Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 01:39

General

  • Target

    LDPlayer9_es_1009_ld.exe

  • Size

    2.5MB

  • MD5

    6908b774daad336d0ab1c55f55c344c4

  • SHA1

    04ea8a943ca41fe152a4c2ec99ede83967d546f3

  • SHA256

    10c59dd6cef6195616ec76184885c1ed1134f9c2ca801652c81a018d040ebbe4

  • SHA512

    aa283489d2474f7b8a5f2bb6f524aa5c3f99932b61e52737db36b8cc7b168e6040217ec69860592e473fab6df5597cc30ce79c23b17805f6cf3c854f41d41de8

  • SSDEEP

    49152:GNfatughHaKLIKN1cueXlaYbsISTb/am5B8y6sEUhSSwoUK0:Gla4ghHaKMu2IYbsIW/amj8yF8SE

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Manipulates Digital Signatures 1 TTPs 64 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Possible privilege escalation attempt 6 IoCs
  • A potential corporate email address has been identified in the URL: currency-file@1
  • Modifies file permissions 1 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Executes dropped EXE 15 IoCs
  • Launches sc.exe 8 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 34 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LDPlayer9_es_1009_ld.exe
    "C:\Users\Admin\AppData\Local\Temp\LDPlayer9_es_1009_ld.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4176
    • C:\LDPlayer\LDPlayer9\LDPlayer.exe
      "C:\LDPlayer\LDPlayer9\\LDPlayer.exe" -silence -downloader -openid=1009 -language=es -path="C:\LDPlayer\LDPlayer9\"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3512
      • C:\LDPlayer\LDPlayer9\dnrepairer.exe
        "C:\LDPlayer\LDPlayer9\dnrepairer.exe" listener=459380
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Windows\SysWOW64\net.exe
          "net" start cryptsvc
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4884
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start cryptsvc
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3316
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" Softpub.dll /s
          4⤵
          • Manipulates Digital Signatures
          • System Location Discovery: System Language Discovery
          PID:3228
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" Wintrust.dll /s
          4⤵
          • Manipulates Digital Signatures
          • System Location Discovery: System Language Discovery
          PID:4436
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" Initpki.dll /s
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4156
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32" Initpki.dll /s
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3104
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" dssenh.dll /s
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4080
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" rsaenh.dll /s
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1864
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" cryptdlg.dll /s
          4⤵
          • Manipulates Digital Signatures
          • System Location Discovery: System Language Discovery
          PID:2748
        • C:\Windows\SysWOW64\takeown.exe
          "takeown" /f "C:\LDPlayer\LDPlayer9\vms" /r /d y
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:4272
        • C:\Windows\SysWOW64\icacls.exe
          "icacls" "C:\LDPlayer\LDPlayer9\vms" /grant everyone:F /t
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:3664
        • C:\Windows\SysWOW64\takeown.exe
          "takeown" /f "C:\LDPlayer\LDPlayer9\\system.vmdk"
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:1088
        • C:\Windows\SysWOW64\icacls.exe
          "icacls" "C:\LDPlayer\LDPlayer9\\system.vmdk" /grant everyone:F /t
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:4224
        • C:\Windows\SysWOW64\dism.exe
          C:\Windows\system32\dism.exe /Online /English /Get-Features
          4⤵
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5080
          • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\dismhost.exe
            C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\dismhost.exe {D1D35EFC-312A-48DC-965F-F800CDBFD946}
            5⤵
            • Drops file in Windows directory
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4256
        • C:\Windows\SysWOW64\sc.exe
          sc query HvHost
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:2332
        • C:\Windows\SysWOW64\sc.exe
          sc query vmms
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:3148
        • C:\Windows\SysWOW64\sc.exe
          sc query vmcompute
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:2376
        • C:\Program Files\ldplayer9box\Ld9BoxSVC.exe
          "C:\Program Files\ldplayer9box\Ld9BoxSVC.exe" /RegServer
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1088
        • C:\Windows\SYSTEM32\regsvr32.exe
          "regsvr32" "C:\Program Files\ldplayer9box\VBoxC.dll" /s
          4⤵
          • Loads dropped DLL
          PID:1500
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" "C:\Program Files\ldplayer9box\x86\VBoxClient-x86.dll" /s
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:4916
        • C:\Windows\SYSTEM32\regsvr32.exe
          "regsvr32" "C:\Program Files\ldplayer9box\VBoxProxyStub.dll" /s
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:3664
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" "C:\Program Files\ldplayer9box\x86\VBoxProxyStub-x86.dll" /s
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:3768
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\system32\sc" create Ld9BoxSup binPath= "C:\Program Files\ldplayer9box\Ld9BoxSup.sys" type= kernel start= auto
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:4992
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\system32\sc" start Ld9BoxSup
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:2032
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" New-NetFirewallRule -DisplayName "Ld9BoxSup" -Direction Inbound -Program 'C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe' -RemoteAddress LocalSubnet -Action Allow
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3236
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" New-NetFirewallRule -DisplayName "Ld9BoxNat" -Direction Inbound -Program 'C:\Program Files\ldplayer9box\VBoxNetNAT.exe' -RemoteAddress LocalSubnet -Action Allow
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:112
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" New-NetFirewallRule -DisplayName "dnplayer" -Direction Inbound -Program 'C:\LDPlayer\LDPlayer9\dnplayer.exe' -RemoteAddress LocalSubnet -Action Allow
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3876
      • C:\LDPlayer\LDPlayer9\driverconfig.exe
        "C:\LDPlayer\LDPlayer9\driverconfig.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4024
      • C:\Windows\SysWOW64\takeown.exe
        "takeown" /f C:\LDPlayer\ldmutiplayer\ /r /d y
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:3912
      • C:\Windows\SysWOW64\icacls.exe
        "icacls" C:\LDPlayer\ldmutiplayer\ /grant everyone:F /t
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:264
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/ykt8hgSabz
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4856
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6baa46f8,0x7fff6baa4708,0x7fff6baa4718
        3⤵
          PID:2608
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:2
          3⤵
            PID:5088
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2712
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:8
            3⤵
              PID:1000
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3684 /prefetch:1
              3⤵
                PID:2916
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3692 /prefetch:1
                3⤵
                  PID:1396
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:1
                  3⤵
                    PID:4024
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4040 /prefetch:8
                    3⤵
                      PID:5264
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3908 /prefetch:8
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5272
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:1
                      3⤵
                        PID:5464
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:1
                        3⤵
                          PID:5596
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:1
                          3⤵
                            PID:5804
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6456 /prefetch:8
                            3⤵
                              PID:6104
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6456 /prefetch:8
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5580
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6380 /prefetch:1
                              3⤵
                                PID:5572
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:1
                                3⤵
                                  PID:5584
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:1
                                  3⤵
                                    PID:5784
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5704691888600760280,3970812087399745284,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6364 /prefetch:1
                                    3⤵
                                      PID:5908
                                  • C:\LDPlayer\LDPlayer9\dnplayer.exe
                                    "C:\LDPlayer\LDPlayer9\\dnplayer.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Checks processor information in registry
                                    • Modifies Internet Explorer settings
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:1532
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc query HvHost
                                      3⤵
                                      • Launches sc.exe
                                      • System Location Discovery: System Language Discovery
                                      PID:4184
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc query vmms
                                      3⤵
                                      • Launches sc.exe
                                      • System Location Discovery: System Language Discovery
                                      PID:1580
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc query vmcompute
                                      3⤵
                                      • Launches sc.exe
                                      • System Location Discovery: System Language Discovery
                                      PID:3532
                                    • C:\Program Files\ldplayer9box\vbox-img.exe
                                      "C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\..\system.vmdk" --uuid 20160302-bbbb-bbbb-0eee-bbbb00000000
                                      3⤵
                                      • Executes dropped EXE
                                      PID:4072
                                    • C:\Program Files\ldplayer9box\vbox-img.exe
                                      "C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\leidian0\data.vmdk" --uuid 20160302-cccc-cccc-0eee-000000000000
                                      3⤵
                                      • Executes dropped EXE
                                      PID:3336
                                    • C:\Program Files\ldplayer9box\vbox-img.exe
                                      "C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\leidian0\sdcard.vmdk" --uuid 20160302-dddd-dddd-0eee-000000000000
                                      3⤵
                                      • Executes dropped EXE
                                      PID:3808
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://es.ldplayer.net/blog/94.html
                                      3⤵
                                        PID:5396
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7fff6baa46f8,0x7fff6baa4708,0x7fff6baa4718
                                          4⤵
                                            PID:5416
                                    • C:\Windows\system32\AUDIODG.EXE
                                      C:\Windows\system32\AUDIODG.EXE 0x4f0 0x244
                                      1⤵
                                        PID:3628
                                      • C:\Program Files\ldplayer9box\Ld9BoxSVC.exe
                                        "C:\Program Files\ldplayer9box\Ld9BoxSVC.exe" -Embedding
                                        1⤵
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        PID:3584
                                        • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                                          "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                                          2⤵
                                          • Executes dropped EXE
                                          PID:4524
                                        • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                                          "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                                          2⤵
                                          • Executes dropped EXE
                                          PID:4156
                                        • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                                          "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                                          2⤵
                                          • Executes dropped EXE
                                          PID:856
                                        • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                                          "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                                          2⤵
                                          • Executes dropped EXE
                                          PID:684
                                        • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                                          "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                                          2⤵
                                          • Executes dropped EXE
                                          PID:4404
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:932
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:2808
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:6068

