Resubmissions

30-10-2024 19:47

241030-yhpxpszgrm 7

30-10-2024 19:45

241030-ygfyeaypby 7

Analysis

  • max time kernel
    67s
  • max time network
    71s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241023-en
  • resource tags

    arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30-10-2024 19:47

General

  • Target

    droidkit-en-setup.exe

  • Size

    19.6MB

  • MD5

    8635f94c18c6372a4df1001cac67e366

  • SHA1

    c6b35959a3afe487581509ba1853ff93c8e4e5df

  • SHA256

    4e7982c1a982141773e2a47f43d0212c6e966457a4f96f7d05f5476d3e18a9af

  • SHA512

    f633b6c883909e9d56434020520a4a2def688e3b4f39be69279bf443822d331daf685c90308d0985454039e6af8d14d82bc6e00ba7ff0b053923dad35e0a5f6d

  • SSDEEP

    393216:tQ5BRfYlfUtUVISRRAgnu+tqDgfUIsBws6XYbTkrXDTNiDRUGJwPAEWXOO:t4YlfUtUVIS8gnu+tlDYUX3NiDRUGJ24

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 26 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\droidkit-en-setup.exe
    "C:\Users\Admin\AppData\Local\Temp\droidkit-en-setup.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"458778C3\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Launch App\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-com\",\"install_trackversion\":\"1.0.1.3\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5008
      • C:\Windows\SysWOW64\curl.exe
        curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"458778C3\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Launch App\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-com\",\"install_trackversion\":\"1.0.1.3\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4288
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"458778C3\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Start Download\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-com\",\"install_trackversion\":\"1.0.1.3\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4104
      • C:\Windows\SysWOW64\curl.exe
        curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"458778C3\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Start Download\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-com\",\"install_trackversion\":\"1.0.1.3\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1072
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"458778C3\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Download Successful\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-com\",\"install_trackversion\":\"1.0.1.3\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1268
      • C:\Windows\SysWOW64\curl.exe
        curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"458778C3\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Download Successful\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-com\",\"install_trackversion\":\"1.0.1.3\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4736
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"458778C3\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Install Finished\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-com\",\"install_trackversion\":\"1.0.1.3\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3408
      • C:\Windows\SysWOW64\curl.exe
        curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"458778C3\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Install Finished\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-com\",\"install_trackversion\":\"1.0.1.3\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4288
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"458778C3\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Start Application\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-com\",\"install_trackversion\":\"1.0.1.3\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:420
      • C:\Windows\SysWOW64\curl.exe
        curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"458778C3\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Start Application\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-com\",\"install_trackversion\":\"1.0.1.3\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3484
    • C:\Program Files (x86)\iMobie\DroidKit\DroidKit.exe
      "C:\Program Files (x86)\iMobie\DroidKit\DroidKit.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1376
      • C:\Program Files (x86)\iMobie\DroidKit\aapt.exe
        "C:\Program Files (x86)\iMobie\DroidKit\aapt.exe" dump badging imobieservice.apk
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2072
      • C:\Program Files (x86)\iMobie\DroidKit\resource\processor.exe
        "C:\Program Files (x86)\iMobie\DroidKit\resource\processor.exe" -log "C:\Users\Admin\AppData\Roaming\iMobie\DroidKit\ErrorLog" -d F:\iMobie\DroidKit
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2804
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.imobie.com/droidkit/thankyou/install-complete.htm
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff1ea53cb8,0x7fff1ea53cc8,0x7fff1ea53cd8
        3⤵
          PID:2824
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,10537434688282488856,16999113267827600939,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1900 /prefetch:2
          3⤵
            PID:5100
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,10537434688282488856,16999113267827600939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4964
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,10537434688282488856,16999113267827600939,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:8
            3⤵
              PID:2412
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,10537434688282488856,16999113267827600939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:1
              3⤵
                PID:2056
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,10537434688282488856,16999113267827600939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:1
                3⤵
                  PID:2336
            • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
              "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
              1⤵
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              PID:2940
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:2484
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:3048
                • C:\Program Files (x86)\iMobie\DroidKit\DroidKit.exe
                  "C:\Program Files (x86)\iMobie\DroidKit\DroidKit.exe"
                  1⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2232

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files (x86)\iMobie\DroidKit\CommonServiceLocator.dll

                  Filesize

                  10KB

                  MD5

                  592a7202a6b5315ea7ce919a141431ab

                  SHA1

                  f49e0ff53fd1f084745b91f127640ce7d596a572

                  SHA256

                  102ec956fc5e3275fdd738bbcbe23dbf7215da8fbb1d7c184190317f583c3507

                  SHA512

                  938d48ec4bb96a71c1790bbeaaf673f51e7baebfe6342b6bf2958535bd3da57f12012e9846c17d87b49295964c60c061e50a55681efbeb841a561b510a5d4ac1

                • C:\Program Files (x86)\iMobie\DroidKit\Core.Http.dll

                  Filesize

                  78KB

                  MD5

                  4b9820e0b356ce3d7e21a11f44227bfd

                  SHA1

                  e002a6e9316357ae38ae5a9670035935cecfae78

                  SHA256

                  aea4b7433026962d822b9c5d54a22282db75d7080ee04f20984b1f082a4e20b1

                  SHA512

                  0ebe177c95619a542eada5091ba4e9b84b41c7a5c18070dba922282b800efd164b30f75567b1bddf7eb5e59282fe2da52f1225da960f6120f595185f0b8a66ea

                • C:\Program Files (x86)\iMobie\DroidKit\Core.Partition.dll

                  Filesize

                  65KB

                  MD5

                  178aba6dc1d7bab9acbea8c59a33ef49

                  SHA1

                  46e4e6c9ec408256f429c46e0cdf762bcf26c052

                  SHA256

                  fb52cb7f8f2bd5b211bae2b9df5973f7c4f5811640f388f5046726b1da0f4f9b

                  SHA512

                  67432322bd87e5fe765655690d957fe200f78556089d72bca72b59c7972e3c03e626b0fe198f65ebdb6e4b488713162f9d80520caf32d0522afccd6af82578f0

                • C:\Program Files (x86)\iMobie\DroidKit\Core.Tracing.GA4.dll

                  Filesize

                  361KB

                  MD5

                  cd79cca86bb167cfec861cc54dd76fdc

                  SHA1

                  6a61da5c3e1cba4f197a791364df4c01944b6bab

                  SHA256

                  06f6676e90b06b498d4075d56ac488522b270143be64edaf2d1206fb8e78a36d

                  SHA512

                  915ff9a53ac5336bec8adbb2d58209de4307ac0220e395816c636f463b0c51f5d5e8c6a0279621d12ef13d8b08572f97a7ed17f2e3081eae6025e9f8c48c085a

