Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2024 09:47

General

  • Target

    LDPlayer9_ens_com.cepstral.flamethrower_3040_ld.exe

  • Size

    2.5MB

  • MD5

    a64bd549d95bfc8be592833460f79fcc

  • SHA1

    0aeeb9507ed39f14d82149c56011ec3aaed1bec9

  • SHA256

    d285b5242f4583d49c63a7c7f83a72f082ab395f9eaff674ff56c8d2d0fa063d

  • SHA512

    767bffb8861e81ce61cfec5b0462f6a62cf86d9fca8411126b6ee3f43bc7fccbbffae8fafe293e9c227f297d82562d70940b441f9d541e35b66b972f2b79fdae

  • SSDEEP

    49152:INfatughHaKLIKN1cueXlaYbsISTb/am5B8y6sEUhSSwoUK:Ila4ghHaKMu2IYbsIW/amj8yF8S

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Manipulates Digital Signatures 1 TTPs 64 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Possible privilege escalation attempt 6 IoCs
  • Modifies file permissions 1 TTPs 6 IoCs
  • Downloads MZ/PE file
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Executes dropped EXE 15 IoCs
  • Launches sc.exe 8 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 34 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LDPlayer9_ens_com.cepstral.flamethrower_3040_ld.exe
    "C:\Users\Admin\AppData\Local\Temp\LDPlayer9_ens_com.cepstral.flamethrower_3040_ld.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\LDPlayer\LDPlayer9\LDPlayer.exe
      "C:\LDPlayer\LDPlayer9\\LDPlayer.exe" -silence -downloader -openid=3040 -language=en -path="C:\LDPlayer\LDPlayer9\"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4396
      • C:\LDPlayer\LDPlayer9\dnrepairer.exe
        "C:\LDPlayer\LDPlayer9\dnrepairer.exe" listener=262826
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1172
        • C:\Windows\SysWOW64\net.exe
          "net" start cryptsvc
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2824
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start cryptsvc
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1704
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" Softpub.dll /s
          4⤵
          • Manipulates Digital Signatures
          • System Location Discovery: System Language Discovery
          PID:640
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" Wintrust.dll /s
          4⤵
          • Manipulates Digital Signatures
          • System Location Discovery: System Language Discovery
          PID:4076
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" Initpki.dll /s
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1584
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32" Initpki.dll /s
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3460
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" dssenh.dll /s
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3476
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" rsaenh.dll /s
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5080
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" cryptdlg.dll /s
          4⤵
          • Manipulates Digital Signatures
          • System Location Discovery: System Language Discovery
          PID:3548
        • C:\Windows\SysWOW64\takeown.exe
          "takeown" /f "C:\LDPlayer\LDPlayer9\vms" /r /d y
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:2480
        • C:\Windows\SysWOW64\icacls.exe
          "icacls" "C:\LDPlayer\LDPlayer9\vms" /grant everyone:F /t
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:1164
        • C:\Windows\SysWOW64\takeown.exe
          "takeown" /f "C:\LDPlayer\LDPlayer9\\system.vmdk"
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:4484
        • C:\Windows\SysWOW64\icacls.exe
          "icacls" "C:\LDPlayer\LDPlayer9\\system.vmdk" /grant everyone:F /t
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:3948
        • C:\Windows\SysWOW64\dism.exe
          C:\Windows\system32\dism.exe /Online /English /Get-Features
          4⤵
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3124
          • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\dismhost.exe
            C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\dismhost.exe {298AA29E-CDB7-4AA2-8FCE-0E6021781C50}
            5⤵
            • Drops file in Windows directory
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4440
        • C:\Windows\SysWOW64\sc.exe
          sc query HvHost
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:1664
        • C:\Windows\SysWOW64\sc.exe
          sc query vmms
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:4484
        • C:\Windows\SysWOW64\sc.exe
          sc query vmcompute
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:2012
        • C:\Program Files\ldplayer9box\Ld9BoxSVC.exe
          "C:\Program Files\ldplayer9box\Ld9BoxSVC.exe" /RegServer
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3668
        • C:\Windows\SYSTEM32\regsvr32.exe
          "regsvr32" "C:\Program Files\ldplayer9box\VBoxC.dll" /s
          4⤵
          • Loads dropped DLL
          PID:1368
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" "C:\Program Files\ldplayer9box\x86\VBoxClient-x86.dll" /s
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:3500
        • C:\Windows\SYSTEM32\regsvr32.exe
          "regsvr32" "C:\Program Files\ldplayer9box\VBoxProxyStub.dll" /s
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:1480
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" "C:\Program Files\ldplayer9box\x86\VBoxProxyStub-x86.dll" /s
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:2096
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\system32\sc" create Ld9BoxSup binPath= "C:\Program Files\ldplayer9box\Ld9BoxSup.sys" type= kernel start= auto
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:4596
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\system32\sc" start Ld9BoxSup
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:4308
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" New-NetFirewallRule -DisplayName "Ld9BoxSup" -Direction Inbound -Program 'C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe' -RemoteAddress LocalSubnet -Action Allow
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3088
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" New-NetFirewallRule -DisplayName "Ld9BoxNat" -Direction Inbound -Program 'C:\Program Files\ldplayer9box\VBoxNetNAT.exe' -RemoteAddress LocalSubnet -Action Allow
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4008
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" New-NetFirewallRule -DisplayName "dnplayer" -Direction Inbound -Program 'C:\LDPlayer\LDPlayer9\dnplayer.exe' -RemoteAddress LocalSubnet -Action Allow
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4604
      • C:\LDPlayer\LDPlayer9\driverconfig.exe
        "C:\LDPlayer\LDPlayer9\driverconfig.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3192
      • C:\Windows\SysWOW64\takeown.exe
        "takeown" /f C:\LDPlayer\ldmutiplayer\ /r /d y
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:1200
      • C:\Windows\SysWOW64\icacls.exe
        "icacls" C:\LDPlayer\ldmutiplayer\ /grant everyone:F /t
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:1684
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/4bUcwDd53d
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5016
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe046a46f8,0x7ffe046a4708,0x7ffe046a4718
        3⤵
          PID:1316
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,13048849030194025313,17351443983610434521,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:2
          3⤵
            PID:1772
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,13048849030194025313,17351443983610434521,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:416
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,13048849030194025313,17351443983610434521,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:8
            3⤵
              PID:888
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13048849030194025313,17351443983610434521,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:1
              3⤵
                PID:464
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13048849030194025313,17351443983610434521,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3656 /prefetch:1
                3⤵
                  PID:4828
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13048849030194025313,17351443983610434521,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:1
                  3⤵
                    PID:3480
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2128,13048849030194025313,17351443983610434521,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5072 /prefetch:8
                    3⤵
                      PID:2624
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2128,13048849030194025313,17351443983610434521,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4312 /prefetch:8
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1816
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,13048849030194025313,17351443983610434521,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:8
                      3⤵
                        PID:2012
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,13048849030194025313,17351443983610434521,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:8
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2580
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13048849030194025313,17351443983610434521,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:1
                        3⤵
                          PID:740
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13048849030194025313,17351443983610434521,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:1
                          3⤵
                            PID:2256
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13048849030194025313,17351443983610434521,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:1
                            3⤵
                              PID:5312
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13048849030194025313,17351443983610434521,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:1
                              3⤵
                                PID:5320
                            • C:\LDPlayer\LDPlayer9\dnplayer.exe
                              "C:\LDPlayer\LDPlayer9\\dnplayer.exe" downloadpackage=com.cepstral.flamethrower|package=com.cepstral.flamethrower
                              2⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Checks processor information in registry
                              • Modifies Internet Explorer settings
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:4240
                              • C:\Windows\SysWOW64\sc.exe
                                sc query HvHost
                                3⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:3380
                              • C:\Windows\SysWOW64\sc.exe
                                sc query vmms
                                3⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:4300
                              • C:\Windows\SysWOW64\sc.exe
                                sc query vmcompute
                                3⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:1988
                              • C:\Program Files\ldplayer9box\vbox-img.exe
                                "C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\..\system.vmdk" --uuid 20160302-bbbb-bbbb-0eee-bbbb00000000
                                3⤵
                                • Executes dropped EXE
                                PID:3084
                              • C:\Program Files\ldplayer9box\vbox-img.exe
                                "C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\leidian0\data.vmdk" --uuid 20160302-cccc-cccc-0eee-000000000000
                                3⤵
                                • Executes dropped EXE
                                PID:4796
                              • C:\Program Files\ldplayer9box\vbox-img.exe
                                "C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\leidian0\sdcard.vmdk" --uuid 20160302-dddd-dddd-0eee-000000000000
                                3⤵
                                • Executes dropped EXE
                                PID:1816
                          • C:\Windows\system32\AUDIODG.EXE
                            C:\Windows\system32\AUDIODG.EXE 0x520 0x510
                            1⤵
                              PID:1240
                            • C:\Program Files\ldplayer9box\Ld9BoxSVC.exe
                              "C:\Program Files\ldplayer9box\Ld9BoxSVC.exe" -Embedding
                              1⤵
                              • Executes dropped EXE
                              • Modifies registry class
                              PID:3208
                              • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                                "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                                2⤵
                                • Executes dropped EXE
                                PID:3924
                              • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                                "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                                2⤵
                                • Executes dropped EXE
                                PID:3100
                              • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                                "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                                2⤵
                                • Executes dropped EXE
                                PID:2108
                              • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                                "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                                2⤵
                                • Executes dropped EXE
                                PID:1304
                              • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                                "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                                2⤵
                                • Executes dropped EXE
                                PID:816
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3672
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3836

