Resubmissions

17/01/2025, 16:19

250117-tszsfawjay 10

17/01/2025, 16:15

250117-tqlsssvrbv 8

Analysis

  • max time kernel
    600s
  • max time network
    584s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17/01/2025, 16:19

General

  • Target

    LDPlayer9_ens_com.ewt.purble_25567197_ld.exe

  • Size

    2.1MB

  • MD5

    b38032c2aacdbf4591f3b2232aa2095b

  • SHA1

    6d0693e138848613bb951a8d7ac0965f3e0d7801

  • SHA256

    486ffcca0673fceb2741b0048d8a409ece396c552b6bca6008f342ac8c94be11

  • SHA512

    e3b3681653ca8b9f8c18068cd1965e70b926581636453a963907ee80b16f942519832467a8be6653718ef057f6a792b808b6cc8b1dff28be402d673cb5380b2e

  • SSDEEP

    24576:tFwpqSq7cwxsmDRpnt3O3a0iD3MzvD/RXNgZ2Ppm+x9nGWTysehNBN88LcpmZQ46:2wntJ3MQ2PQ+3Gnb88amDeqhSSwr+I5

Malware Config

Signatures

  • Guerrilla

    Guerrilla is an Android malware used by the Lemon Group threat actor.

  • Guerrilla family
  • Guerrilla payload 1 IoCs
  • Otpstealer

    Otpstealer is an Android SMS Stealer that targets OTP first seen in February 2022.

  • Otpstealer family
  • Otpstealer payload 1 IoCs
  • Creates new service(s) 2 TTPs
  • Manipulates Digital Signatures 1 TTPs 64 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Possible privilege escalation attempt 6 IoCs
  • Modifies file permissions 1 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Executes dropped EXE 15 IoCs
  • Launches sc.exe 8 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 34 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LDPlayer9_ens_com.ewt.purble_25567197_ld.exe
    "C:\Users\Admin\AppData\Local\Temp\LDPlayer9_ens_com.ewt.purble_25567197_ld.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\LDPlayer\LDPlayer9\LDPlayer.exe
      "C:\LDPlayer\LDPlayer9\\LDPlayer.exe" -silence -downloader -openid=25567197 -language=en -path="C:\LDPlayer\LDPlayer9\"
      2⤵
      • Enumerates connected drives
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5044
      • C:\LDPlayer\LDPlayer9\dnrepairer.exe
        "C:\LDPlayer\LDPlayer9\dnrepairer.exe" listener=655402
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Windows\SysWOW64\net.exe
          "net" start cryptsvc
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4432
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start cryptsvc
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3428
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" Softpub.dll /s
          4⤵
          • Manipulates Digital Signatures
          • System Location Discovery: System Language Discovery
          PID:4036
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" Wintrust.dll /s
          4⤵
          • Manipulates Digital Signatures
          • System Location Discovery: System Language Discovery
          PID:1912
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" Initpki.dll /s
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4716
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32" Initpki.dll /s
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4704
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" dssenh.dll /s
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4680
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" rsaenh.dll /s
          4⤵
          • System Location Discovery: System Language Discovery
          PID:472
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" cryptdlg.dll /s
          4⤵
          • Manipulates Digital Signatures
          • System Location Discovery: System Language Discovery
          PID:1440
        • C:\Windows\SysWOW64\takeown.exe
          "takeown" /f "C:\LDPlayer\LDPlayer9\vms" /r /d y
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:1720
        • C:\Windows\SysWOW64\icacls.exe
          "icacls" "C:\LDPlayer\LDPlayer9\vms" /grant everyone:F /t
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:2612
        • C:\Windows\SysWOW64\takeown.exe
          "takeown" /f "C:\LDPlayer\LDPlayer9\\system.vmdk"
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:3372
        • C:\Windows\SysWOW64\icacls.exe
          "icacls" "C:\LDPlayer\LDPlayer9\\system.vmdk" /grant everyone:F /t
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:4180
        • C:\Windows\SysWOW64\dism.exe
          C:\Windows\system32\dism.exe /Online /English /Get-Features
          4⤵
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3108
          • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\dismhost.exe
            C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\dismhost.exe {235ADC46-9308-41BB-9E0E-A986C7F6B466}
            5⤵
            • Drops file in Windows directory
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1324
        • C:\Windows\SysWOW64\sc.exe
          sc query HvHost
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:3252
        • C:\Windows\SysWOW64\sc.exe
          sc query vmms
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:4200
        • C:\Windows\SysWOW64\sc.exe
          sc query vmcompute
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:4232
        • C:\Program Files\ldplayer9box\Ld9BoxSVC.exe
          "C:\Program Files\ldplayer9box\Ld9BoxSVC.exe" /RegServer
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2700
        • C:\Windows\SYSTEM32\regsvr32.exe
          "regsvr32" "C:\Program Files\ldplayer9box\VBoxC.dll" /s
          4⤵
          • Loads dropped DLL
          PID:1992
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" "C:\Program Files\ldplayer9box\x86\VBoxClient-x86.dll" /s
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:3608
        • C:\Windows\SYSTEM32\regsvr32.exe
          "regsvr32" "C:\Program Files\ldplayer9box\VBoxProxyStub.dll" /s
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:492
        • C:\Windows\SysWOW64\regsvr32.exe
          "regsvr32" "C:\Program Files\ldplayer9box\x86\VBoxProxyStub-x86.dll" /s
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:2496
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\system32\sc" create Ld9BoxSup binPath= "C:\Program Files\ldplayer9box\Ld9BoxSup.sys" type= kernel start= auto
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:4100
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\system32\sc" start Ld9BoxSup
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:2124
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" New-NetFirewallRule -DisplayName "Ld9BoxSup" -Direction Inbound -Program 'C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe' -RemoteAddress LocalSubnet -Action Allow
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1832
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" New-NetFirewallRule -DisplayName "Ld9BoxNat" -Direction Inbound -Program 'C:\Program Files\ldplayer9box\VBoxNetNAT.exe' -RemoteAddress LocalSubnet -Action Allow
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1616
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" New-NetFirewallRule -DisplayName "dnplayer" -Direction Inbound -Program 'C:\LDPlayer\LDPlayer9\dnplayer.exe' -RemoteAddress LocalSubnet -Action Allow
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3220
      • C:\LDPlayer\LDPlayer9\driverconfig.exe
        "C:\LDPlayer\LDPlayer9\driverconfig.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3712
      • C:\Windows\SysWOW64\takeown.exe
        "takeown" /f C:\LDPlayer\ldmutiplayer\ /r /d y
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:2072
      • C:\Windows\SysWOW64\icacls.exe
        "icacls" C:\LDPlayer\ldmutiplayer\ /grant everyone:F /t
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:4076
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/4bUcwDd53d
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1628
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff95b33cb8,0x7fff95b33cc8,0x7fff95b33cd8
        3⤵
          PID:3524
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1752,17123012245102741183,14945963671936256253,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2000 /prefetch:2
          3⤵
            PID:3588
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1752,17123012245102741183,14945963671936256253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3076
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1752,17123012245102741183,14945963671936256253,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2504 /prefetch:8
            3⤵
              PID:3220
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1752,17123012245102741183,14945963671936256253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
              3⤵
                PID:3172
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1752,17123012245102741183,14945963671936256253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:1
                3⤵
                  PID:2680
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1752,17123012245102741183,14945963671936256253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:1
                  3⤵
                    PID:4272
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1752,17123012245102741183,14945963671936256253,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3568 /prefetch:8
                    3⤵
                      PID:2368
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1752,17123012245102741183,14945963671936256253,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3532 /prefetch:8
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1320
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1752,17123012245102741183,14945963671936256253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:1
                      3⤵
                        PID:1668
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1752,17123012245102741183,14945963671936256253,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:1
                        3⤵
                          PID:4516
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1752,17123012245102741183,14945963671936256253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:1
                          3⤵
                            PID:2828
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1752,17123012245102741183,14945963671936256253,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:1
                            3⤵
                              PID:1224
                            • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1752,17123012245102741183,14945963671936256253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:8
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4604
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1752,17123012245102741183,14945963671936256253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:8
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4076
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1752,17123012245102741183,14945963671936256253,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4532 /prefetch:2
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4512
                          • C:\LDPlayer\LDPlayer9\dnplayer.exe
                            "C:\LDPlayer\LDPlayer9\dnplayer.exe" downloadpackage=com.ewt.purble|package=com.ewt.purble
                            2⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Checks processor information in registry
                            • Modifies Internet Explorer settings
                            • Suspicious behavior: GetForegroundWindowSpam
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:920
                            • C:\Windows\SysWOW64\sc.exe
                              sc query HvHost
                              3⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:72
                            • C:\Windows\SysWOW64\sc.exe
                              sc query vmms
                              3⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:2120
                            • C:\Windows\SysWOW64\sc.exe
                              sc query vmcompute
                              3⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:2212
                            • C:\Program Files\ldplayer9box\vbox-img.exe
                              "C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\..\system.vmdk" --uuid 20160302-bbbb-bbbb-0eee-bbbb00000000
                              3⤵
                              • Executes dropped EXE
                              PID:932
                            • C:\Program Files\ldplayer9box\vbox-img.exe
                              "C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\leidian0\data.vmdk" --uuid 20160302-cccc-cccc-0eee-000000000000
                              3⤵
                              • Executes dropped EXE
                              PID:1524
                            • C:\Program Files\ldplayer9box\vbox-img.exe
                              "C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\leidian0\sdcard.vmdk" --uuid 20160302-dddd-dddd-0eee-000000000000
                              3⤵
                              • Executes dropped EXE
                              PID:2824
                        • C:\Windows\system32\AUDIODG.EXE
                          C:\Windows\system32\AUDIODG.EXE 0x0000000000000470 0x00000000000004C8
                          1⤵
                            PID:3180
                          • C:\Program Files\ldplayer9box\Ld9BoxSVC.exe
                            "C:\Program Files\ldplayer9box\Ld9BoxSVC.exe" -Embedding
                            1⤵
                            • Executes dropped EXE
                            • Modifies registry class
                            PID:3600
                            • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                              "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                              2⤵
                              • Executes dropped EXE
                              PID:3168
                            • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                              "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                              2⤵
                              • Executes dropped EXE
                              PID:4252
                            • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                              "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                              2⤵
                              • Executes dropped EXE
                              PID:1764
                            • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                              "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                              2⤵
                              • Executes dropped EXE
                              PID:3004
                            • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                              "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                              2⤵
                              • Executes dropped EXE
                              PID:4728
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4080
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3540

