Analysis

  • max time kernel
    188s
  • max time network
    189s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14-10-2024 07:46

General

  • Target

    LDPlayer9_ens_1001_ld.exe

  • Size

    2.5MB

  • MD5

    9855e448af8561fc920d69a7b45a309b

  • SHA1

    9ceb185e61fde58d6db6e3c4e2e7932ca53ce712

  • SHA256

    aebbda8979b54ca3094e835ec7bffb08aca6c79480675d46bc5df75d9750a583

  • SHA512

    a37495c629c9fd636702f1e1479b0ffd8c7b921cc914a7208478d2b9c348149634bd7736ed41d6627902e8b8e5d5316dbeb3d5783b93574a48b7fb1786fc6d6c

  • SSDEEP

    49152:XNfatughHaKLIKN1cueXlaYbsISTb/am5B8y6sEUhSSwoUKd:Xla4ghHaKMu2IYbsIW/amj8yF8SN

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Manipulates Digital Signatures 1 TTPs 64 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Possible privilege escalation attempt 6 IoCs
  • Modifies file permissions 1 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Executes dropped EXE 15 IoCs
  • Launches sc.exe 8 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 34 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LDPlayer9_ens_1001_ld.exe
    "C:\Users\Admin\AppData\Local\Temp\LDPlayer9_ens_1001_ld.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\LDPlayer\LDPlayer9\LDPlayer.exe
      "C:\LDPlayer\LDPlayer9\\LDPlayer.exe" -silence -downloader -openid=1001 -language=en -path="C:\LDPlayer\LDPlayer9\"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3340
      • C:\LDPlayer\LDPlayer9\dnrepairer.exe
        "C:\LDPlayer\LDPlayer9\dnrepairer.exe" listener=328436
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3372
        • C:\Windows\SysWOW64\net.exe
          "net" start cryptsvc
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1420
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start cryptsvc
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3756
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" Softpub.dll /s
          4⤵
          • Manipulates Digital Signatures
          • System Location Discovery: System Language Discovery
          PID:2912
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" Wintrust.dll /s
          4⤵
          • Manipulates Digital Signatures
          • System Location Discovery: System Language Discovery
          PID:3620
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" Initpki.dll /s
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3760
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32" Initpki.dll /s
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3980
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" dssenh.dll /s
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2404
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" rsaenh.dll /s
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3200
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" cryptdlg.dll /s
          4⤵
          • Manipulates Digital Signatures
          • System Location Discovery: System Language Discovery
          PID:3428
        • C:\Windows\SysWOW64\takeown.exe
          "takeown" /f "C:\LDPlayer\LDPlayer9\vms" /r /d y
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:3852
        • C:\Windows\SysWOW64\icacls.exe
          "icacls" "C:\LDPlayer\LDPlayer9\vms" /grant everyone:F /t
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:3740
        • C:\Windows\SysWOW64\takeown.exe
          "takeown" /f "C:\LDPlayer\LDPlayer9\\system.vmdk"
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:2184
        • C:\Windows\SysWOW64\icacls.exe
          "icacls" "C:\LDPlayer\LDPlayer9\\system.vmdk" /grant everyone:F /t
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:4448
        • C:\Windows\SysWOW64\dism.exe
          C:\Windows\system32\dism.exe /Online /English /Get-Features
          4⤵
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2992
          • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\dismhost.exe
            C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\dismhost.exe {D5A8E75D-6FC4-4D76-8B26-0F1EACBC5DAF}
            5⤵
            • Drops file in Windows directory
            • Executes dropped EXE
            • Loads dropped DLL
            PID:3512
        • C:\Windows\SysWOW64\sc.exe
          sc query HvHost
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:4224
        • C:\Windows\SysWOW64\sc.exe
          sc query vmms
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:1984
        • C:\Windows\SysWOW64\sc.exe
          sc query vmcompute
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:408
        • C:\Program Files\ldplayer9box\Ld9BoxSVC.exe
          "C:\Program Files\ldplayer9box\Ld9BoxSVC.exe" /RegServer
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1784
        • C:\Windows\SYSTEM32\regsvr32.exe
          "regsvr32" "C:\Program Files\ldplayer9box\VBoxC.dll" /s
          4⤵
          • Loads dropped DLL
          PID:3752
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" "C:\Program Files\ldplayer9box\x86\VBoxClient-x86.dll" /s
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:232
        • C:\Windows\SYSTEM32\regsvr32.exe
          "regsvr32" "C:\Program Files\ldplayer9box\VBoxProxyStub.dll" /s
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:2300
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" "C:\Program Files\ldplayer9box\x86\VBoxProxyStub-x86.dll" /s
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:1588
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\system32\sc" create Ld9BoxSup binPath= "C:\Program Files\ldplayer9box\Ld9BoxSup.sys" type= kernel start= auto
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:3080
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\system32\sc" start Ld9BoxSup
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:4872
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" New-NetFirewallRule -DisplayName "Ld9BoxSup" -Direction Inbound -Program 'C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe' -RemoteAddress LocalSubnet -Action Allow
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3488
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" New-NetFirewallRule -DisplayName "Ld9BoxNat" -Direction Inbound -Program 'C:\Program Files\ldplayer9box\VBoxNetNAT.exe' -RemoteAddress LocalSubnet -Action Allow
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:416
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" New-NetFirewallRule -DisplayName "dnplayer" -Direction Inbound -Program 'C:\LDPlayer\LDPlayer9\dnplayer.exe' -RemoteAddress LocalSubnet -Action Allow
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2984
      • C:\LDPlayer\LDPlayer9\driverconfig.exe
        "C:\LDPlayer\LDPlayer9\driverconfig.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2360
      • C:\Windows\SysWOW64\takeown.exe
        "takeown" /f C:\LDPlayer\ldmutiplayer\ /r /d y
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:2656
      • C:\Windows\SysWOW64\icacls.exe
        "icacls" C:\LDPlayer\ldmutiplayer\ /grant everyone:F /t
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:2956
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/4bUcwDd53d
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3144
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff858173cb8,0x7ff858173cc8,0x7ff858173cd8
        3⤵
          PID:4204
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2004 /prefetch:2
          3⤵
            PID:4792
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3116
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2528 /prefetch:8
            3⤵
              PID:1572
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
              3⤵
                PID:5064
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
                3⤵
                  PID:4816
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:1
                  3⤵
                    PID:3768
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3960 /prefetch:8
                    3⤵
                      PID:4224
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4856 /prefetch:8
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3084
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3524 /prefetch:8
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4228
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:1
                      3⤵
                        PID:4832
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:1
                        3⤵
                          PID:1868
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:1
                          3⤵
                            PID:4076
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:1
                            3⤵
                              PID:1836
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6428 /prefetch:1
                              3⤵
                                PID:892
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6796 /prefetch:1
                                3⤵
                                  PID:244
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6408 /prefetch:1
                                  3⤵
                                    PID:4360
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7696 /prefetch:1
                                    3⤵
                                      PID:1964
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7084 /prefetch:8
                                      3⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1212
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7148 /prefetch:1
                                      3⤵
                                        PID:5024
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7128 /prefetch:1
                                        3⤵
                                          PID:2180
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:1
                                          3⤵
                                            PID:5364
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,11297123774796490794,956447619154229713,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7376 /prefetch:1
                                            3⤵
                                              PID:5372
                                          • C:\LDPlayer\LDPlayer9\dnplayer.exe
                                            "C:\LDPlayer\LDPlayer9\\dnplayer.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Checks processor information in registry
                                            • Modifies Internet Explorer settings
                                            • Suspicious behavior: GetForegroundWindowSpam
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:4940
                                            • C:\Windows\SysWOW64\sc.exe
                                              sc query HvHost
                                              3⤵
                                              • Launches sc.exe
                                              • System Location Discovery: System Language Discovery
                                              PID:2236
                                            • C:\Windows\SysWOW64\sc.exe
                                              sc query vmms
                                              3⤵
                                              • Launches sc.exe
                                              • System Location Discovery: System Language Discovery
                                              PID:4380
                                            • C:\Windows\SysWOW64\sc.exe
                                              sc query vmcompute
                                              3⤵
                                              • Launches sc.exe
                                              • System Location Discovery: System Language Discovery
                                              PID:1724
                                            • C:\Program Files\ldplayer9box\vbox-img.exe
                                              "C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\..\system.vmdk" --uuid 20160302-bbbb-bbbb-0eee-bbbb00000000
                                              3⤵
                                              • Executes dropped EXE
                                              PID:4828
                                            • C:\Program Files\ldplayer9box\vbox-img.exe
                                              "C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\leidian0\data.vmdk" --uuid 20160302-cccc-cccc-0eee-000000000000
                                              3⤵
                                              • Executes dropped EXE
                                              PID:1580
                                            • C:\Program Files\ldplayer9box\vbox-img.exe
                                              "C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\leidian0\sdcard.vmdk" --uuid 20160302-dddd-dddd-0eee-000000000000
                                              3⤵
                                              • Executes dropped EXE
                                              PID:1936
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.ldplayer.net/blog/how-to-enable-vt.html
                                              3⤵
                                                PID:1368
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff858173cb8,0x7ff858173cc8,0x7ff858173cd8
                                                  4⤵
                                                    PID:2896
                                            • C:\Windows\system32\AUDIODG.EXE
                                              C:\Windows\system32\AUDIODG.EXE 0x00000000000004E8 0x00000000000004E4
                                              1⤵
                                                PID:2496
                                              • C:\Program Files\ldplayer9box\Ld9BoxSVC.exe
                                                "C:\Program Files\ldplayer9box\Ld9BoxSVC.exe" -Embedding
                                                1⤵
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                PID:4260
                                                • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                                                  "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                                                  2⤵
                                                  • Executes dropped EXE
                                                  PID:4396
                                                • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                                                  "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                                                  2⤵
                                                  • Executes dropped EXE
                                                  PID:4156
                                                • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                                                  "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                                                  2⤵
                                                  • Executes dropped EXE
                                                  PID:3804
                                                • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                                                  "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                                                  2⤵
                                                  • Executes dropped EXE
                                                  PID:2420
                                                • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                                                  "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                                                  2⤵
                                                  • Executes dropped EXE
                                                  PID:1576
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:2984
                                                • C:\Windows\System32\CompPkgSrv.exe
                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                  1⤵
                                                    PID:5088
                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                    1⤵
                                                      PID:276
                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                      1⤵
                                                        PID:3424

