Analysis

  • max time kernel
    273s
  • max time network
    294s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-04-2024 22:31

General

  • Target

    LDPlayer9_es_1009_ld.exe

  • Size

    3.3MB

  • MD5

    7c2e5ef59e9589422bcd5bf3726fbcb1

  • SHA1

    c4dac6966ac4cd3500d6a7fe44138a0db639d507

  • SHA256

    6870e8dbcfaf543500add1d303de528c34e3b1f4d4424b0097c4ffb408a44fcd

  • SHA512

    28870d9cb07f964ba0ecedfb25762cb4530bda869cc717dd4fffcd176085f03c05fd129b23e826dd6ac33ae6af8132bf9dc317ebffb52448b83236ad2349ca45

  • SSDEEP

    49152:XZi5hu7I/BzfK/ZHg1pHtOUYqP3CFOrtG/RR9sXafgkDFMVR9C1UhPJXMK701hOw:XI5ht/BzfKW1t0xOouBiCV2Ht

Malware Config

Signatures

  • Guerrilla

    Guerrilla is an Android malware used by the Lemon Group threat actor.

  • Guerrilla payload 1 IoCs
  • Creates new service(s) 1 TTPs
  • Manipulates Digital Signatures 1 TTPs 64 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Possible privilege escalation attempt 6 IoCs
  • Modifies file permissions 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 64 IoCs
  • Registers COM server for autorun 1 TTPs 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 4 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LDPlayer9_es_1009_ld.exe
    "C:\Users\Admin\AppData\Local\Temp\LDPlayer9_es_1009_ld.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5016
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM dnplayer.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3456
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM dnmultiplayer.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3908
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM dnmultiplayerex.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2132
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM bugreport.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3604
    • C:\LDPlayer\LDPlayer9\LDPlayer.exe
      "C:\LDPlayer\LDPlayer9\\LDPlayer.exe" -silence -downloader -openid=1009 -language=es -path="C:\LDPlayer\LDPlayer9\"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\LDPlayer\LDPlayer9\dnrepairer.exe
        "C:\LDPlayer\LDPlayer9\dnrepairer.exe" listener=328208
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Registers COM server for autorun
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4076
        • C:\Windows\SysWOW64\net.exe
          "net" start cryptsvc
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2492
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start cryptsvc
            5⤵
              PID:1348
          • C:\Windows\SysWOW64\regsvr32.exe
            "regsvr32" Softpub.dll /s
            4⤵
            • Manipulates Digital Signatures
            PID:4576
          • C:\Windows\SysWOW64\regsvr32.exe
            "regsvr32" Wintrust.dll /s
            4⤵
            • Manipulates Digital Signatures
            PID:5020
          • C:\Windows\SysWOW64\regsvr32.exe
            "regsvr32" Initpki.dll /s
            4⤵
              PID:1168
            • C:\Windows\SysWOW64\regsvr32.exe
              "C:\Windows\system32\regsvr32" Initpki.dll /s
              4⤵
                PID:4380
              • C:\Windows\SysWOW64\regsvr32.exe
                "regsvr32" dssenh.dll /s
                4⤵
                  PID:1032
                • C:\Windows\SysWOW64\regsvr32.exe
                  "regsvr32" rsaenh.dll /s
                  4⤵
                    PID:2392
                  • C:\Windows\SysWOW64\regsvr32.exe
                    "regsvr32" cryptdlg.dll /s
                    4⤵
                    • Manipulates Digital Signatures
                    PID:3572
                  • C:\Windows\SysWOW64\takeown.exe
                    "takeown" /f "C:\LDPlayer\LDPlayer9\vms" /r /d y
                    4⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:4012
                  • C:\Windows\SysWOW64\icacls.exe
                    "icacls" "C:\LDPlayer\LDPlayer9\vms" /grant everyone:F /t
                    4⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:1016
                  • C:\Windows\SysWOW64\takeown.exe
                    "takeown" /f "C:\LDPlayer\LDPlayer9\\system.vmdk"
                    4⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:2388
                  • C:\Windows\SysWOW64\icacls.exe
                    "icacls" "C:\LDPlayer\LDPlayer9\\system.vmdk" /grant everyone:F /t
                    4⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:2424
                  • C:\Windows\SysWOW64\dism.exe
                    C:\Windows\system32\dism.exe /Online /English /Get-Features
                    4⤵
                    • Drops file in Windows directory
                    • Suspicious use of WriteProcessMemory
                    PID:2708
                    • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\dismhost.exe
                      C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\dismhost.exe {086EA703-BD25-4080-9F29-C6DF95D1B0DA}
                      5⤵
                      • Drops file in Windows directory
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:1472
                  • C:\Windows\SysWOW64\sc.exe
                    sc query HvHost
                    4⤵
                    • Launches sc.exe
                    PID:2100
                  • C:\Windows\SysWOW64\sc.exe
                    sc query vmms
                    4⤵
                    • Launches sc.exe
                    PID:1396
                  • C:\Windows\SysWOW64\sc.exe
                    sc query vmcompute
                    4⤵
                    • Launches sc.exe
                    PID:5112
                  • C:\Program Files\ldplayer9box\Ld9BoxSVC.exe
                    "C:\Program Files\ldplayer9box\Ld9BoxSVC.exe" /RegServer
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:1852
                  • C:\Windows\SYSTEM32\regsvr32.exe
                    "regsvr32" "C:\Program Files\ldplayer9box\VBoxC.dll" /s
                    4⤵
                    • Loads dropped DLL
                    PID:2960
                  • C:\Windows\SysWOW64\regsvr32.exe
                    "regsvr32" "C:\Program Files\ldplayer9box\x86\VBoxClient-x86.dll" /s
                    4⤵
                    • Loads dropped DLL
                    PID:3924
                  • C:\Windows\SYSTEM32\regsvr32.exe
                    "regsvr32" "C:\Program Files\ldplayer9box\VBoxProxyStub.dll" /s
                    4⤵
                    • Loads dropped DLL
                    • Registers COM server for autorun
                    • Modifies registry class
                    PID:3584
                  • C:\Windows\SysWOW64\regsvr32.exe
                    "regsvr32" "C:\Program Files\ldplayer9box\x86\VBoxProxyStub-x86.dll" /s
                    4⤵
                    • Modifies registry class
                    PID:2132
                  • C:\Windows\SysWOW64\sc.exe
                    "C:\Windows\system32\sc" create Ld9BoxSup binPath= "C:\Program Files\ldplayer9box\Ld9BoxSup.sys" type= kernel start= auto
                    4⤵
                    • Launches sc.exe
                    PID:4608
                  • C:\Windows\SysWOW64\sc.exe
                    "C:\Windows\system32\sc" start Ld9BoxSup
                    4⤵
                    • Launches sc.exe
                    PID:2112
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "powershell.exe" New-NetFirewallRule -DisplayName "Ld9BoxSup" -Direction Inbound -Program 'C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe' -RemoteAddress LocalSubnet -Action Allow
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2812
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "powershell.exe" New-NetFirewallRule -DisplayName "Ld9BoxNat" -Direction Inbound -Program 'C:\Program Files\ldplayer9box\VBoxNetNAT.exe' -RemoteAddress LocalSubnet -Action Allow
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4912
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "powershell.exe" New-NetFirewallRule -DisplayName "dnplayer" -Direction Inbound -Program 'C:\LDPlayer\LDPlayer9\dnplayer.exe' -RemoteAddress LocalSubnet -Action Allow
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2492
                • C:\LDPlayer\LDPlayer9\driverconfig.exe
                  "C:\LDPlayer\LDPlayer9\driverconfig.exe"
                  3⤵
                  • Executes dropped EXE
                  PID:3740
                • C:\Windows\SysWOW64\takeown.exe
                  "takeown" /f C:\LDPlayer\ldmutiplayer\ /r /d y
                  3⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:3064
                • C:\Windows\SysWOW64\icacls.exe
                  "icacls" C:\LDPlayer\ldmutiplayer\ /grant everyone:F /t
                  3⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:3768