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\LDPlayer\LDPlayer9\MSVCR120.dll

                                Filesize

                                947KB

                                MD5

                                50097ec217ce0ebb9b4caa09cd2cd73a

                                SHA1

                                8cd3018c4170072464fbcd7cba563df1fc2b884c

                                SHA256

                                2a2ff2c61977079205c503e0bcfb96bf7aa4d5c9a0d1b1b62d3a49a9aa988112

                                SHA512

                                ac2d02e9bfc2be4c3cb1c2fff41a2dafcb7ce1123998bbf3eb5b4dc6410c308f506451de9564f7f28eb684d8119fb6afe459ab87237df7956f4256892bbab058

                              • C:\LDPlayer\LDPlayer9\crashreport.dll

                                Filesize

                                51KB

                                MD5

                                41ea74c355a2692893c408af9ec5719a

                                SHA1

                                aa7a5306ebca91782e8e2099512161964c2a3e37

                                SHA256

                                d8a1501e6b1e3de316f631d7c69540548c9e3b29559331b288fcb131c12612f8

                                SHA512

                                5b850acbcf6c174fcd0cf110af2cc7ff5351426902c49086da090e99f38ceaeeee11c163497a6e2d7b0ab4ef985e951caf0d947bd9100fd62fe5e2a12dbd6734

                              • C:\LDPlayer\LDPlayer9\dnmultiplayer.exe

                                Filesize

                                1.3MB

                                MD5

                                6b9a90218a9dfbd5d57e5df0cac7ac5b

                                SHA1

                                3d94fbfb04679cceac92f16433ab2d891d18e415

                                SHA256

                                bf3ce593afd4e83c319b3d2ec3a41561c0c58d7ffbaf8014c214c66029722efc

                                SHA512

                                152174e688527bf58215971831640b2abcbfb7a978967b60bf1eb959333a09f2038698463e16feca26f27e7ca59247747dbb9726fc42b4b795e6a2fcc3c4c1b3

                              • C:\LDPlayer\LDPlayer9\dnplayer.exe

                                Filesize

                                3.7MB

                                MD5

                                c1455dc2a6b37767c094fc38d78ea99d

                                SHA1

                                786f9f5cffdca865f70d60f8bd16f8043637a7bd

                                SHA256

                                6b09c7ff6a6880f78be3eeb99ad0bfd08a174a3cea2a73807dae73ce76c3dd4d

                                SHA512

                                b62447009c3fae0881d8cd3d0aee6bea2facee8d691b127fa7a49c36764554af1cdc49486ecb8da36ce88d8027efff054483b8bee907952cf02c94ed796dd412