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\LDPlayer\LDPlayer9\MSVCR120.dll

                                              Filesize

                                              947KB

                                              MD5

                                              50097ec217ce0ebb9b4caa09cd2cd73a

                                              SHA1

                                              8cd3018c4170072464fbcd7cba563df1fc2b884c

                                              SHA256

                                              2a2ff2c61977079205c503e0bcfb96bf7aa4d5c9a0d1b1b62d3a49a9aa988112

                                              SHA512

                                              ac2d02e9bfc2be4c3cb1c2fff41a2dafcb7ce1123998bbf3eb5b4dc6410c308f506451de9564f7f28eb684d8119fb6afe459ab87237df7956f4256892bbab058

                                            • C:\LDPlayer\LDPlayer9\crashreport.dll

                                              Filesize

                                              51KB

                                              MD5

                                              1eb5ffaa41c73d028b4108eef962fb7f

                                              SHA1

                                              bba9bcb8a064fdf68a79bae656f11ba039c9cc77

                                              SHA256

                                              421b885202b3bfe4c7e5f9281c17f836df1de98db6d14c6590eabf4d8153a6af

                                              SHA512

                                              148863b577f7d9fc25225e8dfd3f01d4865afb1596dd320bbd0451fae9d173fc1e15105f0e98352bffb6c36a2462e3d8292ce6db8877b0b921b304be1ba2b879

                                            • C:\LDPlayer\LDPlayer9\dnmultiplayer.exe

                                              Filesize

                                              1.3MB

                                              MD5

                                              03746b5d567927bdb69499ec30039d8c

                                              SHA1

                                              93b08624bd80ed01c370e0ba9a2ee3824edd8733

                                              SHA256

                                              1e3b7a0ac94de0e7209b19b709a0ddd2effbc1b98437a81b3d3dac853ef54b77

                                              SHA512

                                              abf608e020e732407524b780bed7b894768f9828dbbecb1a66c9b6d8cb079380646bc228dce5f1bdbef4b089b241574a22c79eee3271a623cd05e7754ad83e19

                                            • C:\LDPlayer\LDPlayer9\dnplayer.exe

                                              Filesize

                                              3.6MB

                                              MD5

                                              2c8986ce6c1c5fcba4146f642e95d862

                                              SHA1

                                              a913254e6a9bd1db7825f9880a992f21a6827bd7

                                              SHA256

                                              07285fcc8e65f164c8897ebdb63dc44801dae28782a6b2ee5f3469c64952efd6

                                              SHA512

                                              a5b074ad394b75f2597007ca732f5e1b877fae483122332dbcaecfea0c6c52a658df8b5844e60280766fcd38333dfac3a259c159c405a83ea6b78691405203d5

                                            • C:\LDPlayer\LDPlayer9\dnrepairer.exe

                                              Filesize

                                              41.9MB

                                              MD5

                                              5115ad2e73db8f2c00f9328c97469e0a

                                              SHA1

                                              552a24ab6bf961d84b1211f0b9d083c24c36781e

                                              SHA256

                                              19b8c6fa38f2fcc728acb3a110ab4bcdb49648440957a75ecc107c84f3eb7be3

                                              SHA512

                                              7ea61e22a4d036a690ed6fdb6fe05464c0430cc4811930815d6d7281f99c2895e7956b90ec255f59020da82c6f7ae32a9ac780e9d4464a05d4f680119a4ec739

                                            • C:\LDPlayer\LDPlayer9\dnresource.rcc

                                              Filesize

                                              5.6MB

                                              MD5

                                              8556c04c551d35d6a80ebaef4bde9af1

                                              SHA1

                                              158feb0ecf4a6c5cdd93169cdac4c8f10db6f85d

                                              SHA256

                                              7dd496d6acdc405576d42cb50956c203f7aa69080c65e587b1629f45d0b52ee7

                                              SHA512

                                              b29ec3d8833e96ec672ac7378b86bbcd3a9a306d01ae7acb143f68686fc7416a22cf09f315cbfad0e38aa2e7d8595df2584e38bd6d9b1f3173f7b1b7b49da227

                                            • C:\LDPlayer\LDPlayer9\fonts\NanumGothicLight.otf

                                              Filesize

                                              314KB

                                              MD5

                                              e2e37d20b47d7ee294b91572f69e323a

                                              SHA1

                                              afb760386f293285f679f9f93086037fc5e09dcc

                                              SHA256

                                              153161ab882db768c70a753af5e8129852b9c9cae5511a23653beb6414d834a2

                                              SHA512

                                              001500f527e2d3c3b404cd66188149c620d45ee6510a1f9902aacc25b51f8213e6654f0c1ecc927d6ff672ffbe7dc044a84ec470a9eb86d2cba2840df7390901

                                            • C:\LDPlayer\LDPlayer9\ldmutiplayer\7za.exe

                                              Filesize

                                              652KB

                                              MD5

                                              ad9d7cbdb4b19fb65960d69126e3ff68

                                              SHA1

                                              dcdc0e609a4e9d5ff9d96918c30cb79c6602cb3d

                                              SHA256

                                              a6c324f2925b3b3dbd2ad989e8d09c33ecc150496321ae5a1722ab097708f326

                                              SHA512

                                              f0196bee7ad8005a36eea86e31429d2c78e96d57b53ff4a64b3e529a54670fa042322a3c3a21557c96b0b3134bf81f238a9e35124b2d0ce80c61ed548a9791e7