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\LDPlayer\LDPlayer9\MSVCP120.dll

                                  Filesize

                                  444KB

                                  MD5

                                  50260b0f19aaa7e37c4082fecef8ff41

                                  SHA1

                                  ce672489b29baa7119881497ed5044b21ad8fe30

                                  SHA256

                                  891603d569fc6f1afed7c7d935b0a3c7363c35a0eb4a76c9e57ef083955bc2c9

                                  SHA512

                                  6f99d39bfe9d4126417ff65571c78c279d75fc9547ee767a594620c0c6f45f4bb42fd0c5173d9bc91a68a0636205a637d5d1c7847bd5f8ce57e120d210b0c57d

                                • C:\LDPlayer\LDPlayer9\MSVCR120.dll

                                  Filesize

                                  947KB

                                  MD5

                                  50097ec217ce0ebb9b4caa09cd2cd73a

                                  SHA1

                                  8cd3018c4170072464fbcd7cba563df1fc2b884c

                                  SHA256

                                  2a2ff2c61977079205c503e0bcfb96bf7aa4d5c9a0d1b1b62d3a49a9aa988112

                                  SHA512

                                  ac2d02e9bfc2be4c3cb1c2fff41a2dafcb7ce1123998bbf3eb5b4dc6410c308f506451de9564f7f28eb684d8119fb6afe459ab87237df7956f4256892bbab058

                                • C:\LDPlayer\LDPlayer9\crashreport.dll

                                  Filesize

                                  51KB

                                  MD5

                                  cb1f1554bd438600eba5a55feda2c653

                                  SHA1

                                  893dcdd3d21568c6d0586fa3590be7c9dcbfa42e

                                  SHA256

                                  27bb89fa0800e7fdf643126551dda3eaa834b1171346010b93fb904076e90f4f

                                  SHA512

                                  65b064ce0496680408f76e7fe3a9946155384864099c1913acb1f88db182277d5d09d4e9cfdff8a8ae821f0037af93ce97bbc76e656831a52714abcdc0da6412

                                • C:\LDPlayer\LDPlayer9\dnmultiplayer.exe

                                  Filesize

                                  1.3MB

                                  MD5

                                  38f88ca4211fb378c41412c23af886e2

                                  SHA1

                                  7c904c5fdf84d13ffd47703be39380861b5a6a7f

                                  SHA256

                                  6b149b8b72bf3631111f0e7b95b4dbe2646b786a3de1b414110438927d3f9c38

                                  SHA512

                                  6ff289ee872bb96de9de4a3ef82d043f93542545f1555885bd4b6aa008892a8e3fd5f59eb4ed76a402aaa884989725168206aaec6582ea37bd556e7f642d681b

                                • C:\LDPlayer\LDPlayer9\dnplayer.exe

                                  Filesize

                                  3.7MB

                                  MD5

                                  fa2c08e402cc1c1fca849ba2e4eb56aa

                                  SHA1

                                  133dbe827d469e8dcfb792734f1fced97690efca

                                  SHA256

                                  bd6ed960624c4ffb99ce82611f23365733df329b1ff3216590292ee8034a4421

                                  SHA512

                                  d96f84f06784f6d2c2182301ae4437303f5f3ab8936e6e3512606c28cc99de268bd186a4eb73b092c1e54995fa849c38080a26fe6dc2b8c1e7171781677d3eb6

                                • C:\LDPlayer\LDPlayer9\dnrepairer.exe

                                  Filesize

                                  41.9MB

                                  MD5

                                  cee286a3b75e2e3b92359a54a129a8cf

                                  SHA1

                                  d9708dc4a44c32a25d31eb93b7e0627155c5a871

                                  SHA256

                                  d6f0c9d7efe02de528a908285a989cc41903bc34b3448e5638af551ef12f77a5

                                  SHA512

                                  daf84e165437170d2ae029f2092ea9dbde03d6a34d85ac710e679e560333f8c17c6a2fc16ad69adad36ccf29c462f9c92346ca42e163e7a8c4069253456f06c1

                                • C:\LDPlayer\LDPlayer9\dnresource.rcc

                                  Filesize

                                  5.6MB

                                  MD5

                                  be5eb5347c30bc6feba94d103528050a

                                  SHA1

                                  862ff5fd84b1caa34a6298969799a802f1cb3df6

                                  SHA256

                                  5fda5ba5047c9b6c542eb4643fd42e664838702534a3d1a53ccb0c1af1490965

                                  SHA512

                                  15994a163acacbdd5811e21c01a0993c16dcf078cad37b74c95e488cf6c6944c288550a60d1da8e049c24657896370332bf8c0431a7b037614552b43c47a630d

