Analysis

  • max time kernel
    1050s
  • max time network
    759s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-07-2024 20:36

General

  • Target

    LDPlayer9_ru_1007_ld.exe

  • Size

    6.2MB

  • MD5

    e0e91d2d5ecc36bde3a3ba87342c4442

  • SHA1

    47dbd2d9ad2ac3c830339bada9f5daa1c7c993a2

  • SHA256

    86e78c5424bca2e9f9b84c50e251118573dc22bcee6ff908362b6b0e37205bdc

  • SHA512

    b1e2e7fb492158f5fa2ece54bd5a805a5dd97b1eca8d0da3d1ec2bfe8c55220acacf4627384e62745d440b263e1b416177094e33729b1bba97d414ebb575eb86

  • SSDEEP

    98304:TaMOOH01Z71vVOO+svd2YJVr5cOlprwwEGK579UbrGi:TaMOA01uCtf5copnEGKF97

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Manipulates Digital Signatures 1 TTPs 64 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Possible privilege escalation attempt 6 IoCs
  • Modifies file permissions 1 TTPs 6 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Executes dropped EXE 22 IoCs
  • Launches sc.exe 11 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: LoadsDriver 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LDPlayer9_ru_1007_ld.exe
    "C:\Users\Admin\AppData\Local\Temp\LDPlayer9_ru_1007_ld.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM dnplayer.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1152
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM dnmultiplayer.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:804
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM dnupdate.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4620
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM bugreport.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:5100
    • C:\LDPlayer\LDPlayer9\LDPlayer.exe
      "C:\LDPlayer\LDPlayer9\\LDPlayer.exe" -silence -downloader -openid=1007 -language=ru -path="C:\LDPlayer\LDPlayer9\"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5084
      • C:\LDPlayer\LDPlayer9\dnrepairer.exe
        "C:\LDPlayer\LDPlayer9\dnrepairer.exe" listener=721000
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Windows\SysWOW64\net.exe
          "net" start cryptsvc
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1584
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start cryptsvc
            5⤵
              PID:576
          • C:\Windows\SysWOW64\regsvr32.exe
            "regsvr32" Softpub.dll /s
            4⤵
            • Manipulates Digital Signatures
            PID:888
          • C:\Windows\SysWOW64\regsvr32.exe
            "regsvr32" Wintrust.dll /s
            4⤵
            • Manipulates Digital Signatures
            PID:3408
          • C:\Windows\SysWOW64\regsvr32.exe
            "regsvr32" Initpki.dll /s
            4⤵
              PID:564
            • C:\Windows\SysWOW64\regsvr32.exe
              "C:\Windows\system32\regsvr32" Initpki.dll /s
              4⤵
                PID:3548
              • C:\Windows\SysWOW64\regsvr32.exe
                "regsvr32" dssenh.dll /s
                4⤵
                  PID:3860
                • C:\Windows\SysWOW64\regsvr32.exe
                  "regsvr32" rsaenh.dll /s
                  4⤵
                    PID:4644
                  • C:\Windows\SysWOW64\regsvr32.exe
                    "regsvr32" cryptdlg.dll /s
                    4⤵
                    • Manipulates Digital Signatures
                    PID:2752
                  • C:\Windows\SysWOW64\takeown.exe
                    "takeown" /f "C:\LDPlayer\LDPlayer9\vms" /r /d y
                    4⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:1056
                  • C:\Windows\SysWOW64\icacls.exe
                    "icacls" "C:\LDPlayer\LDPlayer9\vms" /grant everyone:F /t
                    4⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:2932
                  • C:\Windows\SysWOW64\takeown.exe
                    "takeown" /f "C:\LDPlayer\LDPlayer9\\system.vmdk"
                    4⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:2884
                  • C:\Windows\SysWOW64\icacls.exe
                    "icacls" "C:\LDPlayer\LDPlayer9\\system.vmdk" /grant everyone:F /t
                    4⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:4684
                  • C:\Windows\SysWOW64\dism.exe
                    C:\Windows\system32\dism.exe /Online /English /Get-Features
                    4⤵
                    • Drops file in Windows directory
                    • Suspicious use of WriteProcessMemory
                    PID:2976
                    • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\dismhost.exe
                      C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\dismhost.exe {EE7AA85C-0D01-4D71-918C-2D8E5C6491B4}
                      5⤵
                      • Drops file in Windows directory
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:5096
                  • C:\Windows\SysWOW64\sc.exe
                    sc query HvHost
                    4⤵
                    • Launches sc.exe
                    PID:3264
                  • C:\Windows\SysWOW64\sc.exe
                    sc query vmms
                    4⤵
                    • Launches sc.exe
                    PID:2884
                  • C:\Windows\SysWOW64\sc.exe
                    sc query vmcompute
                    4⤵
                    • Launches sc.exe
                    PID:4248
                  • C:\Program Files\ldplayer9box\Ld9BoxSVC.exe
                    "C:\Program Files\ldplayer9box\Ld9BoxSVC.exe" /RegServer
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:1828
                  • C:\Windows\SYSTEM32\regsvr32.exe
                    "regsvr32" "C:\Program Files\ldplayer9box\VBoxC.dll" /s
                    4⤵
                    • Loads dropped DLL
                    PID:4256
                  • C:\Windows\SysWOW64\regsvr32.exe
                    "regsvr32" "C:\Program Files\ldplayer9box\x86\VBoxClient-x86.dll" /s
                    4⤵
                    • Loads dropped DLL
                    PID:4988
                  • C:\Windows\SYSTEM32\regsvr32.exe
                    "regsvr32" "C:\Program Files\ldplayer9box\VBoxProxyStub.dll" /s
                    4⤵
                    • Loads dropped DLL
                    • Modifies registry class
                    PID:3824
                  • C:\Windows\SysWOW64\regsvr32.exe
                    "regsvr32" "C:\Program Files\ldplayer9box\x86\VBoxProxyStub-x86.dll" /s
                    4⤵
                    • Loads dropped DLL
                    • Modifies registry class
                    PID:384
                  • C:\Windows\SysWOW64\sc.exe
                    "C:\Windows\system32\sc" create Ld9BoxSup binPath= "C:\Program Files\ldplayer9box\Ld9BoxSup.sys" type= kernel start= auto
                    4⤵
                    • Launches sc.exe
                    PID:1108
                  • C:\Windows\SysWOW64\sc.exe
                    "C:\Windows\system32\sc" start Ld9BoxSup
                    4⤵
                    • Launches sc.exe
                    PID:1168
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "powershell.exe" New-NetFirewallRule -DisplayName "Ld9BoxSup" -Direction Inbound -Program 'C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe' -RemoteAddress LocalSubnet -Action Allow
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2640
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "powershell.exe" New-NetFirewallRule -DisplayName "Ld9BoxNat" -Direction Inbound -Program 'C:\Program Files\ldplayer9box\VBoxNetNAT.exe' -RemoteAddress LocalSubnet -Action Allow