                              • C:\LDPlayer\LDPlayer9\dnrepairer.exe

                                Filesize

                                41.9MB

                                MD5

                                4429724df73e9a4e5634635797d16c64

                                SHA1

                                2ff75d075962de7a3ee0be4ebe1da19eecea255e

                                SHA256

                                0b2f863d93549629cc5e1954e358ad14a007a2cfd82a7b4bce9e820ee3f9ca6d

                                SHA512

                                0bd508c89b60538aac2e5b038fa128ae7b88a44bdbfa39fb5351ad486707163983a30402fcc3c951920ec133462a733e8faed3b12da5fc82f391810b7a0c87cf

                              • C:\LDPlayer\LDPlayer9\dnresource.rcc

                                Filesize

                                5.6MB

                                MD5

                                49da1d5a1a21329e701481307cb088e5

                                SHA1

                                d00e04a18ebb5a926105a2cae87413cfc2216dcc

                                SHA256

                                e5811b8eecb6ac812b609c031db6f920654a07aae766ee329a343d39cd6eeedd

                                SHA512

                                4960b5d5ccd802d97daea872409865cfff0f2a5f7ef60b8f24b48b67a686c8f633df401c7724dd7146b9d3ec077ec7122994627b7312a2e7f16fe84679b4559c

                              • C:\LDPlayer\LDPlayer9\fonts\NanumGothicLight.otf

                                Filesize

                                314KB

                                MD5

                                e2e37d20b47d7ee294b91572f69e323a

                                SHA1

                                afb760386f293285f679f9f93086037fc5e09dcc

                                SHA256

                                153161ab882db768c70a753af5e8129852b9c9cae5511a23653beb6414d834a2

                                SHA512

                                001500f527e2d3c3b404cd66188149c620d45ee6510a1f9902aacc25b51f8213e6654f0c1ecc927d6ff672ffbe7dc044a84ec470a9eb86d2cba2840df7390901

                              • C:\LDPlayer\LDPlayer9\ldmutiplayer\7za.exe

                                Filesize

                                652KB

                                MD5

                                ad9d7cbdb4b19fb65960d69126e3ff68

                                SHA1

                                dcdc0e609a4e9d5ff9d96918c30cb79c6602cb3d

                                SHA256

                                a6c324f2925b3b3dbd2ad989e8d09c33ecc150496321ae5a1722ab097708f326

                                SHA512

                                f0196bee7ad8005a36eea86e31429d2c78e96d57b53ff4a64b3e529a54670fa042322a3c3a21557c96b0b3134bf81f238a9e35124b2d0ce80c61ed548a9791e7

                              • C:\LDPlayer\LDPlayer9\ldmutiplayer\cximagecrt.dll

                                Filesize

                                1.5MB

                                MD5

                                66df6f7b7a98ff750aade522c22d239a

                                SHA1

                                f69464fe18ed03de597bb46482ae899f43c94617

                                SHA256

                                91e3035a01437b54adda33d424060c57320504e7e6a0c85db2654815ba29c71f

                                SHA512

                                48d4513e09edd7f270614258b2750d5e98f0dbce671ba41a524994e96ed3df657fce67545153ca32d2bf7efcb35371cae12c4264df9053e4eb5e6b28014ed20e

                              • C:\LDPlayer\LDPlayer9\ldmutiplayer\libcrypto-1_1.dll

                                Filesize

                                2.0MB

                                MD5

                                01c4246df55a5fff93d086bb56110d2b

                                SHA1

                                e2939375c4dd7b478913328b88eaa3c91913cfdc

                                SHA256

                                c9501469ad2a2745509ab2d0db8b846f2bfb4ec019b98589d311a4bd7ac89889

                                SHA512

                                39524d5b8fc7c9d0602bc6733776237522dcca5f51cc6ceebd5a5d2c4cbda904042cee2f611a9c9477cc7e08e8eadd8915bf41c7c78e097b5e50786143e98196

                              • C:\LDPlayer\LDPlayer9\ldmutiplayer\libcurl.dll

                                Filesize

                                442KB

                                MD5

                                2d40f6c6a4f88c8c2685ee25b53ec00d

                                SHA1

                                faf96bac1e7665aa07029d8f94e1ac84014a863b

                                SHA256

                                1d7037da4222de3d7ca0af6a54b2942d58589c264333ef814cb131d703b5c334

                                SHA512

                                4e6d0dc0dc3fb7e57c6d7843074ee7c89c777e9005893e089939eb765d9b6fb12f0e774dc1814f6a34e75d1775e19e62782465731fd5605182e7984d798ba779

                              • C:\LDPlayer\LDPlayer9\ldmutiplayer\libeay32.dll

                                Filesize

                                1.2MB

                                MD5

                                ba46e6e1c5861617b4d97de00149b905

                                SHA1

                                4affc8aab49c7dc3ceeca81391c4f737d7672b32

                                SHA256

                                2eac0a690be435dd72b7a269ee761340099bf444edb4f447fa0030023cbf8e1e

                                SHA512

                                bf892b86477d63287f42385c0a944eee6354c7ae557b039516bf8932c7140ca8811b7ae7ac111805773495cf6854586e8a0e75e14dbb24eba56e4683029767b6

                              • C:\LDPlayer\LDPlayer9\ldmutiplayer\libssh2.dll

                                Filesize

                                192KB

                                MD5

                                52c43baddd43be63fbfb398722f3b01d

                                SHA1

                                be1b1064fdda4dde4b72ef523b8e02c050ccd820

                                SHA256

                                8c91023203f3d360c0629ffd20c950061566fb6c780c83eaa52fb26abb6be86f

                                SHA512

                                04cc3d8e31bd7444068468dd32ffcc9092881ca4aaea7c92292e5f1b541f877bdec964774562cb7a531c3386220d88b005660a2b5a82957e28350a381bea1b28

                              • C:\LDPlayer\LDPlayer9\ldmutiplayer\libssl-1_1.dll

                                Filesize

                                511KB

                                MD5

                                e8fd6da54f056363b284608c3f6a832e

                                SHA1

                                32e88b82fd398568517ab03b33e9765b59c4946d

                                SHA256

                                b681fd3c3b3f2d59f6a14be31e761d5929e104be06aa77c883ada9675ca6e9fd

                                SHA512

                                4f997deebf308de29a044e4ff2e8540235a41ea319268aa202e41a2be738b8d50f990ecc68f4a737a374f6d5f39ce8855edf0e2bb30ce274f75388e3ddd8c10b