                                • C:\LDPlayer\LDPlayer9\fonts\NanumGothicLight.otf

                                  Filesize

                                  314KB

                                  MD5

                                  e2e37d20b47d7ee294b91572f69e323a

                                  SHA1

                                  afb760386f293285f679f9f93086037fc5e09dcc

                                  SHA256

                                  153161ab882db768c70a753af5e8129852b9c9cae5511a23653beb6414d834a2

                                  SHA512

                                  001500f527e2d3c3b404cd66188149c620d45ee6510a1f9902aacc25b51f8213e6654f0c1ecc927d6ff672ffbe7dc044a84ec470a9eb86d2cba2840df7390901

                                • C:\LDPlayer\LDPlayer9\ldmutiplayer\7za.exe

                                  Filesize

                                  652KB

                                  MD5

                                  ad9d7cbdb4b19fb65960d69126e3ff68

                                  SHA1

                                  dcdc0e609a4e9d5ff9d96918c30cb79c6602cb3d

                                  SHA256

                                  a6c324f2925b3b3dbd2ad989e8d09c33ecc150496321ae5a1722ab097708f326

                                  SHA512

                                  f0196bee7ad8005a36eea86e31429d2c78e96d57b53ff4a64b3e529a54670fa042322a3c3a21557c96b0b3134bf81f238a9e35124b2d0ce80c61ed548a9791e7

                                • C:\LDPlayer\LDPlayer9\ldmutiplayer\cximagecrt.dll

                                  Filesize

                                  1.5MB

                                  MD5

                                  66df6f7b7a98ff750aade522c22d239a

                                  SHA1

                                  f69464fe18ed03de597bb46482ae899f43c94617

                                  SHA256

                                  91e3035a01437b54adda33d424060c57320504e7e6a0c85db2654815ba29c71f

                                  SHA512

                                  48d4513e09edd7f270614258b2750d5e98f0dbce671ba41a524994e96ed3df657fce67545153ca32d2bf7efcb35371cae12c4264df9053e4eb5e6b28014ed20e

                                • C:\LDPlayer\LDPlayer9\ldmutiplayer\libcrypto-1_1.dll

                                  Filesize

                                  2.0MB

                                  MD5

                                  01c4246df55a5fff93d086bb56110d2b

                                  SHA1

                                  e2939375c4dd7b478913328b88eaa3c91913cfdc

                                  SHA256

                                  c9501469ad2a2745509ab2d0db8b846f2bfb4ec019b98589d311a4bd7ac89889

                                  SHA512

                                  39524d5b8fc7c9d0602bc6733776237522dcca5f51cc6ceebd5a5d2c4cbda904042cee2f611a9c9477cc7e08e8eadd8915bf41c7c78e097b5e50786143e98196

                                • C:\LDPlayer\LDPlayer9\ldmutiplayer\libcurl.dll

                                  Filesize

                                  442KB

                                  MD5

                                  2d40f6c6a4f88c8c2685ee25b53ec00d

                                  SHA1

                                  faf96bac1e7665aa07029d8f94e1ac84014a863b

                                  SHA256

                                  1d7037da4222de3d7ca0af6a54b2942d58589c264333ef814cb131d703b5c334

                                  SHA512

                                  4e6d0dc0dc3fb7e57c6d7843074ee7c89c777e9005893e089939eb765d9b6fb12f0e774dc1814f6a34e75d1775e19e62782465731fd5605182e7984d798ba779

                                • C:\LDPlayer\LDPlayer9\ldmutiplayer\libeay32.dll

                                  Filesize

                                  1.2MB

                                  MD5

                                  ba46e6e1c5861617b4d97de00149b905

                                  SHA1

                                  4affc8aab49c7dc3ceeca81391c4f737d7672b32

                                  SHA256

                                  2eac0a690be435dd72b7a269ee761340099bf444edb4f447fa0030023cbf8e1e

                                  SHA512

                                  bf892b86477d63287f42385c0a944eee6354c7ae557b039516bf8932c7140ca8811b7ae7ac111805773495cf6854586e8a0e75e14dbb24eba56e4683029767b6

                                • C:\LDPlayer\LDPlayer9\ldmutiplayer\libssh2.dll

                                  Filesize

                                  192KB

                                  MD5

                                  52c43baddd43be63fbfb398722f3b01d

                                  SHA1

                                  be1b1064fdda4dde4b72ef523b8e02c050ccd820

                                  SHA256

                                  8c91023203f3d360c0629ffd20c950061566fb6c780c83eaa52fb26abb6be86f

                                  SHA512

                                  04cc3d8e31bd7444068468dd32ffcc9092881ca4aaea7c92292e5f1b541f877bdec964774562cb7a531c3386220d88b005660a2b5a82957e28350a381bea1b28

                                • C:\LDPlayer\LDPlayer9\ldmutiplayer\libssl-1_1.dll

                                  Filesize

                                  511KB

                                  MD5

                                  e8fd6da54f056363b284608c3f6a832e

                                  SHA1

                                  32e88b82fd398568517ab03b33e9765b59c4946d

                                  SHA256

                                  b681fd3c3b3f2d59f6a14be31e761d5929e104be06aa77c883ada9675ca6e9fd

                                  SHA512

                                  4f997deebf308de29a044e4ff2e8540235a41ea319268aa202e41a2be738b8d50f990ecc68f4a737a374f6d5f39ce8855edf0e2bb30ce274f75388e3ddd8c10b

                                • C:\LDPlayer\LDPlayer9\ldmutiplayer\msvcp110.dll

                                  Filesize

                                  522KB

                                  MD5

                                  3e29914113ec4b968ba5eb1f6d194a0a

                                  SHA1

                                  557b67e372e85eb39989cb53cffd3ef1adabb9fe

                                  SHA256

                                  c8d5572ca8d7624871188f0acabc3ae60d4c5a4f6782d952b9038de3bc28b39a

                                  SHA512

                                  75078c9eaa5a7ae39408e5db1ce7dbce5a3180d1c644bcb5e481b0810b07cb7d001d68d1b4f462cd5355e98951716f041ef570fcc866d289a68ea19b3f500c43

                                • C:\LDPlayer\LDPlayer9\ldmutiplayer\msvcr110.dll

                                  Filesize

                                  854KB

                                  MD5

                                  4ba25d2cbe1587a841dcfb8c8c4a6ea6

                                  SHA1

                                  52693d4b5e0b55a929099b680348c3932f2c3c62

                                  SHA256

                                  b30160e759115e24425b9bcdf606ef6ebce4657487525ede7f1ac40b90ff7e49

                                  SHA512

                                  82e86ec67a5c6cddf2230872f66560f4b0c3e4c1bb672507bbb8446a8d6f62512cbd0475fe23b619db3a67bb870f4f742761cf1f87d50db7f14076f54006f6c6

                                • C:\LDPlayer\LDPlayer9\ldmutiplayer\ssleay32.dll

                                  Filesize

                                  283KB

                                  MD5

                                  0054560df6c69d2067689433172088ef

                                  SHA1

                                  a30042b77ebd7c704be0e986349030bcdb82857d

                                  SHA256

                                  72553b45a5a7d2b4be026d59ceb3efb389c686636c6da926ffb0ca653494e750

                                  SHA512

                                  418190401b83de32a8ce752f399b00c091afad5e3b21357a53c134cce3b4199e660572ee71e18b5c2f364d3b2509b5365d7b569d6d9da5c79ae78c572c1d0ba0