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\LDPlayer\LDPlayer9\LDPlayer.exe

              Filesize

              650.2MB

              MD5

              b0f1ac417f2426fa072bde7a244f6840

              SHA1

              b357ab91e0a267c3b8c2badbdd01b1cf2fb95517

              SHA256

              742cd9039a9fceb0b04fd1dbfc6a7ac93e30015340ee9d712a2eb8328644012b

              SHA512

              14ddaf22a5deadc77a314773c27e3d4bfae1d74cec5ec55d291d49c07e912bb3115e6ee7d932d461708d959e6669f5f6947d86e0440d87e6edd7b3ca070318d1

            • C:\LDPlayer\LDPlayer9\MSVCP120.dll

              Filesize

              444KB

              MD5

              50260b0f19aaa7e37c4082fecef8ff41

              SHA1

              ce672489b29baa7119881497ed5044b21ad8fe30

              SHA256

              891603d569fc6f1afed7c7d935b0a3c7363c35a0eb4a76c9e57ef083955bc2c9

              SHA512

              6f99d39bfe9d4126417ff65571c78c279d75fc9547ee767a594620c0c6f45f4bb42fd0c5173d9bc91a68a0636205a637d5d1c7847bd5f8ce57e120d210b0c57d

            • C:\LDPlayer\LDPlayer9\MSVCR120.dll

              Filesize

              947KB

              MD5

              50097ec217ce0ebb9b4caa09cd2cd73a

              SHA1

              8cd3018c4170072464fbcd7cba563df1fc2b884c

              SHA256

              2a2ff2c61977079205c503e0bcfb96bf7aa4d5c9a0d1b1b62d3a49a9aa988112

              SHA512

              ac2d02e9bfc2be4c3cb1c2fff41a2dafcb7ce1123998bbf3eb5b4dc6410c308f506451de9564f7f28eb684d8119fb6afe459ab87237df7956f4256892bbab058

            • C:\LDPlayer\LDPlayer9\crashreport.dll

              Filesize

              51KB

              MD5

              b0d864ec1a1291d14039c8cd80643b56

              SHA1

              6c8361132a9a9e654937e43ddd4a3a483b559066

              SHA256

              1a399ef385397da87425d6a8f50a75bb08dad54584d7da916c84c6b1e5f5d285

              SHA512

              1d7cc2966961ea3db6f82456626e242454d830d176ee6e8c5cb3eb462e0b590ffa7d511fb0473eef350bc134cd531c1564262942132afab2fa41a8e49b0e9746

            • C:\LDPlayer\LDPlayer9\dnmultiplayer.exe

              Filesize

              1.2MB

              MD5

              0c81805493ab6e2ea8855e27dad4b63e

              SHA1

              2d1985e253b79f0071cf74ce067faf4d412d14db

              SHA256

              1beac1e13687b2200fdad579cc93d8216788a9adcaf0885b62af24fa1974c82d

              SHA512

              a69d94b97a5e74b418060c7d7902dee05ec6a02302fc2f063fb96b38fd6966a9c8419d73208f570b045d29b1f69c7c26dbe9f85abc1aeb7e4a6b4b17f0b7efd4