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3444
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "powershell.exe" New-NetFirewallRule -DisplayName "dnplayer" -Direction Inbound -Program 'C:\LDPlayer\LDPlayer9\dnplayer.exe' -RemoteAddress LocalSubnet -Action Allow
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1848
                • C:\LDPlayer\LDPlayer9\driverconfig.exe
                  "C:\LDPlayer\LDPlayer9\driverconfig.exe"
                  3⤵
                  • Executes dropped EXE
                  PID:8
                • C:\Windows\SysWOW64\takeown.exe
                  "takeown" /f C:\LDPlayer\ldmutiplayer\ /r /d y
                  3⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:3124
                • C:\Windows\SysWOW64\icacls.exe
                  "icacls" C:\LDPlayer\ldmutiplayer\ /grant everyone:F /t
                  3⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:4856
              • C:\LDPlayer\LDPlayer9\dnplayer.exe
                "C:\LDPlayer\LDPlayer9\\dnplayer.exe"
                2⤵
                • Executes dropped EXE
                • Checks processor information in registry
                • Modifies Internet Explorer settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:3476
                • C:\Windows\SysWOW64\sc.exe
                  sc query HvHost
                  3⤵
                  • Launches sc.exe
                  PID:1060
                • C:\Windows\SysWOW64\sc.exe
                  sc query vmms
                  3⤵
                  • Launches sc.exe
                  PID:4628
                • C:\Windows\SysWOW64\sc.exe
                  sc query vmcompute
                  3⤵
                  • Launches sc.exe
                  PID:1260
                • C:\Program Files\ldplayer9box\vbox-img.exe
                  "C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\..\system.vmdk" --uuid 20160302-bbbb-bbbb-0eee-bbbb00000000
                  3⤵
                  • Executes dropped EXE
                  PID:2080
                • C:\Program Files\ldplayer9box\vbox-img.exe
                  "C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\leidian0\data.vmdk" --uuid 20160302-cccc-cccc-0eee-000000000000
                  3⤵
                  • Executes dropped EXE
                  PID:3672
                • C:\Program Files\ldplayer9box\vbox-img.exe
                  "C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\leidian0\sdcard.vmdk" --uuid 20160302-dddd-dddd-0eee-000000000000
                  3⤵
                  • Executes dropped EXE
                  PID:1032
                • C:\LDPlayer\LDPlayer9\dnplayer.exe
                  "C:\LDPlayer\LDPlayer9\dnplayer.exe" index=0|
                  3⤵
                  • Executes dropped EXE
                  • Checks processor information in registry
                  • Modifies Internet Explorer settings
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:2692
                  • C:\Windows\SysWOW64\sc.exe
                    sc query HvHost
                    4⤵
                    • Launches sc.exe
                    PID:3564
                  • C:\Windows\SysWOW64\sc.exe
                    sc query vmms
                    4⤵
                    • Launches sc.exe
                    PID:2816
                  • C:\Windows\SysWOW64\sc.exe
                    sc query vmcompute
                    4⤵
                    • Launches sc.exe
                    PID:3268
                    • C:\Windows\System32\Conhost.exe
                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      5⤵
                        PID:2080
                • C:\Windows\SysWOW64\taskkill.exe
                  "taskkill" /F /IM ldcurl.exe /T
                  2⤵
                  • Kills process with taskkill
                  PID:3080
              • C:\Windows\system32\AUDIODG.EXE
                C:\Windows\system32\AUDIODG.EXE 0x00000000000004E8 0x00000000000004EC
                1⤵
                  PID:3984
                • C:\Program Files\ldplayer9box\Ld9BoxSVC.exe
                  "C:\Program Files\ldplayer9box\Ld9BoxSVC.exe" -Embedding
                  1⤵
                  • Executes dropped EXE
                  • Modifies registry class
                  PID:4448
                  • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                    "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                    2⤵
                    • Executes dropped EXE
                    PID:4716
                  • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                    "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                    2⤵
                    • Executes dropped EXE
                    PID:1460
                  • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                    "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                    2⤵
                    • Executes dropped EXE
                    PID:1740
                  • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                    "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                    2⤵
                    • Executes dropped EXE
                    PID:4720
                  • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                    "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                    2⤵
                    • Executes dropped EXE
                    PID:1936
                • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                  "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                  1⤵
                  • Suspicious use of SetWindowsHookEx
                  PID:3712
                • C:\Program Files\ldplayer9box\Ld9BoxSVC.exe
                  "C:\Program Files\ldplayer9box\Ld9BoxSVC.exe" -Embedding
                  1⤵
                  • Executes dropped EXE
                  • Modifies registry class
                  PID:2712
                  • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                    "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                    2⤵
                    • Executes dropped EXE
                    PID:4616
                  • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                    "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                    2⤵
                    • Executes dropped EXE
                    PID:1596
                  • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                    "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                    2⤵
                    • Executes dropped EXE
                    PID:1740
                    • C:\Windows\System32\Conhost.exe
                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      3⤵
                        PID:3124
                    • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                      "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                      2⤵
                      • Executes dropped EXE
                      PID:3112
                    • C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe
                      "C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config
                      2⤵
                      • Executes dropped EXE
                      PID:4876