                                • C:\LDPlayer\LDPlayer9\phones.data

                                  Filesize

                                  5KB

                                  MD5

                                  fdee6e3ccf8b61db774884ccb810c66f

                                  SHA1

                                  7a6b13a61cd3ad252387d110d9c25ced9897994d

                                  SHA256

                                  657fec32d9ce7b96986513645a48ddd047a5968d897c589fbc0fc9adb8c670f4

                                  SHA512

                                  f773f6fc22adadf048b9bfb03e4d6e119e8876412beb8517d999f4ed6a219e2ba50eded5308d361b6780792af9f699644e3a8b581a17d5a312f759d981f64512

                                • C:\LDPlayer\LDPlayer9\vms\config\leidian0.config

                                  Filesize

                                  636B

                                  MD5

                                  774bc2056644e5ab7dda64d4589a4dc6

                                  SHA1

                                  471ba501246adbdcfdf94abbc6ddae37612d0d84

                                  SHA256

                                  1d0ea25746603124c13bdfbc51ffd3c7c8b000063984a37b117a435e2ea5c0e6

                                  SHA512

                                  e7a89798400a9625bf4df2d165741936192a110384dc63668c16bcf8e62bd78d39438a60fe5fdeac77032820e605ee121a94bd72beb85f5d8da8eec09501b1c1

                                • C:\LDPlayer\LDPlayer9\vms\leidian0\sdcard.vmdk

                                  Filesize

                                  35.1MB

                                  MD5

                                  4d592fd525e977bf3d832cdb1482faa0

                                  SHA1

                                  131c31bcff32d11b6eda41c9f1e2e26cc5fbc0ef

                                  SHA256

                                  f90ace0994c8cae3a6a95e8c68ca460e68f1662a78a77a2b38eba13cc8e487b6

                                  SHA512

                                  afa31b31e1d137a559190528998085c52602d79a618d930e8c425001fdfbd2437f732beda3d53f2d0e1fc770187184c3fb407828ac39f00967bf4ae015c6ba77

                                • C:\LDPlayer\ldmutiplayer\fonts\Roboto-Regular.otf

                                  Filesize

                                  103KB

                                  MD5

                                  4acd5f0e312730f1d8b8805f3699c184

                                  SHA1

                                  67c957e102bf2b2a86c5708257bc32f91c006739

                                  SHA256

                                  72336333d602f1c3506e642e0d0393926c0ec91225bf2e4d216fcebd82bb6cb5

                                  SHA512

                                  9982c1c53cee1b44fd0c3df6806b8cbf6b441d3ed97aeb466dba568adce1144373ce7833d8f44ac3fa58d01d8cdb7e8621b4bb125c4d02092c355444651a4837

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_645BC4A49DCDC40FE5917FA45C6D4517

                                  Filesize

                                  1KB

                                  MD5

                                  0903ef6c8c017a72043bb6f8f66b3945

                                  SHA1

                                  40dcc71be725953089e697f9073e5af70822578f

                                  SHA256

                                  a2dec17aa478228d8a24f67c51b4c09a6707d763e720f5be38517e58a8c344dd

                                  SHA512

                                  73ab0380bb1072a8b3a90dd30efa2a15be581586a4d97fde9ea8dbad1079f4d2cb99c74a97d656e55bb0ad48e1b2955c10270a105ba93178228ddcf95194ba5a

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

                                  Filesize

                                  2KB

                                  MD5

                                  e6b63a478e9a077e286a024e9f795148

                                  SHA1

                                  2482a0a620b3c38f6c24cf5205e5e7579475512a

                                  SHA256

                                  42596916431c2a9866b19ff048f15ce7ebba0f2b0af85457d05209e4d527e87b

                                  SHA512

                                  199e2c0d75904f98e0aa93bf537bc48e9a4736c40aaea1f7e4119127243e142825df0e9ccada949d637691338032235ce914e8b9793523f59891e4ee8da3e534

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

                                  Filesize

                                  1KB

                                  MD5

                                  bde97e8c3158fca2d98f97f3abd501cb

                                  SHA1

                                  554690bcb41551f9dfab55278db69c510c67218b

                                  SHA256

                                  d4cee1323f6d67421bd638658f1854623af9bfc7f0a9d7dfd7fd5a8665cc61d3

                                  SHA512

                                  1670b565b79cd41b612c70fb0f78174cc9be14f9a1926a4465ca92c92b521696d3af60f869a6c982ae8942f02f58a017a46d47046da69a3f09a8c19ac771ad86

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_645BC4A49DCDC40FE5917FA45C6D4517

                                  Filesize

                                  434B

                                  MD5

                                  c10133031278a818690f9ad22e9b8c51

                                  SHA1

                                  efe41ec2ac0fcae9d263143b4a10e162674f1a77

                                  SHA256

                                  09b948a41c34023ca9a85d4081c853a067d440dba3920c18d67a54a0b1c5eed7

                                  SHA512

                                  2729e68562e87ac85772ee1de594fcf6cb60ad0861a9f01e4812bff8b3ca2015cf0246bbea070e84a9e4f7692dc60ae68f5ea4d9862e05cc487f2eca92b31ee0

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

                                  Filesize

                                  458B

                                  MD5

                                  780881078ae5da3de50a5a103da604d8

                                  SHA1

                                  bd541dea4a3b64f9255b4c923de1592a7aefb709

                                  SHA256

                                  b878f7e0b3039be8d54a560b02be4a525ebc62a2d5db03fa1e60dcce9fce9701

                                  SHA512

                                  d66ebabed1786f2f23aa0c35d20eca39ab003e07b149405578d04bfd14aa4a3f251afb0a782d518c28090f13a6cd5c1b4631b6b0ca876614aca613a8e18ee63e

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

                                  Filesize

                                  432B

                                  MD5

                                  2b1e285b30d7253d0ee3560a958a02cb

                                  SHA1

                                  df663c9c58cc5174bb7ca1c1eafd91c9f09aefb6

                                  SHA256

                                  fc9a9c9246ddab4255ff34166aecb36a0cf156c2bc8f88d86400d009dcf9edad

                                  SHA512

                                  836ed6d62fec01cb21f85155d1a3ecea177922a833e4bc63017ca11b79843c8fc1cb21fc64df6868324a38a060ba7a4a01cf45a6975c29cde06790958bf2734e

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  2dc1a9f2f3f8c3cfe51bb29b078166c5

                                  SHA1

                                  eaf3c3dad3c8dc6f18dc3e055b415da78b704402

                                  SHA256

                                  dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa

                                  SHA512

                                  682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  e4f80e7950cbd3bb11257d2000cb885e

                                  SHA1

                                  10ac643904d539042d8f7aa4a312b13ec2106035

                                  SHA256

                                  1184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124

                                  SHA512

                                  2b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  5151ff668ca5aead6ac08da558a9af6a