            • C:\LDPlayer\LDPlayer9\dnplayer.exe

              Filesize

              3.5MB

              MD5

              f9ddc9083ffa20efd46386eca87582bb

              SHA1

              8558d23be32806ae0dc6e85dbb548f1507240b1e

              SHA256

              c2dd00c3f8b25ff6b5d58317249bcd69a150bc29179bfb63cc2242fef4651cea

              SHA512

              3efed140be34ac956298959ee7dca4161c7b9afd0e06faccc1cfe65def71dd1c856cc16b80d6ad1536f3c7605f3501a75df3220b17654e4708306150deab3276

            • C:\LDPlayer\LDPlayer9\dnrepairer.exe

              Filesize

              41.9MB

              MD5

              012e52c8cb968a21ce90cc6e2e833295

              SHA1

              1870e9946c6627d60e78023890c2a80051711dc0

              SHA256

              5fd54efe3a481f702394abc439191ae470fe01c6f780f3505539170816e90f1d

              SHA512

              b23c50da29a9d803c61e7cbe145d9d4776f1301d3996c09da8f538d95f4fb1d7d11ea441afcdc28a4e8259f1c873384adbe8dbc90d6a382dfc1131a836ecb67e

            • C:\LDPlayer\LDPlayer9\dnresource.rcc

              Filesize

              5.0MB

              MD5

              f845753af4cc7b94f180fb76787e3bc2

              SHA1

              76ca7babbb655d749c9ed69e0b8875370320cc5a

              SHA256

              a19a6c0c644ce0e655eaf38a8dbddf05e55048ba52309366a5333e1b50bde990

              SHA512

              0a3062057622ffcff80c9c5f872abdf59a36131bfc60532c853ea858774d89fed27343f838dfe341dafe8444538fc6e2103d3aa19ef9d264e0f8e761c4bfce81

            • C:\LDPlayer\LDPlayer9\fonts\NotoSans-Regular.otf

              Filesize

              17.4MB

              MD5

              93b877811441a5ae311762a7cb6fb1e1

              SHA1

              339e033fd4fbb131c2d9b964354c68cd2cf18bd1

              SHA256

              b3899a2bb84ce5e0d61cc55c49df2d29ba90d301b71a84e8c648416ec96efc8b

              SHA512

              7f053cec61fbddae0184d858c3ef3e8bf298b4417d25b84ac1fc888c052eca252b24f7abfff7783442a1b80cc9fc2ce777dda323991cc4dc79039f4c17e21df4

            • C:\LDPlayer\LDPlayer9\fonts\Roboto-Regular.otf

              Filesize

              103KB

              MD5

              4acd5f0e312730f1d8b8805f3699c184

              SHA1

              67c957e102bf2b2a86c5708257bc32f91c006739

              SHA256

              72336333d602f1c3506e642e0d0393926c0ec91225bf2e4d216fcebd82bb6cb5

              SHA512

              9982c1c53cee1b44fd0c3df6806b8cbf6b441d3ed97aeb466dba568adce1144373ce7833d8f44ac3fa58d01d8cdb7e8621b4bb125c4d02092c355444651a4837

            • C:\LDPlayer\LDPlayer9\ldmutiplayer\7za.exe

              Filesize

              652KB

              MD5

              ad9d7cbdb4b19fb65960d69126e3ff68

              SHA1

              dcdc0e609a4e9d5ff9d96918c30cb79c6602cb3d

              SHA256

              a6c324f2925b3b3dbd2ad989e8d09c33ecc150496321ae5a1722ab097708f326

              SHA512

              f0196bee7ad8005a36eea86e31429d2c78e96d57b53ff4a64b3e529a54670fa042322a3c3a21557c96b0b3134bf81f238a9e35124b2d0ce80c61ed548a9791e7

            • C:\LDPlayer\LDPlayer9\ldmutiplayer\cximagecrt.dll

              Filesize

              1.5MB

              MD5

              66df6f7b7a98ff750aade522c22d239a

              SHA1

              f69464fe18ed03de597bb46482ae899f43c94617

              SHA256

              91e3035a01437b54adda33d424060c57320504e7e6a0c85db2654815ba29c71f

              SHA512

              48d4513e09edd7f270614258b2750d5e98f0dbce671ba41a524994e96ed3df657fce67545153ca32d2bf7efcb35371cae12c4264df9053e4eb5e6b28014ed20e

            • C:\LDPlayer\LDPlayer9\ldmutiplayer\libcrypto-1_1.dll

              Filesize

              2.0MB

              MD5

              01c4246df55a5fff93d086bb56110d2b

              SHA1

              e2939375c4dd7b478913328b88eaa3c91913cfdc

              SHA256

              c9501469ad2a2745509ab2d0db8b846f2bfb4ec019b98589d311a4bd7ac89889

              SHA512

              39524d5b8fc7c9d0602bc6733776237522dcca5f51cc6ceebd5a5d2c4cbda904042cee2f611a9c9477cc7e08e8eadd8915bf41c7c78e097b5e50786143e98196

            • C:\LDPlayer\LDPlayer9\ldmutiplayer\libcurl.dll

              Filesize

              442KB

              MD5

              2d40f6c6a4f88c8c2685ee25b53ec00d

              SHA1

              faf96bac1e7665aa07029d8f94e1ac84014a863b

              SHA256

              1d7037da4222de3d7ca0af6a54b2942d58589c264333ef814cb131d703b5c334

              SHA512

              4e6d0dc0dc3fb7e57c6d7843074ee7c89c777e9005893e089939eb765d9b6fb12f0e774dc1814f6a34e75d1775e19e62782465731fd5605182e7984d798ba779