                  Network

                  MITRE ATT&CK Matrix ATT&CK v13

                  Execution

                  System Services

                  1
                  T1569

                  Service Execution

                  1
                  T1569.002

                  Persistence

                  Create or Modify System Process

                  1
                  T1543

                  Windows Service

                  1
                  T1543.003

                  Event Triggered Execution

                  1
                  T1546

                  Component Object Model Hijacking

                  1
                  T1546.015

                  Privilege Escalation

                  Create or Modify System Process

                  1
                  T1543

                  Windows Service

                  1
                  T1543.003

                  Event Triggered Execution

                  1
                  T1546

                  Component Object Model Hijacking

                  1
                  T1546.015

                  Defense Evasion

                  Subvert Trust Controls

                  1
                  T1553

                  SIP and Trust Provider Hijacking

                  1
                  T1553.003

                  File and Directory Permissions Modification

                  1
                  T1222

                  Modify Registry

                  1
                  T1112

                  Discovery

                  Query Registry

                  2
                  T1012

                  System Information Discovery

                  2
                  T1082

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\LDPlayer\LDPlayer9\MSVCP120.dll
                    Filesize

                    444KB

                    MD5

                    50260b0f19aaa7e37c4082fecef8ff41

                    SHA1

                    ce672489b29baa7119881497ed5044b21ad8fe30

                    SHA256

                    891603d569fc6f1afed7c7d935b0a3c7363c35a0eb4a76c9e57ef083955bc2c9

                    SHA512

                    6f99d39bfe9d4126417ff65571c78c279d75fc9547ee767a594620c0c6f45f4bb42fd0c5173d9bc91a68a0636205a637d5d1c7847bd5f8ce57e120d210b0c57d

                  • C:\LDPlayer\LDPlayer9\crashreport.dll
                    Filesize

                    51KB

                    MD5

                    19dae6362eb73913f7947f719be52516

                    SHA1

                    e157307ae8e87c9a6f31bc62ecdf32d70f8648d9

                    SHA256

                    ae0eba69019294d03e11d68fea0ee72e77bfe156803f1b83bc8566a0a4d3584d

                    SHA512

                    f5eb5771eb03f7f2067e32573397814ff3ef54dc7fae0abadad6bfdcafef6a4a5bf6f3ab9874c0530cb70cb995f6716ca8fa1cba175ed5a1d298c700f6e59ad2

                  • C:\LDPlayer\LDPlayer9\device.ini
                    Filesize

                    91B

                    MD5

                    dba7fefc48f3b90350effad166abf887

                    SHA1

                    263d9ceb08d10685ff4222d7c89cb563d2c411f8

                    SHA256

                    02cf1d1f11940dcc79c52917a12f52f3a0b3aa3a381ce86d86d3a15c50ac5292

                    SHA512

                    34789e652fc0155e6d18e779d57fdea51c4fc439f96313e0d5290558402d4171d8f8abdcca31d01eb5d50b0bedbaa68b0f70d47df8a4ab714a4f40e6c5a1d2ab

                  • C:\LDPlayer\LDPlayer9\dnmultiplayer.exe
                    Filesize

                    1.2MB

                    MD5

                    330013a714c5dc0c561301adcccd8bc8

                    SHA1

                    030b1d6ac68e64dec5cbb82a75938c6ce5588466

                    SHA256

                    c22a57cd1b0bdba47652f5457c53a975b2e27daa3955f5ef4e3eaee9cf8d127a

                    SHA512

                    6afb7e55a09c9aac370dff52755b117ad16b4fc6973665fce266ea3a7934edfb65f821f4f27f01f4059adb0cf54cc3a97d5ff4038dc005f51ecee626fd5fadd1