                                  SHA1

                                  742ed28feb3d3e4fe87afc5fa254914be3258dc7

                                  SHA256

                                  69e7eb4b6a8fbbf1ac40874cf47e2fd28042d62790698a4fb84288c399905bf2

                                  SHA512

                                  2a282c7583149116b92d49c3ef76055803d0feebda647b737d6e4d6787988874346b5dc121d7b4de6440290ab1c3fb0015f290070b104e0623cfce51eb507783

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  48116913598fe302d90659e94a737bcc

                                  SHA1

                                  b0acae909cc3246d34e623d926ef78adbb096926

                                  SHA256

                                  a35c491528beca99fd2fea6ab18bd314d5e43ebec5174b12fcc0b2c87d4bb0de

                                  SHA512

                                  bc208ccd5f772ad3fa2bd98329c45613025d4cc674fbecf72fa9bf152c0d45cec4a51879808ebbd863ef5b684cfef9ad6dafc2221b2c9d82c25bf34d32c0d7b5

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  6752a1d65b201c13b62ea44016eb221f

                                  SHA1

                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                  SHA256

                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                  SHA512

                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  10KB

                                  MD5

                                  f565f067f60b95c7a81399cacfd2577a

                                  SHA1

                                  e1eb773aa2dad11ca9b77b4ecbab3def084e6cb2

                                  SHA256

                                  e48a50d5888f401db83801cec0fc4c492db82be4e80192b199a82df84f4b9d01

                                  SHA512

                                  850734be0ea58663e15f22e18612807cac9ed18e2f8e510f74e1cb4d4504580c7a70bab6d6c44d52edd2376d33ea609bc28bf09312eecdf4dfa91514907099f7

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\AppxProvider.dll

                                  Filesize

                                  554KB

                                  MD5

                                  a7927846f2bd5e6ab6159fbe762990b1

                                  SHA1

                                  8e3b40c0783cc88765bbc02ccc781960e4592f3f

                                  SHA256

                                  913f97dd219eeb7d5f7534361037fe1ecc3a637eb48d67b1c8afa8b5f951ba2f

                                  SHA512

                                  1eafece2f6aa881193e6374b81d7a7c8555346756ed53b11ca1678f1f3ffb70ae3dea0a30c5a0aab8be45db9c31d78f30f026bb22a7519a0930483d50507243f

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\AssocProvider.dll

                                  Filesize

                                  112KB

                                  MD5

                                  94dc379aa020d365ea5a32c4fab7f6a3

                                  SHA1

                                  7270573fd7df3f3c996a772f85915e5982ad30a1

                                  SHA256

                                  dc6a5930c2b9a11204d2e22a3e8d14c28e5bdac548548e256ba7ffa79bd8c907

                                  SHA512

                                  998fd10a1f43024a2398491e3764748c0b990b37d8b3c820d281296f8da8f1a2f97073f4fd83543994a6e326fa7e299cb5f59e609358cd77af996175782eeaca

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\CbsProvider.dll

                                  Filesize

                                  875KB

                                  MD5

                                  6ad0376a375e747e66f29fb7877da7d0

                                  SHA1

                                  a0de5966453ff2c899f00f165bbff50214b5ea39

                                  SHA256

                                  4c9a4ab6596626482dd2190034fcb3fafebe88a961423962ad577e873ef5008f

                                  SHA512

                                  8a97b2cc96ec975188e53e428d0fc2c562f4c3493d3c354e316c7f89a0bd25c84246807c9977f0afdda3291b8c23d518a36fd967d8f9d4d2ce7b0af11b96eb18

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\DismCore.dll

                                  Filesize

                                  402KB

                                  MD5

                                  b1f793773dc727b4af1648d6d61f5602

                                  SHA1

                                  be7ed4e121c39989f2fb343558171ef8b5f7af68

                                  SHA256

                                  af7f342adf5b533ea6978b68064f39bfb1e4ad3b572ae1b7f2287f5533334d4e

                                  SHA512

                                  66a92bff5869a56a7931d7ed9881d79c22ba741c55fb42c11364f037e1ec99902db2679b67a7e60cbf760740d5b47dcf1a6dcfae5ad6711a0bd7f086cc054eed

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\DismCorePS.dll

                                  Filesize

                                  183KB

                                  MD5

                                  a033f16836d6f8acbe3b27b614b51453

                                  SHA1

                                  716297072897aea3ec985640793d2cdcbf996cf9

                                  SHA256

                                  e3b3a4c9c6403cb8b0aa12d34915b67e4eaa5bb911e102cf77033aa315d66a1e

                                  SHA512

                                  ad5b641d93ad35b3c7a3b56cdf576750d1ad4c63e2a16006739888f0702280cad57dd0a6553ef426111c04ceafd6d1e87f6e7486a171fff77f243311aee83871

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\DismHost.exe

                                  Filesize

                                  142KB

                                  MD5

                                  e5d5e9c1f65b8ec7aa5b7f1b1acdd731

                                  SHA1

                                  dbb14dcda6502ab1d23a7c77d405dafbcbeb439e

                                  SHA256

                                  e30508e2088bc16b2a84233ced64995f738deaef2366ac6c86b35c93bbcd9d80

                                  SHA512

                                  7cf80d4a16c5dbbf61fcb22ebe30cf78ca42a030b7d7b4ad017f28fba2c9b111e8cf5b3064621453a44869bbaed124d6fb1e8d2c8fe8202f1e47579d874fa4bc

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\DmiProvider.dll

                                  Filesize

                                  415KB

                                  MD5

                                  ea8488990b95ce4ef6b4e210e0d963b2

                                  SHA1

                                  cd8bf723aa9690b8ca9a0215321e8148626a27d1

                                  SHA256

                                  04f851b9d5e58ed002ad768bdcc475f22905fb1dab8341e9b3128df6eaa25b98

                                  SHA512

                                  56562131cbe5f0ea5a2508f5bfed88f21413526f1539fe4864ece5b0e03a18513f3db33c07e7abd7b8aaffc34a7587952b96bb9990d9f4efa886f613d95a5b1b

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\FfuProvider.dll

                                  Filesize

                                  619KB

                                  MD5

                                  df785c5e4aacaee3bd16642d91492815

                                  SHA1

                                  286330d2ab07512e1f636b90613afcd6529ada1e

                                  SHA256

                                  56cc8d139be12e969fff3bbf47b1f5c62c3db887e3fb97c79cf7d285076f9271

                                  SHA512

                                  3566de60fe76b63940cff3579da94f404c0bc713f2476ba00b9de12dc47973c7c22d5eed1fd667d20cea29b3c3c4fa648e5f44667e8369c192a4b69046e6f745

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\FolderProvider.dll

                                  Filesize

                                  59KB

                                  MD5

                                  4f3250ecb7a170a5eb18295aa768702d

                                  SHA1

                                  70eb14976ddab023f85bc778621ade1d4b5f4d9d

                                  SHA256

                                  a235317ab7ed89e6530844a78b933d50f6f48ea5df481de158eb99dd8c4ba461

                                  SHA512

                                  e9ce6cced5029d931d82e78e7e609a892bfe239096b55062b78e8ff38cce34ce6dd4e91efb41c4cd6ecf6017d098e4c9b13d6cb4408d761051468ee7f74bc569