                • C:\Program Files (x86)\iMobie\DroidKit\Core.Tracing.dll

                  Filesize

                  45KB

                  MD5

                  001e71af8085e269e442af5ed6a6ee30

                  SHA1

                  ec94772da61bf9dd0fcf5849146946639a9c6377

                  SHA256

                  aa65b2c43db38852c8ecceafa23e3c0cb5bf59731bdae9f442849f612bffdef4

                  SHA512

                  9d18521483557a3071ab6d54cef5c220d2264eee3ecf2302965000e200b0e364eab61d8280dd822d17265667fa75b51ae5b649e5c0984d3f6462088feaa098ef

                • C:\Program Files (x86)\iMobie\DroidKit\DroidKit.Enum.dll

                  Filesize

                  35KB

                  MD5

                  38abb0ab1adbe6c424111a3edf5dd5cb

                  SHA1

                  8ca2655505f860986af80e88a8710d72a10829aa

                  SHA256

                  ce6b1b90a023b98e23319578ac94933544454083e2e410e0b02a44482cc46afc

                  SHA512

                  db2f77565f06e6f014dc0e0d3e5cd69563d58aa8430641df3ed2cc8ece4e3aa52e4c2a41b8f7db7139bb4c42afc5caaed0280e53fa7ce85523cfb1e9ec2657c0

                • C:\Program Files (x86)\iMobie\DroidKit\DroidKit.exe

                  Filesize

                  388KB

                  MD5

                  ea096017a0f0645bcdc7f309ab67aa88

                  SHA1

                  547f274390a3833baa95e5d79eb176f810eb2ab6

                  SHA256

                  b1808b0c8507cc02e5fc5336715cc616d335608c87a6f0e7c921ea5c99bcf5b1

                  SHA512

                  f02cebacbe0dd32eba9dfe6cefd997b0ed7885631f7d9e870ba6745b9c9672bad6745e83988a37331d72926eae8f4d07e621db7c480da4b6766fa7610ef349b4

                • C:\Program Files (x86)\iMobie\DroidKit\DroidKit.exe.config

                  Filesize

                  1KB

                  MD5

                  37c8496f8bb31c32b20a12465731e134

                  SHA1

                  2f9f4e6b75bcc6bb8cae2505150acd2e61244adf

                  SHA256

                  3bbfeb77ee305c4ee95362d2caca743af8e34ac1cb752487c1c2a14edf3dce51

                  SHA512

                  458150c1937d0fc4d3f3ba7d9fe2ddc2a446f370c568018b1a02ee477bbd4843883518a4b9def4c3f2d566a5636bf304c9c657bb960870c5cb35ed955d8f20d4

                • C:\Program Files (x86)\iMobie\DroidKit\Google.Protobuf.dll

                  Filesize

                  381KB

                  MD5

                  396025f29419bc60d9ddee437467aa67

                  SHA1

                  cf96e114fca9da5a2dcb405dae42dbc03714097d

                  SHA256

                  3e9a846a06138186f162450b1f407cfe0da3a6474de82104ccaab34c10e3c0fb

                  SHA512

                  6a17e0f1159c8b6148da738b7f6631799cfd5d5025ebf5414d55a1b26cc2169f81a29b1e3ecb64a54439c7bd26090a6b443a562c6b4e7ccd48595c6b631d14cf

                • C:\Program Files (x86)\iMobie\DroidKit\Help.ico

                  Filesize

                  187KB

                  MD5

                  9ca6d8dcdc3a93521270fcb52c33e491

                  SHA1

                  42da181d0f73676197f50f3a2203708dd2543c0c

                  SHA256

                  7056eda1128f8a3a0c7217885972359cee99b6a62a62d4bd7bad79b04d7db227

                  SHA512

                  d28bce4de41036f25493ea28c64e840f8b62325eee6dbad03a4bb32439396aef16cf73eaaa95e975b82786c2aeac4eba86c13a6d703e616ef3ec82f41e463e28

                • C:\Program Files (x86)\iMobie\DroidKit\Language.Default.dll

                  Filesize

                  200KB

                  MD5

                  e1eb05fd89be31936cb0ee5918d947cb

                  SHA1

                  c082f891eef0fd3d3157f24a21e6e24d6d745d60

                  SHA256

                  8dd9f583b8983d63e1c862b361e3ef6c77ec865927afe7216e42e98f4103307c

                  SHA512

                  2b8ae9d93f50a733c61347dcdc6151f9da14dd2ae545ababecefe17d1e8ffe5a9bc78caa61faef76986ed488cabbb09ec17942e0be9d894061d4013ea5237dd1

                • C:\Program Files (x86)\iMobie\DroidKit\Languages\Language.AR.dll

                  Filesize

                  246KB

                  MD5

                  c693e596532bb41ddf027f5239b89ee2

                  SHA1

                  8d8068e21f60098ae89226382fec7103db06a2c3

                  SHA256

                  1d2f2231e699f16c1662e9afcdc7a23fe8443d49cfb32ccc566d0469741f2ff7

                  SHA512

                  e3b19e444d2c7611089aac4c5df32046608d288c6d3e0c2bf695bd84142945b5c380cf140b5abbb63898013d02365db735e92ced51837972fa7d16b1c66377eb

                • C:\Program Files (x86)\iMobie\DroidKit\Languages\Language.DE.dll

                  Filesize

                  223KB

                  MD5

                  cf0496694bc66c718623a3742f437cc7

                  SHA1

                  31c31c62d9d5e4286dbd48c42198806c49143121

                  SHA256

                  e232890081f60d278db40cfecc6aceaa5961aabcc1a8fea2bb09755b1692c850

                  SHA512

                  a8b29deaf70d28a9a841b0479b20420b95c537a98eb6f12c047031527e214d789d8fe3b004a2424f72c357a6c192c11bffc30d4d694322c4fe91c402b40d6992

                • C:\Program Files (x86)\iMobie\DroidKit\Languages\Language.ES.dll

                  Filesize

                  220KB

                  MD5

                  898adfaaa93bce37f6b5f30cf68c4562

                  SHA1

                  c4d9a4b3a99de999bfa3403b52ae1dd307bdbd90

                  SHA256

                  834d26cada8de72099c69b75aa3a0bee14603dd3edf75585ef41f8c4c9618fda

                  SHA512

                  cd3f5ad5f1cab8810b61753de2f23eebaf9bd88701b83c30251182db067fc773a0024f9ffc291e641ab3a6f315537a7a76f359e4a398de38255b234baac726af

