Analysis
-
max time kernel
99s -
max time network
244s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
22/03/2025, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4.exe
Resource
win11-20250314-en
General
-
Target
500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4.exe
-
Size
2.1MB
-
MD5
2b259cd02570e0d7103c70fe9a9e4d17
-
SHA1
035fe918c59274c1fc662e7d88d0d92d1150fa19
-
SHA256
500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4
-
SHA512
2547a8b631ca07270668741612a8a0d3935008a98ab538f6a14fb1cf3e8d2d82ae7bbe9fe22a495b32ee16b038aaa268b2750ed42705fbf6d080249279cdcb27
-
SSDEEP
24576:Ezvv2Jddh0hXxwQNBH5ffUX5zAEefc5Urz5Eo7zrrdXbETyLAyNBN/8LcpmZQ4J/:22e1iify35cdrrFJAWb/8amDe8hSSw0r
Malware Config
Signatures
-
Creates new service(s) 2 TTPs
-
Manipulates Digital Signatures 1 TTPs 64 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Message\{C6B2E8D0-E005-11CF-A134-00C04FD7BF43}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Usages\1.3.6.1.4.1.311.10.3.3\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\1.3.6.1.4.1.311.2.1.26\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllDecodeObject\#2130\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Cleanup\{C6B2E8D0-E005-11CF-A134-00C04FD7BF43}\$Function = "SoftpubCleanup" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Message\{64B9D180-8DA2-11CF-8736-00AA00A485EB}\$Function = "SoftpubLoadMessage" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\#2008\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllDecodeObject\#2006\FuncName = "WVTAsn1SpcStatementTypeDecode" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Signature\{00AAC56B-CD44-11D0-8CC2-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\1.3.6.1.4.1.311.2.1.25\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\FinalPolicy\{C6B2E8D0-E005-11CF-A134-00C04FD7BF43}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\#2130\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Certificate\{00AAC56B-CD44-11D0-8CC2-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Signature\{C6B2E8D0-E005-11CF-A134-00C04FD7BF43}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Usages\1.3.6.1.5.5.7.3.2\DefaultId = "{573E31F8-AABA-11D0-8CCB-00C04FC295EE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllDecodeObject\#2011\FuncName = "WVTAsn1SealingSignatureAttributeDecode" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptSIPDllGetSignedDataMsg\{9BA61D3F-E73A-11D0-8CD2-00C04FC295EE}\FuncName = "CryptSIPGetSignedDataMsg" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\1.3.6.1.4.1.311.2.1.11\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Usages\2.16.840.1.113730.4.1\DefaultId = "{573E31F8-AABA-11D0-8CCB-00C04FC295EE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Cleanup\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Certificate\{00AAC56B-CD44-11D0-8CC2-00C04FC295EE}\$Function = "WintrustCertificateTrust" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Certificate\{64B9D180-8DA2-11CF-8736-00AA00A485EB}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\1.3.6.1.4.1.311.2.1.12\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\FinalPolicy\{64B9D180-8DA2-11CF-8736-00AA00A485EB}\$Function = "SoftpubAuthenticode" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\#2006\FuncName = "WVTAsn1SpcStatementTypeEncode" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Usages\2.16.840.1.113730.4.1\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\#2010\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllDecodeObject\#2223\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptSIPDllRemoveSignedDataMsg\{C689AAB8-8E78-11D0-8C47-00C04FC295EE}\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptSIPDllRemoveSignedDataMsg\{9BA61D3F-E73A-11D0-8CD2-00C04FC295EE}\FuncName = "CryptSIPRemoveSignedDataMsg" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllDecodeObject\1.3.6.1.4.1.311.2.1.25\FuncName = "WVTAsn1SpcLinkDecode" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Signature\{573E31F8-AABA-11D0-8CCB-00C04FC295EE}\$Function = "SoftpubLoadSignature" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Certificate\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$Function = "WintrustCertificateTrust" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Signature\{FC451C16-AC75-11D1-B4B8-00C04FB66EA0}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\CertCheck\{FC451C16-AC75-11D1-B4B8-00C04FB66EA0}\$Function = "SoftpubCheckCert" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\CRYPTOGRAPHY\OID\ENCODINGTYPE 0\CRYPTSIPDLLPUTSIGNEDDATAMSG\{C689AAB9-8E78-11D0-8C47-00C04FC295EE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllDecodeObject\1.3.6.1.4.1.311.2.1.15\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Initialization\{C6B2E8D0-E005-11CF-A134-00C04FD7BF43}\$Function = "SoftpubInitialize" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Signature\{C6B2E8D0-E005-11CF-A134-00C04FD7BF43}\$Function = "SoftpubLoadSignature" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptSIPDllCreateIndirectData\{9BA61D3F-E73A-11D0-8CD2-00C04FC295EE}\FuncName = "CryptSIPCreateIndirectData" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\1.3.6.1.4.1.311.16.4\Dll = "cryptdlg.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\CertCheck\{64B9D180-8DA2-11CF-8736-00AA00A485EB}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Cleanup\{C6B2E8D0-E005-11CF-A134-00C04FD7BF43}\$Function = "SoftpubCleanup" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Initialization\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Signature\{FC451C16-AC75-11D1-B4B8-00C04FB66EA0}\$Function = "SoftpubLoadSignature" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\DiagnosticPolicy\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\FinalPolicy\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\$Function = "DriverFinalPolicy" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Initialization\{189A3842-3041-11D1-85E1-00C04FC295EE}\$Function = "SoftpubDefCertInit" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Certificate\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\FinalPolicy\{00AAC56B-CD44-11D0-8CC2-00C04FC295EE}\$Function = "SoftpubAuthenticode" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptSIPDllCreateIndirectData\{DE351A42-8E59-11D0-8C47-00C04FC295EE}\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Initialization\{FC451C16-AC75-11D1-B4B8-00C04FB66EA0}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\#2009\FuncName = "WVTAsn1SpcLinkEncode" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllDecodeObject\1.3.6.1.4.1.311.2.1.30\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllDecodeObject\#2221\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllDecodeObject\1.3.6.1.4.1.311.2.1.12\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Certificate\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\$Function = "WintrustCertificateTrust" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptSIPDllPutSignedDataMsg\{C689AABA-8E78-11D0-8C47-00C04FC295EE}\FuncName = "CryptSIPPutSignedDataMsg" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptSIPDllGetSignedDataMsg\{DE351A43-8E59-11D0-8C47-00C04FC295EE}\FuncName = "CryptSIPGetSignedDataMsg" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Usages\2.16.840.1.113730.4.1\CallbackFreeFunction = "SoftpubFreeDefUsageCallData" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\CertCheck\{00AAC56B-CD44-11D0-8CC2-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Message\{189A3842-3041-11D1-85E1-00C04FC295EE}\$Function = "SoftpubLoadMessage" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Initialization\{C6B2E8D0-E005-11CF-A134-00C04FD7BF43}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Usages\1.3.6.1.5.5.7.3.2\$DLL = "WINTRUST.DLL" regsvr32.exe -
Possible privilege escalation attempt 8 IoCs
pid Process 2164 icacls.exe 4704 takeown.exe 408 icacls.exe 1600 takeown.exe 1456 icacls.exe 4088 takeown.exe 2976 icacls.exe 4848 takeown.exe -
Modifies file permissions 1 TTPs 8 IoCs
pid Process 2976 icacls.exe 4848 takeown.exe 2164 icacls.exe 4704 takeown.exe 408 icacls.exe 1600 takeown.exe 1456 icacls.exe 4088 takeown.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 34 4656 500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4.exe File opened (read-only) \??\F: LDPlayer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 113 discord.com 114 discord.com 120 discord.com -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\ldplayer9box\api-ms-win-core-handle-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-crt-environment-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\msvcp120.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\padlock.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-crt-private-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\NetAdp6Install.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\NetAdpUninstall.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\SUPInstall.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\api-ms-win-crt-math-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-core-localization-l1-2-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxPlaygroundDevice.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\api-ms-win-core-rtlsupport-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\vcruntime140.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-crt-time-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxEFI64.fd dnrepairer.exe File created C:\Program Files\ldplayer9box\Qt5Core.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\tstVMREQ.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\api-ms-win-core-console-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\api-ms-win-core-profile-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\api-ms-win-crt-conio-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\msvcp100.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\Ld9BoxSup.inf dnrepairer.exe File created C:\Program Files\ldplayer9box\libcurl.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\api-ms-win-core-timezone-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\api-ms-win-crt-private-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\VBoxClient-x86.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-core-synch-l1-2-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-core-sysinfo-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxSharedFolders.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxVMM.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\api-ms-win-core-util-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\ossltest.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\NetFltInstall.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\ossltest.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-core-file-l1-2-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\tstVBoxDbg.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\USBUninstall.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\ldutils.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\dasync.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\libssl-1_1-x64.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxC.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxDDU.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\api-ms-win-core-synch-l1-2-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-core-memory-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\SDL.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\GLES_V2_utils.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxDbg.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxGuestPropSvc.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxSVGA3D.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\api-ms-win-core-memory-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\api-ms-win-crt-multibyte-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\dpinst_86.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxDragAndDropSvc.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxGuestControlSvc.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-core-console-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-core-datetime-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\tstPDMAsyncCompletionStress.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxSDL.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxEFI32.fd dnrepairer.exe File created C:\Program Files\ldplayer9box\NetAdp6Uninstall.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\tstInt.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\USBTest.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxInstallHelper.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxSupLib.dll dnrepairer.exe -
Executes dropped EXE 3 IoCs
pid Process 64 LDPlayer.exe 2056 dnrepairer.exe 400 Ld9BoxSVC.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4204 sc.exe 1476 sc.exe 3928 sc.exe 4928 sc.exe 1276 sc.exe 744 sc.exe -
Loads dropped DLL 37 IoCs
pid Process 2056 dnrepairer.exe 2056 dnrepairer.exe 2056 dnrepairer.exe 2056 dnrepairer.exe 400 Ld9BoxSVC.exe 400 Ld9BoxSVC.exe 400 Ld9BoxSVC.exe 400 Ld9BoxSVC.exe 400 Ld9BoxSVC.exe 400 Ld9BoxSVC.exe 400 Ld9BoxSVC.exe 400 Ld9BoxSVC.exe 4004 regsvr32.exe 4004 regsvr32.exe 4004 regsvr32.exe 4004 regsvr32.exe 4004 regsvr32.exe 4004 regsvr32.exe 4004 regsvr32.exe 4004 regsvr32.exe 932 regsvr32.exe 932 regsvr32.exe 932 regsvr32.exe 932 regsvr32.exe 932 regsvr32.exe 932 regsvr32.exe 932 regsvr32.exe 932 regsvr32.exe 932 regsvr32.exe 4476 regsvr32.exe 4476 regsvr32.exe 4476 regsvr32.exe 4476 regsvr32.exe 4476 regsvr32.exe 4476 regsvr32.exe 4476 regsvr32.exe 4476 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LDPlayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dnrepairer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Gathers system information 1 TTPs 2 IoCs
Runs systeminfo.exe.