                                            • C:\LDPlayer\LDPlayer9\ldmutiplayer\cximagecrt.dll

                                              Filesize

                                              1.5MB

                                              MD5

                                              66df6f7b7a98ff750aade522c22d239a

                                              SHA1

                                              f69464fe18ed03de597bb46482ae899f43c94617

                                              SHA256

                                              91e3035a01437b54adda33d424060c57320504e7e6a0c85db2654815ba29c71f

                                              SHA512

                                              48d4513e09edd7f270614258b2750d5e98f0dbce671ba41a524994e96ed3df657fce67545153ca32d2bf7efcb35371cae12c4264df9053e4eb5e6b28014ed20e

                                            • C:\LDPlayer\LDPlayer9\ldmutiplayer\libcrypto-1_1.dll

                                              Filesize

                                              2.0MB

                                              MD5

                                              01c4246df55a5fff93d086bb56110d2b

                                              SHA1

                                              e2939375c4dd7b478913328b88eaa3c91913cfdc

                                              SHA256

                                              c9501469ad2a2745509ab2d0db8b846f2bfb4ec019b98589d311a4bd7ac89889

                                              SHA512

                                              39524d5b8fc7c9d0602bc6733776237522dcca5f51cc6ceebd5a5d2c4cbda904042cee2f611a9c9477cc7e08e8eadd8915bf41c7c78e097b5e50786143e98196

                                            • C:\LDPlayer\LDPlayer9\ldmutiplayer\libcurl.dll

                                              Filesize

                                              442KB

                                              MD5

                                              2d40f6c6a4f88c8c2685ee25b53ec00d

                                              SHA1

                                              faf96bac1e7665aa07029d8f94e1ac84014a863b

                                              SHA256

                                              1d7037da4222de3d7ca0af6a54b2942d58589c264333ef814cb131d703b5c334

                                              SHA512

                                              4e6d0dc0dc3fb7e57c6d7843074ee7c89c777e9005893e089939eb765d9b6fb12f0e774dc1814f6a34e75d1775e19e62782465731fd5605182e7984d798ba779

                                            • C:\LDPlayer\LDPlayer9\ldmutiplayer\libeay32.dll

                                              Filesize

                                              1.2MB

                                              MD5

                                              ba46e6e1c5861617b4d97de00149b905

                                              SHA1

                                              4affc8aab49c7dc3ceeca81391c4f737d7672b32

                                              SHA256

                                              2eac0a690be435dd72b7a269ee761340099bf444edb4f447fa0030023cbf8e1e

                                              SHA512

                                              bf892b86477d63287f42385c0a944eee6354c7ae557b039516bf8932c7140ca8811b7ae7ac111805773495cf6854586e8a0e75e14dbb24eba56e4683029767b6

                                            • C:\LDPlayer\LDPlayer9\ldmutiplayer\libssh2.dll

                                              Filesize

                                              192KB

                                              MD5

                                              52c43baddd43be63fbfb398722f3b01d

                                              SHA1

                                              be1b1064fdda4dde4b72ef523b8e02c050ccd820

                                              SHA256

                                              8c91023203f3d360c0629ffd20c950061566fb6c780c83eaa52fb26abb6be86f

                                              SHA512

                                              04cc3d8e31bd7444068468dd32ffcc9092881ca4aaea7c92292e5f1b541f877bdec964774562cb7a531c3386220d88b005660a2b5a82957e28350a381bea1b28

                                            • C:\LDPlayer\LDPlayer9\ldmutiplayer\libssl-1_1.dll

                                              Filesize

                                              511KB

                                              MD5

                                              e8fd6da54f056363b284608c3f6a832e

                                              SHA1

                                              32e88b82fd398568517ab03b33e9765b59c4946d

                                              SHA256

                                              b681fd3c3b3f2d59f6a14be31e761d5929e104be06aa77c883ada9675ca6e9fd

                                              SHA512

                                              4f997deebf308de29a044e4ff2e8540235a41ea319268aa202e41a2be738b8d50f990ecc68f4a737a374f6d5f39ce8855edf0e2bb30ce274f75388e3ddd8c10b

                                            • C:\LDPlayer\LDPlayer9\ldmutiplayer\msvcp110.dll

                                              Filesize

                                              522KB

                                              MD5

                                              3e29914113ec4b968ba5eb1f6d194a0a

                                              SHA1

                                              557b67e372e85eb39989cb53cffd3ef1adabb9fe

                                              SHA256

                                              c8d5572ca8d7624871188f0acabc3ae60d4c5a4f6782d952b9038de3bc28b39a

                                              SHA512

                                              75078c9eaa5a7ae39408e5db1ce7dbce5a3180d1c644bcb5e481b0810b07cb7d001d68d1b4f462cd5355e98951716f041ef570fcc866d289a68ea19b3f500c43

                                            • C:\LDPlayer\LDPlayer9\ldmutiplayer\msvcr110.dll

                                              Filesize

                                              854KB

                                              MD5

                                              4ba25d2cbe1587a841dcfb8c8c4a6ea6

                                              SHA1

                                              52693d4b5e0b55a929099b680348c3932f2c3c62

                                              SHA256

                                              b30160e759115e24425b9bcdf606ef6ebce4657487525ede7f1ac40b90ff7e49

                                              SHA512

                                              82e86ec67a5c6cddf2230872f66560f4b0c3e4c1bb672507bbb8446a8d6f62512cbd0475fe23b619db3a67bb870f4f742761cf1f87d50db7f14076f54006f6c6

                                            • C:\LDPlayer\LDPlayer9\ldmutiplayer\ssleay32.dll

                                              Filesize

                                              283KB

                                              MD5

                                              0054560df6c69d2067689433172088ef

                                              SHA1

                                              a30042b77ebd7c704be0e986349030bcdb82857d

                                              SHA256

                                              72553b45a5a7d2b4be026d59ceb3efb389c686636c6da926ffb0ca653494e750

                                              SHA512

                                              418190401b83de32a8ce752f399b00c091afad5e3b21357a53c134cce3b4199e660572ee71e18b5c2f364d3b2509b5365d7b569d6d9da5c79ae78c572c1d0ba0

                                            • C:\LDPlayer\LDPlayer9\msvcp120.dll

                                              Filesize

                                              444KB

                                              MD5

                                              50260b0f19aaa7e37c4082fecef8ff41

                                              SHA1

                                              ce672489b29baa7119881497ed5044b21ad8fe30

                                              SHA256

                                              891603d569fc6f1afed7c7d935b0a3c7363c35a0eb4a76c9e57ef083955bc2c9

                                              SHA512

                                              6f99d39bfe9d4126417ff65571c78c279d75fc9547ee767a594620c0c6f45f4bb42fd0c5173d9bc91a68a0636205a637d5d1c7847bd5f8ce57e120d210b0c57d

                                            • C:\LDPlayer\LDPlayer9\phones.data

                                              Filesize

                                              5KB

                                              MD5

                                              fdee6e3ccf8b61db774884ccb810c66f

                                              SHA1

                                              7a6b13a61cd3ad252387d110d9c25ced9897994d

                                              SHA256

                                              657fec32d9ce7b96986513645a48ddd047a5968d897c589fbc0fc9adb8c670f4

                                              SHA512

                                              f773f6fc22adadf048b9bfb03e4d6e119e8876412beb8517d999f4ed6a219e2ba50eded5308d361b6780792af9f699644e3a8b581a17d5a312f759d981f64512