                  • C:\LDPlayer\LDPlayer9\dnplayer.exe
                    Filesize

                    3.6MB

                    MD5

                    2061141f3c490b5b441eff06e816a6c2

                    SHA1

                    d24166db06398c6e897ff662730d3d83391fdaaa

                    SHA256

                    2f1e555c3cb142b77bd72209637f9d5c068d960cad52100506ace6431d5e4bb0

                    SHA512

                    6b6e791d615a644af9e3d8b31a750c4679e18ef094fea8cd1434473af895b67f8c45a7658bfedfa30cc54377b02f7ee8715e11ee376ed7b95ded9d82ddbd3ccc

                  • C:\LDPlayer\LDPlayer9\dnrepairer.exe
                    Filesize

                    41.9MB

                    MD5

                    4def56a3500d5a4dec3ff797a88c5751

                    SHA1

                    1a53c9c6f3d1e27ac8532e09f87990505c8090de

                    SHA256

                    c09b51bdc9039b976a55eb8dc7c517d65d8d5f6eadda92d2de27ceee7845b0e4

                    SHA512

                    a96322ca61f45875bfdb7b514ce1a95bbc1faba3fc0b7bc7c0af3f05d68c14e47fddff64e595f6bf053df7e1efad3e5f9e33f3bc2e09501c3c20de62864ae1d8

                  • C:\LDPlayer\LDPlayer9\dnresource.rcc
                    Filesize

                    5.0MB

                    MD5

                    d4d2fd2ce9c5017b32fc054857227592

                    SHA1

                    7ee3b1127c892118cc98fb67b1d8a01748ca52d5

                    SHA256

                    c4b7144dd50f68ca531568cafb6bb37bf54c5b078fbac6847afa9c3b34b5f185

                    SHA512

                    d2f983dde93099f617dd63b37b8a1039166aaf852819df052a9d82a8407eb299dac22b4ffe8cab48331e695bf01b545eb728bec5d793aeb0045b70ea9ceab918

                  • C:\LDPlayer\LDPlayer9\fonts\NotoSans-Regular.otf
                    Filesize

                    17.4MB

                    MD5

                    93b877811441a5ae311762a7cb6fb1e1

                    SHA1

                    339e033fd4fbb131c2d9b964354c68cd2cf18bd1

                    SHA256

                    b3899a2bb84ce5e0d61cc55c49df2d29ba90d301b71a84e8c648416ec96efc8b

                    SHA512

                    7f053cec61fbddae0184d858c3ef3e8bf298b4417d25b84ac1fc888c052eca252b24f7abfff7783442a1b80cc9fc2ce777dda323991cc4dc79039f4c17e21df4

                  • C:\LDPlayer\LDPlayer9\fonts\Roboto-Regular.otf
                    Filesize

                    103KB

                    MD5

                    4acd5f0e312730f1d8b8805f3699c184

                    SHA1

                    67c957e102bf2b2a86c5708257bc32f91c006739

                    SHA256

                    72336333d602f1c3506e642e0d0393926c0ec91225bf2e4d216fcebd82bb6cb5

                    SHA512

                    9982c1c53cee1b44fd0c3df6806b8cbf6b441d3ed97aeb466dba568adce1144373ce7833d8f44ac3fa58d01d8cdb7e8621b4bb125c4d02092c355444651a4837

                  • C:\LDPlayer\LDPlayer9\ldmutiplayer\7za.exe
                    Filesize

                    652KB

                    MD5

                    ad9d7cbdb4b19fb65960d69126e3ff68

                    SHA1

                    dcdc0e609a4e9d5ff9d96918c30cb79c6602cb3d

                    SHA256

                    a6c324f2925b3b3dbd2ad989e8d09c33ecc150496321ae5a1722ab097708f326

                    SHA512

                    f0196bee7ad8005a36eea86e31429d2c78e96d57b53ff4a64b3e529a54670fa042322a3c3a21557c96b0b3134bf81f238a9e35124b2d0ce80c61ed548a9791e7

                  • C:\LDPlayer\LDPlayer9\ldmutiplayer\cximagecrt.dll
                    Filesize

                    1.5MB

                    MD5

                    66df6f7b7a98ff750aade522c22d239a

                    SHA1

                    f69464fe18ed03de597bb46482ae899f43c94617

                    SHA256

                    91e3035a01437b54adda33d424060c57320504e7e6a0c85db2654815ba29c71f

                    SHA512

                    48d4513e09edd7f270614258b2750d5e98f0dbce671ba41a524994e96ed3df657fce67545153ca32d2bf7efcb35371cae12c4264df9053e4eb5e6b28014ed20e

                  • C:\LDPlayer\LDPlayer9\ldmutiplayer\libcrypto-1_1.dll
                    Filesize

                    2.0MB

                    MD5

                    01c4246df55a5fff93d086bb56110d2b

                    SHA1

                    e2939375c4dd7b478913328b88eaa3c91913cfdc

                    SHA256

                    c9501469ad2a2745509ab2d0db8b846f2bfb4ec019b98589d311a4bd7ac89889

                    SHA512

                    39524d5b8fc7c9d0602bc6733776237522dcca5f51cc6ceebd5a5d2c4cbda904042cee2f611a9c9477cc7e08e8eadd8915bf41c7c78e097b5e50786143e98196