pid Process 4508 systeminfo.exe 3532 systeminfo.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-CB63-47A1-84FB-02C4894B89A9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-4737-457B-99FC-BC52C851A44F}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-5F86-4D65-AD1B-87CA284FB1C8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-0B79-4350-BDD9-A0376CD6E6E3}\ = "IExtPackBase" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-00B1-4E9D-0000-11FA00F9D583} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-EABD-4FA6-960A-F1756C99EA1C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-7F29-4AAE-A627-5A282C83092C}\ = "INATNetworkSettingEvent" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00020420-0000-0000-C000-000000000046}\InprocServer32 dnrepairer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-AEDF-461C-BE2C-99E91BDAD8A1}\ = "IHostUSBDeviceFilter" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-93AF-42A7-7F13-79AD6EF1A18D}\ = "IRecordingScreenSettings" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-42F8-CD96-7570-6A8800E3342C}\ = "IDnDBase" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-44DE-1653-B717-2EBF0CA9B664} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-3534-4239-B2DE-8E1535D94C0B}\ = "ISharedFolderChangedEvent" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-0FF7-46B7-A138-3C6E5AC946B4}\ = "IGuestDnDTarget" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-3618-4EBC-B038-833BA829B4B2} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-3618-4EBC-B038-833BA829B4B2}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-6E15-4F71-A6A5-94E707FAFBCC} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-9B2D-4377-BFE6-9702E881516B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-9536-4EF8-820E-3B0E17E5BBC8}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-3FF2-4F2E-8F09-07382EE25088} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-9536-4EF8-820E-3B0E17E5BBC8}\ = "IGuestFileIOEvent" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-604D-11E9-92D3-53CB473DB9FB}\ProxyStubClsid32\ = "{20191216-1807-4249-5BA5-EA42D66AF0BF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-73A5-46CC-8227-93FE57D006A6}\ = "IDHCPIndividualConfig" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-B45C-48AE-8B36-D35E83D207AA} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-FD1C-411A-95C5-E9BB1414E632}\ = "IPerformanceMetric" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-2354-4267-883F-2F417D216519} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-7006-40D4-B339-472EE3801844}\NumMethods\ = "13" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-4C1B-EDF7-FDF3-C1BE6827DC28} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-3FF2-4F2E-8F09-07382EE25088}\ = "IMachineRegisteredEvent" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00020422-0000-0000-C000-000000000046}\InprocServer32 dnrepairer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-D8ED-44CF-85AC-C83A26C95A4D}\ = "IToken" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-AE84-4B8E-B0F3-5C20C35CAAC9} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-3E87-11E9-8AF2-576E84223953}\ = "IBooleanFormValue" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20191216-1807-4249-5BA5-EA42D66AF0BF}\ = "PSFactoryBuffer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-6E15-4F71-A6A5-94E707FAFBCC}\ProxyStubClsid32\ = "{20191216-1807-4249-5BA5-EA42D66AF0BF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-D545-44AA-8013-181B8C288554}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{20191216-1750-46F0-936E-BD127D5BC264}\1.3\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-A1A9-4AC2-8E80-C049AF69DAC8}\ = "IDHCPServer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-787B-44AB-B343-A082A3F2DFB1}\ = "IMedium" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-C6FA-430E-6020-6A505D086387} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-4974-A19C-4DC6-CC98C2269626}\ = "IGuestDirectory" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-1F04-4191-AA2F-1FAC9646AE4C}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-5409-414B-BD16-77DF7BA3451E}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-9641-4397-854A-040439D0114B}\ = "IGuestScreenInfo" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-8079-447A-A33E-47A69C7980DB} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-2F1A-4D6C-81FC-E3FA843F49AE}\NumMethods\ = "38" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-3346-49D6-8F1C-41B0C4784FF2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-2E88-4436-83D7-50F3E64D0503}\ = "IMachineDataChangedEvent" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-26F1-4EDB-8DD2-6BDDD0912368}\ = "IGuestPropertyChangedEvent" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-E64A-4908-804E-371CAD23A756}\ = "IMouseCapabilityChangedEvent" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-3618-4EBC-B038-833BA829B4B2}\ = "IExtPack" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-71B2-4817-9A64-4ED12C17388E}\ = "ICPUChangedEvent" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-92C9-4A77-9D35-E058B39FE0B9} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-6E15-4F71-A6A5-94E707FAFBCC}\NumMethods\ = "42" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-5637-472A-9736-72019EABD7DE}\NumMethods\ = "13" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-BF98-47FB-AB2F-B5177533F493} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-42DA-C94B-8AEC-21968E08355D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-647D-45AC-8FE9-F49B3183BA37} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-486F-40DB-9150-DEEE3FD24189} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-4022-DC80-5535-6FB116815604}\NumMethods\ = "14" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-1A29-4A19-92CF-02285773F3B5}\ProxyStubClsid32\ = "{20191216-1807-4249-5BA5-EA42D66AF0BF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-3E87-11E9-8AF2-576E84223953}\ = "IBooleanFormValue" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-6E0B-492A-A8D0-968472A94DC7}\ProxyStubClsid32\ = "{20191216-1807-4249-5BA5-EA42D66AF0BF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-A1A9-4AC2-8E80-C049AF69DAC8} regsvr32.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4656 500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4.exe 4656 500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4.exe 4656 500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4.exe 4656 500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4.exe 64 LDPlayer.exe 64 LDPlayer.exe 64 LDPlayer.exe 64 LDPlayer.exe 64 LDPlayer.exe 64 LDPlayer.exe 64 LDPlayer.exe 64 LDPlayer.exe 64 LDPlayer.exe 64 LDPlayer.exe 2056 dnrepairer.exe 2056 dnrepairer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeTakeOwnershipPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeTakeOwnershipPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeTakeOwnershipPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeTakeOwnershipPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeTakeOwnershipPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeTakeOwnershipPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeTakeOwnershipPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeTakeOwnershipPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe Token: SeDebugPrivilege 64 LDPlayer.