                                            • C:\LDPlayer\LDPlayer9\vms\config\leidian0.config

                                              Filesize

                                              641B

                                              MD5

                                              196f187fdc4984596fae8f84f6dc7ca0

                                              SHA1

                                              5646eff77a681c388ac299628cefd69f422c5714

                                              SHA256

                                              fde316a347bf1f7ba50c38f3d368fe306450f26768789fbeb90291ca6236e844

                                              SHA512

                                              1749acb3f10a116b978e7ef1efa4fb6aed18228f733254aaee2ce4b17e7a540d0a92c5f1b5baa1541335de0d72106875496d7598ed68adb67625b940720021a9

                                            • C:\LDPlayer\LDPlayer9\vms\leidian0\sdcard.vmdk

                                              Filesize

                                              35.1MB

                                              MD5

                                              4d592fd525e977bf3d832cdb1482faa0

                                              SHA1

                                              131c31bcff32d11b6eda41c9f1e2e26cc5fbc0ef

                                              SHA256

                                              f90ace0994c8cae3a6a95e8c68ca460e68f1662a78a77a2b38eba13cc8e487b6

                                              SHA512

                                              afa31b31e1d137a559190528998085c52602d79a618d930e8c425001fdfbd2437f732beda3d53f2d0e1fc770187184c3fb407828ac39f00967bf4ae015c6ba77

                                            • C:\LDPlayer\ldmutiplayer\fonts\Roboto-Regular.otf

                                              Filesize

                                              103KB

                                              MD5

                                              4acd5f0e312730f1d8b8805f3699c184

                                              SHA1

                                              67c957e102bf2b2a86c5708257bc32f91c006739

                                              SHA256

                                              72336333d602f1c3506e642e0d0393926c0ec91225bf2e4d216fcebd82bb6cb5

                                              SHA512

                                              9982c1c53cee1b44fd0c3df6806b8cbf6b441d3ed97aeb466dba568adce1144373ce7833d8f44ac3fa58d01d8cdb7e8621b4bb125c4d02092c355444651a4837

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_645BC4A49DCDC40FE5917FA45C6D4517

                                              Filesize

                                              1KB

                                              MD5

                                              4937a66db1d25be0664d16cad3cf96c5

                                              SHA1

                                              45388c03fd80b5785cc890f178e86eb41c915e73

                                              SHA256

                                              a6a6ffd388bb0e60bfbd717cebf9add80a7f33a73b2c6d0215a41c39f672e8c9

                                              SHA512

                                              98cd6bd238745d84b7f17a1ce07c483b565c4550b3dacfa51f6dfeb79fc16b28a0fad62473c00e9d243c9a4ade6d29519395718c535330d7aff6056c671f5a69

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\83D863F495E7D991917B3ABB3E1EB382_4842B4543C789FC992419E09C95EDADE

                                              Filesize

                                              471B

                                              MD5

                                              dda702fea2a24589bd9a548f65be014f

                                              SHA1

                                              49eb73641a74982e5ccc5cff8f50944918375a7d

                                              SHA256

                                              d3b2d802a5d0a5652fa42b6f2044b35a687402730bf66a62bd6f748554ad5fba

                                              SHA512

                                              5e65edb843afb42b7f39883c15e388f6d12aae1aceb8e8e3d204ebd0647314820fdd9e12003c24d7bd6f2ce87ce2af3cfb521c5f10360814a8288b06d5269ccd

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

                                              Filesize

                                              2KB

                                              MD5

                                              c9f63ac8cc18ced3e307d967511e2e09

                                              SHA1

                                              a6739a7dda56ce89574a497b677ea51cfcc19aef

                                              SHA256

                                              63c245c8b47c1b956e6bad3ba670789244f463dbeff302686b06612bb304cdda

                                              SHA512

                                              2916e795a63db889618c26fa750d309d69cad56c810c2d71969a5d29289dfcc80648941f8ee3cf2d67566601b43b13b25657e9c368c7b1654f29607d90ac6233

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

                                              Filesize

                                              1KB

                                              MD5

                                              5250b44f007968daeb6835c5a821b7f9

                                              SHA1

                                              bda971d5c7df54c5c570ad1c1459bca6bd24dd30

                                              SHA256

                                              4d8829247874e8f379eb3a3a9cdce1038f4b26c1d3052f66dd5c551bf0d97fc8

                                              SHA512

                                              64635fdf7f361537dd42a7e4640077894109b2127078d10a046c292d538ffe2b0964935ec08ceade35b26a3676f1e3db23b1837a56474e64a4da3b02e0de5661

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_645BC4A49DCDC40FE5917FA45C6D4517

                                              Filesize

                                              434B

                                              MD5

                                              72fb2a8cc723a0b88e67e839b05fbcff

                                              SHA1

                                              54f574ea3568558c61699d03e03e97b8e9c299cf

                                              SHA256

                                              0b0cc35c6f2ef3537c89861cc35ae9ece830a45f1323c28044829a10e2ae78e7

                                              SHA512

                                              1efafbcec3151f3ca2c0cee72a633c76fa8b53e73facb1c2ccdd3201db94e437f3ea11a78082894290465d104e7c9a50330823d6f24138abc99286fe0ddaa476

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\83D863F495E7D991917B3ABB3E1EB382_4842B4543C789FC992419E09C95EDADE

                                              Filesize

                                              422B

                                              MD5

                                              b029b2d14f91c65543dbeeae1f95ebd9

                                              SHA1

                                              c01798d7456c8fde49b38a10044c66fe1fbb1c78

                                              SHA256

                                              9f01382801cc56503b43785bffd97abc97280c8e1d1b9c030549c772857c059f

                                              SHA512

                                              f1a83357733e5c17c8a1dd7b11d330c2547582a8edba50ee9bf84977d49a99cf9cf6a57b0157f130055fbed90a9fa4bde5cea34db3f9b6b4487c535104a34d94

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

                                              Filesize

                                              458B

                                              MD5

                                              a27b543d657600c63ecf6d2278174ff5

                                              SHA1

                                              32d311548f02e73a5f62aa356858411ac996f351

                                              SHA256

                                              4d795d95a7c61f630b0a2bdda433b7d67ca69e985273e3a7d665ad4302632c5b

                                              SHA512

                                              44174f02c28cbe391572db937e3e261cf2510cfdd87925c5e9fa0e698e5fdfb556b582de67d0d98f1a72c63b8fee78137044228a110e389502ec94232697b35c

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

                                              Filesize

                                              432B

                                              MD5

                                              f7edb6ddb176a764533b1b65ae94199c

                                              SHA1

                                              937cfe2bcb08064fa58b721b4890a010db288f81

                                              SHA256

                                              b135efae0152b87c5fe66a4647f03f4ccac171f985ebe5dda2ec95d7da190a6c

                                              SHA512

                                              18d3e0a70b2f467e27677108e833d93edc1924daff321beffca44aa16eac070b7e463eb384c6bca0d6fe1e469a6fbf0cac6af7a45edcbf98d1611fab7cbae5a5

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              36988ca14952e1848e81a959880ea217