                • C:\Program Files (x86)\iMobie\DroidKit\Module.Base.dll

                  Filesize

                  882KB

                  MD5

                  02b17477bfae56d42132110710b5a65a

                  SHA1

                  15b2b4b09b1b0b7f5f105af05f45d1a8bf8b9549

                  SHA256

                  541499d8ac32c964f3424aecb3993b8063cc2623ef47b0739d1573409f722551

                  SHA512

                  903933ce0733a13644f0c079320d1095780a63c0d731bf550337c608b209a8c64cf716179d19f7d4b0b7317ee10cbd3598577c916e97f3deb66a3d1e708bba7c

                • C:\Program Files (x86)\iMobie\DroidKit\Prism.Unity.Wpf.dll

                  Filesize

                  29KB

                  MD5

                  cce587b8ff219b482e304e8d1105335d

                  SHA1

                  349e075ed476d9ebef6f939848a04221ab740151

                  SHA256

                  5429cd9cca2e972c2d0607767967b7e78db3dc4c74c874c96be66bf11c2c95cc

                  SHA512

                  fe3286efe04d229484f9a56b591409884c0cc58413bd54d0d10d245efee88f6060d0dd2d326ef02176c90a9c5f1e7245415515cdee43c8681c1555bdaeb7e312

                • C:\Program Files (x86)\iMobie\DroidKit\Prism.Wpf.dll

                  Filesize

                  143KB

                  MD5

                  f9fcc9bf77158750f4dc5f3ae063378f

                  SHA1

                  63b6c36c7d30e02abf873049e41a505f671e6c4a

                  SHA256

                  39849a5ad96c2f524c653e423a466aac1412d462f18a7c5264956b23c7f57d01

                  SHA512

                  8a5acf576ad98804ff258f2833d5f4bdbfeb8b181469d4ad37e5306fa116caba57c7de979bec37967ee78498268c8359e0a15aa813b07f3194dcfbd52cdba525

                • C:\Program Files (x86)\iMobie\DroidKit\Prism.dll

                  Filesize

                  74KB

                  MD5

                  3512d7bd528fa43472d63e413791784a

                  SHA1

                  103456791eaa487742bd71e1d4892d20dc46bbd1

                  SHA256

                  8c635d69f8b1e9bea6940d0f1fdf5a6604be8532018d9712cde0df1389d23a8c

                  SHA512

                  f923409e03419ccaeecf40d782dac50c016d06726b658b73e641182d0467c4cec478d75a3231107e6aa731c18693e344ba48869086a7a15da8852c9e3faf8b91

                • C:\Program Files (x86)\iMobie\DroidKit\ResourcesBridge.dll

                  Filesize

                  111KB

                  MD5

                  edbb7239a375eca28a5e9f105e91f292

                  SHA1

                  87aea659a4caabd53e14b830087f105d27510507

                  SHA256

                  fe032f13580c915a013f258f7bf0bb6b12d80ff143dab2e283155bd0d10906b1

                  SHA512

                  8d2cff68824872bd2e76b025b7f62f430c2a79d2b6e3711fa3530be326e828eb07b113f6cfbace3289845d329f66e081c4d4e3dee3be420043ae2089b87a1bfb

                • C:\Program Files (x86)\iMobie\DroidKit\System.Windows.Interactivity.dll

                  Filesize

                  54KB

                  MD5

                  580244bc805220253a87196913eb3e5e

                  SHA1

                  ce6c4c18cf638f980905b9cb6710ee1fa73bb397

                  SHA256

                  93fbc59e4880afc9f136c3ac0976ada7f3faa7cacedce5c824b337cbca9d2ebf

                  SHA512

                  2666b594f13ce9df2352d10a3d8836bf447eaf6a08da528b027436bb4affaad9cd5466b4337a3eaf7b41d3021016b53c5448c7a52c037708cae9501db89a73f0

                • C:\Program Files (x86)\iMobie\DroidKit\Theme.Default.dll

                  Filesize

                  36.9MB

                  MD5

                  a66ace64702910aecf7f78931c937467

                  SHA1

                  938cd0f7f78200934a4e97cdae23ad25d0bb9bc3

                  SHA256

                  61b14a5e6555309daead7513bb513a7ea1316f0206d4d5ab2d2387cff4eb9429

                  SHA512

                  49d96a7d419e93f8e7d41cd7e74b36a3cb677a68c6c297b5d4a6fa44bfe46693cfa951fe9eb2ca5ec3e16172dd027a7910b649b9e177c66ed37eb531a3a5561e

                • C:\Program Files (x86)\iMobie\DroidKit\UI.Controls.dll

                  Filesize

                  198KB

                  MD5

                  f3ea45bdf4947e7b99a5cdab1b8de4a7

                  SHA1

                  28dc39c16d96e93a5f655b32492bd8acdfaaeec2

                  SHA256

                  d47d427ae6bd5897d249f8266e4902a1d3628db710f7c7b8d8d9a8b26a8c3219

                  SHA512

                  5b3cdf88ce4e01552c28d7ee8661a58da2405fd81b91187891d61541c23d3a90f118e592abf6ebb4bdfd684749840adcc8dca084415098eb681d60a1c6949d92

                • C:\Program Files (x86)\iMobie\DroidKit\Unity.Abstractions.dll

                  Filesize

                  63KB

                  MD5

                  3ebdf5ca35b087d4f3e430487109e55a

                  SHA1

                  6e784ed96c20a0ca94b87cdd4d766f83ff05fd5a

                  SHA256

                  1086b8381919c2325c3f868862f4d4ad98e1729eb4e5224f14f8a88789f8a092

                  SHA512

                  c0e961166b50792c44553f6fb75cbabbb095e7f92a925ea27bb1360b148750c366f865e32cb5ac3fa90aac2b7a6bfea32be15231fea1e397a1dc34beb4d8ff97

                • C:\Program Files (x86)\iMobie\DroidKit\Utilities.UI.dll

                  Filesize

                  78KB

                  MD5

                  008f852484db114b912e6b17c28f20ac

                  SHA1

                  191d5df9229b91689a3cb02cabdd4568afe40590

                  SHA256

                  2ccc145a547634dc3811558ff0e36432b39d0327a53dc3c6531143aab3c634d1

                  SHA512

                  f620a8fab6554cae66da93d1ba21d61c89b273e790a849cfe02267689f6b1829a09563ca81f0bc58ad3805402546dec04b705bc48941a4d7dd343cbda3a9662d

                • C:\Program Files (x86)\iMobie\DroidKit\Utilities.dll

                  Filesize

                  4.7MB

                  MD5

                  4e4e8e4c2a158186ef9d64056d6582b5

                  SHA1

                  4517e5d74626a15f93835120a91dae769b3f905a

                  SHA256

                  a0f66263f11f7f7ee73741797a7e9e5033116da0ccfebc8634a874747dd6041d

                  SHA512

                  d45b2d4ee6b5228837f9733b614c3207c9f827c11124918b75c8bf93e90da1580aae6a21ecddc678efedfbd5490c5f9d1b5cc1bc210f4877d0e6ac9a66f5bc8d