                              • C:\LDPlayer\LDPlayer9\ldmutiplayer\msvcp110.dll

                                Filesize

                                522KB

                                MD5

                                3e29914113ec4b968ba5eb1f6d194a0a

                                SHA1

                                557b67e372e85eb39989cb53cffd3ef1adabb9fe

                                SHA256

                                c8d5572ca8d7624871188f0acabc3ae60d4c5a4f6782d952b9038de3bc28b39a

                                SHA512

                                75078c9eaa5a7ae39408e5db1ce7dbce5a3180d1c644bcb5e481b0810b07cb7d001d68d1b4f462cd5355e98951716f041ef570fcc866d289a68ea19b3f500c43

                              • C:\LDPlayer\LDPlayer9\ldmutiplayer\msvcr110.dll

                                Filesize

                                854KB

                                MD5

                                4ba25d2cbe1587a841dcfb8c8c4a6ea6

                                SHA1

                                52693d4b5e0b55a929099b680348c3932f2c3c62

                                SHA256

                                b30160e759115e24425b9bcdf606ef6ebce4657487525ede7f1ac40b90ff7e49

                                SHA512

                                82e86ec67a5c6cddf2230872f66560f4b0c3e4c1bb672507bbb8446a8d6f62512cbd0475fe23b619db3a67bb870f4f742761cf1f87d50db7f14076f54006f6c6

                              • C:\LDPlayer\LDPlayer9\ldmutiplayer\ssleay32.dll

                                Filesize

                                283KB

                                MD5

                                0054560df6c69d2067689433172088ef

                                SHA1

                                a30042b77ebd7c704be0e986349030bcdb82857d

                                SHA256

                                72553b45a5a7d2b4be026d59ceb3efb389c686636c6da926ffb0ca653494e750

                                SHA512

                                418190401b83de32a8ce752f399b00c091afad5e3b21357a53c134cce3b4199e660572ee71e18b5c2f364d3b2509b5365d7b569d6d9da5c79ae78c572c1d0ba0

                              • C:\LDPlayer\LDPlayer9\msvcp120.dll

                                Filesize

                                444KB

                                MD5

                                50260b0f19aaa7e37c4082fecef8ff41

                                SHA1

                                ce672489b29baa7119881497ed5044b21ad8fe30

                                SHA256

                                891603d569fc6f1afed7c7d935b0a3c7363c35a0eb4a76c9e57ef083955bc2c9

                                SHA512

                                6f99d39bfe9d4126417ff65571c78c279d75fc9547ee767a594620c0c6f45f4bb42fd0c5173d9bc91a68a0636205a637d5d1c7847bd5f8ce57e120d210b0c57d

                              • C:\LDPlayer\LDPlayer9\phones.data

                                Filesize

                                5KB

                                MD5

                                fdee6e3ccf8b61db774884ccb810c66f

                                SHA1

                                7a6b13a61cd3ad252387d110d9c25ced9897994d

                                SHA256

                                657fec32d9ce7b96986513645a48ddd047a5968d897c589fbc0fc9adb8c670f4

                                SHA512

                                f773f6fc22adadf048b9bfb03e4d6e119e8876412beb8517d999f4ed6a219e2ba50eded5308d361b6780792af9f699644e3a8b581a17d5a312f759d981f64512

                              • C:\LDPlayer\LDPlayer9\system.vmdk

                                Filesize

                                1808.1MB

                                MD5

                                1440f444ab1b89dba193f7c229345afd

                                SHA1

                                f7748717ccda941c5697f12586fa7fd1d16669ab

                                SHA256

                                a4bba1a678a3c162908e35716bb8249ac0ea42bfc651c77c3a21a021dff222e1

                                SHA512

                                83e73647d7e69641a5ade28ea73df1af48c64252f371a4eb1e5527939c16b3684a8e22c18ea6f5395f1ba57e4fdc587538c425fd9c073ff7203046179c0f9303

                              • C:\LDPlayer\LDPlayer9\vms\config\leidian0.config

                                Filesize

                                641B

                                MD5

                                9756782019832fdf28ad6981a9a62b53

                                SHA1

                                10cf1ea269bf6159aefdca2eab794c6255f3cb91

                                SHA256

                                d491b3ba10aa07111d895da626c75156848d4f091c80e12878106f016ef3bfd8

                                SHA512

                                92ea9d33a822370d0d31fefe8c9f9f8f969ee3fbbf0eb72d63bd733dcab2cb23f2fedeb8a2711907ce0f3ee8be92f3617ea073aa4a37e9bf1b7da93ce48d7f79

                              • C:\LDPlayer\LDPlayer9\vms\leidian0\sdcard.vmdk

                                Filesize

                                35.1MB

                                MD5

                                4d592fd525e977bf3d832cdb1482faa0

                                SHA1

                                131c31bcff32d11b6eda41c9f1e2e26cc5fbc0ef

                                SHA256

                                f90ace0994c8cae3a6a95e8c68ca460e68f1662a78a77a2b38eba13cc8e487b6

                                SHA512

                                afa31b31e1d137a559190528998085c52602d79a618d930e8c425001fdfbd2437f732beda3d53f2d0e1fc770187184c3fb407828ac39f00967bf4ae015c6ba77

                              • C:\LDPlayer\ldmutiplayer\fonts\Roboto-Regular.otf

                                Filesize

                                103KB

                                MD5

                                4acd5f0e312730f1d8b8805f3699c184

                                SHA1

                                67c957e102bf2b2a86c5708257bc32f91c006739

                                SHA256

                                72336333d602f1c3506e642e0d0393926c0ec91225bf2e4d216fcebd82bb6cb5

                                SHA512

                                9982c1c53cee1b44fd0c3df6806b8cbf6b441d3ed97aeb466dba568adce1144373ce7833d8f44ac3fa58d01d8cdb7e8621b4bb125c4d02092c355444651a4837

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\772D055D5E4421B179898A4E6FBD9ACC

                                Filesize

                                471B

                                MD5

                                14f9e3a303579ed9e2815fad5092f643

                                SHA1

                                43b492f0599a3bb48c85c9497152fc587240af16

                                SHA256

                                aed2efd5b8b126edab9a659929e607b06fde8f9c3078266b780c32f37e7e95a7

                                SHA512

                                fcd57499407ec0fcb933663a17c8c28458db25c6a6de35b650072bf1e366a78c2a30b0f857db188671f69165c594b46265511aa1465035496aaf78f0061e5cc8