                                              SHA1

                                              a0482ef725657760502c2d1a5abe0bb37aebaadb

                                              SHA256

                                              d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6

                                              SHA512

                                              d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              fab8d8d865e33fe195732aa7dcb91c30

                                              SHA1

                                              2637e832f38acc70af3e511f5eba80fbd7461f2c

                                              SHA256

                                              1b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea

                                              SHA512

                                              39a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000021

                                              Filesize

                                              32KB

                                              MD5

                                              0b9b748ce8dc216961eb21d9eb49ac22

                                              SHA1

                                              52d011feeae0e6db3ed1ad6fdb0b601968ed57e1

                                              SHA256

                                              2caf1013a91e950010ffd25da967f5cdab3806e36a25af05034d8723c0f957ab

                                              SHA512

                                              5346cdc3b85932557e953a342db245226c589194aa9ca613f939eec5d40b92949c575f112fc167eefd2d2330f01233c53b930878892759ba73f99b4c28fb8caf

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              111B

                                              MD5

                                              285252a2f6327d41eab203dc2f402c67

                                              SHA1

                                              acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                              SHA256

                                              5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                              SHA512

                                              11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              9KB

                                              MD5

                                              f25b02054cdf566d3e2b84d8981d3a57

                                              SHA1

                                              0622ce829ba0c0a4090d4203bfad92f9a21474d6

                                              SHA256

                                              ebaba98eba5b35e3dc006b2c39dcb5015093ca0ce40a46302c009dc20f5cf339

                                              SHA512

                                              a6393a9bb2063400298d230beea84719cbe878cf7bc6e66a5d090395d582691a3dd84ef7c27d10c671f82f93610b83143a136213079d4549cb74cd900a602465

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              1120703d545756bea9210a63c8c07961

                                              SHA1

                                              2b2045dfe60fe8e27453e23d0acf217ee5077576

                                              SHA256

                                              ed6d76faed85c7c116c80133429be8c095bc61de381ef53dff2b4af44636ee34

                                              SHA512

                                              96ddc93d22ac89cd6f59f390e4abc886bc7979a18959548f59a66477588a25538b9d3351dd48e2af13797ee8bd600a32b1adf0cb6b1678f7762020c834ae66a7

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              46295cac801e5d4857d09837238a6394

                                              SHA1

                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                              SHA256

                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                              SHA512

                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              206702161f94c5cd39fadd03f4014d98

                                              SHA1

                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                              SHA256

                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                              SHA512

                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              042d0ff24113c06ce9a2e242f77e1c53

                                              SHA1

                                              6c79b18f6ae69a24525aaa8ef0f7f840b5c500be

                                              SHA256

                                              8c979f35e96e8acc4acec096e7eee14eb87deb270a8d242a72f9f9a26dafe903

                                              SHA512

                                              c7031cddc7a96a40ca4cc237e990470b33b08e6042f84292a2332d02fed124db3ac2aec7c2473afe2f906bab961daf6dcb1837888f53bdb77bcfaceab51782bf

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              83fdcdef09115bebcbdbd9d270588240

                                              SHA1

                                              1ebee8693f9b7b97097fa137d08be6a5528c246f

                                              SHA256

                                              da12e2b7730d88fd98539f4f76db851ccd4615cf9b0232f4945a78110029a8eb

                                              SHA512

                                              c79eac56a834e01f81b353a225b0d54afe6540d8c3cdf1ab98e0d4cb63ebaf3daba1e6393407f814157e93a9fde1d8558d6f0bc9aeabc254cae4609a2db1124e

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\AppxProvider.dll

                                              Filesize

                                              554KB

                                              MD5

                                              a7927846f2bd5e6ab6159fbe762990b1

                                              SHA1

                                              8e3b40c0783cc88765bbc02ccc781960e4592f3f

                                              SHA256

                                              913f97dd219eeb7d5f7534361037fe1ecc3a637eb48d67b1c8afa8b5f951ba2f

                                              SHA512

                                              1eafece2f6aa881193e6374b81d7a7c8555346756ed53b11ca1678f1f3ffb70ae3dea0a30c5a0aab8be45db9c31d78f30f026bb22a7519a0930483d50507243f

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\AssocProvider.dll

                                              Filesize

                                              112KB

                                              MD5

                                              94dc379aa020d365ea5a32c4fab7f6a3

                                              SHA1

                                              7270573fd7df3f3c996a772f85915e5982ad30a1

                                              SHA256

                                              dc6a5930c2b9a11204d2e22a3e8d14c28e5bdac548548e256ba7ffa79bd8c907

                                              SHA512

                                              998fd10a1f43024a2398491e3764748c0b990b37d8b3c820d281296f8da8f1a2f97073f4fd83543994a6e326fa7e299cb5f59e609358cd77af996175782eeaca

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\CbsProvider.dll

                                              Filesize

                                              875KB

                                              MD5

                                              6ad0376a375e747e66f29fb7877da7d0

                                              SHA1

                                              a0de5966453ff2c899f00f165bbff50214b5ea39

                                              SHA256

                                              4c9a4ab6596626482dd2190034fcb3fafebe88a961423962ad577e873ef5008f

                                              SHA512

                                              8a97b2cc96ec975188e53e428d0fc2c562f4c3493d3c354e316c7f89a0bd25c84246807c9977f0afdda3291b8c23d518a36fd967d8f9d4d2ce7b0af11b96eb18

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\DismCore.dll

                                              Filesize

                                              402KB

                                              MD5

                                              b1f793773dc727b4af1648d6d61f5602

                                              SHA1

                                              be7ed4e121c39989f2fb343558171ef8b5f7af68

                                              SHA256

                                              af7f342adf5b533ea6978b68064f39bfb1e4ad3b572ae1b7f2287f5533334d4e

                                              SHA512

                                              66a92bff5869a56a7931d7ed9881d79c22ba741c55fb42c11364f037e1ec99902db2679b67a7e60cbf760740d5b47dcf1a6dcfae5ad6711a0bd7f086cc054eed

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\DismCorePS.dll

                                              Filesize

                                              183KB

                                              MD5

                                              a033f16836d6f8acbe3b27b614b51453

                                              SHA1

                                              716297072897aea3ec985640793d2cdcbf996cf9

                                              SHA256

                                              e3b3a4c9c6403cb8b0aa12d34915b67e4eaa5bb911e102cf77033aa315d66a1e

                                              SHA512

                                              ad5b641d93ad35b3c7a3b56cdf576750d1ad4c63e2a16006739888f0702280cad57dd0a6553ef426111c04ceafd6d1e87f6e7486a171fff77f243311aee83871

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\DismHost.exe

                                              Filesize

                                              142KB

                                              MD5

                                              e5d5e9c1f65b8ec7aa5b7f1b1acdd731

                                              SHA1

                                              dbb14dcda6502ab1d23a7c77d405dafbcbeb439e

                                              SHA256

                                              e30508e2088bc16b2a84233ced64995f738deaef2366ac6c86b35c93bbcd9d80

                                              SHA512

                                              7cf80d4a16c5dbbf61fcb22ebe30cf78ca42a030b7d7b4ad017f28fba2c9b111e8cf5b3064621453a44869bbaed124d6fb1e8d2c8fe8202f1e47579d874fa4bc