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 4656 wrote to memory of 64 4656 500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4.exe 88 PID 4656 wrote to memory of 64 4656 500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4.exe 88 PID 4656 wrote to memory of 64 4656 500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4.exe 88 PID 64 wrote to memory of 2056 64 LDPlayer.exe 89 PID 64 wrote to memory of 2056 64 LDPlayer.exe 89 PID 64 wrote to memory of 2056 64 LDPlayer.exe 89 PID 2056 wrote to memory of 5028 2056 dnrepairer.exe 90 PID 2056 wrote to memory of 5028 2056 dnrepairer.exe 90 PID 2056 wrote to memory of 5028 2056 dnrepairer.exe 90 PID 5028 wrote to memory of 3032 5028 net.exe 92 PID 5028 wrote to memory of 3032 5028 net.exe 92 PID 5028 wrote to memory of 3032 5028 net.exe 92 PID 2056 wrote to memory of 4596 2056 dnrepairer.exe 93 PID 2056 wrote to memory of 4596 2056 dnrepairer.exe 93 PID 2056 wrote to memory of 4596 2056 dnrepairer.exe 93 PID 2056 wrote to memory of 892 2056 dnrepairer.exe 94 PID 2056 wrote to memory of 892 2056 dnrepairer.exe 94 PID 2056 wrote to memory of 892 2056 dnrepairer.exe 94 PID 2056 wrote to memory of 1200 2056 dnrepairer.exe 95 PID 2056 wrote to memory of 1200 2056 dnrepairer.exe 95 PID 2056 wrote to memory of 1200 2056 dnrepairer.exe 95 PID 2056 wrote to memory of 724 2056 dnrepairer.exe 96 PID 2056 wrote to memory of 724 2056 dnrepairer.exe 96 PID 2056 wrote to memory of 724 2056 dnrepairer.exe 96 PID 2056 wrote to memory of 1012 2056 dnrepairer.exe 97 PID 2056 wrote to memory of 1012 2056 dnrepairer.exe 97 PID 2056 wrote to memory of 1012 2056 dnrepairer.exe 97 PID 2056 wrote to memory of 3596 2056 dnrepairer.exe 98 PID 2056 wrote to memory of 3596 2056 dnrepairer.exe 98 PID 2056 wrote to memory of 3596 2056 dnrepairer.exe 98 PID 2056 wrote to memory of 4228 2056 dnrepairer.exe 99 PID 2056 wrote to memory of 4228 2056 dnrepairer.exe 99 PID 2056 wrote to memory of 4228 2056 dnrepairer.exe 99 PID 2056 wrote to memory of 1600 2056 dnrepairer.exe 100 PID 2056 wrote to memory of 1600 2056 dnrepairer.exe 100 PID 2056 wrote to memory of 1600 2056 dnrepairer.exe 100 PID 2056 wrote to memory of 1456 2056 dnrepairer.exe 102 PID 2056 wrote to memory of 1456 2056 dnrepairer.exe 102 PID 2056 wrote to memory of 1456 2056 dnrepairer.exe 102 PID 2056 wrote to memory of 4088 2056 dnrepairer.exe 104 PID 2056 wrote to memory of 4088 2056 dnrepairer.exe 104 PID 2056 wrote to memory of 4088 2056 dnrepairer.exe 104 PID 2056 wrote to memory of 2976 2056 dnrepairer.exe 106 PID 2056 wrote to memory of 2976 2056 dnrepairer.exe 106 PID 2056 wrote to memory of 2976 2056 dnrepairer.exe 106 PID 2056 wrote to memory of 4848 2056 dnrepairer.exe 108 PID 2056 wrote to memory of 4848 2056 dnrepairer.exe 108 PID 2056 wrote to memory of 4848 2056 dnrepairer.exe 108 PID 2056 wrote to memory of 2164 2056 dnrepairer.exe 110 PID 2056 wrote to memory of 2164 2056 dnrepairer.exe 110 PID 2056 wrote to memory of 2164 2056 dnrepairer.exe 110 PID 2056 wrote to memory of 400 2056 dnrepairer.exe 112 PID 2056 wrote to memory of 400 2056 dnrepairer.exe 112 PID 2056 wrote to memory of 4004 2056 dnrepairer.exe 113 PID 2056 wrote to memory of 4004 2056 dnrepairer.exe 113 PID 2056 wrote to memory of 932 2056 dnrepairer.exe 114 PID 2056 wrote to memory of 932 2056 dnrepairer.exe 114 PID 2056 wrote to memory of 932 2056 dnrepairer.exe 114 PID 2056 wrote to memory of 4476 2056 dnrepairer.exe 115 PID 2056 wrote to memory of 4476 2056 dnrepairer.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4.exe"C:\Users\Admin\AppData\Local\Temp\500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4.exe"1⤵
- Downloads MZ/PE file
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\LDPlayer\LDPlayer9\LDPlayer.exe"C:\LDPlayer\LDPlayer9\\LDPlayer.exe" -silence -downloader -openid= -language=en -path="C:\LDPlayer\LDPlayer9\"2⤵
- Enumerates connected drives
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:64 -
C:\LDPlayer\LDPlayer9\dnrepairer.exe"C:\LDPlayer\LDPlayer9\dnrepairer.exe" listener=5247323⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\net.exe"net" start cryptsvc4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start cryptsvc5⤵
- System Location Discovery: System Language Discovery
PID:3032
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" Softpub.dll /s4⤵
- Manipulates Digital Signatures
- System Location Discovery: System Language Discovery
PID:4596
-
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" Wintrust.dll /s4⤵
- Manipulates Digital Signatures
- System Location Discovery: System Language Discovery
PID:892
-
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" Initpki.dll /s4⤵
- System Location Discovery: System Language Discovery
PID:1200
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32" Initpki.dll /s4⤵
- System Location Discovery: System Language Discovery
PID:724
-
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" dssenh.dll /s4⤵
- System Location Discovery: System Language Discovery
PID:1012
-
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" rsaenh.dll /s4⤵
- System Location Discovery: System Language Discovery
PID:3596
-
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" cryptdlg.dll /s4⤵
- Manipulates Digital Signatures
- System Location Discovery: System Language Discovery
PID:4228
-
-
C:\Windows\SysWOW64\takeown.exe"takeown" /f "C:\LDPlayer\LDPlayer9\vms" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1600
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" "C:\LDPlayer\LDPlayer9\vms" /grant everyone:F /t4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1456
-
-
C:\Windows\SysWOW64\takeown.exe"takeown" /f "C:\LDPlayer\LDPlayer9\\system.vmdk"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4088
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" "C:\LDPlayer\LDPlayer9\\system.vmdk" /grant everyone:F /t4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2976
-
-
C:\Windows\SysWOW64\takeown.exe"takeown" /f "C:\Users\Admin\.Ld9VirtualBox" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4848
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" "C:\Users\Admin\.Ld9VirtualBox" /grant everyone:F /t4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Program Files\ldplayer9box\Ld9BoxSVC.exe"C:\Program Files\ldplayer9box\Ld9BoxSVC.exe" /RegServer4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:400
-
-
C:\Windows\SYSTEM32\regsvr32.exe"regsvr32" "C:\Program Files\ldplayer9box\VBoxC.dll" /s4⤵
- Loads dropped DLL
PID:4004
-
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" "C:\Program Files\ldplayer9box\x86\VBoxClient-x86.dll" /s4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:932
-
-
C:\Windows\SYSTEM32\regsvr32.exe"regsvr32" "C:\Program Files\ldplayer9box\VBoxProxyStub.dll" /s4⤵