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\LDPlayer\LDPlayer9\MSVCP120.dll

                                                        Filesize

                                                        444KB

                                                        MD5

                                                        50260b0f19aaa7e37c4082fecef8ff41

                                                        SHA1

                                                        ce672489b29baa7119881497ed5044b21ad8fe30

                                                        SHA256

                                                        891603d569fc6f1afed7c7d935b0a3c7363c35a0eb4a76c9e57ef083955bc2c9

                                                        SHA512

                                                        6f99d39bfe9d4126417ff65571c78c279d75fc9547ee767a594620c0c6f45f4bb42fd0c5173d9bc91a68a0636205a637d5d1c7847bd5f8ce57e120d210b0c57d

                                                      • C:\LDPlayer\LDPlayer9\MSVCR120.dll

                                                        Filesize

                                                        947KB

                                                        MD5

                                                        50097ec217ce0ebb9b4caa09cd2cd73a

                                                        SHA1

                                                        8cd3018c4170072464fbcd7cba563df1fc2b884c

                                                        SHA256

                                                        2a2ff2c61977079205c503e0bcfb96bf7aa4d5c9a0d1b1b62d3a49a9aa988112

                                                        SHA512

                                                        ac2d02e9bfc2be4c3cb1c2fff41a2dafcb7ce1123998bbf3eb5b4dc6410c308f506451de9564f7f28eb684d8119fb6afe459ab87237df7956f4256892bbab058

                                                      • C:\LDPlayer\LDPlayer9\crashreport.dll

                                                        Filesize

                                                        51KB

                                                        MD5

                                                        cb1f1554bd438600eba5a55feda2c653

                                                        SHA1

                                                        893dcdd3d21568c6d0586fa3590be7c9dcbfa42e

                                                        SHA256

                                                        27bb89fa0800e7fdf643126551dda3eaa834b1171346010b93fb904076e90f4f

                                                        SHA512

                                                        65b064ce0496680408f76e7fe3a9946155384864099c1913acb1f88db182277d5d09d4e9cfdff8a8ae821f0037af93ce97bbc76e656831a52714abcdc0da6412

                                                      • C:\LDPlayer\LDPlayer9\dnmultiplayer.exe

                                                        Filesize

                                                        1.3MB

                                                        MD5

                                                        38f88ca4211fb378c41412c23af886e2

                                                        SHA1

                                                        7c904c5fdf84d13ffd47703be39380861b5a6a7f

                                                        SHA256

                                                        6b149b8b72bf3631111f0e7b95b4dbe2646b786a3de1b414110438927d3f9c38

                                                        SHA512

                                                        6ff289ee872bb96de9de4a3ef82d043f93542545f1555885bd4b6aa008892a8e3fd5f59eb4ed76a402aaa884989725168206aaec6582ea37bd556e7f642d681b

                                                      • C:\LDPlayer\LDPlayer9\dnplayer.exe

                                                        Filesize

                                                        3.7MB

                                                        MD5

                                                        fa2c08e402cc1c1fca849ba2e4eb56aa

                                                        SHA1

                                                        133dbe827d469e8dcfb792734f1fced97690efca

                                                        SHA256

                                                        bd6ed960624c4ffb99ce82611f23365733df329b1ff3216590292ee8034a4421

                                                        SHA512

                                                        d96f84f06784f6d2c2182301ae4437303f5f3ab8936e6e3512606c28cc99de268bd186a4eb73b092c1e54995fa849c38080a26fe6dc2b8c1e7171781677d3eb6

