Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2024 19:06

General

  • Target

    Z-Launcher-GPS5.exe

  • Size

    1.6MB

  • MD5

    e6db71cc80920480219f16c0c54013c7

  • SHA1

    4c7370868e5187d5d017c69df552dd809b76c1a2

  • SHA256

    5b9a78809c6718019832322023e94982761032adb51e1a44ba139d4f63369542

  • SHA512

    0b229b4b3e2cac3cd25748af0cbcc37840825b2d4f9d098e97e183f2f763fe240d0df89ef98a8c19c32e4cee61145d9e6f478598b6598384b6035ab714ebce55

  • SSDEEP

    49152:TkTq24GjdGSiqkqXfd+/9AqYanieKdsfM:T1EjdGSiqkqXf0FLYWC

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1279142597218013264/8mlljrcp8pu-na1Kxr-pwaQv-IeIN4qXz3iwqKTXrY-DPCA89wjqOAQeRKn7qMqu3BR6

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Z-Launcher-GPS5.exe
    "C:\Users\Admin\AppData\Local\Temp\Z-Launcher-GPS5.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:3760
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Wi-Fi Discovery
      • Suspicious use of WriteProcessMemory
      PID:3748
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3668
      • C:\Windows\SysWOW64\netsh.exe
        netsh wlan show profile
        3⤵
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Wi-Fi Discovery
        PID:3792
      • C:\Windows\SysWOW64\findstr.exe
        findstr All
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3544
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5100
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3172
      • C:\Windows\SysWOW64\netsh.exe
        netsh wlan show networks mode=bssid
        3⤵
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:960
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 2936
      2⤵
      • Program crash
      PID:1016
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2084
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3760 -ip 3760
    1⤵
      PID:4428
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3248
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffe795f46f8,0x7ffe795f4708,0x7ffe795f4718
        2⤵
          PID:656
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,6201474639601012424,8367272950595418718,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:2
          2⤵
            PID:4064
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,6201474639601012424,8367272950595418718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3484
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,6201474639601012424,8367272950595418718,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:8
            2⤵
              PID:4176
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6201474639601012424,8367272950595418718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
              2⤵
                PID:228
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6201474639601012424,8367272950595418718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
                2⤵
                  PID:2892
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6201474639601012424,8367272950595418718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:1
                  2⤵
                    PID:492
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6201474639601012424,8367272950595418718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:1
                    2⤵
                      PID:1600
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,6201474639601012424,8367272950595418718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 /prefetch:8
                      2⤵
                        PID:4908
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,6201474639601012424,8367272950595418718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5044
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6201474639601012424,8367272950595418718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:1
                        2⤵
                          PID:864
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6201474639601012424,8367272950595418718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:1
                          2⤵
                            PID:1900
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6201474639601012424,8367272950595418718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:1
                            2⤵
                              PID:64
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2164,6201474639601012424,8367272950595418718,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4748 /prefetch:8
                              2⤵
                                PID:4684
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3168
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3872

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  983cbc1f706a155d63496ebc4d66515e

                                  SHA1

                                  223d0071718b80cad9239e58c5e8e64df6e2a2fe

                                  SHA256

                                  cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c

                                  SHA512

                                  d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  111c361619c017b5d09a13a56938bd54

                                  SHA1

                                  e02b363a8ceb95751623f25025a9299a2c931e07

                                  SHA256

                                  d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc

                                  SHA512

                                  fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  180B

                                  MD5

                                  00a455d9d155394bfb4b52258c97c5e5

                                  SHA1

                                  2761d0c955353e1982a588a3df78f2744cfaa9df

                                  SHA256

                                  45a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed

                                  SHA512

                                  9553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  c8f91937279be988f14f435c6a692c14

                                  SHA1

                                  22a1590bc94f4adea48c2adcfd2f79415cf2d3aa

                                  SHA256

                                  2dc4bda50bae2740d4f19449dba91aa7078a12dc15e35fa55695699acfc7b333

                                  SHA512

                                  7d7cb41705920b69517cace7feb287faf7d01d36a6bfb4bff4961eee106c676017c82f99638f145d940f4b9f18074f4ae8cf04a02836cbf8b82e433b07bc9659

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  85547378b9e0c8dc304ac7d40ce58eaf