                  • C:\LDPlayer\LDPlayer9\ldmutiplayer\libcurl.dll
                    Filesize

                    442KB

                    MD5

                    2d40f6c6a4f88c8c2685ee25b53ec00d

                    SHA1

                    faf96bac1e7665aa07029d8f94e1ac84014a863b

                    SHA256

                    1d7037da4222de3d7ca0af6a54b2942d58589c264333ef814cb131d703b5c334

                    SHA512

                    4e6d0dc0dc3fb7e57c6d7843074ee7c89c777e9005893e089939eb765d9b6fb12f0e774dc1814f6a34e75d1775e19e62782465731fd5605182e7984d798ba779

                  • C:\LDPlayer\LDPlayer9\ldmutiplayer\libeay32.dll
                    Filesize

                    1.2MB

                    MD5

                    ba46e6e1c5861617b4d97de00149b905

                    SHA1

                    4affc8aab49c7dc3ceeca81391c4f737d7672b32

                    SHA256

                    2eac0a690be435dd72b7a269ee761340099bf444edb4f447fa0030023cbf8e1e

                    SHA512

                    bf892b86477d63287f42385c0a944eee6354c7ae557b039516bf8932c7140ca8811b7ae7ac111805773495cf6854586e8a0e75e14dbb24eba56e4683029767b6

                  • C:\LDPlayer\LDPlayer9\ldmutiplayer\libssh2.dll
                    Filesize

                    192KB

                    MD5

                    52c43baddd43be63fbfb398722f3b01d

                    SHA1

                    be1b1064fdda4dde4b72ef523b8e02c050ccd820

                    SHA256

                    8c91023203f3d360c0629ffd20c950061566fb6c780c83eaa52fb26abb6be86f

                    SHA512

                    04cc3d8e31bd7444068468dd32ffcc9092881ca4aaea7c92292e5f1b541f877bdec964774562cb7a531c3386220d88b005660a2b5a82957e28350a381bea1b28

                  • C:\LDPlayer\LDPlayer9\ldmutiplayer\libssl-1_1.dll
                    Filesize

                    511KB

                    MD5

                    e8fd6da54f056363b284608c3f6a832e

                    SHA1

                    32e88b82fd398568517ab03b33e9765b59c4946d

                    SHA256

                    b681fd3c3b3f2d59f6a14be31e761d5929e104be06aa77c883ada9675ca6e9fd

                    SHA512

                    4f997deebf308de29a044e4ff2e8540235a41ea319268aa202e41a2be738b8d50f990ecc68f4a737a374f6d5f39ce8855edf0e2bb30ce274f75388e3ddd8c10b

                  • C:\LDPlayer\LDPlayer9\ldmutiplayer\msvcp110.dll
                    Filesize

                    522KB

                    MD5

                    3e29914113ec4b968ba5eb1f6d194a0a

                    SHA1

                    557b67e372e85eb39989cb53cffd3ef1adabb9fe

                    SHA256

                    c8d5572ca8d7624871188f0acabc3ae60d4c5a4f6782d952b9038de3bc28b39a

                    SHA512

                    75078c9eaa5a7ae39408e5db1ce7dbce5a3180d1c644bcb5e481b0810b07cb7d001d68d1b4f462cd5355e98951716f041ef570fcc866d289a68ea19b3f500c43

                  • C:\LDPlayer\LDPlayer9\ldmutiplayer\ssleay32.dll
                    Filesize

                    283KB

                    MD5

                    0054560df6c69d2067689433172088ef

                    SHA1

                    a30042b77ebd7c704be0e986349030bcdb82857d

                    SHA256

                    72553b45a5a7d2b4be026d59ceb3efb389c686636c6da926ffb0ca653494e750

                    SHA512

                    418190401b83de32a8ce752f399b00c091afad5e3b21357a53c134cce3b4199e660572ee71e18b5c2f364d3b2509b5365d7b569d6d9da5c79ae78c572c1d0ba0

                  • C:\LDPlayer\LDPlayer9\msvcr120.dll
                    Filesize

                    947KB

                    MD5

                    50097ec217ce0ebb9b4caa09cd2cd73a

                    SHA1

                    8cd3018c4170072464fbcd7cba563df1fc2b884c

                    SHA256

                    2a2ff2c61977079205c503e0bcfb96bf7aa4d5c9a0d1b1b62d3a49a9aa988112

                    SHA512

                    ac2d02e9bfc2be4c3cb1c2fff41a2dafcb7ce1123998bbf3eb5b4dc6410c308f506451de9564f7f28eb684d8119fb6afe459ab87237df7956f4256892bbab058

                  • C:\LDPlayer\LDPlayer9\vms\config\leidian0.config
                    Filesize

                    640B

                    MD5

                    52b81c0957f38531444a46fa805737d7

                    SHA1

                    f9c066bf7c35033753c761616676314fb9ea9181

                    SHA256

                    478f80af70fb2898de285b215b4e39d7ca767aa29e24540856afc07c31c0eed2

                    SHA512

                    15b7e52e28719f8e623143f1e9722cb1163bdf6af168a7aee0f1faec17747767833a2c6e346bbecb99d1a7cb47ea75e55d1599cb4b96f0ab204f6745bc4ace04