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_D14B79B440CDC26D7D21C81855E2C04D

                                Filesize

                                471B

                                MD5

                                3bde5158b78df09417a7212e947cf6a8

                                SHA1

                                37c36c5f0d2d27439ab2c71e59c62a3314d729cf

                                SHA256

                                ad5a9804e1225ca86b55eaff9e0a9211ed40cb7b3144745cac8613173501cf84

                                SHA512

                                4fc81babbc627bb51220c231456ee042d588856914920359d17e6d5d181d0c167b846d100535b7ea94d229f7c91adc052f4c035587b3b4d2c1af3719dc28687a

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\772D055D5E4421B179898A4E6FBD9ACC

                                Filesize

                                400B

                                MD5

                                cbf6b95229115582a97f00433ba1f3b5

                                SHA1

                                8bbca58b349490efeffa502f9687b3812a963e9e

                                SHA256

                                2b5aae8efc90f7f82a9cf56e765f52794618582e517f4aa1837a4bc5952c1d51

                                SHA512

                                c8076d3801dd9857505dded4a7e49c32bcebafe305488c1e80178ecff388404c083044ed4c0a157f269763d86404978f3161ad9c38b4e18c93c2c70afe7063b4

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_D14B79B440CDC26D7D21C81855E2C04D

                                Filesize

                                404B

                                MD5

                                3f1f9af11002dd6d59d2480e87aaafdb

                                SHA1

                                190cede344f7f109c72d9a27e84e5a76e3cc2475

                                SHA256

                                a5d0f0b62e48072a9f92fc451d26090fab55e9f539c311a238d49e35ca803aba

                                SHA512

                                776284c5acd35ddc8932468976f60ac36dbfa931b8c9df61ac59675862e679c6c13e5b3d94d9c0741ae8c7b922996c02aa6f6ebf16c781713a0dc93aa29bf8b7

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                c03d23a8155753f5a936bd7195e475bc

                                SHA1

                                cdf47f410a3ec000e84be83a3216b54331679d63

                                SHA256

                                6f5f7996d9b0e131dc2fec84859b7a8597c11a67dd41bdb5a5ef21a46e1ae0ca

                                SHA512

                                6ea9a631b454d7e795ec6161e08dbe388699012dbbc9c8cfdf73175a0ecd51204d45cf28a6f1706c8d5f1780666d95e46e4bc27752da9a9d289304f1d97c2f41

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                3d68c7edc2a288ee58e6629398bb9f7c

                                SHA1

                                6c1909dea9321c55cae38b8f16bd9d67822e2e51

                                SHA256

                                dfd733ed3cf4fb59f2041f82fdf676973783ffa75b9acca095609c7d4f73587b

                                SHA512

                                0eda66a07ec4cdb46b0f27d6c8cc157415d803af610b7430adac19547e121f380b9c6a2840f90fe49eaea9b48fa16079d93833c2bcf4b85e3c401d90d464ad2f

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                1KB

                                MD5

                                485ab63b2b83b50ec07438a7fa0951b2

                                SHA1

                                c860041ce6377d95ca66a0edc3eea22455b8f14d

                                SHA256

                                3ebd7fa7a89f6f97719f47d3ec4ece146b0e0a50d11306d3d319aa82ec32dd22

                                SHA512

                                7a2f30649c645373bee8beac527ea3c491b46d9eb77763dc6c03854e587253652eb91c69c4098b960503c14d24bb2e15c674274a59519885d9d1ddb652c809b3

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                323B

                                MD5

                                a5a1149047729a493b1a2a65063c39ba

                                SHA1

                                8f1f45cb0c0772dcd05795734cbf408636fb9fb9

                                SHA256

                                e0ef1f906ea2606c802310437fe799d93e073770ab6549060ee4b9c9c49f2006

                                SHA512

                                8ce257a087115e2d542657a2b4679d0c100ebdec76e3392cff1bbba133e129f2fcdbd73f9baab92e762bef47a2572d3dc8553fa3858d787d2a0b2bf8f05dc54e

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                e27583360233502e8956f4857caf9bfb

                                SHA1

                                6f7c89d9b0d55b7faf1a4e7aecb9bc5f68f74062

                                SHA256

                                a382a41f646cb4cc1288fa5fc43c9608ce94b89d1008d8718407764ff222007a

                                SHA512

                                93578eca11c932ca14b149a7794895350edc99d328a74edf108f45d3cd06da2d0fe7c4e36c99572b9a619cb1abb261ff302db2c76904954f8dd02273362f639e

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                247f1c27a2d9aacb2bf3c67eaa2cc517

                                SHA1

                                6449aee511f1231409349f965d57b213b14f2c37

                                SHA256

                                92f50936511a95c60bde5601866a17bd8bf001426e479a673b7225dc88cb0438

                                SHA512

                                d7a9ee74003064c3a4898a76a46899640a0a3c9892feb0d962de88c9d76729027495ebeae9cdab9c04e7ba44a447fa1cfaf7c6acfc1b7bf685bec99712a25430

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                46295cac801e5d4857d09837238a6394

                                SHA1

                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                SHA256

                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                SHA512

                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                206702161f94c5cd39fadd03f4014d98

                                SHA1

                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                SHA256

                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                SHA512

                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                9de2d9c2e4335e63ffabab4d26b79b55

                                SHA1

                                709ea6100be63c533d1c74d726cb0dedaeab8317

                                SHA256

                                42fe09438957bac743ce1f6375ac993c21d6a4e3ea8f5ecd714a6dfe2bffc35e

                                SHA512

                                7784aa95112e163c11d9f522ae8e5aabb6edc3f229192ecabbc78af8b8584f85f72912ec987e10a1b3df6c4a9d14741e3b7d188d3efd9986e3b5635c6c7b343d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                fd97257396cfcaf79a659851534f11f6

                                SHA1

                                44770c5766a0015fe6808431558517c942550d07

                                SHA256

                                637b11d72538b12d49087d31c4fb8bf208d54aa17d9add09702eaf306d999a06

                                SHA512

                                6a1bc0502790b4f67b98c035bba091eea85f5a2e829b1b71e0f6fd4f2b91f4f8feb998b5a925a964e1560527fbcc313147134b6b0d43e8a97ef691863fbb3927

