Analysis

  • max time kernel
    59s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-10-2024 20:58

General

  • Target

    https://raw.githubusercontent.com/ytisf/theZoo/refs/heads/master/malware/Binaries/Keylogger.Ardamax/Keylogger.Ardamax.zip

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://raw.githubusercontent.com/ytisf/theZoo/refs/heads/master/malware/Binaries/Keylogger.Ardamax/Keylogger.Ardamax.zip
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6d6546f8,0x7ffb6d654708,0x7ffb6d654718
      2⤵
        PID:5052
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:2
        2⤵
          PID:3048
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3700
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:8
          2⤵
            PID:2608
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
            2⤵
              PID:2324
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
              2⤵
                PID:756
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:8
                2⤵
                  PID:1280
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1508
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:1
                  2⤵
                    PID:4936
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:1
                    2⤵
                      PID:2328
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4876 /prefetch:8
                      2⤵
                        PID:5028
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:1
                        2⤵
                          PID:2492
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4136
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:1
                          2⤵
                            PID:4440
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:1
                            2⤵
                              PID:1428
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1944
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4760
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:5716
                                • C:\Program Files\7-Zip\7zG.exe
                                  "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Keylogger.Ardamax\" -ad -an -ai#7zMap30849:96:7zEvent23246
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:5796
                                • C:\Users\Admin\Downloads\Keylogger.Ardamax\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe
                                  "C:\Users\Admin\Downloads\Keylogger.Ardamax\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe"
                                  1⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  PID:4712
                                  • C:\Windows\SysWOW64\28463\DPBJ.exe
                                    "C:\Windows\system32\28463\DPBJ.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:2580

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  fab8d8d865e33fe195732aa7dcb91c30

                                  SHA1

                                  2637e832f38acc70af3e511f5eba80fbd7461f2c

                                  SHA256

                                  1b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea

                                  SHA512

                                  39a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  36988ca14952e1848e81a959880ea217

                                  SHA1

                                  a0482ef725657760502c2d1a5abe0bb37aebaadb

                                  SHA256

                                  d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6

                                  SHA512

                                  d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  193B

                                  MD5

                                  62fc8758c85fb0d08cd24eeddafeda2c

                                  SHA1

                                  320fc202790b0ca6f65ff67e9397440c7d97eb20

                                  SHA256

                                  ee0d15dce841e092ad1a2d4346a612410f8f950fdb019bc7b768f6346f2b5248

                                  SHA512

                                  ca97e615bdcac137a936c10104a702e1529ed3470828f2c3a2f783345ebbef04cac8c051df636c714151671efea53a9b8912b6b0d0b5eafdac5fae1dfdc8f85d

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  6c9d7403cb0d0956f1e6b4114cc74683

                                  SHA1

                                  3196938592d635e9ee9ea19a9b3239f1b91e0dbf

                                  SHA256

                                  7b82015eeb3d960ef8436ac2ef6a82e79dd899252b35eabf1c17df60ce95511e

                                  SHA512

                                  904e09d84b79d3f5e45528bed41b71082411a4b9d6be1adc217c57d4beb2a132acb61bb8acc6a80c6b1078cf0bb686fffe1fcecde59efc9b2466e02cf2f68eb2

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  f62bb79174a0c2125e0ce61e69098ffd

                                  SHA1

                                  ab2f7ee967152dc34c6465c129fb9826d867b109

                                  SHA256

                                  5c1171468d98adaee01db2fa00b06c09ac71d9a21f1245fc3e49d09a5580d46f

                                  SHA512

                                  656918368c29f4067008d98cb002706dcd1199867d0f03e16f1f4705dd513bb55b4e7e2ca682dd7bb4e15d490c988c2e01400b9b1d24e6499cbb942c63d7c3c1

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  6752a1d65b201c13b62ea44016eb221f

                                  SHA1

                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                  SHA256

                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                  SHA512

                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  548293ad413404d7cfa8ffe577996408