                  • C:\LDPlayer\LDPlayer9\vms\leidian0\sdcard.vmdk
                    Filesize

                    35.1MB

                    MD5

                    4d592fd525e977bf3d832cdb1482faa0

                    SHA1

                    131c31bcff32d11b6eda41c9f1e2e26cc5fbc0ef

                    SHA256

                    f90ace0994c8cae3a6a95e8c68ca460e68f1662a78a77a2b38eba13cc8e487b6

                    SHA512

                    afa31b31e1d137a559190528998085c52602d79a618d930e8c425001fdfbd2437f732beda3d53f2d0e1fc770187184c3fb407828ac39f00967bf4ae015c6ba77

                  • C:\LDPlayer\LDPlayer9\vms\leidian0\sdcard.vmdk
                    Filesize

                    35.1MB

                    MD5

                    277feb8e5be448109a1a2ccba7c56b37

                    SHA1

                    4fc0d552231749d1187e121ed932a929b0645c44

                    SHA256

                    009538439fb32cfce5b2c838123affbab0508e011bda02e8adfbf3dd0b6786d3

                    SHA512

                    631d2ff9fcbf3b555811be4b28314f56ab4238a6d96d99a64783723d2fef13fe6e088235af673a9076c0dc614177bb749693a8c71c2a97b50d861c21cce9dd69

                  • C:\LDPlayer\ldmutiplayer\msvcr110.dll
                    Filesize

                    854KB

                    MD5

                    4ba25d2cbe1587a841dcfb8c8c4a6ea6

                    SHA1

                    52693d4b5e0b55a929099b680348c3932f2c3c62

                    SHA256

                    b30160e759115e24425b9bcdf606ef6ebce4657487525ede7f1ac40b90ff7e49

                    SHA512

                    82e86ec67a5c6cddf2230872f66560f4b0c3e4c1bb672507bbb8446a8d6f62512cbd0475fe23b619db3a67bb870f4f742761cf1f87d50db7f14076f54006f6c6

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\AppxProvider.dll
                    Filesize

                    664KB

                    MD5

                    a31cb807bf0ab4ddbbe2b6bb96ae6cd1

                    SHA1

                    cf63765b41aee9cd7ae76c04dfbb6151e909b3c9

                    SHA256

                    37f45e6fc1e531279dcffed70c420df7b073504efe43bbb99a33a9ec24b75a47

                    SHA512

                    6a83378c7e88fe04dde20685889d76fd7efdf4e02342a952ba2e6ab0fa354e3293560986e5fded00718e4c14417970db0c06e6384277ae1e50021bb4dc87fad3

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\AssocProvider.dll
                    Filesize

                    136KB

                    MD5

                    702f9c8fb68fd19514c106e749ec357d

                    SHA1

                    7c141106e4ae8f3a0e5f75d8277ec830fc79eccc

                    SHA256

                    21ad24a767aeb22d27d356bc8381f103ab620de1a47e374b9f961e44b543a358

                    SHA512

                    2e7d403c89dacdda623ed1a107bac53aafde089fdd66088d578d6b55bcfe0a4fc7b54733642162bd62d0ca3f1696667a6f0cb4b572d81a6eefd6792d6003c0d9

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\CbsProvider.dll
                    Filesize

                    1004KB

                    MD5

                    f51151b2d8d84cddbedbeffebdc6ec6a

                    SHA1

                    adc9c19aa0663e65997f54835228968e13532198

                    SHA256

                    7fe4e4924fbbfdf6d772cb9d0a4963d49f6aa18b3c86a2e8df6ca49e22f79884

                    SHA512

                    802b58617be5e92bfc0c7f8c8d7443128d81908ae99d9a4ce0a785f858dc7832c70dc305f2ad39c9f57db01c05f483f6bf949ad8811fc6fb255c5aee88c729b3

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\DismCorePS.dll
                    Filesize

                    200KB

                    MD5

                    7f751738de9ac0f2544b2722f3a19eb0

                    SHA1

                    7187c57cd1bd378ef73ba9ad686a758b892c89dc

                    SHA256

                    db995f4f55d8654fc1245da0df9d1d9d52b02d75131bc3bce501b141888232fc

                    SHA512

                    0891c2dedb420e10d8528996bc9202c9f5f96a855997f71b73023448867d7d03abee4a9a7e2e19ebe2811e7d09497bce1ea4e9097fcb810481af10860ff43dfb

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\DismHost.exe
                    Filesize

                    168KB

                    MD5

                    17275206102d1cf6f17346fd73300030

                    SHA1

                    bbec93f6fb2ae56c705efd6e58d6b3cc68bf1166

                    SHA256

                    dead0ebd5b5bf5d4b0e68ba975e9a70f98820e85d056b0a6b3775fc4df4da0f6

                    SHA512

                    ce14a4f95328bb9ce437c5d79084e9d647cb89b66cde86a540b200b1667edc76aa27a36061b6e2ceccecb70b9a011b4bd54040e2a480b8546888ba5cc84a01b3

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\DismProv.dll
                    Filesize

                    292KB

                    MD5

                    2ac64cc617d144ae4f37677b5cdbb9b6

                    SHA1

                    13fe83d7489d302de9ccefbf02c7737e7f9442f9

                    SHA256

                    006464f42a487ab765e1e97cf2d15bfa7db76752946de52ff7e518bc5bbb9a44

                    SHA512

                    acdb2c9727f53889aa4f1ca519e1991a5d9f08ef161fb6680265804c99487386ca6207d0a22f6c3e02f34eaeb5ded076655ee3f6b4b4e1f5fab5555d73addfd7