- Loads dropped DLL
- Modifies registry class
PID:4476
-
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" "C:\Program Files\ldplayer9box\x86\VBoxProxyStub-x86.dll" /s4⤵PID:2752
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc" create Ld9BoxSup binPath= "C:\Program Files\ldplayer9box\Ld9BoxSup.sys" type= kernel start= auto4⤵
- Launches sc.exe
PID:1476
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc" start Ld9BoxSup4⤵
- Launches sc.exe
PID:3928
-
-
C:\Windows\SysWOW64\sc.exesc query HvHost4⤵
- Launches sc.exe
PID:4928
-
-
C:\Windows\SysWOW64\sc.exesc query vmms4⤵
- Launches sc.exe
PID:1276
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo4⤵PID:2848
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo5⤵
- Gathers system information
PID:3532
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" New-NetFirewallRule -DisplayName "Ld9BoxSup" -Direction Inbound -Program 'C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe' -RemoteAddress LocalSubnet -Action Allow4⤵PID:1772
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" New-NetFirewallRule -DisplayName "Ld9BoxNat" -Direction Inbound -Program 'C:\Program Files\ldplayer9box\VBoxNetNAT.exe' -RemoteAddress LocalSubnet -Action Allow4⤵PID:888
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" New-NetFirewallRule -DisplayName "dnplayer" -Direction Inbound -Program 'C:\LDPlayer\LDPlayer9\dnplayer.exe' -RemoteAddress LocalSubnet -Action Allow4⤵PID:5060
-
-
-
C:\LDPlayer\LDPlayer9\driverconfig.exe"C:\LDPlayer\LDPlayer9\driverconfig.exe"3⤵PID:2448
-
-
C:\Windows\SysWOW64\takeown.exe"takeown" /f C:\LDPlayer\ldmutiplayer\ /r /d y3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4704
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" C:\LDPlayer\ldmutiplayer\ /grant everyone:F /t3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:408
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/4bUcwDd53d2⤵PID:272
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2f0,0x2f4,0x2f8,0x2ec,0x318,0x7ffb69d7f208,0x7ffb69d7f214,0x7ffb69d7f2203⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1824,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=2368 /prefetch:33⤵PID:188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2200,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=2196 /prefetch:23⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2636,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=2664 /prefetch:83⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3468,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:13⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3476,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=3488 /prefetch:13⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4244,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:23⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4252,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=4348 /prefetch:13⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5256,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=5268 /prefetch:83⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=5276,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=5424 /prefetch:13⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3916,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=4432 /prefetch:83⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5740,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=5768 /prefetch:83⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5724,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=5764 /prefetch:83⤵PID:5360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5684,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=5296 /prefetch:83⤵PID:5876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5684,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=5296 /prefetch:83⤵PID:5980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6212,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=5288 /prefetch:83⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5388,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=6304 /prefetch:83⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6344,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=6260 /prefetch:83⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6288,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=6268 /prefetch:83⤵PID:6072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6616,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=6628 /prefetch:83⤵PID:5996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6800,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=6324 /prefetch:83⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6964,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=6996 /prefetch:83⤵PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6832,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=6976 /prefetch:83⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6788,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=7196 /prefetch:83⤵PID:6076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6232,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=7364 /prefetch:83⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4772,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=4420 /prefetch:83⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4428,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=6216 /prefetch:83⤵PID:5996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4720,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=4740 /prefetch:83⤵PID:5756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6060,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=5272 /prefetch:83⤵PID:5584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=5680,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=2068 /prefetch:13⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --always-read-main-dll --field-trial-handle=7432,i,752583837895418893,962455732726461902,262144 --variations-seed-version --mojo-platform-channel-handle=3692 /prefetch:13⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window3⤵PID:5752
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x2a8,0x7ffb69d7f208,0x7ffb69d7f214,0x7ffb69d7f2204⤵PID:5136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1860,i,1918424280961096921,76858717789722735,262144 --variations-seed-version --mojo-platform-channel-handle=2152 /prefetch:34⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2124,i,1918424280961096921,76858717789722735,262144 --variations-seed-version --mojo-platform-channel-handle=2092 /prefetch:24⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2520,i,1918424280961096921,76858717789722735,262144 --variations-seed-version --mojo-platform-channel-handle=2724 /prefetch:84⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4384,i,1918424280961096921,76858717789722735,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:84⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4384,i,1918424280961096921,76858717789722735,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:84⤵PID:6116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4472,i,1918424280961096921,76858717789722735,262144 --variations-seed-version --mojo-platform-channel-handle=4488 /prefetch:84⤵PID:5172