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\AssocProvider.dll

                                Filesize

                                136KB

                                MD5

                                702f9c8fb68fd19514c106e749ec357d

                                SHA1

                                7c141106e4ae8f3a0e5f75d8277ec830fc79eccc

                                SHA256

                                21ad24a767aeb22d27d356bc8381f103ab620de1a47e374b9f961e44b543a358

                                SHA512

                                2e7d403c89dacdda623ed1a107bac53aafde089fdd66088d578d6b55bcfe0a4fc7b54733642162bd62d0ca3f1696667a6f0cb4b572d81a6eefd6792d6003c0d9

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\DismCorePS.dll

                                Filesize

                                200KB

                                MD5

                                7f751738de9ac0f2544b2722f3a19eb0

                                SHA1

                                7187c57cd1bd378ef73ba9ad686a758b892c89dc

                                SHA256

                                db995f4f55d8654fc1245da0df9d1d9d52b02d75131bc3bce501b141888232fc

                                SHA512

                                0891c2dedb420e10d8528996bc9202c9f5f96a855997f71b73023448867d7d03abee4a9a7e2e19ebe2811e7d09497bce1ea4e9097fcb810481af10860ff43dfb

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\DismHost.exe

                                Filesize

                                168KB

                                MD5

                                17275206102d1cf6f17346fd73300030

                                SHA1

                                bbec93f6fb2ae56c705efd6e58d6b3cc68bf1166

                                SHA256

                                dead0ebd5b5bf5d4b0e68ba975e9a70f98820e85d056b0a6b3775fc4df4da0f6

                                SHA512

                                ce14a4f95328bb9ce437c5d79084e9d647cb89b66cde86a540b200b1667edc76aa27a36061b6e2ceccecb70b9a011b4bd54040e2a480b8546888ba5cc84a01b3

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\DmiProvider.dll

                                Filesize

                                436KB

                                MD5

                                e54120aa50f14e0d3d257e77db46ece5

                                SHA1

                                922203542962ec5f938dcb3c876f060ecf17f9dc

                                SHA256

                                b5fb1a5eb4090598d5f878cdd37ed8eca82962d85995dd2280b8849fba816b54

                                SHA512

                                fbce5d707f6a66d451165608520be9d7174a8c22eb9827dfe94d98718e2c961f15ac45583b1743f3b8078b3fe675992d4b97bfc5e4b893b60328d94665f71dc9

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\EdgeProvider.dll

                                Filesize

                                200KB

                                MD5

                                c22cc16103ee51ba59b765c6b449bddb

                                SHA1

                                b0683f837e1e44c46c9a050e0a3753893ece24ad

                                SHA256

                                eb68c7d48f78b46933acba617cf3b5fcb5b8695c8a29295a9fa075f36910825b

                                SHA512

                                2c382aaddeca4efda63162584c4a2338ffcc1f4828362ce7e927e0b39c470f1f66a7933ae2210d63afb5a2ae25412266fde2ee6bdb896c3c030bdc08b67ec54e

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\Ffuprovider.dll

                                Filesize

                                680KB

                                MD5

                                a41b0e08419de4d9874893b813dccb5c

                                SHA1

                                2390e00f2c2bc9779e99a669193666688064ea77

                                SHA256

                                57ce7761531058f3c4289b1240bea6dc06355c9c4b4e88b9c9c0df8012edc5b3

                                SHA512

                                bd370e49da266148d50144c621f6415bdd5358e6274b1d471b8d4ee1888d93774331c3f75e6cb99782f1c8e772981cbc5a4baf5592c6400f340407dc670e547a

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\GenericProvider.dll

                                Filesize

                                172KB

                                MD5

                                20fb116831396d9477e352d42097741c

                                SHA1

                                7e063ac9bc173a81dc56dc5864f912041e2c725a

                                SHA256

                                6a940ba16154c4a1729b8560b03efb5f2558d66b10da4a5ec26c1299ea713bc4

                                SHA512

                                851843da748555eba735e1f5457044f24f225bd029534019814a6d1baf2e0bd1f171d297c362cfed5977274b266e823b7ad131ae2512568f7a5f2e3ea498b69a

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\IBSProvider.dll

                                Filesize

                                84KB

                                MD5

                                f6b7301c18f651567a5f816c2eb7384d

                                SHA1

                                40cd6efc28aa7efe86b265af208b0e49bec09ae4

                                SHA256

                                8f4e3f600917d49ada481ff0ed125fef4a316b659bb1197dc3036fc8c21a5a61

                                SHA512

                                4087d819706c64a5d2eed546163c55caacc553b02dc4db0d067b8815d3a24fb06ea08de3de86aac058ff2907f200e4e89eef2357ca23328aaacbe29501ea3286

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\ImagingProvider.dll

                                Filesize

                                248KB

                                MD5

                                4c6d681704e3070df2a9d3f42d3a58a2

                                SHA1

                                a9f6286ac25f17b6b2acd1fce6459b0bc94c6c81

                                SHA256

                                f1bbab35b2602d04d096c8de060b2a5cf802499a937fd1ffe749ff7f54852137

                                SHA512

                                daa0c723312680256c24457162e0ef026b753ba267f3e2755f838e2864a163802c078d8668dd2c2064cb8887f4e382a73d6402a5533b6ac5c3cbf662ad83db86

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\IntlProvider.dll

                                Filesize

                                312KB

                                MD5

                                34035aed2021763bec1a7112d53732f1

                                SHA1

                                7132595f73755c3ae20a01b6863ac9518f7b75a4

                                SHA256

                                aac13ddb9ab5a165a38611f1b61229268a40d416f07740d4eefba1a8fcf7c731

                                SHA512

                                ea045aa46713133a5d0ad20514cc2a8c8fffb99b4e19c4d5262f86167cfce08a31d336222fd3c91e6efbfd90312bb2325337aa02a8489e047b616085fdf46c1d

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\LogProvider.dll

                                Filesize

                                108KB

                                MD5

                                c63f6b6d4498f2ec95de15645c48e086

                                SHA1

                                29f71180feed44f023da9b119ba112f2e23e6a10

                                SHA256

                                56aca41c62c8d0d1b26db3a01ef6c2da4a6a51fc963eb28411f8f7f029f1bfde

                                SHA512

                                3a634340d8c66cbc1bef19f701d8bdb034449c28afecce4e8744d18181a20f85a17af3b66c8853cecb8be53f69ae73f85b70e45deac29debab084a25eb3c69dc