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\DismProv.dll

                                              Filesize

                                              255KB

                                              MD5

                                              490be3119ea17fa29329e77b7e416e80

                                              SHA1

                                              c71191c3415c98b7d9c9bbcf1005ce6a813221da

                                              SHA256

                                              ef1e263e1bcc05d9538cb9469dd7dba5093956aa325479c3d2607168cc1c000a

                                              SHA512

                                              6339b030008b7d009d36abf0f9595da9b793264ebdce156d4a330d095a5d7602ba074075ea05fef3dde474fc1d8e778480429de308c121df0bf3075177f26f13

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\DmiProvider.dll

                                              Filesize

                                              415KB

                                              MD5

                                              ea8488990b95ce4ef6b4e210e0d963b2

                                              SHA1

                                              cd8bf723aa9690b8ca9a0215321e8148626a27d1

                                              SHA256

                                              04f851b9d5e58ed002ad768bdcc475f22905fb1dab8341e9b3128df6eaa25b98

                                              SHA512

                                              56562131cbe5f0ea5a2508f5bfed88f21413526f1539fe4864ece5b0e03a18513f3db33c07e7abd7b8aaffc34a7587952b96bb9990d9f4efa886f613d95a5b1b

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\FfuProvider.dll

                                              Filesize

                                              619KB

                                              MD5

                                              df785c5e4aacaee3bd16642d91492815

                                              SHA1

                                              286330d2ab07512e1f636b90613afcd6529ada1e

                                              SHA256

                                              56cc8d139be12e969fff3bbf47b1f5c62c3db887e3fb97c79cf7d285076f9271

                                              SHA512

                                              3566de60fe76b63940cff3579da94f404c0bc713f2476ba00b9de12dc47973c7c22d5eed1fd667d20cea29b3c3c4fa648e5f44667e8369c192a4b69046e6f745

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\FolderProvider.dll

                                              Filesize

                                              59KB

                                              MD5

                                              4f3250ecb7a170a5eb18295aa768702d

                                              SHA1

                                              70eb14976ddab023f85bc778621ade1d4b5f4d9d

                                              SHA256

                                              a235317ab7ed89e6530844a78b933d50f6f48ea5df481de158eb99dd8c4ba461

                                              SHA512

                                              e9ce6cced5029d931d82e78e7e609a892bfe239096b55062b78e8ff38cce34ce6dd4e91efb41c4cd6ecf6017d098e4c9b13d6cb4408d761051468ee7f74bc569

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\GenericProvider.dll

                                              Filesize

                                              149KB

                                              MD5

                                              ef7e2760c0a24453fc78359aea3d7869

                                              SHA1

                                              0ea67f1fd29df2615da43e023e86046e8e46e2e1

                                              SHA256

                                              d39f38402a9309ddd1cba67be470ede348f2bc1bab2f8d565e8f15510761087a

                                              SHA512

                                              be785ba6b564cc4e755b4044ae27f916c009b7d942fcd092aed2ae630b1704e8a2f8b4692648eed481a5eb5355fd2e1ef7f94f6fb519b7e1ff6fc3c5f1aaa06f

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\IBSProvider.dll

                                              Filesize

                                              59KB

                                              MD5

                                              120f0a2022f423fc9aadb630250f52c4

                                              SHA1

                                              826df2b752c4f1bba60a77e2b2cf908dd01d3cf7

                                              SHA256

                                              5425382aaa32ffc133adb6458ff516db0e2ad60fac52dd595d53c370f4ba6fa0

                                              SHA512

                                              23e50735c06cef93d11873fc8e5e29fc63dcf3f01dc56822a17c11ca57bbfb10d46fac6351f84ba30050a16d6bd0744a08a4042a9743a6df87ac8a12e81e2764

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\ImagingProvider.dll

                                              Filesize

                                              218KB

                                              MD5

                                              35e989a1df828378baa340f4e0b2dfcb

                                              SHA1

                                              59ecc73a0b3f55e43dace3b05ff339f24ec2c406

                                              SHA256

                                              874137ee906f91285b9a018735683a0dd21bdeaf2e340cbc54296551ccf8be2d

                                              SHA512

                                              c8d69e37c918881786a8fdab2a2c5d1632411b1f75082aeb3eb24a8ba5f93dcb39b3f4000e651f95452263525d98fd1d3cb834de93bed16fa6f92ef271c3a92a

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\IntlProvider.dll

                                              Filesize

                                              296KB

                                              MD5

                                              510e132215cef8d09be40402f355879b

                                              SHA1

                                              cae8659f2d3fd54eb321a8f690267ba93d56c6f1

                                              SHA256

                                              1bb39f3389aa4258a923fa265afa2279688e6cdb14ff771f1621a56b03ddcf52

                                              SHA512

                                              2f7b2ec0e94738838f755759cd35e20ab2138b8eca023ee6ef630ab83a3de1bc0792f12ea0d722abe9a6953626cbddf8ba55ea32fc794d2df677a0625e498ab0

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\LogProvider.dll

                                              Filesize

                                              77KB

                                              MD5

                                              815a4e7a7342224a239232f2c788d7c0

                                              SHA1

                                              430b7526d864cfbd727b75738197230d148de21a

                                              SHA256

                                              a9c8787c79a952779eca82e7389cf5bbde7556e4491b8bfcfd6617740ac7d8a2

                                              SHA512

                                              0c19d1e388ed0855a660135dec7a5e6b72ecbb7eb67ff94000f2399bd07df431be538055a61cfb2937319a0ce060898bb9b6996765117b5acda8fc0bad47a349

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\MsiProvider.dll

                                              Filesize

                                              207KB

                                              MD5

                                              9a760ddc9fdca758501faf7e6d9ec368

                                              SHA1

                                              5d395ad119ceb41b776690f9085f508eaaddb263

                                              SHA256

                                              7ff3939e1ef015da8c9577af4edfdd46f0029a2cfe4e3dac574d3175516e095f

                                              SHA512

                                              59d095246b62a7777e7d2d50c2474f4b633a1ae96056e4a4cb5265ccf7432fed0ea5df9b350f44d70b55a726241da10f228d8b5cbee9b0890c0b9dc9e810b139

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\OSProvider.dll

                                              Filesize

                                              149KB

                                              MD5

                                              db4c3a07a1d3a45af53a4cf44ed550ad

                                              SHA1

                                              5dea737faadf0422c94f8f50e9588033d53d13b3

                                              SHA256

                                              2165d567aa47264abe2a866bb1bcb01a1455a75a6ea530b1b9a4dda54d08f758

                                              SHA512

                                              5182b80459447f3c1fb63b70ad0370e1da26828a7f73083bec0af875b37888dd12ec5a6d9dc84157fc5b535f473ad7019eb6a53b9a47a2e64e6a8b7fae4cddde

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\OfflineSetupProvider.dll

                                              Filesize

                                              182KB

                                              MD5

                                              9cd7292cca75d278387d2bdfb940003c

                                              SHA1

                                              bab579889ed3ac9cb0f124842c3e495cb2ec92ac

                                              SHA256

                                              b38d322af8e614cc54299effd2164247c75bd7e68e0eb1a428376fcedaca9a6f

                                              SHA512

                                              ebf96839e47bef9e240836b1d02065c703547a2424e05074467fe70f83c1ebf3db6cb71bf0d38848ec25e2e81b4cbb506ced7973b85e2ab2d8e4273de720779d