-
-
-
-
C:\LDPlayer\LDPlayer9\dnplayer.exe"C:\LDPlayer\LDPlayer9\dnplayer.exe"2⤵PID:1708
-
C:\Windows\SysWOW64\sc.exesc query HvHost3⤵
- Launches sc.exe
PID:744
-
-
C:\Windows\SysWOW64\sc.exesc query vmms3⤵
- Launches sc.exe
PID:4204
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo3⤵PID:1068
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:4508
-
-
-
C:\Program Files\ldplayer9box\vbox-img.exe"C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\..\system.vmdk" --uuid 20160302-bbbb-bbbb-0eee-bbbb000000003⤵PID:5248
-
-
C:\Program Files\ldplayer9box\vbox-img.exe"C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\leidian0\data.vmdk" --uuid 20160302-cccc-cccc-0eee-0000000000003⤵PID:5668
-
-
C:\Program Files\ldplayer9box\vbox-img.exe"C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\leidian0\sdcard.vmdk" --uuid 20160302-dddd-dddd-0eee-0000000000003⤵PID:5752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.ldplayer.net/blog/how-to-enable-vt.html3⤵PID:4528
-
-
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.4467_none_7e0f83e07c8c1985\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.4467_none_7e0f83e07c8c1985\TiWorker.exe -Embedding1⤵PID:3968
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x398 0x44c1⤵PID:3068
-
C:\Program Files\ldplayer9box\Ld9BoxSVC.exe"C:\Program Files\ldplayer9box\Ld9BoxSVC.exe" -Embedding1⤵PID:4112
-
C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe"C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config2⤵PID:6056
-
-
C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe"C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config2⤵PID:5116
-
-
C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe"C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config2⤵PID:5480
-
-
C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe"C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config2⤵PID:5576
-
-
C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe"C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config2⤵PID:5488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4856
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:6108
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
File and Directory Permissions Modification
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD550260b0f19aaa7e37c4082fecef8ff41
SHA1ce672489b29baa7119881497ed5044b21ad8fe30
SHA256891603d569fc6f1afed7c7d935b0a3c7363c35a0eb4a76c9e57ef083955bc2c9
SHA5126f99d39bfe9d4126417ff65571c78c279d75fc9547ee767a594620c0c6f45f4bb42fd0c5173d9bc91a68a0636205a637d5d1c7847bd5f8ce57e120d210b0c57d
-
Filesize
947KB
MD550097ec217ce0ebb9b4caa09cd2cd73a
SHA18cd3018c4170072464fbcd7cba563df1fc2b884c
SHA2562a2ff2c61977079205c503e0bcfb96bf7aa4d5c9a0d1b1b62d3a49a9aa988112
SHA512ac2d02e9bfc2be4c3cb1c2fff41a2dafcb7ce1123998bbf3eb5b4dc6410c308f506451de9564f7f28eb684d8119fb6afe459ab87237df7956f4256892bbab058
-
Filesize
51KB
MD51ea48ba4040743ffc511b0cc923a178b
SHA172b76002087d62c9580ff2a1655b41095826acc4
SHA2561e2e3ca8d4bfe01a68586e3568b8964eba8bf92a6bc19b7c245865ad9ba7280e
SHA51220bc651739a267514cf2b7d158c2d0a56ac0251fe8c5f79eed7d88f6628d92d3bd3b697a6c958fb1f46f853c6defa204a6557996ad9d32a741e787cb8188026d
-
Filesize
1.3MB
MD5c4e98fdba5d3b3a95f96abf279bf240a
SHA1c6bce2c2ae044fd4054a58f2fd9757252b4e9afe
SHA2561f817c6cf7ba37f0d89e45640639e1b8256639045de98bfa63f17de3f4eacb16
SHA512799cfbda36d41e2029b1d13a600807731cb230b2ceb96f2b77a260f4ea174af810ba1e64dd04d43a38f9caa6775ae0523c61f614e5b8c857433cb02ae06ef5ac
-
Filesize
3.7MB
MD5b668762c83ea3cb69a400824e3c56c23
SHA1087621217249a70dfd7cbf2c46ee7a3053636d9d
SHA256c167875d270e8a307dc7c125a118d2fce8b61425dded1bff0486115e6677afb9
SHA512819928240e9f005cee2101f84d7c27bd1036f625d77ddd12f672b54d993fd4bdce32189f369f18ac36786b07d8d6602f281aa5888db7a86f92ee5ba2d179ec29
-
Filesize
41.9MB
MD510b376bf925c50a88096b601abef4d80
SHA124a3d1ecb2e0087b2140c6674453fcf9d82cf150
SHA25613a241b6d1144cbe2e11c9d46ebd26a649f574db8c4bf1a98a92fbe824038912
SHA512fb7dc9db718dd94c7d275388aa376ca219b8c865d6a05b6392d5acc964c67980458ef2ad7746ac8589e01cb95e4830c7ca0301c15300de1c6c02d2a8bf52bde1
-
Filesize
5.6MB
MD5ba84bf6204db711f866adb2841d5c91c
SHA1807a03b5ddb07b9e8e30c8261e3ba5514cc537e2
SHA256dad6ee5a8b12b9396b56d827fe91fc8d3f9468428e32902390c0ddef596f2f26
SHA512ad18d5a353add4e7ffc8868c9ce62ebea947531684e4a054dce116a97a8397dfce39dfc7744cf416fc1259035824645a8ae71b4eed9f8fd5d534c29995c0578a
-
Filesize
103KB
MD54acd5f0e312730f1d8b8805f3699c184
SHA167c957e102bf2b2a86c5708257bc32f91c006739
SHA25672336333d602f1c3506e642e0d0393926c0ec91225bf2e4d216fcebd82bb6cb5
SHA5129982c1c53cee1b44fd0c3df6806b8cbf6b441d3ed97aeb466dba568adce1144373ce7833d8f44ac3fa58d01d8cdb7e8621b4bb125c4d02092c355444651a4837
-
Filesize
5KB
MD5fdee6e3ccf8b61db774884ccb810c66f
SHA17a6b13a61cd3ad252387d110d9c25ced9897994d
SHA256657fec32d9ce7b96986513645a48ddd047a5968d897c589fbc0fc9adb8c670f4
SHA512f773f6fc22adadf048b9bfb03e4d6e119e8876412beb8517d999f4ed6a219e2ba50eded5308d361b6780792af9f699644e3a8b581a17d5a312f759d981f64512
-
Filesize
490.5MB
MD5f327840b25d26ba3b48129b6af3d23f3
SHA189328dcf652978b45963332b76c0285bfca61eda
SHA2566cebc3c671411678379c2993955a26cc04cb115cfedfc1cfb2613fd55a751acb
SHA512e6a36c0cc458efdb190f7c2a3aad6ea992bfda7a4d601ea127ea029e445d03f4987743ee7600138ae2d7026dc73381dbefe47ec774a3c0afb9c2183146a09180
-
Filesize
527.5MB
MD5f055c0b5be55ddbfe53d9ac1efa345c7
SHA1918b3331b1b1ae7ba230406ab4dc1581181f35b4
SHA25663cd58262a80cd9ef581b33bc7b87eb261a373f3570da3eacb9b15f00f95b31e
SHA512a3b7b0f87190ba779a3f0444ed90f3a0930a557a70b1049ce37bcebac637580de458d7a560681f77997825ff631c57c7283539b87cabe94baa5c2ad9d2e232d3
-
Filesize
529.6MB
MD5bcab416c6bfb5207c7f7932ae45c6724
SHA18d4c4be2a588982dd9a0d863427aed7140f87bec
SHA2566768f8c6a597f86b225f9a092d64ab2cc06942fbeffee157fc9eeba735c0ef4a
SHA51223c4d2e33953d4ac4b0043376febf7f46b01c671f4112f80f7dbfbdc59b40cb20a97135e10f2f28718ed9b19b0eea74b6642929b43d09db3fdb7ea3357951999
-
Filesize
18KB
MD5cde2424d99db56dd0d1eaf34811738c1
SHA1cc7889c43729b93a4e193b2fd6ae5f22b6ad6b8f
SHA2564ceaf28cadfd0929b44e9c686b93432a7151504c8ffe2a6afe516f9b16538131
SHA512d5b8ef2de3fefde29b2c9cccb330c3076ba71d6ae29e1b34617057d8a832d37eae8e2f238e2abb6eb226453c00a835c669a7c03a00cd1698d02272d8eb6998e2
-
Filesize
17KB
MD5acf4321ac8c8ff4d0442c799d621f8d9
SHA1b12f87e6afc48697f1ce8b587715361e89b79cae
SHA25669b84f7318798a91143e3d273ae9c0bedaabba930e3702447d493e2b8dd70725
SHA5127878a7cd62f9d259a6bab05e13e9ac5b16437c0d8bda46e864f205465ae19531e5655d7547ae1594a53a05ddeb8b0c6058a73caeb21cd7c81fe5a424303d3bde
-
Filesize
17KB
MD53c47c25b8141d20b2b4d576000000a61
SHA104543f9cdd847ff66389c9fd1e12b444dae6383a
SHA256290030199e8b47d6bcf466f9fc81fee7e6aebc2c16a3f26dd77019f795658956
SHA512c599ef06045583b28faac051909c28f5f2fa56c34d47f3bd49efc101a1cdcb571a298eb100d0b381e3ebb1ba19b2fb4dd5127f259eb8ab183753722ecbe0f10a
-
Filesize
18KB
MD5e05ce0232e64328c62c9da37698566bf
SHA150c25e6ecec2cd17ecf3117bb9a646ba107d2b84