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\GenericProvider.dll

                                  Filesize

                                  149KB

                                  MD5

                                  ef7e2760c0a24453fc78359aea3d7869

                                  SHA1

                                  0ea67f1fd29df2615da43e023e86046e8e46e2e1

                                  SHA256

                                  d39f38402a9309ddd1cba67be470ede348f2bc1bab2f8d565e8f15510761087a

                                  SHA512

                                  be785ba6b564cc4e755b4044ae27f916c009b7d942fcd092aed2ae630b1704e8a2f8b4692648eed481a5eb5355fd2e1ef7f94f6fb519b7e1ff6fc3c5f1aaa06f

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\IBSProvider.dll

                                  Filesize

                                  59KB

                                  MD5

                                  120f0a2022f423fc9aadb630250f52c4

                                  SHA1

                                  826df2b752c4f1bba60a77e2b2cf908dd01d3cf7

                                  SHA256

                                  5425382aaa32ffc133adb6458ff516db0e2ad60fac52dd595d53c370f4ba6fa0

                                  SHA512

                                  23e50735c06cef93d11873fc8e5e29fc63dcf3f01dc56822a17c11ca57bbfb10d46fac6351f84ba30050a16d6bd0744a08a4042a9743a6df87ac8a12e81e2764

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\ImagingProvider.dll

                                  Filesize

                                  218KB

                                  MD5

                                  35e989a1df828378baa340f4e0b2dfcb

                                  SHA1

                                  59ecc73a0b3f55e43dace3b05ff339f24ec2c406

                                  SHA256

                                  874137ee906f91285b9a018735683a0dd21bdeaf2e340cbc54296551ccf8be2d

                                  SHA512

                                  c8d69e37c918881786a8fdab2a2c5d1632411b1f75082aeb3eb24a8ba5f93dcb39b3f4000e651f95452263525d98fd1d3cb834de93bed16fa6f92ef271c3a92a

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\IntlProvider.dll

                                  Filesize

                                  296KB

                                  MD5

                                  510e132215cef8d09be40402f355879b

                                  SHA1

                                  cae8659f2d3fd54eb321a8f690267ba93d56c6f1

                                  SHA256

                                  1bb39f3389aa4258a923fa265afa2279688e6cdb14ff771f1621a56b03ddcf52

                                  SHA512

                                  2f7b2ec0e94738838f755759cd35e20ab2138b8eca023ee6ef630ab83a3de1bc0792f12ea0d722abe9a6953626cbddf8ba55ea32fc794d2df677a0625e498ab0

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\LogProvider.dll

                                  Filesize

                                  77KB

                                  MD5

                                  815a4e7a7342224a239232f2c788d7c0

                                  SHA1

                                  430b7526d864cfbd727b75738197230d148de21a

                                  SHA256

                                  a9c8787c79a952779eca82e7389cf5bbde7556e4491b8bfcfd6617740ac7d8a2

                                  SHA512

                                  0c19d1e388ed0855a660135dec7a5e6b72ecbb7eb67ff94000f2399bd07df431be538055a61cfb2937319a0ce060898bb9b6996765117b5acda8fc0bad47a349

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\MsiProvider.dll

                                  Filesize

                                  207KB

                                  MD5

                                  9a760ddc9fdca758501faf7e6d9ec368

                                  SHA1

                                  5d395ad119ceb41b776690f9085f508eaaddb263

                                  SHA256

                                  7ff3939e1ef015da8c9577af4edfdd46f0029a2cfe4e3dac574d3175516e095f

                                  SHA512

                                  59d095246b62a7777e7d2d50c2474f4b633a1ae96056e4a4cb5265ccf7432fed0ea5df9b350f44d70b55a726241da10f228d8b5cbee9b0890c0b9dc9e810b139

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\OSProvider.dll

                                  Filesize

                                  149KB

                                  MD5

                                  db4c3a07a1d3a45af53a4cf44ed550ad

                                  SHA1

                                  5dea737faadf0422c94f8f50e9588033d53d13b3

                                  SHA256

                                  2165d567aa47264abe2a866bb1bcb01a1455a75a6ea530b1b9a4dda54d08f758

                                  SHA512

                                  5182b80459447f3c1fb63b70ad0370e1da26828a7f73083bec0af875b37888dd12ec5a6d9dc84157fc5b535f473ad7019eb6a53b9a47a2e64e6a8b7fae4cddde

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\OfflineSetupProvider.dll

                                  Filesize

                                  182KB

                                  MD5

                                  9cd7292cca75d278387d2bdfb940003c

                                  SHA1

                                  bab579889ed3ac9cb0f124842c3e495cb2ec92ac

                                  SHA256

                                  b38d322af8e614cc54299effd2164247c75bd7e68e0eb1a428376fcedaca9a6f

                                  SHA512

                                  ebf96839e47bef9e240836b1d02065c703547a2424e05074467fe70f83c1ebf3db6cb71bf0d38848ec25e2e81b4cbb506ced7973b85e2ab2d8e4273de720779d

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\ProvProvider.dll

                                  Filesize

                                  753KB

                                  MD5

                                  70c34975e700a9d7e120aaecf9d8f14b

                                  SHA1

                                  e24d47f025c0ec0f60ec187bfc664e9347dc2c9c

                                  SHA256

                                  a3e652c0bbe2082f2e0290da73485fb2c6e35c33ac60daa51a65f8c782dbd7a7

                                  SHA512

                                  7f6a24345f5724d710e0b6c23b3b251e96d656fac58ea67b2b84d7d9a38d7723eae2c278e6e218e7f69f79d1cce240d91a8b0fd0d99960cacc65d82eb614a260

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\dismprov.dll

                                  Filesize

                                  255KB

                                  MD5

                                  490be3119ea17fa29329e77b7e416e80

                                  SHA1

                                  c71191c3415c98b7d9c9bbcf1005ce6a813221da

                                  SHA256

                                  ef1e263e1bcc05d9538cb9469dd7dba5093956aa325479c3d2607168cc1c000a

                                  SHA512

                                  6339b030008b7d009d36abf0f9595da9b793264ebdce156d4a330d095a5d7602ba074075ea05fef3dde474fc1d8e778480429de308c121df0bf3075177f26f13

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\en-US\AppxProvider.dll.mui

                                  Filesize

                                  22KB

                                  MD5

                                  bd0dd9c5a602cb0ad7eabc16b3c1abfc

                                  SHA1

                                  cede6e6a55d972c22da4bc9e0389759690e6b37f

                                  SHA256

                                  8af0073f8a023f55866e48bf3b902dfa7f41c51b0e8b0fe06f8c496d41f9a7b3

                                  SHA512

                                  86351dc31118fc5a12fad6f549aa60c45ebe92b3ce5b90376e41f60d6d168a8a9f6c35320fc2cdcc750e67a5751651657fe64cf42690943500afd0d1dae2cd0c

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\en-US\AssocProvider.dll.mui