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\DmiProvider.dll
                    Filesize

                    436KB

                    MD5

                    e54120aa50f14e0d3d257e77db46ece5

                    SHA1

                    922203542962ec5f938dcb3c876f060ecf17f9dc

                    SHA256

                    b5fb1a5eb4090598d5f878cdd37ed8eca82962d85995dd2280b8849fba816b54

                    SHA512

                    fbce5d707f6a66d451165608520be9d7174a8c22eb9827dfe94d98718e2c961f15ac45583b1743f3b8078b3fe675992d4b97bfc5e4b893b60328d94665f71dc9

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\EdgeProvider.dll
                    Filesize

                    200KB

                    MD5

                    c22cc16103ee51ba59b765c6b449bddb

                    SHA1

                    b0683f837e1e44c46c9a050e0a3753893ece24ad

                    SHA256

                    eb68c7d48f78b46933acba617cf3b5fcb5b8695c8a29295a9fa075f36910825b

                    SHA512

                    2c382aaddeca4efda63162584c4a2338ffcc1f4828362ce7e927e0b39c470f1f66a7933ae2210d63afb5a2ae25412266fde2ee6bdb896c3c030bdc08b67ec54e

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\Ffuprovider.dll
                    Filesize

                    680KB

                    MD5

                    a41b0e08419de4d9874893b813dccb5c

                    SHA1

                    2390e00f2c2bc9779e99a669193666688064ea77

                    SHA256

                    57ce7761531058f3c4289b1240bea6dc06355c9c4b4e88b9c9c0df8012edc5b3

                    SHA512

                    bd370e49da266148d50144c621f6415bdd5358e6274b1d471b8d4ee1888d93774331c3f75e6cb99782f1c8e772981cbc5a4baf5592c6400f340407dc670e547a

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\GenericProvider.dll
                    Filesize

                    172KB

                    MD5

                    20fb116831396d9477e352d42097741c

                    SHA1

                    7e063ac9bc173a81dc56dc5864f912041e2c725a

                    SHA256

                    6a940ba16154c4a1729b8560b03efb5f2558d66b10da4a5ec26c1299ea713bc4

                    SHA512

                    851843da748555eba735e1f5457044f24f225bd029534019814a6d1baf2e0bd1f171d297c362cfed5977274b266e823b7ad131ae2512568f7a5f2e3ea498b69a

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\IBSProvider.dll
                    Filesize

                    84KB

                    MD5

                    f6b7301c18f651567a5f816c2eb7384d

                    SHA1

                    40cd6efc28aa7efe86b265af208b0e49bec09ae4

                    SHA256

                    8f4e3f600917d49ada481ff0ed125fef4a316b659bb1197dc3036fc8c21a5a61

                    SHA512

                    4087d819706c64a5d2eed546163c55caacc553b02dc4db0d067b8815d3a24fb06ea08de3de86aac058ff2907f200e4e89eef2357ca23328aaacbe29501ea3286

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\ImagingProvider.dll
                    Filesize

                    248KB

                    MD5

                    4c6d681704e3070df2a9d3f42d3a58a2

                    SHA1

                    a9f6286ac25f17b6b2acd1fce6459b0bc94c6c81

                    SHA256

                    f1bbab35b2602d04d096c8de060b2a5cf802499a937fd1ffe749ff7f54852137

                    SHA512

                    daa0c723312680256c24457162e0ef026b753ba267f3e2755f838e2864a163802c078d8668dd2c2064cb8887f4e382a73d6402a5533b6ac5c3cbf662ad83db86

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\IntlProvider.dll
                    Filesize

                    312KB

                    MD5

                    34035aed2021763bec1a7112d53732f1

                    SHA1

                    7132595f73755c3ae20a01b6863ac9518f7b75a4

                    SHA256

                    aac13ddb9ab5a165a38611f1b61229268a40d416f07740d4eefba1a8fcf7c731

                    SHA512

                    ea045aa46713133a5d0ad20514cc2a8c8fffb99b4e19c4d5262f86167cfce08a31d336222fd3c91e6efbfd90312bb2325337aa02a8489e047b616085fdf46c1d

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\LogProvider.dll
                    Filesize

                    108KB

                    MD5

                    c63f6b6d4498f2ec95de15645c48e086

                    SHA1

                    29f71180feed44f023da9b119ba112f2e23e6a10

                    SHA256

                    56aca41c62c8d0d1b26db3a01ef6c2da4a6a51fc963eb28411f8f7f029f1bfde

                    SHA512

                    3a634340d8c66cbc1bef19f701d8bdb034449c28afecce4e8744d18181a20f85a17af3b66c8853cecb8be53f69ae73f85b70e45deac29debab084a25eb3c69dc

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\MsiProvider.dll
                    Filesize

                    208KB

                    MD5

                    eb171b7a41a7dd48940f7521da61feb0

                    SHA1

                    9f2a5ddac7b78615f5a7af753d835aaa41e788fc

                    SHA256

                    56a8527d267116af39864feca528be5b7a88c3b5df94750154b2efcf2fda5d55

                    SHA512

                    5917266aed1a79ee4cb16bb532ccae99782d0ee8af27cb42a6b39496c3de61c12a30ce524a1a66cc063101ebcfac957d1b129aae0b491c0587f40171ba6bae12