                • C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.desktop\ADDITIONAL_LICENSE_INFO

                  Filesize

                  49B

                  MD5

                  19c9d1d2aad61ce9cb8fb7f20ef1ca98

                  SHA1

                  2db86ab706d9b73feeb51a904be03b63bee92baf

                  SHA256

                  ebf9777bd307ed789ceabf282a9aca168c391c7f48e15a60939352efb3ea33f9

                  SHA512

                  7ec63b59d8f87a42689f544c2e8e7700da5d8720b37b41216cbd1372c47b1bc3b892020f0dd3a44a05f2a7c07471ff484e4165427f1a9cad0d2393840cd94e5b

                • C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.desktop\ASSEMBLY_EXCEPTION

                  Filesize

                  44B

                  MD5

                  7caf4cdbb99569deb047c20f1aad47c4

                  SHA1

                  24e7497426d27fe3c17774242883ccbed8f54b4d

                  SHA256

                  b998cda101e5a1ebcfb5ff9cddd76ed43a2f2169676592d428b7c0d780665f2a

                  SHA512

                  a1435e6f1e4e9285476a0e7bc3b4f645bbafb01b41798a2450390e16b18b242531f346373e01d568f6cc052932a3256e491a65e8b94b118069853f2b0c8cd619

                • C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.desktop\LICENSE

                  Filesize

                  33B

                  MD5

                  16989bab922811e28b64ac30449a5d05

                  SHA1

                  51ab20e8c19ee570bf6c496ec7346b7cf17bd04a

                  SHA256

                  86e0516b888276a492b19f9a84f5a866ed36925fae1510b3a94a0b6213e69192

                  SHA512

                  86571f127a6755a7339a9ed06e458c8dc5898e528de89e369a13c183711831af0646474986bae6573bc5155058d5f38348d6bfdeb3fd9318e98e0bf7916e6608

                • C:\Program Files (x86)\iMobie\DroidKit\libusbK.dll

                  Filesize

                  166KB

                  MD5

                  3935ec3158d0e488da1929b77edd1633

                  SHA1

                  bd6d94704b29b6cef3927796bfe22a2d09ee4fe7

                  SHA256

                  87cbd1f3bf5ab72089a879df110263784602a574c0ae83f428df57ae2f8115db

                  SHA512

                  5173891b1dfad2298910236a786c7b9bbcfce641491a25f933022088c81465fb93fd2385d270e9a0632f674355538da464d1edacf511140d6f31d91d1afe64fc

                • C:\Program Files (x86)\iMobie\DroidKit\log4net.dll

                  Filesize

                  264KB

                  MD5

                  27fe8d18682fd9901e589e65ef429b23

                  SHA1

                  6426e96243911beab547f2bc98a252a26692f11f

                  SHA256

                  896ab9cac41e3977792ba2034ea8730610c2779fa51bab6bed426094ea8d3ecd

                  SHA512

                  9d6bc8c77c72cbad15e808281818c2768f1b44aa6ea1d54a979c91218b8fbf2a02fee49fa97db6cfa6087ddc363d6cdd6407e4494934b4568c514437030a2615

                • C:\Program Files (x86)\iMobie\DroidKit\x86\libusb0.dll

                  Filesize

                  45KB

                  MD5

                  8574627d4a5415c36176bf4ab9058183

                  SHA1

                  a50ab8e8983ce2afa54cb23e4629c83889cd0c56

                  SHA256

                  3b8c37db1af7f30a2baff39b587ecf7edd30027ee3e91d5e596e39dd0f0e3908

                  SHA512

                  ea27c071f047d200f45c5c82943e39df05bf5755aa72c44983ed367fc1d2ba30781cd24a0ff4e4da6224106d9f639f0872848d0fa7058f088467d1b4b5205954

                • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\iMobie\DroidKit\DroidKit Online Help.url

                  Filesize

                  213B

                  MD5

                  cc99a9c0b700052a7902f697b58ed058

                  SHA1

                  30cb88fe7f8171e82c824df40b0b9afa379abfac

                  SHA256

                  3f6dcf365afec198abe4c2358bf937bc2ea9ff558d3cfa8a1bce75969d208667

                  SHA512

                  059bdd6164ac6f5af32a8419853e7d6ab6bf757a7ff3093849b9be55b2d6e9e9866722aa5d213097f2f47481fcbb4a2407c29ae936cfa16dc64b617ea5c99029

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

                  Filesize

                  854B

                  MD5

                  e935bc5762068caf3e24a2683b1b8a88

                  SHA1

                  82b70eb774c0756837fe8d7acbfeec05ecbf5463

                  SHA256

                  a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

                  SHA512

                  bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_3FE575F426798AD871787980316DDDA4

                  Filesize

                  472B

                  MD5

                  74a75a50ee671eff2d1abc67b2055a2d

                  SHA1

                  d68af7e7ebb335c25a707b9231c095d7b55db7b3

                  SHA256

                  a4c3b99b3f3f719b3c5246a794f0ed4cfeb68095133eafe9c69a511dfda5d2f2

                  SHA512

                  2fe715c6e23a875df07be476739fe1eaf7ea9b5112286272d8a45adb51a1ce9d57e566634eb4a0fb1064e92774addfed324b9d0b025d600d072bf560b83891d8

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                  Filesize

                  1KB

                  MD5

                  67e486b2f148a3fca863728242b6273e

                  SHA1

                  452a84c183d7ea5b7c015b597e94af8eef66d44a

                  SHA256

                  facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb

                  SHA512

                  d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

                  Filesize

                  436B

                  MD5

                  971c514f84bba0785f80aa1c23edfd79

                  SHA1

                  732acea710a87530c6b08ecdf32a110d254a54c8

                  SHA256

                  f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

                  SHA512

                  43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

                  Filesize

                  170B

                  MD5

                  6af516945dd106556b3cf2dccdf85041

                  SHA1

                  a046b6c428e227f459ebe7254ef54288444061c7

                  SHA256

                  60393ae584cb36d83b722f8f6b58fdcdca6674ff3d5fb4f68269bc1a5a943f33

                  SHA512

                  6f9b6b0d493cacbf8521e4e8f296cc19f6fd4d1291ec33cf10b1b83799941d42b18a0f9bb851674bc5f86c76ba4c8cb3b200eed82acf334f0b25ee2d120840c6

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_3FE575F426798AD871787980316DDDA4

                  Filesize

                  398B

                  MD5

                  3c0cb7601bbe62f862d828a129151008

                  SHA1

                  9e7ef4a2d54a78e4202adf0b799e775efc5c7147

                  SHA256

                  15df2050e8fe00481a3212674f93cb68e01382a9bf703894a8c2ace2ace0c7e2

                  SHA512

                  f357f6b4a7eb0b8113b38de2735cec16bedffe9053158a145fb7fe89372db05a0dcbca132e741473c70324f273e1cbb95d6cf04d9fe530e8b4b9d7e09e7fbca9