                                                      • C:\LDPlayer\LDPlayer9\dnrepairer.exe

                                                        Filesize

                                                        41.9MB

                                                        MD5

                                                        cee286a3b75e2e3b92359a54a129a8cf

                                                        SHA1

                                                        d9708dc4a44c32a25d31eb93b7e0627155c5a871

                                                        SHA256

                                                        d6f0c9d7efe02de528a908285a989cc41903bc34b3448e5638af551ef12f77a5

                                                        SHA512

                                                        daf84e165437170d2ae029f2092ea9dbde03d6a34d85ac710e679e560333f8c17c6a2fc16ad69adad36ccf29c462f9c92346ca42e163e7a8c4069253456f06c1

                                                      • C:\LDPlayer\LDPlayer9\dnresource.rcc

                                                        Filesize

                                                        5.6MB

                                                        MD5

                                                        be5eb5347c30bc6feba94d103528050a

                                                        SHA1

                                                        862ff5fd84b1caa34a6298969799a802f1cb3df6

                                                        SHA256

                                                        5fda5ba5047c9b6c542eb4643fd42e664838702534a3d1a53ccb0c1af1490965

                                                        SHA512

                                                        15994a163acacbdd5811e21c01a0993c16dcf078cad37b74c95e488cf6c6944c288550a60d1da8e049c24657896370332bf8c0431a7b037614552b43c47a630d

                                                      • C:\LDPlayer\LDPlayer9\fonts\NanumGothicLight.otf

                                                        Filesize

                                                        314KB

                                                        MD5

                                                        e2e37d20b47d7ee294b91572f69e323a

                                                        SHA1

                                                        afb760386f293285f679f9f93086037fc5e09dcc

                                                        SHA256

                                                        153161ab882db768c70a753af5e8129852b9c9cae5511a23653beb6414d834a2

                                                        SHA512

                                                        001500f527e2d3c3b404cd66188149c620d45ee6510a1f9902aacc25b51f8213e6654f0c1ecc927d6ff672ffbe7dc044a84ec470a9eb86d2cba2840df7390901

                                                      • C:\LDPlayer\LDPlayer9\ldmutiplayer\7za.exe

                                                        Filesize

                                                        652KB

                                                        MD5

                                                        ad9d7cbdb4b19fb65960d69126e3ff68

                                                        SHA1

                                                        dcdc0e609a4e9d5ff9d96918c30cb79c6602cb3d

                                                        SHA256

                                                        a6c324f2925b3b3dbd2ad989e8d09c33ecc150496321ae5a1722ab097708f326

                                                        SHA512

                                                        f0196bee7ad8005a36eea86e31429d2c78e96d57b53ff4a64b3e529a54670fa042322a3c3a21557c96b0b3134bf81f238a9e35124b2d0ce80c61ed548a9791e7

                                                      • C:\LDPlayer\LDPlayer9\ldmutiplayer\cximagecrt.dll

                                                        Filesize

                                                        1.5MB

                                                        MD5

                                                        66df6f7b7a98ff750aade522c22d239a

                                                        SHA1

                                                        f69464fe18ed03de597bb46482ae899f43c94617

                                                        SHA256

                                                        91e3035a01437b54adda33d424060c57320504e7e6a0c85db2654815ba29c71f

                                                        SHA512

                                                        48d4513e09edd7f270614258b2750d5e98f0dbce671ba41a524994e96ed3df657fce67545153ca32d2bf7efcb35371cae12c4264df9053e4eb5e6b28014ed20e

                                                      • C:\LDPlayer\LDPlayer9\ldmutiplayer\libcrypto-1_1.dll

                                                        Filesize

                                                        2.0MB

                                                        MD5

                                                        01c4246df55a5fff93d086bb56110d2b

                                                        SHA1

                                                        e2939375c4dd7b478913328b88eaa3c91913cfdc

                                                        SHA256

                                                        c9501469ad2a2745509ab2d0db8b846f2bfb4ec019b98589d311a4bd7ac89889

                                                        SHA512

                                                        39524d5b8fc7c9d0602bc6733776237522dcca5f51cc6ceebd5a5d2c4cbda904042cee2f611a9c9477cc7e08e8eadd8915bf41c7c78e097b5e50786143e98196

                                                      • C:\LDPlayer\LDPlayer9\ldmutiplayer\libcurl.dll

                                                        Filesize

                                                        442KB

                                                        MD5

                                                        2d40f6c6a4f88c8c2685ee25b53ec00d

                                                        SHA1

                                                        faf96bac1e7665aa07029d8f94e1ac84014a863b

                                                        SHA256

                                                        1d7037da4222de3d7ca0af6a54b2942d58589c264333ef814cb131d703b5c334

                                                        SHA512

                                                        4e6d0dc0dc3fb7e57c6d7843074ee7c89c777e9005893e089939eb765d9b6fb12f0e774dc1814f6a34e75d1775e19e62782465731fd5605182e7984d798ba779

                                                      • C:\LDPlayer\LDPlayer9\ldmutiplayer\libeay32.dll

                                                        Filesize

                                                        1.2MB

                                                        MD5

                                                        ba46e6e1c5861617b4d97de00149b905

                                                        SHA1

                                                        4affc8aab49c7dc3ceeca81391c4f737d7672b32

                                                        SHA256

                                                        2eac0a690be435dd72b7a269ee761340099bf444edb4f447fa0030023cbf8e1e

                                                        SHA512

                                                        bf892b86477d63287f42385c0a944eee6354c7ae557b039516bf8932c7140ca8811b7ae7ac111805773495cf6854586e8a0e75e14dbb24eba56e4683029767b6

                                                      • C:\LDPlayer\LDPlayer9\ldmutiplayer\libssh2.dll

                                                        Filesize

                                                        192KB

                                                        MD5

                                                        52c43baddd43be63fbfb398722f3b01d

                                                        SHA1

                                                        be1b1064fdda4dde4b72ef523b8e02c050ccd820

                                                        SHA256

                                                        8c91023203f3d360c0629ffd20c950061566fb6c780c83eaa52fb26abb6be86f

                                                        SHA512

                                                        04cc3d8e31bd7444068468dd32ffcc9092881ca4aaea7c92292e5f1b541f877bdec964774562cb7a531c3386220d88b005660a2b5a82957e28350a381bea1b28