SHA256573aed3f3eb436f9b7c24d51be3be2105deb8149ebda9b964660930c957b2410
SHA5128093bd5d1ad96d759a5d9183fca27d7cb756e0884776673f132d20119e602ea33f8121893b9b90965b0eb5710e244faf4e2ad738479998fc2c5dc37f83fe18cb
-
Filesize
21KB
MD5a26c7ffcf18b62904dab7786de638ea6
SHA1b28489bc38ee2f522ee83dcf49faeb96f39a77e3
SHA25674075b7af84378cee0d035c020b320ee52a120b21f71a4972093c9e23d534830
SHA512768c8d7818acacf83d8bd020ab239408673f6cf9e0e8f1be1dab2dd58c5df4e45b970baf7d8d09887280be0788790eacd6126274deaca6b1c4b7bad3e335b34f
-
Filesize
18KB
MD56a55a7e284b51b086b63cc6f2061ce8b
SHA146a48a1ccf5262038b71ed4be09cf625009d078d
SHA256d9973270a952b4ce615104520051e847b26e4b1cc330a5a95ba1ae128f0dfdeb
SHA5126a6ba643bf15581cd579e383bac351ccae714d50453cff52cac7dcf5bd472a170e7d33b0509c7bd50c5e76e8a0304fa88dcad63a9e2cd0694a5c56f4a21ae363
-
Filesize
18KB
MD56e38a6bed88e1c27155e4dc428188ef0
SHA18b47a1960ed157f7beeb80fa4a16a723279c4efa
SHA256144d3a28e43e47fc1cce956255cc80467d4a6fbbb8f612ec6d85f62de030a924
SHA5123b801875bc5a483eea6d6cc43015e759ee1f66c12585f698cb92368455f25b5309617c8beae39945cadb57009a9c9a9ce21c18dec28e86097c67d8fc5f9febab
-
Filesize
18KB
MD59304209688e2a18d0b26997bc78fda7a
SHA15d4332cf1c5123418c6419d0291486c3939e8785
SHA256d6bc1509fd2d4ea07e661f2f59395b4d71907d16f59942443a5d460df343dbf4
SHA5125952e192b6150055bc88e672fb0254bc962abd27afb5c30cd0f52ede98ad84eba9966d721b3b6602116ff40ad5c489a24eac35dde77397db88aa46ad2bd18960
-
Filesize
18KB
MD5f42a84d78a5a15ff1a4dbac591e95783
SHA11cd5b5e68fd729bdd340463b53728634d342b0cd
SHA256f60267cab87dfc1accf912c212186112aba38742f621549d6bc8d67e217e7234
SHA51289ba6571df642dbac769c72914b30f2d27107f023a9e1cbb0c6f5412b6a69d414cd99f29de07d06592c7ab9cdfc558f3b65b7050921bd442c01417bac0a850f0
-
Filesize
18KB
MD59f286e57e5b1c1a347adf9eef059ad5d
SHA1631aa1aa364234acc5ad20b27f926e9cb9ee4276
SHA256f93ddef4ac14ef778790f3f00057ab6cafc0c99dff52cc24f523d63917719970
SHA5126df20707ccda0cf9916b7c00b11a4a82b47a0f6e87c6eba0f38e440e143b4aa6e5b48f67d09a9eeef75da2aadfbb5abc7e62362f50d674bb8a532e290699a197
-
Filesize
18KB
MD5beaae8294db31afa04fa60795c6e02ae
SHA18a32ebd843e461864747fe0aebf4bbf83c4ec093
SHA256f8e8d85035bcb478ce2ab47a6476a8c756a7c8fa05bad66b9a03ece6a2ced141
SHA512dd1a75943401ae5d20c9ee023ba77000db9433a643ec2f102cd3a72faf274deb3611954557c81120d81ff447f86b7309cec1c9005ab37ed7bb48d6e6c239b135
-
Filesize
20KB
MD52ac1289e4dbab076b332869bef26d3ce
SHA160570ddd06b671e26c6a814b9c08cdfa0ef38aba
SHA2566475f20f46814d28845c2fa73e9c283a8504483fa16d911325588c778cf76c26
SHA512e226fb4739d66e2c4624a9e01ec00dbe3b37dc96995eec35660208d76a9e6758a2a29be1b7986d14074df23ea0fc39d2ce121b7bd32c553371c1b15ff3e2ef7a
-
Filesize
18KB
MD5a2661a468bb87ee9cc5dee968fd3805c
SHA19b17fbd552e34888f1453f9113ff4c42efaf6d6a
SHA256dc41da54e717aef60228ee11d10669c31d3ddd532eee9ecad944c09b71b762dd
SHA512b5c01cb3c991fcf8945c764b853f8a32fce324f01562107e086dd998a1b31f9285a0d645c96052b94c955f3626691c3ca2cc9e04d8594a0a7c042530549f1aa3
-
Filesize
18KB
MD5acbfc011d5842ba60c372ba3d222ab70
SHA116b8014060a04bb03215f6ce4c118bae48653bd5
SHA256b0ae48eb5ff51fa038e1ed23c7c48d266c20c2af3f9907ee6906bb0346df7f9e
SHA512dce34d64e6674b67c7c6e7c34886c1ede2967e6af7cfe2addfe51fcf70780a33d7308e7ce81a80149034b8f910c045b3ea81f458d9227448fc4b339dc05a59d3
-
Filesize
19KB
MD519d14d348ac38737431a7ee2f82973e6
SHA111cd8f5dc5c08d133b9b006da5c84946f012cbb6
SHA2561cd9cff9f7d24b22993a207cb81f15ce2792fa5f941e77e8280db00db6a273ae
SHA512b3bf7426150bf3b933db4670db3b7d22530c7087efeeab0ddacfbb0bffc01aabdac68e535c7298b13a42530a1aab2340203874b5382581f59309ec9465f6a0cc
-
Filesize
20KB
MD5ea0e13feac13dc18c79eb682bef4676e
SHA1b9db47624345c68cf07bd2677df537e0f975caf9
SHA2562658242ccd090181ed944f682c435e5fb880f3b21d1811d43b93478901d701b0
SHA512540b9f8b18d42e551f13de3d4a6f0f821ea23e4c85a6346b84e8b74d02cfb5413355d126913699208faefd67680c52cdf4e6ecd66fc0cb4753ee603fe9763df7
-
Filesize
18KB
MD51af2a91dc0a4e48bab0ca123073adf30
SHA1cf6625fd31b17d46dd31b16372840c74026d0ba2
SHA256ae574c9b8a2467c3ee0ac3e862255e93a02627bce146ad7b720b99905dc224fc
SHA51245103c51fc655f608e687c8e9db24c956d12c63b0497ced3817aee3d9f5fadf0741064ccb49ae71fbf377228af315c961fa414221731ea4892425ed4939bbf51
-
Filesize
17KB
MD59b9d1949b75df171884f6f8caba7ff59
SHA1411adf413f53c56488d5cf68e9b4b692889f3c4b
SHA256cffb2007c31932b092cda3a0a39f1cfcc5766b6a1c05e5eaeabc53660cbbe786
SHA512dd2110a2406e9cf70e26076ff4bc41f5478ece318ac48e8c7d8101e14c41284ddb2ea305560e1fa27d70925525553969fdcab243b31c0fb5ac460e1f00db2b7c
-
Filesize
18KB
MD5c6e268c877a9be5b43877308b1231120
SHA1949105c826dee6a32fe1288285e3e41cb7d04821
SHA256eae3cd8747da3b435846901a1dbe0e430666d3d8d7ba6e54307cff5d6ee0592f
SHA512776fe5cc3e5eb7ae9c20e15c6c5bce20fb2a0e9e81d260a08dc41860b3967c7abdc3142786421f349ebe9c43a12e261a34e3e176535b8e04545395279c439331
-
Filesize
18KB
MD55122b8aa14a25c8567d9d0335036446f
SHA181961f2c8a331136f8156930779964a71e0badc4
SHA2567b5393e2cb79f0396d5d97510e8f0955a2586aacaf60eb8de3676006cb81dc5c
SHA512758ff98f838f3ca03ef6a9e5a0e39732afed73f4d15dd7d7a1a842c36ad00a859541b4e977af513ddcf970ed994cc27b11654ddc0f15fffd83bdbeff43084cc9
-
Filesize
20KB
MD5e1b30d56617709cf7dff5f464d7566d9
SHA1e29646b1c90550cb86ed42782c764d41f2c70651
SHA2565d1a854a0c5121e2e8866dad26545f7f8c2d2f1b15ed7f1ed0b72654a1fc299b
SHA512e158389a4f71eb94a2e73706f0d52db91798104d990065029a3745dbc9a0459ed9ae96c78bd005043de9057bae66f35a174537c525385abc8e91dbbf579ba511
-
Filesize
18KB
MD5e4b64b2710725ec3332021bd8044d884
SHA12d7f8d87d0f395296ecdf277084d23cb9e0880e8
SHA2569566b81b1c6db1727a4bb3a7a3de12247ff5297f34548593280ec31f2b2e2c65
SHA512ae5570a2cd245588a3f80744c7b1af99533730ebf8926f51a2cc13004a6eb5ecb501aa8c2906e5fa5ddc5a92fb796d54af43b3e3ff97ca1cc3d898462bf7e9b2
-
Filesize
19KB
MD567fd470a60fe8fb3f9fbe32fa52871d0
SHA109aba019a0d0dae7415b6d9a39e1dc67d93f130b
SHA2561f98f9e044d32e61445c5fab3c80c2f37ca6bab3d5b22cd5611fb5df73db04a8
SHA512f8c3f1e3bee196487aec704f128240acb57fb392db918a97176793b07726f017177abbb5a6c68822fc59ce06f04d489a78284a865efdc2de518f34ecfb0cc1e6
-
Filesize
18KB
MD5f53ed8a0c18157b9e37500621dfab9ee
SHA1b8a3131150cfd46052353309843c802d9f43df03
SHA2565909e928d791f67a13e3130033cb0e2178f5167a644c3ab5336322d38356db47
SHA5122cc98322e67ff49aacaba0b23fb559a5c4c58182e4f3965673a766d3198a26fcd7c7c340779d9fb0fc3f2649c16427ff312d87caa1feadf23dabc6675169416a
-
Filesize
18KB
MD52b9f551cddd662c618432a75c546b296
SHA11ddd65fcc8bb401c734ebc2014d057328f771744
SHA256070afbdbe5b3f3b76b6b7ea2dbb9f8deff81c6ec8706eef9080671543e2ae28b
SHA51254df6e692ac630d969a697c9e6f379c4826ca71b7e8eaefdf502405b1333a6b483256aeba609a4a1c61e73f72d2958aaf3eb31538cc5e7a91101d7d09e3ed9dc
-
Filesize
19KB
MD57d943f85ff8d1515a02d202ae79453d3
SHA194def1f7368172ac50b665e74b89e8f7aae2857b
SHA2561d4464fe335470452e58d613028dde2f105edf969d411e90ba7ca9e343c3fc89
SHA512e111dbef97c6c6cb3b5c2d183294620792c48a2cb16d9d91c12cede757a1c0c53d707f4294542bef47eae784893bf63fe0f0229bed4b2d0a961c8d1cc1cf43cb
-
Filesize
22KB
MD5278857b86f667c47cbcce94f5ec73ca8
SHA1a0f5b7e7c67f3c6b8f285d39d08b740e49445755
SHA25691c5966932287078d0e616d8e0369347991f39765749bbffa1ed3a9df49776d9