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                  Filesize

                  174B

                  MD5

                  7f7b585476f6bd612f96ce6b7902e644

                  SHA1

                  5aa3ad212e1f4161eee67af2888ade381327f373

                  SHA256

                  2d0a8c74dae38409cf67d2442cd24ba309b383bfb46cdcc7f51a426b610b3506

                  SHA512

                  c3de4e9873a968e6dab4beafbc60059294001c5b807f7da2c64cb41985d9d9264069ae4bdf754d4fea7cf1e924f512f3fda310fcd1aca1bb7e305d8d80680759

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

                  Filesize

                  170B

                  MD5

                  ea76a4916185b3f1d32a82c94fbee68b

                  SHA1

                  1bcc5e7d8656997f4d39d71e4abecdcc221ea702

                  SHA256

                  34cec22c96a9cd7d46873e659104482533e940542d168f247d31ae47a3a82671

                  SHA512

                  8fd7b7e7c7fc1356f0f84ce9b54b9d4d82023184775ab7e90d84208d990df3b834214d686c78a055ce626d7e9ea6d854bde4c099171c81f828ff01339cc8e53f

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  7bed1eca5620a49f52232fd55246d09a

                  SHA1

                  e429d9d401099a1917a6fb31ab2cf65fcee22030

                  SHA256

                  49c484f08c5e22ee6bec6d23681b26b0426ee37b54020f823a2908ab7d0d805e

                  SHA512

                  afc8f0b5b95d593f863ad32186d1af4ca333710bcfba86416800e79528616e7b15f8813a20c2cfa9d13688c151bf8c85db454a9eb5c956d6e49db84b4b222ee8

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  5431d6602455a6db6e087223dd47f600

                  SHA1

                  27255756dfecd4e0afe4f1185e7708a3d07dea6e

                  SHA256

                  7502d9453168c86631fb40ec90567bf80404615d387afc7ec2beb7a075bcc763

                  SHA512

                  868f6dcf32ef80459f3ea122b0d2c79191193b5885c86934a97bfec7e64250e10c23e4d00f34c6c2387a04a15f3f266af96e571bbe37077fb374d6d30f35b829

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                  Filesize

                  312B

                  MD5

                  4ca0e22d606a0c487f7ea1105dab9e1f

                  SHA1

                  4dd6ae2cdce0ad7b603bdfed1006ef17a445d9ba

                  SHA256

                  2b78d51c10e0a4dbb2c7db6f3f857eb018c4bd1e4501e3d80c33904825b87053

                  SHA512

                  58b259f3a8df946e808728995a6429c14af9778f49bb722aa478c35f14e304097afb810519112f038574dd2d9a9449a017fa9c6ed3e51b6bec6245d6f1b351c9

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                  Filesize

                  1KB

                  MD5

                  7049f2e01d6e813ac9560b5f3ac5df04

                  SHA1

                  0154a45b3cbbfb31edace0e302f60ed122e3f2e5

                  SHA256

                  b15694c269ee86f8821a55c3eb046f58df4c572b9c9c6e9e528dbc8038a25646

                  SHA512

                  37ac947858001ab55aae6fd18b8ce04de1c8396068536754835f594911f6dc9a950a76d65ed007f4a978f4dc39db3d5290189638cb03badd0625c93005165e34

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  5KB

                  MD5

                  d0c886aec395c5eb15cf6c807fa7fee0

                  SHA1

                  d49250e481fddf7969381dfae0d3bcce2cb97f5e

                  SHA256

                  b43f5b2e2e1249f30c0028ed0745d409c1b4d85f7faab6d814bf58d2e0b9d5c4

                  SHA512

                  2305dad809cbb55e42f50e0282b257febea58815b4e2c05cc80c9af5c8f5ddfd58bf6e90bcf4278235428a8b49bcf30b3bdc673cdad73021d6dca36f31ef75a8

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  7KB

                  MD5

                  b1ba45b0134d9104e6e5993248c940a3

                  SHA1

                  c0939a8dfa149652cde1b42ab5b5fed3a6c87f5d

                  SHA256

                  4f8b3303cb2dbae0b8a63120b318dded8604fe0bde7b5a9bdabe7db385813cdc

                  SHA512

                  55744428a30074a291587af518b07f96f016dd00e8adfa2c8003a85cfae71bf5acd0ce5f94da47435051ff3378a511fa64c6931a28e408363dbc8ec59c7e638c

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  10KB

                  MD5

                  70d4f76079fd98c14ec9ff312162bd52

                  SHA1

                  00a3831ce04baf1911116ea3ff4141b7a1c52487

                  SHA256

                  7279a2acca037dd8f5c9d9c145e4c8f8d6783d61f4b0adc9e0374aef7312862d

                  SHA512

                  441227d39b741e4e03334c593360d2c14adde21752d6fc6d5a3a473dc8449b95ab308e934c7fbacebed7a1b51b1519135f43bd666ca89124fcf8214d3893e991

                • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                  Filesize

                  10KB

                  MD5

                  1301a13a0b62ba61652cdbf2d61f80fa

                  SHA1

                  1911d1f0d097e8f5275a29e17b0bcef305df1d9e

                  SHA256

                  7e75ad955706d05f5934810aebbd3b5a7742d5e5766efd9c4fc17ee492b2f716

                  SHA512

                  66aa4261628bb31ee416af70f4159c02e5bbfbe2f7645e87d70bb35b1f20fa915d62b25d99cd72c59580d1f64e6c6b5ad36ace6600d3bcdb67f45036d768ed8b

                • C:\Users\Admin\AppData\Local\Temp\nsbC8B0.tmp\BgWorker.dll

                  Filesize

                  13KB

                  MD5

                  8401375a531d44e40b02c0739acf13ec

                  SHA1

                  2937b881c4a1ceed819dfbe604315e2c1c320e77

                  SHA256

                  d46ab59420f1eed08f2b4e93d9a2feb0986a5df703e33be0a739b0347c7dd618

                  SHA512

                  f5bc08b540508b152a4cf0bbe05a1d0c0a82bd512ca59e83d4290ad078f3b4368caa57deac85de42c1b945ec3b908a5b3a7dc863a017801479437595834863d7

                • C:\Users\Admin\AppData\Local\Temp\nsbC8B0.tmp\CheckProVs.dll

                  Filesize

                  18KB

                  MD5

                  5422e399fabd3a344e8dcc807a48637e

                  SHA1

                  59b0830698b15993671eb0dd43020041c351deb8

                  SHA256

                  64e6aad5d6628bc743196a42e28df3f8dc71cdf0d2ad4c250bab872d2a3991c7

                  SHA512

                  9d102954e0d7bb7e69219a14158e410c18adb85d1cca9e269f3955d3fc5e61b23872313b78d16cd6488eaac0f835b233356152575bf130f8ec91e0d481aa1493