                                  SHA1

                                  04bc0db3dd85388387636cbdac8f99d42326a2fa

                                  SHA256

                                  16b6e5e559499318d5554cc7ade3eba283bc02c8523096857666a11906bda08c

                                  SHA512

                                  3019b9b213de79edb4048736225608beec22e3d82f8576487faa7882a08938eb1924a408bef2eeb5777978fcba0604c26a845989f47f10895a5ff2290262a2a0

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  e7d2ce52825d2b28e080f89978753655

                                  SHA1

                                  99b14c38c712187fa5c851ffdd8da3f909f39ad2

                                  SHA256

                                  fd15094312e47b40b0036a5cd3c0763cea365aa6987e2267f1b03a0ecdaadb37

                                  SHA512

                                  9293cd74e1c112e65383b22913b28f940f53ecb108e1931457b4a427dcf9b281cba13d60414fb85859e2f2ba94ec0128f8de2fe6ba94afd5a483b73284372687

                                • C:\Users\Admin\AppData\Local\Temp\@6963.tmp

                                  Filesize

                                  4KB

                                  MD5

                                  d73d89b1ea433724795b3d2b524f596c

                                  SHA1

                                  213514f48ece9f074266b122ee2d06e842871c8c

                                  SHA256

                                  8aef975a94c800d0e3e4929999d05861868a7129b766315c02a48a122e3455d6

                                  SHA512

                                  8b73be757ad3e0f2b29c0b130918e8f257375f9f3bf7b9609bac24b17369de2812341651547546af238936d70f38f050d6984afd16d47b467bcbba4992e42f41

                                • C:\Users\Admin\Downloads\Keylogger.Ardamax.zip

                                  Filesize

                                  778KB

                                  MD5

                                  5de75a478ffb3aa01a88f4e539f3edc0

                                  SHA1

                                  d4dbbdd4a8888b6b0738471e2e422c26f7e2f81b

                                  SHA256

                                  9c662e2c950e9cba8367a47f628553291f1e26b7e897a8533c00a4b27e174227

                                  SHA512

                                  05f2bcdfb298f294f58fc59709986f73c48d6d6d2b4b21dc8307c8dde57b5a5b632ab6e00af43457b30182fb8a5351239c3636231244dec10c45d4c7b62f5d70

                                • C:\Users\Admin\Downloads\Keylogger.Ardamax\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe

                                  Filesize

                                  783KB

                                  MD5

                                  e33af9e602cbb7ac3634c2608150dd18

                                  SHA1

                                  8f6ec9bc137822bc1ddf439c35fedc3b847ce3fe

                                  SHA256

                                  8c870eec48bc4ea1aca1f0c63c8a82aaadaf837f197708a7f0321238da8b6b75

                                  SHA512

                                  2ae5003e64b525049535ebd5c42a9d1f6d76052cccaa623026758aabe5b1d1b5781ca91c727f3ecb9ac30b829b8ce56f11b177f220330c704915b19b37f8f418

                                • C:\Windows\SysWOW64\28463\AKV.exe

                                  Filesize

                                  457KB

                                  MD5

                                  97eee85d1aebf93d5d9400cb4e9c771b

                                  SHA1

                                  26fa2bf5fce2d86b891ac0741a6999bff31397de

                                  SHA256

                                  30df6c8cbd255011d80fa6e959179d47c458bc4c4d9e78c4cf571aa611cd7d24

                                  SHA512

                                  8cecc533c07c91c67b93a7ae46102a0aae7f4d3d88d04c250231f0bcd8e1f173daf06e94b5253a66db3f2a052c51e62154554368929294178d2b3597c1cca7e6

                                • C:\Windows\SysWOW64\28463\DPBJ.001

                                  Filesize

                                  492B

                                  MD5

                                  7a0f1fa20fd40c047b07379da5290f2b

                                  SHA1

                                  e0fb8305de6b661a747d849edb77d95959186fca

                                  SHA256

                                  b0ad9e9d3d51e8434cc466bec16e2b94fc2d03bab03b48ccf57db86ae8e2c9b6

                                  SHA512

                                  bb5b3138b863811a8b9dcba079ac8a2828dae73943a1cc1d107d27faca509fda9f03409db7c23d5d70b48d299146de14b656314a24b854f3ae4fdb6ef6770346