            • C:\LDPlayer\LDPlayer9\ldmutiplayer\libssh2.dll

              Filesize

              192KB

              MD5

              52c43baddd43be63fbfb398722f3b01d

              SHA1

              be1b1064fdda4dde4b72ef523b8e02c050ccd820

              SHA256

              8c91023203f3d360c0629ffd20c950061566fb6c780c83eaa52fb26abb6be86f

              SHA512

              04cc3d8e31bd7444068468dd32ffcc9092881ca4aaea7c92292e5f1b541f877bdec964774562cb7a531c3386220d88b005660a2b5a82957e28350a381bea1b28

            • C:\LDPlayer\LDPlayer9\ldmutiplayer\libssl-1_1.dll

              Filesize

              511KB

              MD5

              e8fd6da54f056363b284608c3f6a832e

              SHA1

              32e88b82fd398568517ab03b33e9765b59c4946d

              SHA256

              b681fd3c3b3f2d59f6a14be31e761d5929e104be06aa77c883ada9675ca6e9fd

              SHA512

              4f997deebf308de29a044e4ff2e8540235a41ea319268aa202e41a2be738b8d50f990ecc68f4a737a374f6d5f39ce8855edf0e2bb30ce274f75388e3ddd8c10b

            • C:\LDPlayer\LDPlayer9\ldmutiplayer\msvcp110.dll

              Filesize

              522KB

              MD5

              3e29914113ec4b968ba5eb1f6d194a0a

              SHA1

              557b67e372e85eb39989cb53cffd3ef1adabb9fe

              SHA256

              c8d5572ca8d7624871188f0acabc3ae60d4c5a4f6782d952b9038de3bc28b39a

              SHA512

              75078c9eaa5a7ae39408e5db1ce7dbce5a3180d1c644bcb5e481b0810b07cb7d001d68d1b4f462cd5355e98951716f041ef570fcc866d289a68ea19b3f500c43

            • C:\LDPlayer\LDPlayer9\ldmutiplayer\msvcr110.dll

              Filesize

              854KB

              MD5

              4ba25d2cbe1587a841dcfb8c8c4a6ea6

              SHA1

              52693d4b5e0b55a929099b680348c3932f2c3c62

              SHA256

              b30160e759115e24425b9bcdf606ef6ebce4657487525ede7f1ac40b90ff7e49

              SHA512

              82e86ec67a5c6cddf2230872f66560f4b0c3e4c1bb672507bbb8446a8d6f62512cbd0475fe23b619db3a67bb870f4f742761cf1f87d50db7f14076f54006f6c6

            • C:\LDPlayer\LDPlayer9\ldmutiplayer\ssleay32.dll

              Filesize

              283KB

              MD5

              0054560df6c69d2067689433172088ef

              SHA1

              a30042b77ebd7c704be0e986349030bcdb82857d

              SHA256

              72553b45a5a7d2b4be026d59ceb3efb389c686636c6da926ffb0ca653494e750

              SHA512

              418190401b83de32a8ce752f399b00c091afad5e3b21357a53c134cce3b4199e660572ee71e18b5c2f364d3b2509b5365d7b569d6d9da5c79ae78c572c1d0ba0

            • C:\LDPlayer\LDPlayer9\system.vmdk

              Filesize

              57.8MB

              MD5

              bfd6633c93edde76345ac086683e6e79

              SHA1

              d44a7af878db0659e43b817a3bed9fe6c63223d4

              SHA256

              8ee7deb9c8607378c47b1e6e38a82bd3cc81333774003869fb1cf43b538b07e4

              SHA512

              1401d0630fb9d8f05000cd0a3f0c7810f5684f1622e265459821927060da78befea0f4b51a607317f967ffa0fc6a95ef115744b46cf514cad57961b72f2d908a

            • C:\LDPlayer\LDPlayer9\system.vmdk

              Filesize

              1520.9MB

              MD5

              ed37f162ee7b29cd1ab7b12a029c0a61

              SHA1

              e2fefe47c99c225cd5f808029fda03add8206a38

              SHA256

              6d0fc1d6dc92ef1df2376b6491739fda5e9a3d4135524dc71c67810886af4030

              SHA512

              a4464a3dd5c42d8557d6bc39e9d78999296f0f0cc9face1cec816f4d7ad12cef4fb3dbf3d3dabdfaa1689fa0e25b4ebd734f968942eb31d6453cf83f6c444443

            • C:\LDPlayer\LDPlayer9\vms\config\leidian0.config

              Filesize

              641B

              MD5

              b6fd5bfd9ae5ff4088523c9ea5cfacad

              SHA1

              a17f60ecad8a2c8b8e325c741f3294e2fcd1832e

              SHA256

              27a16f92b1108b91e549f0a4d65c0e0d00f5825e79cfbc5257e6ebb1a3939f08

              SHA512

              247e3b5bd37e4f71c2f897b2cbac723f7fd082e8202de198a5f2223c3fc9505490554af208e3cde5d4a627f3886ee451dcfac541f0c8eb37accd843be1f71b30

            • C:\LDPlayer\ldmutiplayer\libeay32.dll

              Filesize

              1.2MB

              MD5

              ba46e6e1c5861617b4d97de00149b905

              SHA1

              4affc8aab49c7dc3ceeca81391c4f737d7672b32

              SHA256

              2eac0a690be435dd72b7a269ee761340099bf444edb4f447fa0030023cbf8e1e

              SHA512

              bf892b86477d63287f42385c0a944eee6354c7ae557b039516bf8932c7140ca8811b7ae7ac111805773495cf6854586e8a0e75e14dbb24eba56e4683029767b6