                                  SHA1

                                  47d083c0e2ef5b526a34538ce64c5db3aa18f806

                                  SHA256

                                  c14dfb565c1198bf3cdfdf52d9485bffcce731b661eac7eaa30cec362bcc7669

                                  SHA512

                                  df21fd4ae0fef0161812fbaf9f9ac6dc9d376099952a971f1ba99626bba58498ed3acf9598698bd76802446aa7415fc07c8b521ee49d59146a8f46eefd11a870

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  18575785d41e4c1c46c024c50ce2bcc0

                                  SHA1

                                  aed05ca6a0840de056990b1aaa184d495c6a47a8

                                  SHA256

                                  f48c9af63769d8dbd4d27102d82ca79f56eb84ea721134452b44ec98ff1051aa

                                  SHA512

                                  45ae6273449f183993c32b9d7c6753cec55e80509b49f2ff6923931e8b86299e59e3a48c3a821cfcf992201fbbcd3d4930202226259bc9cd5eb6b79efdabbafb

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  46295cac801e5d4857d09837238a6394

                                  SHA1

                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                  SHA256

                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                  SHA512

                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  206702161f94c5cd39fadd03f4014d98

                                  SHA1

                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                  SHA256

                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                  SHA512

                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  10KB

                                  MD5

                                  04dadc2b9e16dd62aea87a490ca58fcb

                                  SHA1

                                  cf5d6a608863de463db8b7ba651b90dbb88a2be5

                                  SHA256

                                  3da641645ad5be4d319b6d73406ce437f9f0a58af15f9c0d8e384632325c2c4b

                                  SHA512

                                  e052494db9a71a2eeb4b85aeab90e8db5d83d751c8b43541a77f73ac673df3de97e3b6e0ffd5b19ad452b8598411c75ea12297c9ebc7feed104ff1d8bf1aba53

                                • C:\Users\Admin\AppData\Local\da40a2b876f63cd5f41fc7256ac870aa\Admin@MKDTRXIT_en-US\Browsers\Firefox\Bookmarks.txt

                                  Filesize

                                  105B

                                  MD5

                                  2e9d094dda5cdc3ce6519f75943a4ff4

                                  SHA1

                                  5d989b4ac8b699781681fe75ed9ef98191a5096c

                                  SHA256

                                  c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

                                  SHA512

                                  d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

                                • C:\Users\Admin\AppData\Local\da40a2b876f63cd5f41fc7256ac870aa\Admin@MKDTRXIT_en-US\Directories\OneDrive.txt

                                  Filesize

                                  25B

                                  MD5

                                  966247eb3ee749e21597d73c4176bd52

                                  SHA1

                                  1e9e63c2872cef8f015d4b888eb9f81b00a35c79

                                  SHA256

                                  8ddfc481b1b6ae30815ecce8a73755862f24b3bb7fdebdbf099e037d53eb082e

                                  SHA512

                                  bd30aec68c070e86e3dec787ed26dd3d6b7d33d83e43cb2d50f9e2cff779fee4c96afbbe170443bd62874073a844beb29a69b10c72c54d7d444a8d86cfd7b5aa

                                • C:\Users\Admin\AppData\Local\da40a2b876f63cd5f41fc7256ac870aa\Admin@MKDTRXIT_en-US\Directories\Startup.txt

                                  Filesize

                                  24B

                                  MD5

                                  68c93da4981d591704cea7b71cebfb97

                                  SHA1

                                  fd0f8d97463cd33892cc828b4ad04e03fc014fa6

                                  SHA256

                                  889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483

                                  SHA512

                                  63455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402

                                • C:\Users\Admin\AppData\Local\da40a2b876f63cd5f41fc7256ac870aa\Admin@MKDTRXIT_en-US\Directories\Videos.txt

                                  Filesize

                                  23B

                                  MD5

                                  1fddbf1169b6c75898b86e7e24bc7c1f

                                  SHA1

                                  d2091060cb5191ff70eb99c0088c182e80c20f8c

                                  SHA256

                                  a67aa329b7d878de61671e18cd2f4b011d11cbac67ea779818c6dafad2d70733

                                  SHA512

                                  20bfeafde7fec1753fef59de467bd4a3dd7fe627e8c44e95fe62b065a5768c4508e886ec5d898e911a28cf6365f455c9ab1ebe2386d17a76f53037f99061fd4d