SHA512ebc02d1a2e223eb0b30a8e62089735faed83add4161094493f62561a09c13a426815e7f06c20c44477691109a8c3040dc68527023bfee6d9984c42d6a05208c9
-
Filesize
18KB
MD56493b21fefae874655c62a56a156f3eb
SHA1c65beb46f9f03d35867ff008026d3a56fa26fb65
SHA2568d9d3e905d072c4465e4787dd5bd843d3a5dd5ac5ad9d7f232032b25facc82ab
SHA51293cbe187f7fa86ac58191b5384a993135e3291873a76cc2cf81dd60c68ad7591386e4eb5ab53aaac2a6f48f7f778263b7fa0a4ea0863361910a9f1efee92b64b
-
Filesize
20KB
MD5ae83311041ee793253ff10736317a09e
SHA1c62d06cb6cbd9d997c42a6ad7f13c06f38725069
SHA2568f9361d02f68392127fe264655eac4fef4a4a1bf63571f184ce26faa98670702
SHA5120fabcb0370330460f8f525401f339535c08d768f075816989a16eff2256584cfa8fd6832df3ce3d9c2a5364b4ef58bfff53cc486e3b48d11b654f7174aa18458
-
Filesize
18KB
MD512311308d7d65895b3920b3dd3e54b3b
SHA13faa74c6913f451d9c575761630b507af0c15ee3
SHA25676dad3e04c9ff61b40ae1c9e039837cd1c077d59b6a008643e4fbf2dbdb564dc
SHA51267fd047e760dbdadb06cc2c34b935fdabc629fa988484a9f5120cd59d6167d943b612df65626701022b5e73c5b1177a8d813e90c5990468f51a5a11932c008ed
-
Filesize
18KB
MD53dafcf25a2ac1becf40acbec8fc7134b
SHA10729fdc617403622c2edd77fdb7dd49b530e2037
SHA256ba1458f730ff90009483c763926d1c74383480e529541c0ef5d4de44e7a4f14c
SHA5129dbb487489c8a6af8dbd6326fe4958f489552af268f2937495ada35bb8404cfaeaf54833d8bba2966e72cd0ba3284a5fd167baf4cd6d905870f5d1ed3e5ff6c0
-
Filesize
27KB
MD5f32bd567d35d2e85504c39dede609e72
SHA1b7a7145956466e45bbe6f7fe41e935a152c2c325
SHA2565f2bb085217304006c81c55214c6093ec476e554e31808026e424da82f58aa0e
SHA51255396f3e5821d3f3eb5988bd3362a0cddf036de4afa8cc1214813834b5a152fc3df787a8347a7aff3de6bf112e1d2a354790f593854a59f1f49393ddf967d085
-
Filesize
25KB
MD556c02fabc2c64174009c905570c3a22d
SHA1e52154112ad127ab01937453490091def4d21ad2
SHA2560aa2cf2cc029c95fc053374071d7873edddc410ff8858720ee5c29bfee62dddc
SHA5129f22f70b5de4078fcbfdbb186d6cf220561200092eb7ceaaad9d44a5281f84abfb1729f4e447dab3753225d5fc6c44d94363e3729e5765dd2213213c327c4c1b
-
Filesize
69KB
MD54b27cf5cdb20aebf113df752019ffca3
SHA1b02c6e45f704dac118f81c324122c189e3e61e17
SHA256c1e206aa4c8014dcfdad15c16f50fbf4e3ce8e76e9406af923131ebc001dd5ac
SHA512cd4df2478d719e159e2252e6784d24e4260c13d8f47774ac33a8e10b1fa96d38236bf2c3ebc060a5801fc19392cbe5c636befa898721bf114956c2be6476bbd1
-
Filesize
19KB
MD5fa677cfb18ba1370d8bb98681c48cfbd
SHA1cbccd561bf53c59254fb04ab136996b81cc80d3a
SHA25636589e9738a9358065d5a72f4276505d6c2f78101508bede05bdcceea46a8cd8
SHA5129312acd4955d4950d851910198d4ee622b75e11262e409c79391078d12d2d0db320723a1552048acc0e9deb30378e3cd27d4fabcf2077d429eedfb275cdb73e3
-
Filesize
22KB
MD5595a997bd415c8ae0ef1e3c3b73e6091
SHA110f34bc2f474a43bfaac26f66ec8081106c12253
SHA25611aca97acda31203aeee496c9f183b49db1c54d0efa48888a15ab4ea47ee080f
SHA512944f6bc405c69d6bf6dc97652e9f296658bd3de078dda50ac680e56818c00dfee909b100fc2fa9c6a891c55dbc66dd62ac52819950732c83198dbb8c04f3c9b8
-
Filesize
24KB
MD5415d765aa267382a79e56e428c80b1e1
SHA11bf13460b8aaac1538bf45186a1624825bb8c355
SHA256cf7bbe93ae75a1c46a38204a6acef71bf2f5e3cd34501825601900e07d3d7b15
SHA5127236ef7b2937718409ef4eeda20318b1697e7c1c868d0df263f4be8673365d48ff6ffa2317bfd1881b6cb3dd1300410ad4f715b8e01ed321c4011aac88490d21
-
Filesize
24KB
MD55bd5a9001cb0555c5b2b14e0cbc8d922
SHA14562d23fba312fe95cbc777fd7c2e37ca1e76ad9
SHA256b516d1772b75714f039440cf5d070b87a187d2f67b7f891c94cf1c60330fbfa7
SHA512a6271f28f069a00c2912f80552bd54bf0d8461886adff626b336d25943dd0ade19eb88c718602017a1986317af3eb5f94f8896e88b9367207e8b53225322cb84
-
Filesize
20KB
MD5f719ad4c04043f55a21e73805997b287
SHA10e88b1271b242f7933e78edcb05131612cea061e
SHA256a4b0f75854949980d410c5da90c36ddb94be292431c89fd3e992f9d5f8ee9983
SHA512752b9b4385162126729c3f09b3b75d7121c8dec00cce11f7cf1ecaffed3e79addcbcfe8bdd4e20e15b8494bfe2d24c3f2d11583860b1e03be021196bc83fc3bf
-
Filesize
18KB
MD5a405399d5b958a03e6054307a631553a
SHA1dba43f0afd8c6e1f61cf0be7503c6f70b48b8240
SHA256d675ee0c418c4cd7ff0c19c2d945331c8e6072a51abbca548e7d9d2f1bf288dd
SHA51233c64766053058fa9fa4fe689f1ca5a345b8b70443995d71aa65b64c7bb38d4dc3a2b37ad06a4ce5ca1c927ed9ea4377443eaaecc69b0e758ff265e755194287
-
Filesize
310KB
MD567a3ad0fec3eb767e423e3d7a9134343
SHA142949506bc8451031425840df33f3acab5637b52
SHA25601729ff33c2e3db1033fb86e899d62026dc1c03705269bb9636227f61934d9b3
SHA512f3b13d38f44acf37c5002f08b684cb2955b778c8a703c8fca6e07eecaac45e1bf4bb036dda055114152390322351ef936492abbf6532d1a48fcfd29304b4db1b
-
Filesize
51KB
MD58a2ef730063317fcecc510063c11c28e
SHA16992058fa89a2c6ed41ec02afeab0dc9c7d96a51
SHA256f404f48b5d8223571b4697ababf7da60404ed5fec958bff698d7cffaa6a4fff9
SHA512c88035598f187125139b93756e5f4324ed253494d63262c9a153a0f4a450a1aff9ccf594e7c82fe6245bac3c055b3c60d84eaa0f5a70d11ef974ad8752686771
-
Filesize
636B
MD511d8dd27339f77a7bb632ffd1e14b6bd
SHA1c22d96c0f04b1dccc2f0028a9522e0bcd76c7d0e
SHA25677761e9e38430386c473a1f26ea78f55fdeb42c5f785523308dc5c5f852daf9a
SHA512e5b57da52e120b3ef87f9bd66dc0bc88508a16bb4fe6ec2442b68d2070e80d22a837cd3c145c0da24b743b620ad82f4ee365995a3f59eeaa88eb3853548d67cf
-
Filesize
471B
MD5cf2e0722747b50ce215fc3dadec4e003
SHA105647ada04495a03f1d25ec341e20495093e42b0
SHA256f358a88588f82db7dca9b43aee2e3d20e211d780b9eca8497ae617eb8cbb705c
SHA5125a229b6ef40c6d523d6fdb0dd83c706f946b2e40c8633f8e78255dcb255f4de8a38b0c3eec8223b291354be43a0ddf78fa6e2255ebae3869076e7bb6eedf6269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_D14B79B440CDC26D7D21C81855E2C04D
Filesize471B
MD5f2efbce793c04d8e609baa8b0304e21c
SHA1ea2e858fddf0e95321ce7ccb08c301b5bf8bab4b
SHA2567111a2c67178de083d19b328253c713b436788975db55ff990cc9ed50063b1a8
SHA512c1a38412ba9a7f93910b03e21ee678bb266d310f16183e5e6b6bbcbb824d643745eb2b51931ff576ed13ecbe1cafc69dd6000b003ed4dca7700f6339491fb299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\772D055D5E4421B179898A4E6FBD9ACC
Filesize400B
MD5ca455405466d90323c1f6dda2efb4363
SHA19191c7f368c983961c090cb3f28b9d139e653349
SHA256ccd0280c75de0519fcce8ecc6ef07e2952304fbc11c07646b4e431fe51af54f7
SHA512054a0145135a5624906115d02e7759bce837f4b64e9554d32e5a2aaa5e0293649fa6b18241b656948a47b6a1c56e641824738fc21ec59273e8a0aa8a9d3fecfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_D14B79B440CDC26D7D21C81855E2C04D
Filesize404B
MD52514fe40c6ef7f1874109a1aff96bf59
SHA16dd4f03e395ff3e568f2c9799808ba202aaa4d75
SHA2562e86f7bbdd44e2e24fe6ca91770b4f8cd8c92158ca11178dc2e082feab1b5d34
SHA512eb139f43c478bdf1aba44ea180e658fd90568e9b0190f85019ec735ab3d1eb11dcc670f9c43a0a2f37b13023a21a56c178089fdb7ff72c832a0e8fc7deac61ab
-
Filesize
280B
MD586a436169f2a626a53da1e245514f5a5
SHA19da9f505848ab6a945773e8e4b4a506a83460e2d
SHA2568921a909b0e088f600cb65fab7b1a8206d4c6960fb5607d50605b10f465dd4bb
SHA51220ac3578c36736fa5ac0a68d7566aab963c865ccfb117ea3a52268ed5427d9f1394e4ac20fe58f3d51c48a9f4cd038beeab70621118f588ad3df82c20f1525e6
-
Filesize
280B
MD529f13140c50c2394177caf96baf3a5c0
SHA1680e35060382a846752eb208b62de077d31fd1eb
SHA256f4554eb3e1e133edb5f5f01e19539ffc52adc0b346e19c4742a815e7a92b2dcb
SHA512d964d066a2913d3b6eb73925160d7e9d79a94ae5c6e3956cd361b54fe53833b311990a91346917bc90b227301d864939f6a5a417ff52ef9fe8e21971b1a661fc
-
Filesize
280B
MD5a46a324553367dc0b13a007305e4f102
SHA1005a700ac0bf4429024f9e857e2281f82f370aed