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\AppxProvider.dll

              Filesize

              664KB

              MD5

              a31cb807bf0ab4ddbbe2b6bb96ae6cd1

              SHA1

              cf63765b41aee9cd7ae76c04dfbb6151e909b3c9

              SHA256

              37f45e6fc1e531279dcffed70c420df7b073504efe43bbb99a33a9ec24b75a47

              SHA512

              6a83378c7e88fe04dde20685889d76fd7efdf4e02342a952ba2e6ab0fa354e3293560986e5fded00718e4c14417970db0c06e6384277ae1e50021bb4dc87fad3

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\AssocProvider.dll

              Filesize

              136KB

              MD5

              702f9c8fb68fd19514c106e749ec357d

              SHA1

              7c141106e4ae8f3a0e5f75d8277ec830fc79eccc

              SHA256

              21ad24a767aeb22d27d356bc8381f103ab620de1a47e374b9f961e44b543a358

              SHA512

              2e7d403c89dacdda623ed1a107bac53aafde089fdd66088d578d6b55bcfe0a4fc7b54733642162bd62d0ca3f1696667a6f0cb4b572d81a6eefd6792d6003c0d9

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\CbsProvider.dll

              Filesize

              1004KB

              MD5

              f51151b2d8d84cddbedbeffebdc6ec6a

              SHA1

              adc9c19aa0663e65997f54835228968e13532198

              SHA256

              7fe4e4924fbbfdf6d772cb9d0a4963d49f6aa18b3c86a2e8df6ca49e22f79884

              SHA512

              802b58617be5e92bfc0c7f8c8d7443128d81908ae99d9a4ce0a785f858dc7832c70dc305f2ad39c9f57db01c05f483f6bf949ad8811fc6fb255c5aee88c729b3

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\DismCorePS.dll

              Filesize

              200KB

              MD5

              7f751738de9ac0f2544b2722f3a19eb0

              SHA1

              7187c57cd1bd378ef73ba9ad686a758b892c89dc

              SHA256

              db995f4f55d8654fc1245da0df9d1d9d52b02d75131bc3bce501b141888232fc

              SHA512

              0891c2dedb420e10d8528996bc9202c9f5f96a855997f71b73023448867d7d03abee4a9a7e2e19ebe2811e7d09497bce1ea4e9097fcb810481af10860ff43dfb

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\DismHost.exe

              Filesize

              168KB

              MD5

              17275206102d1cf6f17346fd73300030

              SHA1

              bbec93f6fb2ae56c705efd6e58d6b3cc68bf1166

              SHA256

              dead0ebd5b5bf5d4b0e68ba975e9a70f98820e85d056b0a6b3775fc4df4da0f6

              SHA512

              ce14a4f95328bb9ce437c5d79084e9d647cb89b66cde86a540b200b1667edc76aa27a36061b6e2ceccecb70b9a011b4bd54040e2a480b8546888ba5cc84a01b3

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\DismProv.dll

              Filesize

              292KB

              MD5

              2ac64cc617d144ae4f37677b5cdbb9b6

              SHA1

              13fe83d7489d302de9ccefbf02c7737e7f9442f9

              SHA256

              006464f42a487ab765e1e97cf2d15bfa7db76752946de52ff7e518bc5bbb9a44

              SHA512

              acdb2c9727f53889aa4f1ca519e1991a5d9f08ef161fb6680265804c99487386ca6207d0a22f6c3e02f34eaeb5ded076655ee3f6b4b4e1f5fab5555d73addfd7

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\DmiProvider.dll

              Filesize

              436KB

              MD5

              e54120aa50f14e0d3d257e77db46ece5

              SHA1

              922203542962ec5f938dcb3c876f060ecf17f9dc

              SHA256

              b5fb1a5eb4090598d5f878cdd37ed8eca82962d85995dd2280b8849fba816b54

              SHA512

              fbce5d707f6a66d451165608520be9d7174a8c22eb9827dfe94d98718e2c961f15ac45583b1743f3b8078b3fe675992d4b97bfc5e4b893b60328d94665f71dc9

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\EdgeProvider.dll

              Filesize

              200KB

              MD5

              c22cc16103ee51ba59b765c6b449bddb

              SHA1

              b0683f837e1e44c46c9a050e0a3753893ece24ad

              SHA256

              eb68c7d48f78b46933acba617cf3b5fcb5b8695c8a29295a9fa075f36910825b

              SHA512

              2c382aaddeca4efda63162584c4a2338ffcc1f4828362ce7e927e0b39c470f1f66a7933ae2210d63afb5a2ae25412266fde2ee6bdb896c3c030bdc08b67ec54e

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\Ffuprovider.dll

              Filesize

              680KB

              MD5

              a41b0e08419de4d9874893b813dccb5c

              SHA1

              2390e00f2c2bc9779e99a669193666688064ea77

              SHA256

              57ce7761531058f3c4289b1240bea6dc06355c9c4b4e88b9c9c0df8012edc5b3

              SHA512

              bd370e49da266148d50144c621f6415bdd5358e6274b1d471b8d4ee1888d93774331c3f75e6cb99782f1c8e772981cbc5a4baf5592c6400f340407dc670e547a