                • C:\Users\Admin\AppData\Local\Temp\nsbC8B0.tmp\GoogleTracingLib.dll

                  Filesize

                  46KB

                  MD5

                  3a914fc853188765010b73ff99834383

                  SHA1

                  374b9c4bcc852e42e85aab7b142ecdd80f0c40a1

                  SHA256

                  5b8cadf540dd47d19b1020bf5c0aca1b6d14d9d875b0a5794b432401c60ee5c7

                  SHA512

                  1e1a26dcb480cae7dc0fb89c0e8b560206b23b85a6f56458e2019af9c67ca9f942e2c75e78052e4e0eebcfff5e7a3c5eafb5538ba776c0a40b39cafee0bce0e7

                • C:\Users\Admin\AppData\Local\Temp\nsbC8B0.tmp\System.dll

                  Filesize

                  22KB

                  MD5

                  86a488bf743dfab80ff142713adb5d48

                  SHA1

                  02e4b39f2fa40cd4edcc42cb524dc3ce911bfdac

                  SHA256

                  3924b57f8993a880d53e1e4e18eb6ba9b5dc610cbb00345c954c7e8a9078c309

                  SHA512

                  0ed09bcddd5bd13a91e7b99b78e37a01a36d62a29ad74acaacbe0da6446c8523e83ed2c089d2847e4d1ba467da93e2fd2de104feb51bcda445511b334bf932c8

                • C:\Users\Admin\AppData\Local\Temp\nsbC8B0.tmp\msvcp100.dll

                  Filesize

                  593KB

                  MD5

                  d029339c0f59cf662094eddf8c42b2b5

                  SHA1

                  a0b6de44255ce7bfade9a5b559dd04f2972bfdc8

                  SHA256

                  934d882efd3c0f3f1efbc238ef87708f3879f5bb456d30af62f3368d58b6aa4c

                  SHA512

                  021d9af52e68cb7a3b0042d9ed6c9418552ee16df966f9ccedd458567c47d70471cb8851a69d3982d64571369664faeeae3be90e2e88a909005b9cdb73679c82

                • C:\Users\Admin\AppData\Local\Temp\nsbC8B0.tmp\msvcr100.dll

                  Filesize

                  809KB

                  MD5

                  366fd6f3a451351b5df2d7c4ecf4c73a

                  SHA1

                  50db750522b9630757f91b53df377fd4ed4e2d66

                  SHA256

                  ae3cb6c6afba9a4aa5c85f66023c35338ca579b30326dd02918f9d55259503d5

                  SHA512

                  2de764772b68a85204b7435c87e9409d753c2196cf5b2f46e7796c99a33943e167f62a92e8753eaa184cd81fb14361e83228eb1b474e0c3349ed387ec93e6130

                • C:\Users\Admin\AppData\Local\Temp\nsbC8B0.tmp\nsDui.dll

                  Filesize

                  10.0MB

                  MD5

                  368841af8b0074e348418f106716e603

                  SHA1

                  75469510665b651b38e3b4fb7c4240722c756126

                  SHA256

                  3be54dea5aedc0d8d16d6c4bd4e046e2d93bfc550a1a035a94768c2d5901e327

                  SHA512

                  3804afa3930a90f258a2b4e7106e1d0211e5d4ca6a7f5ba23da11e3908b4e202295ddbcb1ecf1e15215bc9a0aece1a46efad07ad94feddd4f316b0de674c50d5

                • C:\Users\Admin\AppData\Local\Temp\nsbC8B0.tmp\nsProcess.dll

                  Filesize

                  15KB

                  MD5

                  8205bee74d498724aa5508e93c6d21f8

                  SHA1

                  2564cc3032e59d538826596a88d80c3d022ef595

                  SHA256

                  382aad28fa439b18d3d41a4652201c1d1542d73ff756a738c4cee6b75ebeca8f

                  SHA512

                  67c1e7fcfbc03565ddcd0cde4a91104231b30e0e3edbfe338ba5da76085fe849ea2dea199554dd3b25b90ab9722c30fd22399932463ef4a95e6000fcb5ef3ca1

                • C:\Users\Admin\AppData\Local\Temp\nsbC8B0.tmp\nsis7z.dll

                  Filesize

                  324KB

                  MD5

                  257fa9ec6d0cf12f4717dd6e56a876bf

                  SHA1

                  f4989aa55a6cfd35cac6992184232081fe48f6fe

                  SHA256

                  e558416adceace0064b2d8c7fb2f880ee685cec167b723ab4ed5573734d798f3

                  SHA512

                  548b6a2c483942230dc85be303e8fde33a11feb308afa0be605c1a2b9a1c5226c2279e327f4bc96b8fca2be8badff2f49d7ba968a40728886be5d110c4be215a

                • C:\Users\Admin\AppData\Local\Temp\nsbC8B0.tmp\registry.dll

                  Filesize

                  35KB

                  MD5

                  2e7ced24d47e40e0725e8d80c2d2ba6b

                  SHA1

                  b74c0fd4d1111bc461558a96720d40adb314a21e

                  SHA256

                  59120dcdf3315804ecaa8cb76b9cf5ee99f992407f30a11c6df8e23c09294c06

                  SHA512

                  ba0afcb54ed33265faa45a22ece8ee8f35fe3ee96170bd231e4e11b409330216c95b1a2f360a4d1955c6ef77a45a4c65385047333b2bd46f3e27fbfbfcc19713

                • C:\Users\Admin\AppData\Local\Temp\nsbC8B0.tmp\track_Official-com.txt

                  Filesize

                  33B

                  MD5

                  fa52ec95f4829013cdfd7ec9b8b1e533

                  SHA1

                  c3c3fec43c808c02d5a8177da0ff751b974ac40f

                  SHA256

                  8bdd7a58efb7679d680d94e1a5067699d4b06161700335e05fc20268e53c75b2

                  SHA512

                  b79ecf85a580fbfd00a298e76cc0381863f19cd2ff281894b05772f4d0104960ec96f78cfa86427994029d580973227214c4ffbcc444f82e65e00a5916c1068d

                • C:\Users\Admin\AppData\Local\Temp\nsbC8B0.tmp\uninstall.exe

                  Filesize

                  8.2MB

                  MD5

                  dc81c01374e9543469920d763402b10a

                  SHA1

                  535e9355a31bd2a06381e67ff24f52953071478a

                  SHA256

                  87801f6c52b6660a9f1cb8a832a5bbad75f7d086e3c141f547eafd633bd7cb76

                  SHA512

                  c37cc90e8b1319b5edb0a55f8462f664fa138d80938053b521d0cd713e04f137244b14d03063a2da9e4e3fdd6c4f8e5a219dc36752eb5caf190b5ef2a6204611