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\en-US\AppxProvider.dll.mui

                                              Filesize

                                              22KB

                                              MD5

                                              bd0dd9c5a602cb0ad7eabc16b3c1abfc

                                              SHA1

                                              cede6e6a55d972c22da4bc9e0389759690e6b37f

                                              SHA256

                                              8af0073f8a023f55866e48bf3b902dfa7f41c51b0e8b0fe06f8c496d41f9a7b3

                                              SHA512

                                              86351dc31118fc5a12fad6f549aa60c45ebe92b3ce5b90376e41f60d6d168a8a9f6c35320fc2cdcc750e67a5751651657fe64cf42690943500afd0d1dae2cd0c

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\en-US\AssocProvider.dll.mui

                                              Filesize

                                              8KB

                                              MD5

                                              8833761572f0964bdc1bea6e1667f458

                                              SHA1

                                              166260a12c3399a9aa298932862569756b4ecc45

                                              SHA256

                                              b18c6ce1558c9ef6942a3bce246a46557c2a7d12aec6c4a07e4fa84dd5c422f5

                                              SHA512

                                              2a907354ec9a1920b9d1d2aeb9ff7c7314854b36a27f7d88aca17825e74a87413dbe7d1c3fde6a2410b5934f8c80a76f8bb6b7f12e7cfc643ce6622ca516d9b8

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\en-US\CbsProvider.dll.mui

                                              Filesize

                                              53KB

                                              MD5

                                              6c51a3187d2464c48cc8550b141e25c5

                                              SHA1

                                              a42e5ae0a3090b5ab4376058e506b111405d5508

                                              SHA256

                                              d7a0253d6586e7bbfb0acb6facd9a326b32ba1642b458f5b5ed27feccb4fc199

                                              SHA512

                                              87a9e997d55bc6dbd05af1291fb78cd02266641d018ccfeb6826cb0de205aaf8a57b49e587462dbb6df2b86b54f91c0c5d3f87e64d7dbb2aea75ef143c5447ba

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\en-US\DismCore.dll.mui

                                              Filesize

                                              7KB

                                              MD5

                                              7a15f6e845f0679de593c5896fe171f9

                                              SHA1

                                              0c923dfaffb56b56cba0c28a4eacb66b1b91a1f4

                                              SHA256

                                              f91e3c35b472f95d7b1ae3dc83f9d6bfde33515aa29e8b310f55d9fe66466419

                                              SHA512

                                              5a0373f1fb076a0059cac8f30fe415e06ed880795f84283911bec75de0977baf52432b740b429496999cedf5cca45efd6ef010700e2d9a1887438056c8c573ca

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\en-US\DmiProvider.dll.mui

                                              Filesize

                                              17KB

                                              MD5

                                              b7252234aa43b7295bb62336adc1b85c

                                              SHA1

                                              b2c42a5af79530e7cf9bcf54fd76ae9d5f234d7f

                                              SHA256

                                              73709c25dc5300a435e53df97fc01a7dc184b56796cae48ee728d54d26076d6c

                                              SHA512

                                              88241009b342eb1205b10f7725a7cb1ec2c7135606459d038c4b8847efd9d5e0ad4749621f8df93746dd3ba8ab92d1b0f513ed10e2ba712a7991716f4c062358

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\en-US\FfuProvider.dll.mui

                                              Filesize

                                              9KB

                                              MD5

                                              dc826a9cb121e2142b670d0b10022e22

                                              SHA1

                                              b2fe459ede8ba99602ae6ea5fa24f0133cca2bc9

                                              SHA256

                                              ba6695148f96a5d45224324006ae29becfd2a6aa1de947e27371a4eb84e7451a

                                              SHA512

                                              038e9abff445848c882a71836574df0394e73690bc72642c2aa949c1ad820c5cbb4dedc4ee7b5b75fd5ac8a43813d416f23d28973de7a7f0e5c3f7112da6fe1b

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\en-US\FolderProvider.dll.mui

                                              Filesize

                                              2KB

                                              MD5

                                              22b4a3a1ec3b6d7aa3bc61d0812dc85f

                                              SHA1

                                              97ae3504a29eb555632d124022d8406fc5b6f662

                                              SHA256

                                              c81a992ecebd9260ff34e41383aaca1c64a9fa4706a4744ac814f0f5daa1e105

                                              SHA512

                                              9329b60a60c45b2486000ed0aff8d260fdac3d0a8789823eaa015eab1a6d577012f9d12502f81bad9902e41545c3c3e77f434bc1a753b4f8430d01db2cdbe26c

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\en-US\GenericProvider.dll.mui

                                              Filesize

                                              5KB

                                              MD5

                                              d6b02daf9583f640269b4d8b8496a5dd

                                              SHA1

                                              e3bc2acd8e6a73b6530bc201902ab714e34b3182

                                              SHA256

                                              9102fa05ed98d902bf6e95b74fdbb745399d4ce4536a29607b2156a0edfeddf0

                                              SHA512

                                              189e87fcc2902e2a8e59773783d80a7d4dd5d2991bd291b0976cbd304f78bd225b353703735b84de41b5f59c37402db634c4acc805d73176cde75ca662efff50

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\en-US\IBSProvider.dll.mui

                                              Filesize

                                              2KB

                                              MD5

                                              d4b67a347900e29392613b5d86fe4ac2

                                              SHA1

                                              fb84756d11bfd638c4b49268b96d0007b26ba2fb

                                              SHA256

                                              4ccfe7883bce7785b1387ad3872230159899a5337d30a2f81a937b74bcbc4ce5

                                              SHA512

                                              af0a2a3f813e1adfff972285c9655f50ce6916caaeff5cb82f6c7d76491ffc9b365a47f19750fc02d7122182bf65aae79ed167886c33f202d5a781ab83d75662

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\en-US\ImagingProvider.dll.mui

                                              Filesize

                                              18KB

                                              MD5

                                              f2e2ba029f26341158420f3c4db9a68f

                                              SHA1

                                              1dee9d3dddb41460995ad8913ad701546be1e59d

                                              SHA256

                                              32d8c8fb9a746be209db5c3bdad14f361cf2bef8144c32e5af419c28efd35da3

                                              SHA512

                                              3d45d7bcf21d5df56b516fc18f7dc1bf80e44258b0c810b199a7bc06047a547060956c9d79575b82d9b6992fb5fe64f5b0ef1e408363887ae81a64b6ff9fa03e

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\en-US\IntlProvider.dll.mui

                                              Filesize

                                              27KB

                                              MD5

                                              2eb303db5753eb7a6bb3ab773eeabdcb

                                              SHA1

                                              44c6c38e6ae5f9ce9d7ca9d45a3cc3020b1353e4

                                              SHA256

                                              aa43b64db4fdcd89e56ba5309f3ba2ffac2663ba30514e87c160687f4314221f

                                              SHA512

                                              df1c8cefed4b5ef5a47f9bc0c42776611b3af709938a0900db79c6c9f4fae21acbbb6c4b1cad3c5a2051b622fe7e6e01486d34622742a981623fed933f1b1427

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\en-US\LogProvider.dll.mui

                                              Filesize

                                              6KB

                                              MD5

                                              8933c8d708e5acf5a458824b19fd97da

                                              SHA1

                                              de55756ddbeebc5ad9d3ce950acba5d2fb312331

                                              SHA256

                                              6e51af7cfda6be5419f89d6705c44587556a4abffd388020d7f19e007e122cd6

                                              SHA512

                                              ead5017d9d024a1d7c53634ae725438ea3a34eed8c9056ebbc4ebe5aab2055c0e67687ce7608724e4f66f55aa486a63024967b76a5638cde3dd88b3d3432ca1f