                                                      • C:\LDPlayer\LDPlayer9\ldmutiplayer\libssl-1_1.dll

                                                        Filesize

                                                        511KB

                                                        MD5

                                                        e8fd6da54f056363b284608c3f6a832e

                                                        SHA1

                                                        32e88b82fd398568517ab03b33e9765b59c4946d

                                                        SHA256

                                                        b681fd3c3b3f2d59f6a14be31e761d5929e104be06aa77c883ada9675ca6e9fd

                                                        SHA512

                                                        4f997deebf308de29a044e4ff2e8540235a41ea319268aa202e41a2be738b8d50f990ecc68f4a737a374f6d5f39ce8855edf0e2bb30ce274f75388e3ddd8c10b

                                                      • C:\LDPlayer\LDPlayer9\ldmutiplayer\msvcp110.dll

                                                        Filesize

                                                        522KB

                                                        MD5

                                                        3e29914113ec4b968ba5eb1f6d194a0a

                                                        SHA1

                                                        557b67e372e85eb39989cb53cffd3ef1adabb9fe

                                                        SHA256

                                                        c8d5572ca8d7624871188f0acabc3ae60d4c5a4f6782d952b9038de3bc28b39a

                                                        SHA512

                                                        75078c9eaa5a7ae39408e5db1ce7dbce5a3180d1c644bcb5e481b0810b07cb7d001d68d1b4f462cd5355e98951716f041ef570fcc866d289a68ea19b3f500c43

                                                      • C:\LDPlayer\LDPlayer9\ldmutiplayer\msvcr110.dll

                                                        Filesize

                                                        854KB

                                                        MD5

                                                        4ba25d2cbe1587a841dcfb8c8c4a6ea6

                                                        SHA1

                                                        52693d4b5e0b55a929099b680348c3932f2c3c62

                                                        SHA256

                                                        b30160e759115e24425b9bcdf606ef6ebce4657487525ede7f1ac40b90ff7e49

                                                        SHA512

                                                        82e86ec67a5c6cddf2230872f66560f4b0c3e4c1bb672507bbb8446a8d6f62512cbd0475fe23b619db3a67bb870f4f742761cf1f87d50db7f14076f54006f6c6

                                                      • C:\LDPlayer\LDPlayer9\ldmutiplayer\ssleay32.dll

                                                        Filesize

                                                        283KB

                                                        MD5

                                                        0054560df6c69d2067689433172088ef

                                                        SHA1

                                                        a30042b77ebd7c704be0e986349030bcdb82857d

                                                        SHA256

                                                        72553b45a5a7d2b4be026d59ceb3efb389c686636c6da926ffb0ca653494e750

                                                        SHA512

                                                        418190401b83de32a8ce752f399b00c091afad5e3b21357a53c134cce3b4199e660572ee71e18b5c2f364d3b2509b5365d7b569d6d9da5c79ae78c572c1d0ba0

                                                      • C:\LDPlayer\LDPlayer9\phones.data

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        fdee6e3ccf8b61db774884ccb810c66f

                                                        SHA1

                                                        7a6b13a61cd3ad252387d110d9c25ced9897994d

                                                        SHA256

                                                        657fec32d9ce7b96986513645a48ddd047a5968d897c589fbc0fc9adb8c670f4

                                                        SHA512

                                                        f773f6fc22adadf048b9bfb03e4d6e119e8876412beb8517d999f4ed6a219e2ba50eded5308d361b6780792af9f699644e3a8b581a17d5a312f759d981f64512

                                                      • C:\LDPlayer\LDPlayer9\vms\config\leidian0.config

                                                        Filesize

                                                        641B

                                                        MD5

                                                        eb420b670233c2a3fca06e801b9f4658

                                                        SHA1

                                                        29ae31bda8713bf5daa7a437ca1fe6de33456bd2

                                                        SHA256

                                                        7d4c301ca0183bfe44eb3fc923d6df30684a6433c8e0b52d1f5004c1e39523e0

                                                        SHA512

                                                        17e9ced566706e232e4d30bfc555df84ef6e2758e093b36ff1c65c15d4150fb176e9e91626fef5422b44b2b4b29e3be091690923ae097a4accbcef1ccf173907

                                                      • C:\LDPlayer\LDPlayer9\vms\leidian0\sdcard.vmdk

                                                        Filesize

                                                        35.1MB

                                                        MD5

                                                        4d592fd525e977bf3d832cdb1482faa0

                                                        SHA1

                                                        131c31bcff32d11b6eda41c9f1e2e26cc5fbc0ef

                                                        SHA256

                                                        f90ace0994c8cae3a6a95e8c68ca460e68f1662a78a77a2b38eba13cc8e487b6

                                                        SHA512

                                                        afa31b31e1d137a559190528998085c52602d79a618d930e8c425001fdfbd2437f732beda3d53f2d0e1fc770187184c3fb407828ac39f00967bf4ae015c6ba77

                                                      • C:\LDPlayer\ldmutiplayer\fonts\Roboto-Regular.otf

                                                        Filesize

                                                        103KB

                                                        MD5

                                                        4acd5f0e312730f1d8b8805f3699c184

                                                        SHA1

                                                        67c957e102bf2b2a86c5708257bc32f91c006739

                                                        SHA256

                                                        72336333d602f1c3506e642e0d0393926c0ec91225bf2e4d216fcebd82bb6cb5

                                                        SHA512

                                                        9982c1c53cee1b44fd0c3df6806b8cbf6b441d3ed97aeb466dba568adce1144373ce7833d8f44ac3fa58d01d8cdb7e8621b4bb125c4d02092c355444651a4837

                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_D14B79B440CDC26D7D21C81855E2C04D

                                                        Filesize

                                                        471B

                                                        MD5

                                                        8084ddcced8e5e1ddfd16daa16be63fd

                                                        SHA1

                                                        bc4e31a39e412216412bb2fb9415f881f2fc24f6

                                                        SHA256

                                                        62ad93a7064b34254f02e59d3d8e613511456f80d8d6e8d00c53c75af67f52ab

                                                        SHA512

                                                        2b1f6b92301b33b143df4716b678db510faf29bb01c457ffb1f7bb6d245145e7abd5b64ddc377bb2a60361804d2b81c52c3afe0b919d656029214fff3ed5ce34

                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_D14B79B440CDC26D7D21C81855E2C04D

                                                        Filesize

                                                        404B

                                                        MD5

                                                        bde83735a5a99d3d70a7400b2863ef02

                                                        SHA1

                                                        6903773e08172db7a1b9fa355d889dda4fe774dd

                                                        SHA256

                                                        3f6a8364359bebf50d0f622d4b80e30324a9dd9762db2ba1d40d4b77bcaf9620

                                                        SHA512

                                                        e6d028682b53feee6f23acb0339168425515d6b023dbfd4e517ccdb2bdf15f25b945d02eb748150d3111b47a93007b9e08340f8b4703ff524b023dd4c4a07d1f

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        cb557349d7af9d6754aed39b4ace5bee