                • C:\Users\Admin\AppData\Local\Temp\nsbC8B0.tmp\uninstall.ini

                  Filesize

                  52B

                  MD5

                  e978a46d7e23c139e4df7b526f86745f

                  SHA1

                  f280d921ff3bbf5e171b0f6aa9e48e9914e32dd6

                  SHA256

                  435288e587018aa375e8a4bf3f35cd8dfffd559053f5ca6a0e487a61ff23e5db

                  SHA512

                  7b7150f3b2385d7a7264839d626e9b7c7026868d57f9f5df7d42ddb01688a7bf3008937ef2aa06c3f49089cb4cfbbfb8b6d9661fbc6a4f8e555305552759a75f

                • C:\Users\Admin\AppData\Local\lang_info.xml

                  Filesize

                  3KB

                  MD5

                  b36489cb554c11a7bf85cd14c7c1cb84

                  SHA1

                  c7349c67c34aa9d536dba6c20e5aaa65095db710

                  SHA256

                  85ced2c6b72c435ca255179c6136c8b25061fe1a6981c9b7fdfd8c7d359955d2

                  SHA512

                  fd3adc41759e7f789110a8d13a60a5503ea45fccd3fe7d773ad44a284dc3eed89585c76422678051a390266711c11cc5a3bb9aff569f0ddced3bc359b3054922

                • F:\iMobie\DroidKit\settings

                  Filesize

                  1KB

                  MD5

                  b2046352abc66627f20d01d7489bb6ef

                  SHA1

                  614d7a3b4d6f0d1e275a77ee5253be946159afa7

                  SHA256

                  f10b15a230d3b2fa5a61cc13c51418b06426b22b79e933555547d190a8a49430

                  SHA512

                  cc1aaff44b929cc1e807b8bb3928cf195c1668211231785c9db11f31c9d852f53b7bdf3cd26a39607112c6a489994574a5b16ef78b3c41e198ad0baeefc38afa

                • memory/832-1507-0x0000000005770000-0x00000000057C9000-memory.dmp

                  Filesize

                  356KB

                • memory/1376-1724-0x00000208BB6C0000-0x00000208BB6FC000-memory.dmp

                  Filesize

                  240KB

                • memory/1376-1798-0x00000208BC240000-0x00000208BC3BC000-memory.dmp

                  Filesize

                  1.5MB

                • memory/1376-1607-0x00000208BA980000-0x00000208BA9DE000-memory.dmp

                  Filesize

                  376KB

                • memory/1376-1696-0x00000208BB0A0000-0x00000208BB0B6000-memory.dmp

                  Filesize

                  88KB

                • memory/1376-1699-0x00000208BB0C0000-0x00000208BB11A000-memory.dmp

                  Filesize

                  360KB

                • memory/1376-1704-0x00000208BAAB0000-0x00000208BAAB8000-memory.dmp

                  Filesize

                  32KB

                • memory/1376-1712-0x00000208BB140000-0x00000208BB14E000-memory.dmp

                  Filesize

                  56KB

                • memory/1376-1709-0x00000208BB130000-0x00000208BB140000-memory.dmp

                  Filesize

                  64KB

                • memory/1376-1605-0x00000208BA8A0000-0x00000208BA8B4000-memory.dmp

                  Filesize

                  80KB

                • memory/1376-1717-0x00000208BB5D0000-0x00000208BB634000-memory.dmp

                  Filesize

                  400KB

                • memory/1376-1599-0x00000208BA6D0000-0x00000208BA6DE000-memory.dmp

                  Filesize

                  56KB

                • memory/1376-1707-0x00000208BB150000-0x00000208BB166000-memory.dmp

                  Filesize

                  88KB

                • memory/1376-1595-0x00000208BA8E0000-0x00000208BA914000-memory.dmp

                  Filesize

                  208KB

                • memory/1376-1593-0x00000208BA6F0000-0x00000208BA706000-memory.dmp

                  Filesize

                  88KB

                • memory/1376-1705-0x00000208BB120000-0x00000208BB128000-memory.dmp

                  Filesize

                  32KB

                • memory/1376-1586-0x00000208BD450000-0x00000208BF930000-memory.dmp

                  Filesize

                  36.9MB

                • memory/1376-1702-0x00000208BAAA0000-0x00000208BAAAC000-memory.dmp

                  Filesize

                  48KB

                • memory/1376-1571-0x00000208B8DE0000-0x00000208B8E00000-memory.dmp

                  Filesize

                  128KB

                • memory/1376-1715-0x00000208BB520000-0x00000208BB558000-memory.dmp

                  Filesize

                  224KB

                • memory/1376-1573-0x00000208BA730000-0x00000208BA766000-memory.dmp

                  Filesize

                  216KB

                • memory/1376-1723-0x00000208BB680000-0x00000208BB6BA000-memory.dmp

                  Filesize

                  232KB

                • memory/1376-1569-0x00000208BA610000-0x00000208BA656000-memory.dmp

                  Filesize

                  280KB

                • memory/1376-1721-0x00000208BB640000-0x00000208BB67A000-memory.dmp

                  Filesize

                  232KB

                • memory/1376-1555-0x00000208BAAC0000-0x00000208BAF70000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1376-1719-0x00000208BB560000-0x00000208BB5A0000-memory.dmp