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\en-US\MsiProvider.dll.mui

                                              Filesize

                                              15KB

                                              MD5

                                              c5e60ee2d8534f57fddb81ffce297763

                                              SHA1

                                              78e6b0e03c8bf5802b3ef429b105d7ae3092a8f2

                                              SHA256

                                              1ec7b04a8c25812db99abec82c7b7bf915ae3f7594c5d071231cafab9c1fa145

                                              SHA512

                                              ce654295e8b16da7bd004453ae4a422fe8296a8c2343e56d819883b835c391a02537ecf4d155a281a9d38f2291ee0004506b7fd48a99c0f8881ff1e38ae8ebcc

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\en-US\OfflineSetupProvider.dll.mui

                                              Filesize

                                              2KB

                                              MD5

                                              015271d46ab128a854a4e9d214ab8a43

                                              SHA1

                                              2569deff96fb5ad6db924cee2e08a998ddc80b2a

                                              SHA256

                                              692744ce4bba1e82ad1a91ab97eec2bac7146bc995e8e8ed59bc2c7d366af7ec

                                              SHA512

                                              6ba678da0475a6b1872c2e2c151b395a4d97390bed4671d3f918aab5e69cbc9ceafe72c3100ba060ac6586fd37682499fdeef7d7b1ab10f5ec2411c1438ed438

                                            • C:\Users\Admin\AppData\Local\Temp\D9C42759-D179-49E9-A4C9-3F1BCF48E24E\en-US\dismprov.dll.mui

                                              Filesize

                                              2KB

                                              MD5

                                              7d06108999cc83eb3a23eadcebb547a5

                                              SHA1

                                              200866d87a490d17f6f8b17b26225afeb6d39446

                                              SHA256

                                              cf8cc85cdd12cf4a02df5274f8d0cdc625c6409fe80866b3052b7d5a862ac311

                                              SHA512

                                              9f024aa89392fbbbabe62a58857e5ad5250e05f23d7f78fc9a09f535463446796dd6e37aab5e38dfc0bf5b15533844f63b3bddcb5cb9335901e099f65f9d8002

                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gnp5sppd.aqe.ps1

                                              Filesize

                                              60B

                                              MD5

                                              d17fe0a3f47be24a6453e9ef58c94641

                                              SHA1

                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                              SHA256

                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                              SHA512

                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                            • C:\Users\Admin\AppData\Roaming\XuanZhi9\ldopengl32x.dll

                                              Filesize

                                              130KB

                                              MD5

                                              b33f2e65677a256b37e75340c167f54b

                                              SHA1

                                              735c404466aea6a70e653a6706cdd0b4d65c0aae

                                              SHA256

                                              77e81f19ef02e620898b53a308d502042b9ae732d9741b99062a1baaa164dcd7

                                              SHA512

                                              cf1bfefef47d5cee5932fc9cccf323f87640912225cb5b0f93442929fc96f32edccad48fd8c95def9be64fa62c750add4b53448e3e4a2e854f8940be7aaefc8f

                                            • C:\Windows\Logs\DISM\dism.log

                                              Filesize

                                              2.1MB

                                              MD5

                                              28b899b968fa7e278e1ca6337908a17b

                                              SHA1

                                              23c375315fc5c82fff2d8a3d05543930b2397c36

                                              SHA256

                                              96d180beebcceeea3980dc8c3f8d609e7def6167cafd941e0375000a723f2246

                                              SHA512

                                              2a0334f482775a337a4f9d132c12971344b0f7fe7db3b95778317a86f612a7b17231876309628e954cb1079e57970bb5bf2e57e866af0bd1ef8f64d5e7fc8b4c

                                            • C:\Windows\Logs\DISM\dism.log

                                              Filesize

                                              2.2MB

                                              MD5

                                              1ec417c8dc61f7e58026aaaee57238cd

                                              SHA1

                                              8fd3eb494d1910cc6435c952df4b7286a3e02c15

                                              SHA256

                                              a72f38a7777a6489e4f0970baa58f663cee6d4c930d0cef6d547d72f8f3bd921

                                              SHA512

                                              ad03975612ee88e084aca8d30df828cfc5d9efddf0d53a753459610344bddb064a7231ee9080ec50586d816c2c638cb925a5c9e0533f7b1507b1289fb94468d1

                                            • memory/112-910-0x0000000005650000-0x00000000059A4000-memory.dmp

                                              Filesize

                                              3.3MB

                                            • memory/112-911-0x000000006F140000-0x000000006F18C000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/1532-1421-0x0000000070710000-0x0000000070769000-memory.dmp

                                              Filesize

                                              356KB

                                            • memory/1532-1025-0x00000000010C0000-0x00000000010D6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/1532-1422-0x0000000070E20000-0x000000007281B000-memory.dmp

                                              Filesize

                                              26.0MB

                                            • memory/1532-1418-0x0000000070870000-0x0000000070E16000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/1532-1420-0x0000000070770000-0x00000000707EA000-memory.dmp

                                              Filesize

                                              488KB

                                            • memory/1532-1419-0x00000000707F0000-0x000000007086E000-memory.dmp

                                              Filesize

                                              504KB

                                            • memory/1532-1046-0x00000000363C0000-0x00000000363D0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3236-891-0x0000000007480000-0x0000000007523000-memory.dmp

                                              Filesize

                                              652KB

                                            • memory/3236-877-0x0000000006260000-0x000000000627E000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/3236-864-0x00000000052C0000-0x00000000052E2000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/3236-892-0x0000000007C00000-0x000000000827A000-memory.dmp

                                              Filesize

                                              6.5MB

                                            • memory/3236-876-0x0000000005CB0000-0x0000000006004000-memory.dmp

                                              Filesize

                                              3.3MB

                                            • memory/3236-866-0x0000000005C40000-0x0000000005CA6000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/3236-865-0x0000000005BD0000-0x0000000005C36000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/3236-863-0x0000000005330000-0x0000000005958000-memory.dmp

                                              Filesize

                                              6.2MB

                                            • memory/3236-862-0x0000000004CC0000-0x0000000004CF6000-memory.dmp

                                              Filesize

                                              216KB

                                            • memory/3236-890-0x0000000007450000-0x000000000746E000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/3236-898-0x00000000078D0000-0x00000000078EA000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/3236-878-0x00000000062B0000-0x00000000062FC000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/3236-880-0x000000006F140000-0x000000006F18C000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/3236-879-0x00000000071F0000-0x0000000007222000-memory.dmp

                                              Filesize

                                              200KB

                                            • memory/3236-893-0x00000000075B0000-0x00000000075CA000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/3236-894-0x0000000007620000-0x000000000762A000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/3236-895-0x0000000007830000-0x00000000078C6000-memory.dmp

                                              Filesize

                                              600KB

                                            • memory/3236-896-0x00000000077B0000-0x00000000077C1000-memory.dmp

                                              Filesize

                                              68KB

                                            • memory/3236-897-0x0000000007800000-0x000000000780E000-memory.dmp

                                              Filesize

                                              56KB

                                            • memory/3876-931-0x000000006F140000-0x000000006F18C000-memory.dmp

                                              Filesize

                                              304KB