                                                        SHA1

                                                        04de2ac30defbb36508a41872ddb475effe2d793

                                                        SHA256

                                                        cfc24ed7d1c2e2c6585f53db7b39aa2447bf9212487b0a3c8c2a7d8e7e5572ee

                                                        SHA512

                                                        f0cf51f42d975d720d613d09f201435bf98c6283ae5bc033207f4ada93b15e49743a235a1cfb1b761bde268e2f7f8561aa57619b99bff67a36820bc1a4d0ec4a

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        aad1d98ca9748cc4c31aa3b5abfe0fed

                                                        SHA1

                                                        32e8d4d9447b13bc00ec3eb15a88c55c29489495

                                                        SHA256

                                                        2a07cac05ffcf140a9ad32e58ef51b32ecccf1e3ab5ef4e656770df813a8944e

                                                        SHA512

                                                        150ebf7e37d20f88b21ab7ea0793afe1d40b00611ed36f0cf1ac1371b656d26f11b08a84dbb958891c79776fae04c9c616e45e2e211d292988a5709857a3bf72

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00003e

                                                        Filesize

                                                        63KB

                                                        MD5

                                                        49cbefd08639aca7f6921c43a85d9905

                                                        SHA1

                                                        8ab5b92fb186f50cfdb124fa9631d4b59ccada78

                                                        SHA256

                                                        3cd2609cb9fc79af0d14a44ba31b2dd33ee28c64d6c108c06d27c61366b6b020

                                                        SHA512

                                                        c57894a7c80df7e7a5add407f52587d7f6d001237c5d8e90761237d7c6497adfba010ca0b64d3f80829aa010a6eaa6e38b5ab374c51f9db9013d09949f09fdf4

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        18a8fc89650fd10c1803101d0ff5c11f

                                                        SHA1

                                                        b5b9178af0eedeab30e42ec9237b4b0d83c462a9

                                                        SHA256

                                                        8ca129bf185072a3c8e5387feaf25094cc9061b58be347e5da9d667a2d9e92cb

                                                        SHA512

                                                        6a6cb928f2cc9671c9a2ee85285523924a74397fa89d1d6d6900b2f3017a7fea799110d7c88bb10f6760ae403ea6a549d6f89892b64b5959752264519582689e

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        117c8a22ffe7331870aa23ace31e5877

                                                        SHA1

                                                        376c63546b7d18b573c1a153cba5bacfc7785ed1

                                                        SHA256

                                                        bb8c22de6d949041d25ce7cc50ed062fe5fe2c375b589b4f09cda871367a7cbb

                                                        SHA512

                                                        1701c061e19f0aee305eebdf9c01fe68d1d261ddf33cb2987f209c8e967d70e1729f83a17841434b08421a6944a80e6938ac938376a789420810f4c2ab1ff501

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        ee3572246281cebf1634636af33f8de9

                                                        SHA1

                                                        3755489444a64b28bd7c89ab0a37de299247fc4a

                                                        SHA256

                                                        4e63436decb263a98e32222fb84b9ade68ac39a5feee16cd03ee121131783d41

                                                        SHA512

                                                        77d7368940fed1768fba25d3a76bff7e50767b46d199b4212b447cd7cf4fa4e9366304ea41f47d97e1793b18708185f15713ee3e471248ec65fb3d83ff44a87b

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        12KB

                                                        MD5

                                                        8d7e55e603de0dbf1d515fb8090213f2

                                                        SHA1

                                                        661f7c74e0e8f171901ccfdad8f0f6e965373be8

                                                        SHA256

                                                        3f7fee8c4b43e748d5caced3821688096984ef0546a293d0ced4f5609f3e3193

                                                        SHA512

                                                        997a7f1027090b28f393edf9c8e3539caf801b4e94367e8eacd8d5bc6a4cc4d44118c85550d891fac6aa04f620d5da544b28e56a054ca4cb38fabe2e82676314

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        b73d1bb3f3c3c5a674dda9bc6a1f8d9c

                                                        SHA1

                                                        4fc81e848008273678db7ca459d4b444bb887043

                                                        SHA256

                                                        c53c6eafa071e4b5b8d18d905c0b0d2f381ef3117747fc134ec44ac297cb4860

                                                        SHA512

                                                        561a86fb8a37ba9de578d28ce2dfc2ba985f2decbbed4c5126d371d7a438f7647f8476b9bc4df892e7301ff51ad75bf226859d8fc3a3e6a4ed1f03ffbd2b3a3e

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        2b01b554b661825ebffe7a9424d9ca7d

                                                        SHA1

                                                        80ca588d01c52445566f6d2a2399a425bce73b91

                                                        SHA256

                                                        d68cb96a5b9297d1228e8bdfd8a6a5448ceae0171c44e7f25f793681fc8e1803

                                                        SHA512

                                                        00c39ba48d65a9eddffd6d4e7eedf519f6baaa2b203a1905f9488b60c600e35936af83e0d83e3db1ad51e7a1b205ba3b19da444f216cdfe02f01e123b17a88c8

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe59c402.TMP

                                                        Filesize

                                                        706B

                                                        MD5

                                                        46adb8b5304bf526d74103f64e045049

                                                        SHA1

                                                        7285834cb0675740044f62c0dc28d49735812032

                                                        SHA256

                                                        04dbadd017c10f883d70e5fe10d60d59745424252339c4c037db89acf943b930

                                                        SHA512

                                                        b03fc2af3c366e4394e9e11ae9fa3f63c8da1d336b920d124ad1cb49ffe925f09d788c78bc0d4652512191d0434d75d55c045004c1c9ce40bb9bd7e0e61e0dd4

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                        Filesize

                                                        16B

                                                        MD5

                                                        46295cac801e5d4857d09837238a6394

                                                        SHA1

                                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                        SHA256

                                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                        SHA512

                                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                        Filesize

                                                        16B

                                                        MD5

                                                        206702161f94c5cd39fadd03f4014d98

                                                        SHA1

                                                        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                        SHA256

                                                        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                        SHA512

                                                        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        76981d439999e8da0cbf9fbc71bf004e

                                                        SHA1

                                                        910b42dfd4a5b0fd3381753111257640f6bb6f87

                                                        SHA256

                                                        4b5a4af0b82e224681e0d9835f14e8330a249ccc2c122cea7a823da9352fedae

                                                        SHA512

                                                        5b6c5416399b22ebebef4d3fecf74b214c36eec56c014e000bd762862b71a53020049f1049d86eca901f7942bfcf8fc083618f94f86af8d8566cbc1e1de21256

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        32e8785cc063c0eaa8f224e37fb9f202

                                                        SHA1

                                                        640858a4ed36f2cfe70ef5a6f84961f3d2074d48

                                                        SHA256

                                                        8a1f9f590563369444731c80b6755220be1d5241e2838700b60217fcea7bb885

                                                        SHA512

                                                        da632d921321da708cc58abfc5b47481557c78a7436d4017ce370deb6ecac4eb583056d6c05db1883528cfda8c3a51c1594d89d899066d6ade73c27f15472e37

