesize

                                    48KB

                                  • memory/3660-1593-0x0000012ADFAA0000-0x0000012ADFAFE000-memory.dmp

                                    Filesize

                                    376KB

                                  • memory/3660-1825-0x0000012AFBA10000-0x0000012AFBBB6000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3660-1824-0x0000012AFA010000-0x0000012AFA0AA000-memory.dmp

                                    Filesize

                                    616KB

                                  • memory/3984-1584-0x00000000068B0000-0x000000000690A000-memory.dmp

                                    Filesize

                                    360KB

                                  • memory/3984-1588-0x0000000006960000-0x0000000006976000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/3984-1567-0x0000000005D40000-0x0000000005DA6000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/3984-1566-0x0000000006180000-0x0000000006630000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3984-1562-0x0000000005C70000-0x0000000005CCE000-memory.dmp

                                    Filesize

                                    376KB

                                  • memory/3984-1558-0x0000000005720000-0x000000000572E000-memory.dmp

                                    Filesize

                                    56KB

                                  • memory/3984-1541-0x0000000000C20000-0x0000000000C44000-memory.dmp

                                    Filesize

                                    144KB

                                  • memory/3984-1598-0x0000000007550000-0x0000000007570000-memory.dmp

                                    Filesize

                                    128KB

                                  • memory/3984-1601-0x0000000007570000-0x00000000078C7000-memory.dmp

                                    Filesize

                                    3.3MB

                                  • memory/4968-1762-0x0000000000400000-0x00000000004D4000-memory.dmp

                                    Filesize

                                    848KB

                                  • memory/5052-1502-0x00000000071C0000-0x0000000007219000-memory.dmp

                                    Filesize

                                    356KB