                                • C:\Users\Admin\AppData\Local\da40a2b876f63cd5f41fc7256ac870aa\Admin@MKDTRXIT_en-US\System\Apps.txt

                                  Filesize

                                  6KB

                                  MD5

                                  4633fa8465cc921b18e6e4b0c5ed0317

                                  SHA1

                                  1f05c2f2245efff0204a52f2dc588d9909efc019

                                  SHA256

                                  b1bc5cac961eb905dff3e591998dbf8b0e39098229a7289d2270195a167b4ecc

                                  SHA512

                                  3b3f1235151966fa9bbcdc36152afc4808126839414dd5132f075fb94201fbc68670d15a00e27dd7be9651628e0f5ca7cb448d67cf3aff23bb98e03abba57ce5

                                • C:\Users\Admin\AppData\Local\da40a2b876f63cd5f41fc7256ac870aa\Admin@MKDTRXIT_en-US\System\Debug.txt

                                  Filesize

                                  1KB

                                  MD5

                                  32c4f21ad188bd7a465ca68927c9d583

                                  SHA1

                                  c5febaaf8778a76790cbcd2156bca961672d0667

                                  SHA256

                                  5f9f73ffdcacd685965ec474f9148bf690c67853d123dbd39cd7c71e9623e206

                                  SHA512

                                  b0994c68a9e74c3a7dfd656c836e4d914ec5206d3e50a00d7971932d387be946cf88bea168f032a35cca428b2cab260573c664a86b6261989b0ec8576b03ec03

                                • C:\Users\Admin\AppData\Local\da40a2b876f63cd5f41fc7256ac870aa\Admin@MKDTRXIT_en-US\System\Process.txt

                                  Filesize

                                  4KB

                                  MD5

                                  e2b7534bf4c5c6aa864614e9b4bd847e

                                  SHA1

                                  1d01033d0616fad949c9fe49a9b4eeda6101d3a9

                                  SHA256

                                  61b2a632f71cc6e92a9cc748e0e6661aac44ba00f20a43b571397a88f477045d

                                  SHA512

                                  79e0047bfde086a668003ed9ebdcea4827a278060bdb0de07f053c290427098f60d5dd54e6cb1210632e91240fce1007a68b82277ac62fb6180a9abf66fe7164

                                • C:\Users\Admin\AppData\Local\da40a2b876f63cd5f41fc7256ac870aa\Admin@MKDTRXIT_en-US\System\ProductKey.txt

                                  Filesize

                                  29B

                                  MD5

                                  71eb5479298c7afc6d126fa04d2a9bde

                                  SHA1

                                  a9b3d5505cf9f84bb6c2be2acece53cb40075113

                                  SHA256

                                  f6cadfd4e4c25ff3b8cffe54a2af24a757a349abbf4e1142ec4c9789347fe8b3

                                  SHA512

                                  7c6687e21d31ec1d6d2eff04b07b465f875fd80df26677f1506b14158444cf55044eb6674880bd5bd44f04ff73023b26cb19b8837427a1d6655c96df52f140bd

                                • memory/3760-11-0x00000000059B0000-0x00000000059BA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/3760-202-0x00000000070F0000-0x000000000716A000-memory.dmp

                                  Filesize

                                  488KB

                                • memory/3760-89-0x0000000074560000-0x0000000074D10000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3760-75-0x0000000007FF0000-0x0000000008594000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/3760-69-0x0000000007800000-0x0000000007892000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/3760-275-0x0000000007440000-0x00000000074F2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/3760-277-0x0000000074560000-0x0000000074D10000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3760-13-0x0000000006F60000-0x0000000006F7E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/3760-12-0x0000000006F40000-0x0000000006F48000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/3760-0-0x000000007456E000-0x000000007456F000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3760-10-0x000000007456E000-0x000000007456F000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3760-9-0x00000000059A0000-0x00000000059A8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/3760-8-0x0000000005970000-0x0000000005996000-memory.dmp

                                  Filesize

                                  152KB

                                • memory/3760-7-0x0000000005E40000-0x0000000005ED2000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/3760-3-0x0000000074560000-0x0000000074D10000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3760-2-0x0000000005880000-0x00000000058E6000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/3760-1-0x0000000000E70000-0x000000000100C000-memory.dmp

                                  Filesize

                                  1.6MB