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\AssocProvider.dll

                                                        Filesize

                                                        136KB

                                                        MD5

                                                        702f9c8fb68fd19514c106e749ec357d

                                                        SHA1

                                                        7c141106e4ae8f3a0e5f75d8277ec830fc79eccc

                                                        SHA256

                                                        21ad24a767aeb22d27d356bc8381f103ab620de1a47e374b9f961e44b543a358

                                                        SHA512

                                                        2e7d403c89dacdda623ed1a107bac53aafde089fdd66088d578d6b55bcfe0a4fc7b54733642162bd62d0ca3f1696667a6f0cb4b572d81a6eefd6792d6003c0d9

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\CbsProvider.dll

                                                        Filesize

                                                        1004KB

                                                        MD5

                                                        f51151b2d8d84cddbedbeffebdc6ec6a

                                                        SHA1

                                                        adc9c19aa0663e65997f54835228968e13532198

                                                        SHA256

                                                        7fe4e4924fbbfdf6d772cb9d0a4963d49f6aa18b3c86a2e8df6ca49e22f79884

                                                        SHA512

                                                        802b58617be5e92bfc0c7f8c8d7443128d81908ae99d9a4ce0a785f858dc7832c70dc305f2ad39c9f57db01c05f483f6bf949ad8811fc6fb255c5aee88c729b3

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\DismCorePS.dll

                                                        Filesize

                                                        200KB

                                                        MD5

                                                        7f751738de9ac0f2544b2722f3a19eb0

                                                        SHA1

                                                        7187c57cd1bd378ef73ba9ad686a758b892c89dc

                                                        SHA256

                                                        db995f4f55d8654fc1245da0df9d1d9d52b02d75131bc3bce501b141888232fc

                                                        SHA512

                                                        0891c2dedb420e10d8528996bc9202c9f5f96a855997f71b73023448867d7d03abee4a9a7e2e19ebe2811e7d09497bce1ea4e9097fcb810481af10860ff43dfb

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\DismHost.exe

                                                        Filesize

                                                        168KB

                                                        MD5

                                                        17275206102d1cf6f17346fd73300030

                                                        SHA1

                                                        bbec93f6fb2ae56c705efd6e58d6b3cc68bf1166

                                                        SHA256

                                                        dead0ebd5b5bf5d4b0e68ba975e9a70f98820e85d056b0a6b3775fc4df4da0f6

                                                        SHA512

                                                        ce14a4f95328bb9ce437c5d79084e9d647cb89b66cde86a540b200b1667edc76aa27a36061b6e2ceccecb70b9a011b4bd54040e2a480b8546888ba5cc84a01b3

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\DismProv.dll

                                                        Filesize

                                                        292KB

                                                        MD5

                                                        2ac64cc617d144ae4f37677b5cdbb9b6

                                                        SHA1

                                                        13fe83d7489d302de9ccefbf02c7737e7f9442f9

                                                        SHA256

                                                        006464f42a487ab765e1e97cf2d15bfa7db76752946de52ff7e518bc5bbb9a44

                                                        SHA512

                                                        acdb2c9727f53889aa4f1ca519e1991a5d9f08ef161fb6680265804c99487386ca6207d0a22f6c3e02f34eaeb5ded076655ee3f6b4b4e1f5fab5555d73addfd7

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\DmiProvider.dll

                                                        Filesize

                                                        436KB

                                                        MD5

                                                        e54120aa50f14e0d3d257e77db46ece5

                                                        SHA1

                                                        922203542962ec5f938dcb3c876f060ecf17f9dc

                                                        SHA256

                                                        b5fb1a5eb4090598d5f878cdd37ed8eca82962d85995dd2280b8849fba816b54

                                                        SHA512

                                                        fbce5d707f6a66d451165608520be9d7174a8c22eb9827dfe94d98718e2c961f15ac45583b1743f3b8078b3fe675992d4b97bfc5e4b893b60328d94665f71dc9

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\EdgeProvider.dll

                                                        Filesize

                                                        200KB

                                                        MD5

                                                        c22cc16103ee51ba59b765c6b449bddb

                                                        SHA1

                                                        b0683f837e1e44c46c9a050e0a3753893ece24ad

                                                        SHA256

                                                        eb68c7d48f78b46933acba617cf3b5fcb5b8695c8a29295a9fa075f36910825b

                                                        SHA512

                                                        2c382aaddeca4efda63162584c4a2338ffcc1f4828362ce7e927e0b39c470f1f66a7933ae2210d63afb5a2ae25412266fde2ee6bdb896c3c030bdc08b67ec54e

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\Ffuprovider.dll

                                                        Filesize

                                                        680KB

                                                        MD5

                                                        a41b0e08419de4d9874893b813dccb5c

                                                        SHA1

                                                        2390e00f2c2bc9779e99a669193666688064ea77

                                                        SHA256

                                                        57ce7761531058f3c4289b1240bea6dc06355c9c4b4e88b9c9c0df8012edc5b3

                                                        SHA512

                                                        bd370e49da266148d50144c621f6415bdd5358e6274b1d471b8d4ee1888d93774331c3f75e6cb99782f1c8e772981cbc5a4baf5592c6400f340407dc670e547a

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\GenericProvider.dll

                                                        Filesize

                                                        172KB

                                                        MD5

                                                        20fb116831396d9477e352d42097741c

                                                        SHA1

                                                        7e063ac9bc173a81dc56dc5864f912041e2c725a

                                                        SHA256

                                                        6a940ba16154c4a1729b8560b03efb5f2558d66b10da4a5ec26c1299ea713bc4

                                                        SHA512

                                                        851843da748555eba735e1f5457044f24f225bd029534019814a6d1baf2e0bd1f171d297c362cfed5977274b266e823b7ad131ae2512568f7a5f2e3ea498b69a

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\IBSProvider.dll

                                                        Filesize

                                                        84KB

                                                        MD5

                                                        f6b7301c18f651567a5f816c2eb7384d

                                                        SHA1

                                                        40cd6efc28aa7efe86b265af208b0e49bec09ae4

                                                        SHA256

                                                        8f4e3f600917d49ada481ff0ed125fef4a316b659bb1197dc3036fc8c21a5a61

                                                        SHA512

                                                        4087d819706c64a5d2eed546163c55caacc553b02dc4db0d067b8815d3a24fb06ea08de3de86aac058ff2907f200e4e89eef2357ca23328aaacbe29501ea3286

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\ImagingProvider.dll

                                                        Filesize

                                                        248KB

                                                        MD5

                                                        4c6d681704e3070df2a9d3f42d3a58a2

                                                        SHA1

                                                        a9f6286ac25f17b6b2acd1fce6459b0bc94c6c81

                                                        SHA256

                                                        f1bbab35b2602d04d096c8de060b2a5cf802499a937fd1ffe749ff7f54852137

                                                        SHA512

                                                        daa0c723312680256c24457162e0ef026b753ba267f3e2755f838e2864a163802c078d8668dd2c2064cb8887f4e382a73d6402a5533b6ac5c3cbf662ad83db86