                                  Filesize

                                  8KB

                                  MD5

                                  8833761572f0964bdc1bea6e1667f458

                                  SHA1

                                  166260a12c3399a9aa298932862569756b4ecc45

                                  SHA256

                                  b18c6ce1558c9ef6942a3bce246a46557c2a7d12aec6c4a07e4fa84dd5c422f5

                                  SHA512

                                  2a907354ec9a1920b9d1d2aeb9ff7c7314854b36a27f7d88aca17825e74a87413dbe7d1c3fde6a2410b5934f8c80a76f8bb6b7f12e7cfc643ce6622ca516d9b8

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\en-US\CbsProvider.dll.mui

                                  Filesize

                                  53KB

                                  MD5

                                  6c51a3187d2464c48cc8550b141e25c5

                                  SHA1

                                  a42e5ae0a3090b5ab4376058e506b111405d5508

                                  SHA256

                                  d7a0253d6586e7bbfb0acb6facd9a326b32ba1642b458f5b5ed27feccb4fc199

                                  SHA512

                                  87a9e997d55bc6dbd05af1291fb78cd02266641d018ccfeb6826cb0de205aaf8a57b49e587462dbb6df2b86b54f91c0c5d3f87e64d7dbb2aea75ef143c5447ba

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\en-US\DismCore.dll.mui

                                  Filesize

                                  7KB

                                  MD5

                                  7a15f6e845f0679de593c5896fe171f9

                                  SHA1

                                  0c923dfaffb56b56cba0c28a4eacb66b1b91a1f4

                                  SHA256

                                  f91e3c35b472f95d7b1ae3dc83f9d6bfde33515aa29e8b310f55d9fe66466419

                                  SHA512

                                  5a0373f1fb076a0059cac8f30fe415e06ed880795f84283911bec75de0977baf52432b740b429496999cedf5cca45efd6ef010700e2d9a1887438056c8c573ca

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\en-US\DmiProvider.dll.mui

                                  Filesize

                                  17KB

                                  MD5

                                  b7252234aa43b7295bb62336adc1b85c

                                  SHA1

                                  b2c42a5af79530e7cf9bcf54fd76ae9d5f234d7f

                                  SHA256

                                  73709c25dc5300a435e53df97fc01a7dc184b56796cae48ee728d54d26076d6c

                                  SHA512

                                  88241009b342eb1205b10f7725a7cb1ec2c7135606459d038c4b8847efd9d5e0ad4749621f8df93746dd3ba8ab92d1b0f513ed10e2ba712a7991716f4c062358

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\en-US\FfuProvider.dll.mui

                                  Filesize

                                  9KB

                                  MD5

                                  dc826a9cb121e2142b670d0b10022e22

                                  SHA1

                                  b2fe459ede8ba99602ae6ea5fa24f0133cca2bc9

                                  SHA256

                                  ba6695148f96a5d45224324006ae29becfd2a6aa1de947e27371a4eb84e7451a

                                  SHA512

                                  038e9abff445848c882a71836574df0394e73690bc72642c2aa949c1ad820c5cbb4dedc4ee7b5b75fd5ac8a43813d416f23d28973de7a7f0e5c3f7112da6fe1b

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\en-US\FolderProvider.dll.mui

                                  Filesize

                                  2KB

                                  MD5

                                  22b4a3a1ec3b6d7aa3bc61d0812dc85f

                                  SHA1

                                  97ae3504a29eb555632d124022d8406fc5b6f662

                                  SHA256

                                  c81a992ecebd9260ff34e41383aaca1c64a9fa4706a4744ac814f0f5daa1e105

                                  SHA512

                                  9329b60a60c45b2486000ed0aff8d260fdac3d0a8789823eaa015eab1a6d577012f9d12502f81bad9902e41545c3c3e77f434bc1a753b4f8430d01db2cdbe26c

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\en-US\GenericProvider.dll.mui

                                  Filesize

                                  5KB

                                  MD5

                                  d6b02daf9583f640269b4d8b8496a5dd

                                  SHA1

                                  e3bc2acd8e6a73b6530bc201902ab714e34b3182

                                  SHA256

                                  9102fa05ed98d902bf6e95b74fdbb745399d4ce4536a29607b2156a0edfeddf0

                                  SHA512

                                  189e87fcc2902e2a8e59773783d80a7d4dd5d2991bd291b0976cbd304f78bd225b353703735b84de41b5f59c37402db634c4acc805d73176cde75ca662efff50

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\en-US\IBSProvider.dll.mui

                                  Filesize

                                  2KB

                                  MD5

                                  d4b67a347900e29392613b5d86fe4ac2

                                  SHA1

                                  fb84756d11bfd638c4b49268b96d0007b26ba2fb

                                  SHA256

                                  4ccfe7883bce7785b1387ad3872230159899a5337d30a2f81a937b74bcbc4ce5

                                  SHA512

                                  af0a2a3f813e1adfff972285c9655f50ce6916caaeff5cb82f6c7d76491ffc9b365a47f19750fc02d7122182bf65aae79ed167886c33f202d5a781ab83d75662

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\en-US\ImagingProvider.dll.mui

                                  Filesize

                                  18KB

                                  MD5

                                  f2e2ba029f26341158420f3c4db9a68f

                                  SHA1

                                  1dee9d3dddb41460995ad8913ad701546be1e59d

                                  SHA256

                                  32d8c8fb9a746be209db5c3bdad14f361cf2bef8144c32e5af419c28efd35da3

                                  SHA512

                                  3d45d7bcf21d5df56b516fc18f7dc1bf80e44258b0c810b199a7bc06047a547060956c9d79575b82d9b6992fb5fe64f5b0ef1e408363887ae81a64b6ff9fa03e

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\en-US\IntlProvider.dll.mui

                                  Filesize

                                  27KB

                                  MD5

                                  2eb303db5753eb7a6bb3ab773eeabdcb

                                  SHA1

                                  44c6c38e6ae5f9ce9d7ca9d45a3cc3020b1353e4

                                  SHA256

                                  aa43b64db4fdcd89e56ba5309f3ba2ffac2663ba30514e87c160687f4314221f

                                  SHA512

                                  df1c8cefed4b5ef5a47f9bc0c42776611b3af709938a0900db79c6c9f4fae21acbbb6c4b1cad3c5a2051b622fe7e6e01486d34622742a981623fed933f1b1427

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\en-US\LogProvider.dll.mui

                                  Filesize

                                  6KB

                                  MD5

                                  8933c8d708e5acf5a458824b19fd97da

                                  SHA1

                                  de55756ddbeebc5ad9d3ce950acba5d2fb312331

                                  SHA256

                                  6e51af7cfda6be5419f89d6705c44587556a4abffd388020d7f19e007e122cd6

                                  SHA512

                                  ead5017d9d024a1d7c53634ae725438ea3a34eed8c9056ebbc4ebe5aab2055c0e67687ce7608724e4f66f55aa486a63024967b76a5638cde3dd88b3d3432ca1f

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\en-US\MsiProvider.dll.mui

                                  Filesize

                                  15KB

                                  MD5

                                  c5e60ee2d8534f57fddb81ffce297763

                                  SHA1

                                  78e6b0e03c8bf5802b3ef429b105d7ae3092a8f2

                                  SHA256

                                  1ec7b04a8c25812db99abec82c7b7bf915ae3f7594c5d071231cafab9c1fa145

                                  SHA512

                                  ce654295e8b16da7bd004453ae4a422fe8296a8c2343e56d819883b835c391a02537ecf4d155a281a9d38f2291ee0004506b7fd48a99c0f8881ff1e38ae8ebcc