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\MsiProvider.dll

                                Filesize

                                208KB

                                MD5

                                eb171b7a41a7dd48940f7521da61feb0

                                SHA1

                                9f2a5ddac7b78615f5a7af753d835aaa41e788fc

                                SHA256

                                56a8527d267116af39864feca528be5b7a88c3b5df94750154b2efcf2fda5d55

                                SHA512

                                5917266aed1a79ee4cb16bb532ccae99782d0ee8af27cb42a6b39496c3de61c12a30ce524a1a66cc063101ebcfac957d1b129aae0b491c0587f40171ba6bae12

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\OSProvider.dll

                                Filesize

                                180KB

                                MD5

                                e9833a54c1a1bfdab3e5189f3f740ff9

                                SHA1

                                ffb999c781161d9a694a841728995fda5b6da6d3

                                SHA256

                                ec137f9caebcea735a9386112cf68f78b92b6a5a38008ce6415485f565e5cf85

                                SHA512

                                0b18932b24c0257c80225c99be70c5125d2207f9b92681fd623870e7a62599a18fa46bcb5f2b4b01889be73aeb084e1b7e00a4968c699c7fdb3c083ef17a49f9

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\OfflineSetupProvider.dll

                                Filesize

                                213KB

                                MD5

                                3437087e6819614a8d54c9bc59a23139

                                SHA1

                                ae84efe44b02bacdb9da876e18715100a18362be

                                SHA256

                                8b247665218f5151f0d19f59ea902a7c28f745d67a5d51b63b77242ffb4bdd74

                                SHA512

                                018e88f6c121dd4ecaceb44794e2fa7a44b52ddb22e7a5a30a332905e02065cbc1d1dcddc197676277b22f741195c1b7c4c185d328b096b6560b84e9749d6dde

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\ProvProvider.dll

                                Filesize

                                800KB

                                MD5

                                2ef388f7769205ca319630dd328dcef1

                                SHA1

                                6dc9ed84e72af4d3e7793c07cfb244626470f3b6

                                SHA256

                                4915b0c9cd8dc8a29dd649739974d244f9105dc58725f1da0d592af3b546e2bf

                                SHA512

                                b465917424dd98125d080c135c7e222a9485ed7ec89004f9a70e335b800e5b9419fbc932c8069bae9ff126494174cf48e2790030dd22aa2d75b7b9d8ccff752b

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\ServicingCommon.dll

                                Filesize

                                944KB

                                MD5

                                07231bdae9d15bfca7d97f571de3a521

                                SHA1

                                04aec0f1afcf7732bc4cd1f7aab36e460c325ba6

                                SHA256

                                be75afbbc30cad7235adf03dcc07fcee3c0c330c89b00e326ebbef2e57df5935

                                SHA512

                                2a46e0657e84481faf5c9d3de410884cb5c6e7b35039f5be04183cdac6c088cc42b12d0097e27836af14699e7815d794ca1cec80960833ab093b8dc6d44e2129

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\SmiProvider.dll

                                Filesize

                                272KB

                                MD5

                                46e3e59dbf300ae56292dea398197837

                                SHA1

                                78636b25fdb32c8fcdf5fe73cac611213f13a8be

                                SHA256

                                5a0f1279013d1d379cb3a3e30f1d5be22549728cd9dc92ed5643eacf46199339

                                SHA512

                                e0584da3c302ea6ffa85932fa185500543f15237d029fdc4b084aee971ec13967f9e83cad250bea36b31f1a3efb1cc556da7dd231e5b06884809d0af51ebdf8c

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\SysprepProvider.dll

                                Filesize

                                820KB

                                MD5

                                4dfa1eeec0822bfcfb95e4fa8ec6c143

                                SHA1

                                54251e697e289020a72e1fd412e34713f2e292cf

                                SHA256

                                901cea68c7a158a1d9c030d3939f8f72057d1cf2f902aec1bc1b22a0000c0494

                                SHA512

                                5f3f710bef75da8cddb6e40686d6a19f59fbc7d8a6842eaceb9a002ab284a91ecf48c352171e13f6a75366610988e67710439f1dde579311ebbb3cd9e4751aa4

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\TransmogProvider.dll

                                Filesize

                                1.3MB

                                MD5

                                c1c56a9c6ea636dbca49cfcc45a188c3

                                SHA1

                                d852e49978a08e662804bf3d7ec93d8f6401a174

                                SHA256

                                b20b3eb2df22998fd7f9ff6898ba707d6b8833a8274719a5e09d5148d868faaf

                                SHA512

                                f6db05e4644d734f81c2461e4ad49c4e81880c9e4beee13dbbda923360ef6cf4821fccd9040671b86ab2cd8c85fc313c951c1a69e4df14d94268753ce7ae5b2e

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\UnattendProvider.dll

                                Filesize

                                256KB

                                MD5

                                7c61284580a6bc4a4c9c92a39bd9ea08

                                SHA1

                                4579294e3f3b6c03b03b15c249b9cac66e730d2a

                                SHA256

                                3665872e68264bbf3827c2bf0cfa60124ea1d87912728f2fc3685dce32855cb8

                                SHA512

                                b30b89d0d5e065042811d6ff397d226877ff698aeb1153681692aedabe3730e2f3746ad9d70e3120e336552bab880644f9ead0c91a451197a8f0977a2126a0fe

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\Vhdprovider.dll

                                Filesize

                                596KB

                                MD5

                                8a655555544b2915b5d8676cbf3d77ab

                                SHA1

                                5a7529f8a6d50d3f4e13b2e3a0585f08eb0511a2

                                SHA256

                                d3a2dd7d47bfbb3897b927d1b7230b5b12e5fd7315d687458de15fbb08fb7e27

                                SHA512

                                c6da649ae3c3688065b37bccfb5525ade25ba7bc3b163ad7d61f3b3d1c4957c8fd6c9f2bf23b0dbc4fffe32e980acb5a5d3895b8a012c5ed086e3e38caee2e93

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\WimProvider.dll

                                Filesize

                                672KB

                                MD5

                                bcf8735528bb89555fc687b1ed358844

                                SHA1

                                5ef5b24631d2f447c58b0973f61cb02118ae4adc

                                SHA256

                                78b742deddee8305ea06d77f296ad9fe0f4b4a27d71b34dcdff8ae199364790c

                                SHA512

                                8b2be4e9a4334a5fc7f7c58579c20974c9194b771f7a872fd8e411d79f45fc5b7657df4c57ad11acb915d5ea5d1f0583c8a981b2c05104e3303b3ee1469b93f5