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\IntlProvider.dll

                                                        Filesize

                                                        312KB

                                                        MD5

                                                        34035aed2021763bec1a7112d53732f1

                                                        SHA1

                                                        7132595f73755c3ae20a01b6863ac9518f7b75a4

                                                        SHA256

                                                        aac13ddb9ab5a165a38611f1b61229268a40d416f07740d4eefba1a8fcf7c731

                                                        SHA512

                                                        ea045aa46713133a5d0ad20514cc2a8c8fffb99b4e19c4d5262f86167cfce08a31d336222fd3c91e6efbfd90312bb2325337aa02a8489e047b616085fdf46c1d

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\LogProvider.dll

                                                        Filesize

                                                        108KB

                                                        MD5

                                                        c63f6b6d4498f2ec95de15645c48e086

                                                        SHA1

                                                        29f71180feed44f023da9b119ba112f2e23e6a10

                                                        SHA256

                                                        56aca41c62c8d0d1b26db3a01ef6c2da4a6a51fc963eb28411f8f7f029f1bfde

                                                        SHA512

                                                        3a634340d8c66cbc1bef19f701d8bdb034449c28afecce4e8744d18181a20f85a17af3b66c8853cecb8be53f69ae73f85b70e45deac29debab084a25eb3c69dc

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\MsiProvider.dll

                                                        Filesize

                                                        208KB

                                                        MD5

                                                        eb171b7a41a7dd48940f7521da61feb0

                                                        SHA1

                                                        9f2a5ddac7b78615f5a7af753d835aaa41e788fc

                                                        SHA256

                                                        56a8527d267116af39864feca528be5b7a88c3b5df94750154b2efcf2fda5d55

                                                        SHA512

                                                        5917266aed1a79ee4cb16bb532ccae99782d0ee8af27cb42a6b39496c3de61c12a30ce524a1a66cc063101ebcfac957d1b129aae0b491c0587f40171ba6bae12

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\OSProvider.dll

                                                        Filesize

                                                        180KB

                                                        MD5

                                                        e9833a54c1a1bfdab3e5189f3f740ff9

                                                        SHA1

                                                        ffb999c781161d9a694a841728995fda5b6da6d3

                                                        SHA256

                                                        ec137f9caebcea735a9386112cf68f78b92b6a5a38008ce6415485f565e5cf85

                                                        SHA512

                                                        0b18932b24c0257c80225c99be70c5125d2207f9b92681fd623870e7a62599a18fa46bcb5f2b4b01889be73aeb084e1b7e00a4968c699c7fdb3c083ef17a49f9

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\OfflineSetupProvider.dll

                                                        Filesize

                                                        213KB

                                                        MD5

                                                        3437087e6819614a8d54c9bc59a23139

                                                        SHA1

                                                        ae84efe44b02bacdb9da876e18715100a18362be

                                                        SHA256

                                                        8b247665218f5151f0d19f59ea902a7c28f745d67a5d51b63b77242ffb4bdd74

                                                        SHA512

                                                        018e88f6c121dd4ecaceb44794e2fa7a44b52ddb22e7a5a30a332905e02065cbc1d1dcddc197676277b22f741195c1b7c4c185d328b096b6560b84e9749d6dde

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\ProvProvider.dll

                                                        Filesize

                                                        800KB

                                                        MD5

                                                        2ef388f7769205ca319630dd328dcef1

                                                        SHA1

                                                        6dc9ed84e72af4d3e7793c07cfb244626470f3b6

                                                        SHA256

                                                        4915b0c9cd8dc8a29dd649739974d244f9105dc58725f1da0d592af3b546e2bf

                                                        SHA512

                                                        b465917424dd98125d080c135c7e222a9485ed7ec89004f9a70e335b800e5b9419fbc932c8069bae9ff126494174cf48e2790030dd22aa2d75b7b9d8ccff752b

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\ServicingCommon.dll

                                                        Filesize

                                                        944KB

                                                        MD5

                                                        07231bdae9d15bfca7d97f571de3a521

                                                        SHA1

                                                        04aec0f1afcf7732bc4cd1f7aab36e460c325ba6

                                                        SHA256

                                                        be75afbbc30cad7235adf03dcc07fcee3c0c330c89b00e326ebbef2e57df5935

                                                        SHA512

                                                        2a46e0657e84481faf5c9d3de410884cb5c6e7b35039f5be04183cdac6c088cc42b12d0097e27836af14699e7815d794ca1cec80960833ab093b8dc6d44e2129

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\SmiProvider.dll

                                                        Filesize

                                                        272KB

                                                        MD5

                                                        46e3e59dbf300ae56292dea398197837

                                                        SHA1

                                                        78636b25fdb32c8fcdf5fe73cac611213f13a8be

                                                        SHA256

                                                        5a0f1279013d1d379cb3a3e30f1d5be22549728cd9dc92ed5643eacf46199339

                                                        SHA512

                                                        e0584da3c302ea6ffa85932fa185500543f15237d029fdc4b084aee971ec13967f9e83cad250bea36b31f1a3efb1cc556da7dd231e5b06884809d0af51ebdf8c

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\SysprepProvider.dll

                                                        Filesize

                                                        820KB

                                                        MD5

                                                        4dfa1eeec0822bfcfb95e4fa8ec6c143

                                                        SHA1

                                                        54251e697e289020a72e1fd412e34713f2e292cf

                                                        SHA256

                                                        901cea68c7a158a1d9c030d3939f8f72057d1cf2f902aec1bc1b22a0000c0494

                                                        SHA512

                                                        5f3f710bef75da8cddb6e40686d6a19f59fbc7d8a6842eaceb9a002ab284a91ecf48c352171e13f6a75366610988e67710439f1dde579311ebbb3cd9e4751aa4

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\TransmogProvider.dll

                                                        Filesize

                                                        1.3MB

                                                        MD5

                                                        c1c56a9c6ea636dbca49cfcc45a188c3

                                                        SHA1

                                                        d852e49978a08e662804bf3d7ec93d8f6401a174

                                                        SHA256

                                                        b20b3eb2df22998fd7f9ff6898ba707d6b8833a8274719a5e09d5148d868faaf

                                                        SHA512

                                                        f6db05e4644d734f81c2461e4ad49c4e81880c9e4beee13dbbda923360ef6cf4821fccd9040671b86ab2cd8c85fc313c951c1a69e4df14d94268753ce7ae5b2e