                                • C:\Windows\SysWOW64\28463\DPBJ.006

                                  Filesize

                                  8KB

                                  MD5

                                  35b24c473bdcdb4411e326c6c437e8ed

                                  SHA1

                                  ec1055365bc2a66e52de2d66d24d742863c1ce3d

                                  SHA256

                                  4530fcc91e4d0697a64f5e24d70e2b327f0acab1a9013102ff04236841c5a617

                                  SHA512

                                  32722f1484013bbc9c1b41b3fdaf5cd244ec67facaa2232be0e90455719d664d65cae1cd670adf5c40c67f568122d910b30e3e50f7cc06b0350a6a2d34d371de

                                • C:\Windows\SysWOW64\28463\DPBJ.007

                                  Filesize

                                  5KB

                                  MD5

                                  a8e19de6669e831956049685225058a8

                                  SHA1

                                  6d2546d49d92b18591ad4fedbc92626686e7e979

                                  SHA256

                                  34856528d8b7e31caa83f350bc4dbc861120dc2da822a9eb896b773bc7e1f564

                                  SHA512

                                  5c407d4aa5731bd62c2a1756127f794382dc5e2b214298acfa68698c709fbbe3f2aa8dbdcbef02ed2a49f8f35969959946e9f727895bdca4500d16e84f4ef2e8

                                • C:\Windows\SysWOW64\28463\DPBJ.009

                                  Filesize

                                  807KB

                                  MD5

                                  30222bb1cd6720a63a455cfe9ea96299

                                  SHA1

                                  aa5b9eff73bd07980078d04e013d368ba1588d13

                                  SHA256

                                  66c441e9e9177b2d745962b9ffe7db7c352ddb53aec351b8c34871cba067cecf

                                  SHA512

                                  80daee7beee15940195789befa69ed08dc2e5629800e65fcf8dd0b5c8080217b9a217e73b7c436bfbabda411b8c51fb8a700557e73475e1b003adc8f616dd51b

                                • C:\Windows\SysWOW64\28463\DPBJ.exe

                                  Filesize

                                  646KB

                                  MD5

                                  b863a9ac3bcdcde2fd7408944d5bf976

                                  SHA1

                                  4bd106cd9aefdf2b51f91079760855e04f73f3b0

                                  SHA256

                                  0fe8e3cd44a89c15dec75ff2949bac1a96e1ea7e0040f74df3230569ac9e37b0

                                  SHA512

                                  4b30c3b119c1e7b2747d2745b2b79c61669a33b84520b88ab54257793e3ed6e76378dea2b8ff048cb1822187ffdc20e921d658bb5b0482c23cfa7d70f4e7aa1a

                                • C:\Windows\SysWOW64\28463\Oct_24_2024__20_59_24.jpg

                                  Filesize

                                  79KB

                                  MD5

                                  2b56970e1bc20f9b1815b38584ae0bfd

                                  SHA1

                                  cf7f86159d7fb563ed550ab1c63a8c5777c54777

                                  SHA256

                                  2b56aaa4350bdebd6f07988da53e0cc93ce817237c4a6d8b71eaffd5eea4e74b

                                  SHA512

                                  1dd5584488c11316426add1e7a4bc1344b3c07fc5578b9cf4191b281d4871acb97825787c926984b3843c81917e8442645ade80511c42accc37c2baad84c8170

                                • C:\Windows\SysWOW64\28463\key.bin

                                  Filesize

                                  106B

                                  MD5

                                  639d75ab6799987dff4f0cf79fa70c76

                                  SHA1

                                  be2678476d07f78bb81e8813c9ee2bfff7cc7efb

                                  SHA256

                                  fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98

                                  SHA512

                                  4b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2

                                • memory/2580-139-0x0000000000400000-0x00000000004DF000-memory.dmp

                                  Filesize

                                  892KB

                                • memory/2580-184-0x0000000000400000-0x00000000004DF000-memory.dmp

                                  Filesize

                                  892KB

                                • memory/2580-114-0x0000000000400000-0x00000000004DF000-memory.dmp

                                  Filesize

                                  892KB