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\GenericProvider.dll

              Filesize

              172KB

              MD5

              20fb116831396d9477e352d42097741c

              SHA1

              7e063ac9bc173a81dc56dc5864f912041e2c725a

              SHA256

              6a940ba16154c4a1729b8560b03efb5f2558d66b10da4a5ec26c1299ea713bc4

              SHA512

              851843da748555eba735e1f5457044f24f225bd029534019814a6d1baf2e0bd1f171d297c362cfed5977274b266e823b7ad131ae2512568f7a5f2e3ea498b69a

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\IBSProvider.dll

              Filesize

              84KB

              MD5

              f6b7301c18f651567a5f816c2eb7384d

              SHA1

              40cd6efc28aa7efe86b265af208b0e49bec09ae4

              SHA256

              8f4e3f600917d49ada481ff0ed125fef4a316b659bb1197dc3036fc8c21a5a61

              SHA512

              4087d819706c64a5d2eed546163c55caacc553b02dc4db0d067b8815d3a24fb06ea08de3de86aac058ff2907f200e4e89eef2357ca23328aaacbe29501ea3286

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\ImagingProvider.dll

              Filesize

              248KB

              MD5

              4c6d681704e3070df2a9d3f42d3a58a2

              SHA1

              a9f6286ac25f17b6b2acd1fce6459b0bc94c6c81

              SHA256

              f1bbab35b2602d04d096c8de060b2a5cf802499a937fd1ffe749ff7f54852137

              SHA512

              daa0c723312680256c24457162e0ef026b753ba267f3e2755f838e2864a163802c078d8668dd2c2064cb8887f4e382a73d6402a5533b6ac5c3cbf662ad83db86

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\IntlProvider.dll

              Filesize

              312KB

              MD5

              34035aed2021763bec1a7112d53732f1

              SHA1

              7132595f73755c3ae20a01b6863ac9518f7b75a4

              SHA256

              aac13ddb9ab5a165a38611f1b61229268a40d416f07740d4eefba1a8fcf7c731

              SHA512

              ea045aa46713133a5d0ad20514cc2a8c8fffb99b4e19c4d5262f86167cfce08a31d336222fd3c91e6efbfd90312bb2325337aa02a8489e047b616085fdf46c1d

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\LogProvider.dll

              Filesize

              108KB

              MD5

              c63f6b6d4498f2ec95de15645c48e086

              SHA1

              29f71180feed44f023da9b119ba112f2e23e6a10

              SHA256

              56aca41c62c8d0d1b26db3a01ef6c2da4a6a51fc963eb28411f8f7f029f1bfde

              SHA512

              3a634340d8c66cbc1bef19f701d8bdb034449c28afecce4e8744d18181a20f85a17af3b66c8853cecb8be53f69ae73f85b70e45deac29debab084a25eb3c69dc

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\MsiProvider.dll

              Filesize

              208KB

              MD5

              eb171b7a41a7dd48940f7521da61feb0

              SHA1

              9f2a5ddac7b78615f5a7af753d835aaa41e788fc

              SHA256

              56a8527d267116af39864feca528be5b7a88c3b5df94750154b2efcf2fda5d55

              SHA512

              5917266aed1a79ee4cb16bb532ccae99782d0ee8af27cb42a6b39496c3de61c12a30ce524a1a66cc063101ebcfac957d1b129aae0b491c0587f40171ba6bae12

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\OSProvider.dll

              Filesize

              180KB

              MD5

              e9833a54c1a1bfdab3e5189f3f740ff9

              SHA1

              ffb999c781161d9a694a841728995fda5b6da6d3

              SHA256

              ec137f9caebcea735a9386112cf68f78b92b6a5a38008ce6415485f565e5cf85

              SHA512

              0b18932b24c0257c80225c99be70c5125d2207f9b92681fd623870e7a62599a18fa46bcb5f2b4b01889be73aeb084e1b7e00a4968c699c7fdb3c083ef17a49f9

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\OfflineSetupProvider.dll

              Filesize

              213KB

              MD5

              3437087e6819614a8d54c9bc59a23139

              SHA1

              ae84efe44b02bacdb9da876e18715100a18362be

              SHA256

              8b247665218f5151f0d19f59ea902a7c28f745d67a5d51b63b77242ffb4bdd74

              SHA512

              018e88f6c121dd4ecaceb44794e2fa7a44b52ddb22e7a5a30a332905e02065cbc1d1dcddc197676277b22f741195c1b7c4c185d328b096b6560b84e9749d6dde

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\ProvProvider.dll

              Filesize

              800KB

              MD5

              2ef388f7769205ca319630dd328dcef1

              SHA1

              6dc9ed84e72af4d3e7793c07cfb244626470f3b6

              SHA256

              4915b0c9cd8dc8a29dd649739974d244f9105dc58725f1da0d592af3b546e2bf

              SHA512

              b465917424dd98125d080c135c7e222a9485ed7ec89004f9a70e335b800e5b9419fbc932c8069bae9ff126494174cf48e2790030dd22aa2d75b7b9d8ccff752b

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\ServicingCommon.dll

              Filesize

              944KB

              MD5

              07231bdae9d15bfca7d97f571de3a521

              SHA1

              04aec0f1afcf7732bc4cd1f7aab36e460c325ba6

              SHA256

              be75afbbc30cad7235adf03dcc07fcee3c0c330c89b00e326ebbef2e57df5935

              SHA512

              2a46e0657e84481faf5c9d3de410884cb5c6e7b35039f5be04183cdac6c088cc42b12d0097e27836af14699e7815d794ca1cec80960833ab093b8dc6d44e2129