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\UnattendProvider.dll

                                                        Filesize

                                                        256KB

                                                        MD5

                                                        7c61284580a6bc4a4c9c92a39bd9ea08

                                                        SHA1

                                                        4579294e3f3b6c03b03b15c249b9cac66e730d2a

                                                        SHA256

                                                        3665872e68264bbf3827c2bf0cfa60124ea1d87912728f2fc3685dce32855cb8

                                                        SHA512

                                                        b30b89d0d5e065042811d6ff397d226877ff698aeb1153681692aedabe3730e2f3746ad9d70e3120e336552bab880644f9ead0c91a451197a8f0977a2126a0fe

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\Vhdprovider.dll

                                                        Filesize

                                                        596KB

                                                        MD5

                                                        8a655555544b2915b5d8676cbf3d77ab

                                                        SHA1

                                                        5a7529f8a6d50d3f4e13b2e3a0585f08eb0511a2

                                                        SHA256

                                                        d3a2dd7d47bfbb3897b927d1b7230b5b12e5fd7315d687458de15fbb08fb7e27

                                                        SHA512

                                                        c6da649ae3c3688065b37bccfb5525ade25ba7bc3b163ad7d61f3b3d1c4957c8fd6c9f2bf23b0dbc4fffe32e980acb5a5d3895b8a012c5ed086e3e38caee2e93

                                                      • C:\Users\Admin\AppData\Local\Temp\57B00C23-383B-4833-855D-F93F32F8BBA2\WimProvider.dll

                                                        Filesize

                                                        672KB

                                                        MD5

                                                        bcf8735528bb89555fc687b1ed358844

                                                        SHA1

                                                        5ef5b24631d2f447c58b0973f61cb02118ae4adc

                                                        SHA256

                                                        78b742deddee8305ea06d77f296ad9fe0f4b4a27d71b34dcdff8ae199364790c

                                                        SHA512

                                                        8b2be4e9a4334a5fc7f7c58579c20974c9194b771f7a872fd8e411d79f45fc5b7657df4c57ad11acb915d5ea5d1f0583c8a981b2c05104e3303b3ee1469b93f5

                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sse5r5ct.05k.ps1

                                                        Filesize

                                                        60B

                                                        MD5

                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                        SHA1

                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                        SHA256

                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                        SHA512

                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                      • C:\Users\Admin\AppData\Roaming\XuanZhi9\ldopengl32x.dll

                                                        Filesize

                                                        130KB

                                                        MD5

                                                        395970be72d1bcc7755f95a04b3b303d

                                                        SHA1

                                                        f4019b43fd95f1748e2392d5cb1aa4486aadbc13

                                                        SHA256

                                                        5fa3f4cb4f4f603bd8b9a538b54658ebbcf9198d99f2b0e1ce447322b22fb312

                                                        SHA512

                                                        2f4968b8564bd3bbc624a6838ec33de22413afb8711e08cc36b082863f4e146212c1b6173921ea110c65a0dc20b97c9e187a8ef006005711efcf4237db0bcd1e

                                                      • C:\Windows\Logs\DISM\dism.log

                                                        Filesize

                                                        263KB

                                                        MD5

                                                        95f01643e4fd46867176090c5102d20c

                                                        SHA1

                                                        d6b295dc22bfb4b551ecc0bf306e42ca35c388d3

                                                        SHA256

                                                        5438244bb17dfccc9abaf4ded96f99d21484eba081008d828142e1d479189cba

                                                        SHA512

                                                        a85f0992a17891d234197559a462b60fb0e813a7ffecaa709d95b203687e0d7481893da614d9047dd16c09c73d1827937235c175c30e1ff7b0dbc98f9fc4b149

                                                      • C:\Windows\Logs\DISM\dism.log

                                                        Filesize

                                                        266KB

                                                        MD5

                                                        cf41d4db216c03a9150ec96f3c5861e8

                                                        SHA1

                                                        4272f7622f116119681c665b6059c8750827dcd9

                                                        SHA256

                                                        7278c576e0de26b757d175389356f95cf3992436fff66bb7575ceec8c7219e3c

                                                        SHA512

                                                        7f2ed60db7844e33258adc81b61c8897fb56e7b8267dde47bb79d4d125a58fba849b7ae866126673500d764b203ea0cd5b28671636125dc4a8acde8e297b38cd

                                                      • memory/416-910-0x000000006F0B0000-0x000000006F0FC000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/416-909-0x0000000005830000-0x0000000005B87000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/2984-928-0x000000006F0B0000-0x000000006F0FC000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/3488-864-0x0000000002B20000-0x0000000002B56000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/3488-892-0x0000000007C70000-0x00000000082EA000-memory.dmp

                                                        Filesize

                                                        6.5MB

                                                      • memory/3488-865-0x00000000055D0000-0x0000000005BFA000-memory.dmp

                                                        Filesize

                                                        6.2MB

                                                      • memory/3488-894-0x00000000076B0000-0x00000000076BA000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/3488-895-0x00000000078C0000-0x0000000007956000-memory.dmp

                                                        Filesize

                                                        600KB

                                                      • memory/3488-868-0x0000000005DE0000-0x0000000005E46000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/3488-867-0x0000000005D70000-0x0000000005DD6000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/3488-877-0x0000000005E50000-0x00000000061A7000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/3488-879-0x0000000006300000-0x000000000634C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/3488-878-0x00000000062D0000-0x00000000062EE000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/3488-896-0x0000000007840000-0x0000000007851000-memory.dmp

                                                        Filesize

                                                        68KB

                                                      • memory/3488-898-0x0000000007960000-0x000000000797A000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/3488-897-0x0000000007880000-0x000000000788E000-memory.dmp

                                                        Filesize

                                                        56KB

                                                      • memory/3488-893-0x0000000007630000-0x000000000764A000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/3488-866-0x0000000005450000-0x0000000005472000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/3488-880-0x00000000072A0000-0x00000000072D4000-memory.dmp

                                                        Filesize

                                                        208KB

                                                      • memory/3488-881-0x000000006F0B0000-0x000000006F0FC000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/3488-890-0x00000000072E0000-0x00000000072FE000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/3488-891-0x0000000007300000-0x00000000073A4000-memory.dmp

                                                        Filesize

                                                        656KB

                                                      • memory/4940-1196-0x0000000070AE0000-0x00000000724DB000-memory.dmp

                                                        Filesize

                                                        26.0MB

                                                      • memory/4940-1198-0x0000000070430000-0x00000000704AA000-memory.dmp

                                                        Filesize

                                                        488KB

                                                      • memory/4940-1199-0x00000000728A0000-0x00000000728F9000-memory.dmp

                                                        Filesize

                                                        356KB

                                                      • memory/4940-1194-0x0000000070530000-0x0000000070AD6000-memory.dmp

                                                        Filesize

                                                        5.6MB

                                                      • memory/4940-1195-0x00000000704B0000-0x000000007052E000-memory.dmp

                                                        Filesize

                                                        504KB

                                                      • memory/4940-1040-0x0000000036180000-0x0000000036190000-memory.dmp

                                                        Filesize

                                                        64KB