                              • C:\Users\Admin\AppData\Local\Temp\BC37B1FF-8CC9-440B-AF0D-BB44A5CD6B89\dismprov.dll

                                Filesize

                                292KB

                                MD5

                                2ac64cc617d144ae4f37677b5cdbb9b6

                                SHA1

                                13fe83d7489d302de9ccefbf02c7737e7f9442f9

                                SHA256

                                006464f42a487ab765e1e97cf2d15bfa7db76752946de52ff7e518bc5bbb9a44

                                SHA512

                                acdb2c9727f53889aa4f1ca519e1991a5d9f08ef161fb6680265804c99487386ca6207d0a22f6c3e02f34eaeb5ded076655ee3f6b4b4e1f5fab5555d73addfd7

                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4vtiwwfc.gty.ps1

                                Filesize

                                60B

                                MD5

                                d17fe0a3f47be24a6453e9ef58c94641

                                SHA1

                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                SHA256

                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                SHA512

                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                              • C:\Users\Admin\AppData\Roaming\XuanZhi9\ldopengl32x.dll

                                Filesize

                                130KB

                                MD5

                                6c03777b6ad3d02e1a3d618e7ee4fec6

                                SHA1

                                d89895c5f64d8f7589cf26c4196fb25e4a6d416e

                                SHA256

                                961e8a446d43764dc948c71902be2ca5f9784fb9c046313eda267b19c34439b8

                                SHA512

                                4da133bbae07bd1ea68df613750d6cba5b11ce3167254aa312e57df3ebe5a2fd331ecd2233f9d671af90eb6b765481d2e0b23c7d34a9ed423e3013855afd968d

                              • C:\Windows\Logs\DISM\dism.log

                                Filesize

                                263KB

                                MD5

                                dac55ef4cbb6e22b2f12eb7322729df5

                                SHA1

                                13c600ed4c549ac312336642cf5d98495a09ee9c

                                SHA256

                                f165c8711a4a41505ef92c607341b1c4893c99f9261ec449cf96aed9dd0eba8e

                                SHA512

                                d0a9820b1265b9e7f2ab8edb34c5bab29d34607caebdb51c233000f79cf46d92a1d215924e13388be8f81af5dfa1db0f3779dacb0e34552ebabd69045245e56c

                              • C:\Windows\Logs\DISM\dism.log

                                Filesize

                                266KB

                                MD5

                                a0df8d53bbdbe8d6f5a9090d69483e5f

                                SHA1

                                8a1b84313c26fe8356a92bee6df8518580e0d8ff

                                SHA256

                                257c262ebd8ae90db1186fc60aecdde52e5f4023a6dc550f761de656d630e556

                                SHA512

                                90202dc57006904d4dbb78471423841a180737bf77ef0a391fd339c26e6d1f3481136b140a6e92ba11738f1f96b477bd26ef7beda0a3d0cacf6591cf891ac0bb

                              • memory/920-1289-0x0000000070320000-0x0000000070379000-memory.dmp

                                Filesize

                                356KB

                              • memory/920-1291-0x0000000070A30000-0x000000007242B000-memory.dmp

                                Filesize

                                26.0MB

                              • memory/920-1290-0x0000000070480000-0x0000000070A26000-memory.dmp

                                Filesize

                                5.6MB

                              • memory/920-1288-0x0000000070380000-0x00000000703FA000-memory.dmp

                                Filesize

                                488KB

                              • memory/920-1287-0x0000000070400000-0x000000007047E000-memory.dmp

                                Filesize

                                504KB

                              • memory/920-1047-0x0000000036A50000-0x0000000036A60000-memory.dmp

                                Filesize

                                64KB

                              • memory/1616-916-0x000000006EFD0000-0x000000006F01C000-memory.dmp

                                Filesize

                                304KB

                              • memory/1832-903-0x0000000007290000-0x00000000072A1000-memory.dmp

                                Filesize

                                68KB

                              • memory/1832-875-0x00000000057E0000-0x0000000005846000-memory.dmp

                                Filesize

                                408KB

                              • memory/1832-886-0x0000000005D60000-0x0000000005DAC000-memory.dmp

                                Filesize

                                304KB

                              • memory/1832-905-0x00000000073B0000-0x00000000073CA000-memory.dmp

                                Filesize

                                104KB

                              • memory/1832-884-0x0000000005850000-0x0000000005BA7000-memory.dmp

                                Filesize

                                3.3MB

                              • memory/1832-904-0x00000000072D0000-0x00000000072DE000-memory.dmp

                                Filesize

                                56KB

                              • memory/1832-872-0x0000000004F90000-0x00000000055BA000-memory.dmp

                                Filesize

                                6.2MB

                              • memory/1832-902-0x0000000007310000-0x00000000073A6000-memory.dmp

                                Filesize

                                600KB

                              • memory/1832-901-0x0000000007100000-0x000000000710A000-memory.dmp

                                Filesize

                                40KB

                              • memory/1832-885-0x0000000005D20000-0x0000000005D3E000-memory.dmp

                                Filesize

                                120KB

                              • memory/1832-874-0x0000000005770000-0x00000000057D6000-memory.dmp

                                Filesize

                                408KB

                              • memory/1832-888-0x000000006EFD0000-0x000000006F01C000-memory.dmp

                                Filesize

                                304KB

                              • memory/1832-873-0x0000000004E90000-0x0000000004EB2000-memory.dmp

                                Filesize

                                136KB

                              • memory/1832-871-0x0000000004920000-0x0000000004956000-memory.dmp

                                Filesize

                                216KB

                              • memory/1832-899-0x00000000076C0000-0x0000000007D3A000-memory.dmp

                                Filesize

                                6.5MB

                              • memory/1832-900-0x0000000007080000-0x000000000709A000-memory.dmp

                                Filesize

                                104KB

                              • memory/1832-898-0x0000000006D40000-0x0000000006DE4000-memory.dmp

                                Filesize

                                656KB

                              • memory/1832-887-0x0000000006CE0000-0x0000000006D14000-memory.dmp

                                Filesize

                                208KB

                              • memory/1832-897-0x0000000006D20000-0x0000000006D3E000-memory.dmp

                                Filesize

                                120KB

                              • memory/3220-934-0x0000000006050000-0x00000000063A7000-memory.dmp

                                Filesize

                                3.3MB

                              • memory/3220-935-0x000000006EFD0000-0x000000006F01C000-memory.dmp

                                Filesize

                                304KB