SHA256a718f2fe90be4422382450b4959840a13d6d18dea09d3da5394624198a126063
SHA512d3b9fcde15be13451aa441070d9143fc53faa6a2725adea7fb9c340bcb9d7ea183dc1b36c0f8ec21c1748c80bc8fa03a14f198c2fc914c9f8e81702bd8e18399
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD551d750f97c1ba2eaf1759b43d1b32219
SHA17d402ef239c419fd53e576cfb082be282e2475c5
SHA256e3fd86e3d274440d49b473ec211249b80a1d80001f19434ecf7234773987263c
SHA512a16b76b7b0ec53b6177cc75b4a4293b78509ef2f82b1f4080c33e077ba53319a06bbe995ae6e615f7a9dfe26f457604fbbcea26b9d7102fd086d9d1c0ae471d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize6KB
MD5dbfbfccaf50baf7257f0f2021ccd2fa5
SHA1e64b3bcfd9673af2d2c3fc35592589407eabfb09
SHA256e824ff63fd15282948429caf0302f5b4ef5a105efbca34fa35b00a86969751bb
SHA5126be206e65774d66ff7ee340c4d521b0b26c77fbe94a2d68be5cf0ea494cd0be8a7f23b08e1eaa0b06bf25bf65281fe1f4b6e3cab10801ac00ad9e966ce3daf79
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD505445a9663c0f46e9c96c64a8c0872e1
SHA10c73734931cc11ec63a11d656278bdaa007a1aa1
SHA256adbcf759ec952fce9ae5a0254b01e0715c1975603aae7d898d0f03b37c8ad3ac
SHA512704c503911231e2fc5a4b3b3c877cae6ba52b7958394d69d4641e78bb8d5500d92b5a84835bdb480cffd6efd5d02d37f8231610febf46f745c21f202ae3291a5
-
Filesize
264KB
MD5002b75f8348f3ffd27f621a09be86c48
SHA1a1157576aa45518ad9c7a1bfe8409c34503326cb
SHA256dfa2ee33ca134c941113b9bef621d837bdb55c02ffcbcf49f80fd185a7d1f44b
SHA5121959bed3a50decf10b33ccbc0861dfa1a693e361124059af6dedf9bc51d56a9f00978a24a9f2fe00b6f8562d19619747005328dace4a7a3238576b9a7e46a3a2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\1f932c9b-0047-4135-8d67-29d6400df79e.tmp
Filesize2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD58d8a5b8c0ff6edb49c9aa2a323732831
SHA1bbc2fa9f1c73f161d988e82670f3847844f5fba4
SHA25647e125e428791dc07c9901559c3a7bb96dafc63030519453add331058e033b28
SHA5124025a6042ab8cacb38a369885dd4b9a896b999fb64e7a8e9ad4a7a527a9b5f87fb71c01a0c7fd55dea3846c6c6555479cf4e414a92617683352fab4dfb324b62
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\e96fd62b-3c5f-4aa1-b16f-dfc263331510.tmp
Filesize40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
14KB
MD5d632f0a9ac55df18fff9e02b878dce05
SHA1fec56d4260e41c6b930206bafa266a070e921491
SHA256a71421ca00233e0f0d5a4ab272a4f854774010e5834ef4aa3ed0fe7dd7e3607f
SHA5127336f2c93aa51cc24305369a9bfb2b48e8ce298c9067a0df88f4479da77ca83df3f0ea374e35fd23176c4c177cd8d74e398ead92ed5651d4d25b68a10b4fe552
-
Filesize
13KB
MD58d3df101b0275c46a3db3f576883fc9a
SHA1dca44a0424352540f800a8f9d9e4e9bfe12c7b5d
SHA25674d75f1b7daa51e5cc98be8686232a6bd6f03493436e4604de3e78eee3fde989
SHA5125bf71cb2492226ae9671935b849cd4ecae4e4aed78afa8d6013a79d638d78f5122e8d4728a23013450e647adaaf3a7e36f76cc4a35f481e5edd2222ebc3c7cfb
-
Filesize
15KB
MD5fb223dd68469c0633bb8e2dfdcdc5d30
SHA153d32b03141f170f040f00e67da0e612eceacb2d
SHA256a3537ed3cec61aea5365875b3409eec51ad47d929c7b9e9d5866921d55f10fe7
SHA51235c97ad076f410de1abedc8aa547a72e9d999feb71f2a1c2533eb4ffc68dc0e0c661aff7bb8e6686b33dc1d3c4df183fbf60516d983045c679729f28a6b78db1
-
Filesize
16KB
MD54818d20cd80acf5f468e69b3d7f6147a
SHA17602799af9ac69279f90bbf9a09a9ac20b671fd3
SHA256803118e06ffc70d8fcd809d53a027343272b4050e666cc3676b124db485b7c09
SHA512f51c5d8746ee323637c14137cb6c9dd9796945bcc9ccc7641fcb05b782c1a9baa78c6a435cb9428d956d1ccbfe564072d95cbd1ea473cee1199b0d97505e2622
-
Filesize
36KB
MD51dece3edef13b3f61f53863fd0d4d3c9
SHA1c770422d7e12406ea372f81197b68e8a882c0aaf
SHA25664c7ac899d0f475453c157509ba2d7ab87fad34601da680c5ea9c06f3f2e8b0b
SHA512b7c3b60018063b0849b8f6748519bc6badaa07c6e4fb8f881ae64e80b89e8d5e3a1b1fb706e0d6c1d051f9c403a8091ba7d20569659d3a3562785e8f345751e7
-
Filesize
5KB
MD50e36bd0cbe2a546ca5d71944804627dc
SHA18caa05dfd4618945ca5c069f1c47946d046f4b68
SHA2563bbe5da65fddfa2749686748fb890e321705ab7e89aa4f71911a55c6ebcd12bd
SHA512ace5787fc780885af3bf328696d8b623a4428db46beb4c4d2e6b7e722c95fb1a76caec706a276fbe0c5f382909649ff2fbbaa71ab53e160041a7f2eb03bbd035
-
Filesize
880B
MD5d505e83c7d801af0976dc991ef4c262c
SHA1394a7b850b02c9ae60b380d1790c635076ed61a5
SHA256b6dc2487473f10019420eab85ff4e63cdf98252921168f43ca5481b7ec89a11f
SHA51213b02e82441c9e7f5e4fe3ef83163ee02fa6bc3d2d37dda0d453bf79c2c8f0aa59ad77c32b6ad7698d65f1334d4d1e841ff071e27b85288af21f350135819aec
-
Filesize
22KB
MD51ccce36844cb0612001c0a1e39ed83f7
SHA187339009ef0151c8765e98d97ec853e42f70ebc9
SHA25626a29e20c9dd0a3c490645ce83f9071b24cda081f14c5317fd9868114837d6fa
SHA5121043f7030c8fafd0cf1d31eff06da33a5af8d1cdfe8d0ded7127b89c688f2ab23da65a0049cdca7d371439d320e54091d04311e6c21d576fd45aeaf61ea86503
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe5addaf.TMP
Filesize469B
MD53a87105d9bd02f30f7c0ef8a4455fdab
SHA1551a3394271603ac57737ce7adaab6644b6ca991
SHA256eb28411d7a908a20f3275fbd0409965247956d4f0375bd0fa75234ac86bcf621
SHA512c46913c27c0a783f50456829abdeedbdf52f5b222ffaac21d60c4873b7a8b24ef768379492e1a0d6d8fed15b7021e8e12aaae2fd7c66b6da50ea1e47afe05c66
-
Filesize
21KB
MD5e4dfd0504387a1ebcc4a48846e44a23e
SHA1a5a91da421e3d8728ae857694dbeb24ea72b7866
SHA256d3c39babd9652bcdb02ae17f895437ed85f617cb04f7ba4bbaf7ad7e8ab78cb6
SHA51294a1d4ab7b18763b55c9246d73feb0ed64a7e506572884a2940696b12910d6ff2a03a0b1aca3e4035a81548633acd437e762e758952ba72dafc97f191e46d419
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe5ae35c.TMP
Filesize3KB
MD5c7569efb2fa9fe93c0ea2f0896f54036
SHA1e231c700b778b624f6065b035e5803fdd8b4db4b
SHA2562422f055fd21adce7a027c3eaab1bbc474345a26cb1b9762b3d7572ebde67d3f
SHA512c394da9a75cca87f6e20cb2abbc2e087d3e374b613bbc960f255ebfc8f01d4349fc8a487ec56ff8141f47566cf021dc33196e42b6295ce5399ff78e5ce4b066f
-
Filesize
7KB
MD5721ef6fc98b31f37c6feb9b9e15d316a
SHA13e0f9170e7d573fef2bf5307c8bb4287a24040ba
SHA25665fe9994798f6c6a7c47b6c307dadfe0749099fc4c59955ba1bb50defdb1fbce
SHA512a233119e978b1cfea923cc0a1c1c7413c62de865a56d1d71e7c31cee87c9fd6ee5409817ac88521c555dde3a6316c58d2b0f947f22a7d23d4f0f8808fcfb2a2b
-
Filesize
30KB
MD53da987c78f5a75c8550b4139d889edf5
SHA19de302f8304571b9e69dc1adc2e8e710b8af4167
SHA2562a073235cbde1ca9e4bf3b4a9542a701c4738c377027da616451cc93ec53e73f
SHA512f36327f828fa14ad257685a243989d9e3281e4060b7abd619afff682b801630f265a2086b534fdfbaed657267ea597f4c4c8932be4113b3ed1e5caa9bea01caa
-
Filesize
41KB
MD53ddae5067dd0a685a4e188ea8262af32
SHA10f87bacd4c87d251859324fff27212c2abf83597
SHA2565be6399ec2e0977be0ce0eff5fb8fbc2f623c62d229ba1a815c4ffe146338d31
SHA512de41cd60905ea2fe0270098384a1dd2d3885dfafedbf3fd3d9540f3f13d818488d4225699d5ec0e827e468729b2570323db57ba0ceef75d6a63e15bd1af795be
-
Filesize
6KB
MD53cf1f15dac3c49b1185bbc41aa4fca28
SHA167314903d19a51d5efe2b5f94d9ea2bfa503f06d
SHA2569051f7616987a5509ab01e280c76bedde33d23943f61b8b0ad7e8cb1ea6905fa
SHA512d3fd07017b52690801c2339456f2a68319f15e3197a2c10c87dd6c29c3463de94e3eb4e5082b9c452801c0cbac99116b4dba06431bd1d7f23df4ff43b8b335d4
-
Filesize
34KB
MD5867ad087ec4fb5a273aa921f9d3527a4
SHA1b92ef739b9b944c31a6662982968fac95f59a64c
SHA256216ca28f3777f15a498cce74d329d36dc12081b4483db821feb798d78026ebb3
SHA5124fe5614833b997f635ad4c05315747d8d3a82c319f42726cf31d9ce849611936644b044aa105d6a915ee2d5dac63f96c3141431f6d77efa3a47a0bb393a96776
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82