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\SmiProvider.dll

              Filesize

              272KB

              MD5

              46e3e59dbf300ae56292dea398197837

              SHA1

              78636b25fdb32c8fcdf5fe73cac611213f13a8be

              SHA256

              5a0f1279013d1d379cb3a3e30f1d5be22549728cd9dc92ed5643eacf46199339

              SHA512

              e0584da3c302ea6ffa85932fa185500543f15237d029fdc4b084aee971ec13967f9e83cad250bea36b31f1a3efb1cc556da7dd231e5b06884809d0af51ebdf8c

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\SysprepProvider.dll

              Filesize

              820KB

              MD5

              4dfa1eeec0822bfcfb95e4fa8ec6c143

              SHA1

              54251e697e289020a72e1fd412e34713f2e292cf

              SHA256

              901cea68c7a158a1d9c030d3939f8f72057d1cf2f902aec1bc1b22a0000c0494

              SHA512

              5f3f710bef75da8cddb6e40686d6a19f59fbc7d8a6842eaceb9a002ab284a91ecf48c352171e13f6a75366610988e67710439f1dde579311ebbb3cd9e4751aa4

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\TransmogProvider.dll

              Filesize

              1.3MB

              MD5

              c1c56a9c6ea636dbca49cfcc45a188c3

              SHA1

              d852e49978a08e662804bf3d7ec93d8f6401a174

              SHA256

              b20b3eb2df22998fd7f9ff6898ba707d6b8833a8274719a5e09d5148d868faaf

              SHA512

              f6db05e4644d734f81c2461e4ad49c4e81880c9e4beee13dbbda923360ef6cf4821fccd9040671b86ab2cd8c85fc313c951c1a69e4df14d94268753ce7ae5b2e

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\UnattendProvider.dll

              Filesize

              256KB

              MD5

              7c61284580a6bc4a4c9c92a39bd9ea08

              SHA1

              4579294e3f3b6c03b03b15c249b9cac66e730d2a

              SHA256

              3665872e68264bbf3827c2bf0cfa60124ea1d87912728f2fc3685dce32855cb8

              SHA512

              b30b89d0d5e065042811d6ff397d226877ff698aeb1153681692aedabe3730e2f3746ad9d70e3120e336552bab880644f9ead0c91a451197a8f0977a2126a0fe

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\Vhdprovider.dll

              Filesize

              596KB

              MD5

              8a655555544b2915b5d8676cbf3d77ab

              SHA1

              5a7529f8a6d50d3f4e13b2e3a0585f08eb0511a2

              SHA256

              d3a2dd7d47bfbb3897b927d1b7230b5b12e5fd7315d687458de15fbb08fb7e27

              SHA512

              c6da649ae3c3688065b37bccfb5525ade25ba7bc3b163ad7d61f3b3d1c4957c8fd6c9f2bf23b0dbc4fffe32e980acb5a5d3895b8a012c5ed086e3e38caee2e93

            • C:\Users\Admin\AppData\Local\Temp\A0BFE803-0490-4161-86FE-E1BA09926D76\WimProvider.dll

              Filesize

              672KB

              MD5

              bcf8735528bb89555fc687b1ed358844

              SHA1

              5ef5b24631d2f447c58b0973f61cb02118ae4adc

              SHA256

              78b742deddee8305ea06d77f296ad9fe0f4b4a27d71b34dcdff8ae199364790c

              SHA512

              8b2be4e9a4334a5fc7f7c58579c20974c9194b771f7a872fd8e411d79f45fc5b7657df4c57ad11acb915d5ea5d1f0583c8a981b2c05104e3303b3ee1469b93f5

            • C:\Users\Admin\AppData\Local\Temp\Setup\ds.dll

              Filesize

              67KB

              MD5

              7d5d3e2fcfa5ff53f5ae075ed4327b18

              SHA1

              3905104d8f7ba88b3b34f4997f3948b3183953f6

              SHA256

              e1fb95609f2757ce74cb531a5cf59674e411ea0a262b758371d7236c191910c4

              SHA512

              e67683331bb32ea4b2c38405be7f516db6935f883a1e4ae02a1700f5f36462c31b593e07c6fe06d8c0cb1c20c9f40a507c9eae245667c89f989e32765a89f589

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jg4qd4w4.foq.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Windows\Logs\DISM\dism.log

              Filesize

              19KB

              MD5

              f656738708cbd8b6765b29def20c3f80

              SHA1

              3b8814a7870145130e9bbcbf850abe07c0073c2a

              SHA256

              bc6757f8a3999673c3ad7eee741ca25a7eac5d9d071fdd3eed9a3b151ca7db7a

              SHA512

              f5cc2a6cfd958f8ece0015c6f5d47617481dd15516dae6cb6f75efb11340fb94a521e5452ef6bf3c75a556d24b7cae1bf9437196028a970dcc4d6bfc63a98208

            • C:\Windows\Logs\DISM\dism.log

              Filesize

              23KB

              MD5

              170c745d872498f88715d532c712bfa0

              SHA1

              cf47fbf275ca106419f372ff064977e603cc06be

              SHA256

              7a397b6dae1f109593a542a6844463ce033d41fad2a0b4b0b79b8b02885cbbd5

              SHA512

              80f2d988d165a02ab51af13c99836e210f10e244edaf762107daa8c8d651725def5c02c94febf13a94fedb87414448feb7542147c429d30c31d8439ca220571c