                  Filesize

                  256KB

                • memory/1376-1725-0x00000208BB700000-0x00000208BB73A000-memory.dmp

                  Filesize

                  232KB

                • memory/1376-1726-0x00000208BB740000-0x00000208BB77E000-memory.dmp

                  Filesize

                  248KB

                • memory/1376-1731-0x00000208BB880000-0x00000208BB8B2000-memory.dmp

                  Filesize

                  200KB

                • memory/1376-1730-0x00000208BB840000-0x00000208BB878000-memory.dmp

                  Filesize

                  224KB

                • memory/1376-1729-0x00000208BB800000-0x00000208BB838000-memory.dmp

                  Filesize

                  224KB

                • memory/1376-1728-0x00000208BB7C0000-0x00000208BB7F8000-memory.dmp

                  Filesize

                  224KB

                • memory/1376-1727-0x00000208BB780000-0x00000208BB7BA000-memory.dmp

                  Filesize

                  232KB

                • memory/1376-1732-0x00000208BB5A0000-0x00000208BB5CA000-memory.dmp

                  Filesize

                  168KB

                • memory/1376-1733-0x00000208BB500000-0x00000208BB514000-memory.dmp

                  Filesize

                  80KB

                • memory/1376-1734-0x00000208BB4E0000-0x00000208BB4E8000-memory.dmp

                  Filesize

                  32KB

                • memory/1376-1735-0x00000208BB4F0000-0x00000208BB4FA000-memory.dmp

                  Filesize

                  40KB

                • memory/1376-1736-0x00000208BBCD0000-0x00000208BBCD8000-memory.dmp

                  Filesize

                  32KB

                • memory/1376-1737-0x00000208BBD00000-0x00000208BBD1C000-memory.dmp

                  Filesize

                  112KB

                • memory/1376-1738-0x00000208BBE20000-0x00000208BBE40000-memory.dmp

                  Filesize

                  128KB

                • memory/1376-1739-0x00000208BC370000-0x00000208BC8A0000-memory.dmp

                  Filesize

                  5.2MB

                • memory/1376-1743-0x00000208BC450000-0x00000208BCA52000-memory.dmp

                  Filesize

                  6.0MB

                • memory/1376-1768-0x00000208BBF80000-0x00000208BC0C0000-memory.dmp

                  Filesize

                  1.2MB

                • memory/1376-1546-0x00000208B8D60000-0x00000208B8D76000-memory.dmp

                  Filesize

                  88KB

                • memory/1376-1609-0x00000208BAF70000-0x00000208BB050000-memory.dmp

                  Filesize

                  896KB

                • memory/1376-1544-0x000002089EDA0000-0x000002089EDC8000-memory.dmp

                  Filesize

                  160KB

                • memory/1376-1542-0x000002089ED40000-0x000002089ED4C000-memory.dmp

                  Filesize

                  48KB

                • memory/1376-1804-0x00000208BCDD0000-0x00000208BD136000-memory.dmp

                  Filesize

                  3.4MB

                • memory/1376-1540-0x000002089E8D0000-0x000002089E930000-memory.dmp

                  Filesize

                  384KB

                • memory/1376-1834-0x00000208BFCB0000-0x00000208C002B000-memory.dmp

                  Filesize

                  3.5MB

                • memory/1376-1835-0x00000208BBEE0000-0x00000208BBF7C000-memory.dmp

                  Filesize

                  624KB

                • memory/1376-1837-0x00000208BC0C0000-0x00000208BC126000-memory.dmp

                  Filesize

                  408KB

                • memory/1376-1840-0x00000208BD140000-0x00000208BD3C6000-memory.dmp

                  Filesize

                  2.5MB

                • memory/1376-1841-0x00000208BBE80000-0x00000208BBEC0000-memory.dmp

                  Filesize

                  256KB

                • memory/1376-1842-0x00000208BC1A0000-0x00000208BC206000-memory.dmp

                  Filesize

                  408KB

                • memory/1376-1843-0x00007FFF19E30000-0x00007FFF1A19C000-memory.dmp

                  Filesize

                  3.4MB

                • memory/1376-1844-0x00000208BCB60000-0x00000208BCC60000-memory.dmp

                  Filesize

                  1024KB

                • memory/1376-1845-0x00000208BC130000-0x00000208BC158000-memory.dmp

                  Filesize

                  160KB

                • memory/1376-1850-0x00000208BBEC0000-0x00000208BBEDA000-memory.dmp

                  Filesize

                  104KB

                • memory/1376-1852-0x00000208BC160000-0x00000208BC174000-memory.dmp

                  Filesize

                  80KB

                • memory/1376-1851-0x00000208BC210000-0x00000208BC240000-memory.dmp

                  Filesize

                  192KB

                • memory/1376-1849-0x00000208BC3C0000-0x00000208BC3FE000-memory.dmp

                  Filesize

                  248KB

                • memory/1376-1848-0x00000208BCA60000-0x00000208BCAB0000-memory.dmp

                  Filesize

                  320KB

                • memory/1376-1847-0x00000208BBCE0000-0x00000208BBCF0000-memory.dmp

                  Filesize

                  64KB

                • memory/1376-1846-0x00000208BBE40000-0x00000208BBE58000-memory.dmp

                  Filesize

                  96KB

                • memory/1376-1853-0x00000208BC180000-0x00000208BC198000-memory.dmp

                  Filesize

                  96KB

                • memory/1376-1854-0x00000208BC400000-0x00000208BC414000-memory.dmp

                  Filesize

                  80KB

                • memory/1376-1855-0x00000208BBCF0000-0x00000208BBCFA000-memory.dmp

                  Filesize

                  40KB

                • memory/1376-1856-0x00000208BC420000-0x00000208BC436000-memory.dmp

                  Filesize

                  88KB

                • memory/1376-1857-0x00000208BBE80000-0x00000208BBE96000-memory.dmp

                  Filesize

                  88KB

                • memory/1376-1858-0x00000208BBEC0000-0x00000208BBEC8000-memory.dmp

                  Filesize

                  32KB

                • memory/1376-1859-0x00000208BBFC0000-0x00000208BBFDA000-memory.dmp

                  Filesize

                  104KB

                • memory/1376-1860-0x00000208BC1A0000-0x00000208BC1A8000-memory.dmp

                  Filesize

                  32KB

                • memory/1376-1861-0x00000208C1CA0000-0x00000208C277E000-memory.dmp

                  Filesize

                  10.9MB

                • memory/1376-1863-0x00000208BC1E0000-0x00000208BC1EE000-memory.dmp

                  Filesize

                  56KB

                • memory/1376-1864-0x00000208BC210000-0x00000208BC21A000-memory.dmp

                  Filesize

                  40KB

                • memory/1376-1870-0x00000208BD0C0000-0x00000208BD112000-memory.dmp

                  Filesize

                  328KB

                • memory/1376-1867-0x00000208BD1D0000-0x00000208BD2D4000-memory.dmp

                  Filesize

                  1.0MB

                • memory/1376-1866-0x00000208BC220000-0x00000208BC228000-memory.dmp

                  Filesize

                  32KB

                • memory/1376-1865-0x00000208BC250000-0x00000208BC25C000-memory.dmp

                  Filesize

                  48KB

                • memory/1376-1874-0x00000208BD370000-0x00000208BD3AA000-memory.dmp

                  Filesize

                  232KB

                • memory/1376-1871-0x00000208BD2E0000-0x00000208BD366000-memory.dmp

                  Filesize

                  536KB

                • memory/1376-1873-0x00000208BD160000-0x00000208BD182000-memory.dmp

                  Filesize

                  136KB

                • memory/1376-1875-0x00000208BD190000-0x00000208BD1B6000-memory.dmp

                  Filesize

                  152KB

                • memory/2072-1872-0x0000000000400000-0x00000000004D4000-memory.dmp

                  Filesize

                  848KB

                • memory/2804-1899-0x0000000000270000-0x0000000000278000-memory.dmp

                  Filesize

                  32KB