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\en-US\OSProvider.dll.mui

                                  Filesize

                                  3KB

                                  MD5

                                  0633e0fccd477d9b22de4dd5a84abe53

                                  SHA1

                                  e04fb5c3acb35d128c1ea6ee6fb0e9b3fe90d5a9

                                  SHA256

                                  b6758aba17f6cd74923ca0976dd580222851ef6435cd16b3b2b04e85280ce706

                                  SHA512

                                  e95ed1d8069d6f200f0a2ea8dd7688404af9db9ce5e229afcb625a1f9eb46ac9e7a1c2c4c5ce156b190514415679e82e213732e8e890ed1a89af9026e4e73fe3

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\en-US\OfflineSetupProvider.dll.mui

                                  Filesize

                                  2KB

                                  MD5

                                  015271d46ab128a854a4e9d214ab8a43

                                  SHA1

                                  2569deff96fb5ad6db924cee2e08a998ddc80b2a

                                  SHA256

                                  692744ce4bba1e82ad1a91ab97eec2bac7146bc995e8e8ed59bc2c7d366af7ec

                                  SHA512

                                  6ba678da0475a6b1872c2e2c151b395a4d97390bed4671d3f918aab5e69cbc9ceafe72c3100ba060ac6586fd37682499fdeef7d7b1ab10f5ec2411c1438ed438

                                • C:\Users\Admin\AppData\Local\Temp\3EF8B847-0AD1-44DD-9002-07762BDC6EC3\en-US\dismprov.dll.mui

                                  Filesize

                                  2KB

                                  MD5

                                  7d06108999cc83eb3a23eadcebb547a5

                                  SHA1

                                  200866d87a490d17f6f8b17b26225afeb6d39446

                                  SHA256

                                  cf8cc85cdd12cf4a02df5274f8d0cdc625c6409fe80866b3052b7d5a862ac311

                                  SHA512

                                  9f024aa89392fbbbabe62a58857e5ad5250e05f23d7f78fc9a09f535463446796dd6e37aab5e38dfc0bf5b15533844f63b3bddcb5cb9335901e099f65f9d8002

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0wkiyybg.5j2.ps1

                                  Filesize

                                  60B

                                  MD5

                                  d17fe0a3f47be24a6453e9ef58c94641

                                  SHA1

                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                  SHA256

                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                  SHA512

                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                • C:\Users\Admin\AppData\Roaming\XuanZhi9\ldopengl32x.dll

                                  Filesize

                                  130KB

                                  MD5

                                  395970be72d1bcc7755f95a04b3b303d

                                  SHA1

                                  f4019b43fd95f1748e2392d5cb1aa4486aadbc13

                                  SHA256

                                  5fa3f4cb4f4f603bd8b9a538b54658ebbcf9198d99f2b0e1ce447322b22fb312

                                  SHA512

                                  2f4968b8564bd3bbc624a6838ec33de22413afb8711e08cc36b082863f4e146212c1b6173921ea110c65a0dc20b97c9e187a8ef006005711efcf4237db0bcd1e

                                • C:\Windows\Logs\DISM\dism.log

                                  Filesize

                                  236KB

                                  MD5

                                  aa279560f7a677197c9008f44261424b

                                  SHA1

                                  466372ce2cdb870b696fa0090209fed9cecb7a93

                                  SHA256

                                  6e6ce3eed483a87e213377f828f8eb735dc0bf7d9d1bb90edbcaaeba4144dbfe

                                  SHA512

                                  95976a4240526910094718a354c5de8d20ccc17cd71dee80f5e2204cdca81ee4d098bce409d3f7163539d6d3ea34ba733e819f8d623395c8e628acff1cb39d21

                                • C:\Windows\Logs\DISM\dism.log

                                  Filesize

                                  276KB

                                  MD5

                                  54ecf79d5a720d4e00fe5e723ce16e5c

                                  SHA1

                                  a79c88de7e127e5eda9e4cbfc93c9f21756e0188

                                  SHA256

                                  ba1b45034383380d628a6ad15777f6fca8b2ab6fd6fa5deca56daa85078d9675

                                  SHA512

                                  c87845be251eb9505f4244b2b4f6322bd3cec0888909086cdc61d6c5b6a810c747c884f77990fc43ce38d53cbde0e350b5dd4a5af7e0d8798e0bb0b24f060f6b

                                • memory/3088-886-0x00000000078C0000-0x00000000078DA000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/3088-856-0x0000000005750000-0x0000000005D78000-memory.dmp

                                  Filesize

                                  6.2MB

                                • memory/3088-884-0x0000000007790000-0x0000000007833000-memory.dmp

                                  Filesize

                                  652KB

                                • memory/3088-883-0x0000000006B60000-0x0000000006B7E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/3088-872-0x0000000007530000-0x0000000007562000-memory.dmp

                                  Filesize

                                  200KB

                                • memory/3088-873-0x000000006F080000-0x000000006F0CC000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/3088-870-0x0000000006570000-0x000000000658E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/3088-871-0x00000000065C0000-0x000000000660C000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/3088-869-0x0000000005FD0000-0x0000000006324000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/3088-885-0x0000000007F00000-0x000000000857A000-memory.dmp

                                  Filesize

                                  6.5MB

                                • memory/3088-859-0x0000000005F60000-0x0000000005FC6000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/3088-858-0x0000000005EF0000-0x0000000005F56000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/3088-857-0x00000000055F0000-0x0000000005612000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/3088-887-0x0000000007930000-0x000000000793A000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/3088-855-0x0000000002C70000-0x0000000002CA6000-memory.dmp

                                  Filesize

                                  216KB

                                • memory/3088-888-0x0000000007B40000-0x0000000007BD6000-memory.dmp

                                  Filesize

                                  600KB

                                • memory/3088-889-0x0000000007AC0000-0x0000000007AD1000-memory.dmp

                                  Filesize

                                  68KB

                                • memory/3088-890-0x0000000007B00000-0x0000000007B0E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/3088-891-0x0000000007BE0000-0x0000000007BFA000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/4008-899-0x00000000058F0000-0x0000000005C44000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/4008-904-0x000000006F080000-0x000000006F0CC000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/4240-1182-0x0000000070700000-0x000000007077E000-memory.dmp

                                  Filesize

                                  504KB

                                • memory/4240-1181-0x0000000070780000-0x0000000070D26000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/4240-1185-0x0000000070620000-0x0000000070679000-memory.dmp

                                  Filesize

                                  356KB

                                • memory/4240-1184-0x0000000070680000-0x00000000706FA000-memory.dmp

                                  Filesize

                                  488KB

                                • memory/4240-1183-0x0000000070DB0000-0x00000000727AB000-memory.dmp

                                  Filesize

                                  26.0MB

                                • memory/4240-1039-0x0000000036550000-0x0000000036560000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4604-924-0x000000006F080000-0x000000006F0CC000-memory.dmp

                                  Filesize

                                  304KB