            • memory/2492-757-0x0000000072EF0000-0x00000000736A1000-memory.dmp

              Filesize

              7.7MB

            • memory/2492-777-0x0000000072EF0000-0x00000000736A1000-memory.dmp

              Filesize

              7.7MB

            • memory/2492-767-0x000000006E3D0000-0x000000006E41C000-memory.dmp

              Filesize

              304KB

            • memory/2492-758-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

              Filesize

              64KB

            • memory/2812-696-0x00000000055A0000-0x0000000005BCA000-memory.dmp

              Filesize

              6.2MB

            • memory/2812-727-0x00000000078A0000-0x00000000078B1000-memory.dmp

              Filesize

              68KB

            • memory/2812-710-0x0000000004F60000-0x0000000004F70000-memory.dmp

              Filesize

              64KB

            • memory/2812-711-0x00000000072F0000-0x0000000007324000-memory.dmp

              Filesize

              208KB

            • memory/2812-712-0x000000006E3D0000-0x000000006E41C000-memory.dmp

              Filesize

              304KB

            • memory/2812-721-0x0000000007530000-0x000000000754E000-memory.dmp

              Filesize

              120KB

            • memory/2812-722-0x0000000007550000-0x00000000075F4000-memory.dmp

              Filesize

              656KB

            • memory/2812-723-0x0000000007CD0000-0x000000000834A000-memory.dmp

              Filesize

              6.5MB

            • memory/2812-724-0x0000000007690000-0x00000000076AA000-memory.dmp

              Filesize

              104KB

            • memory/2812-725-0x0000000007710000-0x000000000771A000-memory.dmp

              Filesize

              40KB

            • memory/2812-726-0x0000000007920000-0x00000000079B6000-memory.dmp

              Filesize

              600KB

            • memory/2812-707-0x0000000005E60000-0x00000000061B7000-memory.dmp

              Filesize

              3.3MB

            • memory/2812-728-0x00000000078E0000-0x00000000078EE000-memory.dmp

              Filesize

              56KB

            • memory/2812-729-0x00000000079C0000-0x00000000079DA000-memory.dmp

              Filesize

              104KB

            • memory/2812-732-0x0000000072EF0000-0x00000000736A1000-memory.dmp

              Filesize

              7.7MB

            • memory/2812-692-0x0000000002B30000-0x0000000002B66000-memory.dmp

              Filesize

              216KB

            • memory/2812-693-0x0000000072EF0000-0x00000000736A1000-memory.dmp

              Filesize

              7.7MB

            • memory/2812-694-0x0000000004F60000-0x0000000004F70000-memory.dmp

              Filesize

              64KB

            • memory/2812-695-0x0000000004F60000-0x0000000004F70000-memory.dmp

              Filesize

              64KB

            • memory/2812-697-0x0000000005490000-0x00000000054B2000-memory.dmp

              Filesize

              136KB

            • memory/2812-698-0x0000000005D80000-0x0000000005DE6000-memory.dmp

              Filesize

              408KB

            • memory/2812-709-0x00000000063F0000-0x000000000643C000-memory.dmp

              Filesize

              304KB

            • memory/2812-708-0x0000000006350000-0x000000000636E000-memory.dmp

              Filesize

              120KB

            • memory/4912-756-0x0000000072EF0000-0x00000000736A1000-memory.dmp

              Filesize

              7.7MB

            • memory/4912-746-0x000000006E3D0000-0x000000006E41C000-memory.dmp

              Filesize

              304KB

            • memory/4912-745-0x00000000045F0000-0x0000000004600000-memory.dmp

              Filesize

              64KB

            • memory/4912-744-0x00000000055D0000-0x0000000005927000-memory.dmp

              Filesize

              3.3MB

            • memory/4912-733-0x0000000072EF0000-0x00000000736A1000-memory.dmp

              Filesize

              7.7MB

            • memory/4912-735-0x00000000045F0000-0x0000000004600000-memory.dmp

              Filesize

              64KB

            • memory/4912-734-0x00000000045F0000-0x0000000004600000-memory.dmp

              Filesize

              64KB

            • memory/5016-24-0x0000000009D70000-0x000000000A29C000-memory.dmp

              Filesize

              5.2MB

            • memory/5016-23-0x00000000097D0000-0x0000000009836000-memory.dmp

              Filesize

              408KB

            • memory/5016-22-0x0000000009730000-0x00000000097CC000-memory.dmp

              Filesize

              624KB

            • memory/5016-21-0x00000000043D0000-0x0000000004414000-memory.dmp

              Filesize

              272KB

            • memory/5016-20-0x0000000008580000-0x0000000008612000-memory.dmp

              Filesize

              584KB

            • memory/5016-19-0x00000000088F0000-0x0000000008E96000-memory.dmp

              Filesize

              5.6MB

            • memory/5016-18-0x0000000072EF0000-0x00000000736A1000-memory.dmp

              Filesize

              7.7MB

            • memory/5016-17-0x00000000737B0000-0x00000000737C4000-memory.dmp

              Filesize

              80KB

            • memory/5016-16-0x0000000005D30000-0x0000000005D44000-memory.dmp

              Filesize

              80KB

            • memory/5016-12-0x0000000005EC0000-0x0000000005ED0000-memory.dmp

              Filesize

              64KB

            • memory/5016-25-0x000000000A2B0000-0x000000000A2BA000-memory.dmp

              Filesize

              40KB

            • memory/5016-26-0x0000000005EC0000-0x0000000005ED0000-memory.dmp

              Filesize

              64KB

            • memory/5016-51-0x0000000072EF0000-0x00000000736A1000-memory.dmp

              Filesize

              7.7MB

            • memory/5016-177-0x0000000005EC0000-0x0000000005ED0000-memory.dmp

              Filesize

              64KB