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\OSProvider.dll
                    Filesize

                    180KB

                    MD5

                    e9833a54c1a1bfdab3e5189f3f740ff9

                    SHA1

                    ffb999c781161d9a694a841728995fda5b6da6d3

                    SHA256

                    ec137f9caebcea735a9386112cf68f78b92b6a5a38008ce6415485f565e5cf85

                    SHA512

                    0b18932b24c0257c80225c99be70c5125d2207f9b92681fd623870e7a62599a18fa46bcb5f2b4b01889be73aeb084e1b7e00a4968c699c7fdb3c083ef17a49f9

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\OfflineSetupProvider.dll
                    Filesize

                    213KB

                    MD5

                    3437087e6819614a8d54c9bc59a23139

                    SHA1

                    ae84efe44b02bacdb9da876e18715100a18362be

                    SHA256

                    8b247665218f5151f0d19f59ea902a7c28f745d67a5d51b63b77242ffb4bdd74

                    SHA512

                    018e88f6c121dd4ecaceb44794e2fa7a44b52ddb22e7a5a30a332905e02065cbc1d1dcddc197676277b22f741195c1b7c4c185d328b096b6560b84e9749d6dde

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\ProvProvider.dll
                    Filesize

                    800KB

                    MD5

                    2ef388f7769205ca319630dd328dcef1

                    SHA1

                    6dc9ed84e72af4d3e7793c07cfb244626470f3b6

                    SHA256

                    4915b0c9cd8dc8a29dd649739974d244f9105dc58725f1da0d592af3b546e2bf

                    SHA512

                    b465917424dd98125d080c135c7e222a9485ed7ec89004f9a70e335b800e5b9419fbc932c8069bae9ff126494174cf48e2790030dd22aa2d75b7b9d8ccff752b

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\ServicingCommon.dll
                    Filesize

                    944KB

                    MD5

                    07231bdae9d15bfca7d97f571de3a521

                    SHA1

                    04aec0f1afcf7732bc4cd1f7aab36e460c325ba6

                    SHA256

                    be75afbbc30cad7235adf03dcc07fcee3c0c330c89b00e326ebbef2e57df5935

                    SHA512

                    2a46e0657e84481faf5c9d3de410884cb5c6e7b35039f5be04183cdac6c088cc42b12d0097e27836af14699e7815d794ca1cec80960833ab093b8dc6d44e2129

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\SmiProvider.dll
                    Filesize

                    272KB

                    MD5

                    46e3e59dbf300ae56292dea398197837

                    SHA1

                    78636b25fdb32c8fcdf5fe73cac611213f13a8be

                    SHA256

                    5a0f1279013d1d379cb3a3e30f1d5be22549728cd9dc92ed5643eacf46199339

                    SHA512

                    e0584da3c302ea6ffa85932fa185500543f15237d029fdc4b084aee971ec13967f9e83cad250bea36b31f1a3efb1cc556da7dd231e5b06884809d0af51ebdf8c

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\SysprepProvider.dll
                    Filesize

                    820KB

                    MD5

                    4dfa1eeec0822bfcfb95e4fa8ec6c143

                    SHA1

                    54251e697e289020a72e1fd412e34713f2e292cf

                    SHA256

                    901cea68c7a158a1d9c030d3939f8f72057d1cf2f902aec1bc1b22a0000c0494

                    SHA512

                    5f3f710bef75da8cddb6e40686d6a19f59fbc7d8a6842eaceb9a002ab284a91ecf48c352171e13f6a75366610988e67710439f1dde579311ebbb3cd9e4751aa4

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\TransmogProvider.dll
                    Filesize

                    1.3MB

                    MD5

                    c1c56a9c6ea636dbca49cfcc45a188c3

                    SHA1

                    d852e49978a08e662804bf3d7ec93d8f6401a174

                    SHA256

                    b20b3eb2df22998fd7f9ff6898ba707d6b8833a8274719a5e09d5148d868faaf

                    SHA512

                    f6db05e4644d734f81c2461e4ad49c4e81880c9e4beee13dbbda923360ef6cf4821fccd9040671b86ab2cd8c85fc313c951c1a69e4df14d94268753ce7ae5b2e

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\UnattendProvider.dll
                    Filesize

                    256KB

                    MD5

                    7c61284580a6bc4a4c9c92a39bd9ea08

                    SHA1

                    4579294e3f3b6c03b03b15c249b9cac66e730d2a

                    SHA256

                    3665872e68264bbf3827c2bf0cfa60124ea1d87912728f2fc3685dce32855cb8

                    SHA512

                    b30b89d0d5e065042811d6ff397d226877ff698aeb1153681692aedabe3730e2f3746ad9d70e3120e336552bab880644f9ead0c91a451197a8f0977a2126a0fe

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\Vhdprovider.dll
                    Filesize

                    596KB

                    MD5

                    8a655555544b2915b5d8676cbf3d77ab

                    SHA1

                    5a7529f8a6d50d3f4e13b2e3a0585f08eb0511a2

                    SHA256

                    d3a2dd7d47bfbb3897b927d1b7230b5b12e5fd7315d687458de15fbb08fb7e27

                    SHA512

                    c6da649ae3c3688065b37bccfb5525ade25ba7bc3b163ad7d61f3b3d1c4957c8fd6c9f2bf23b0dbc4fffe32e980acb5a5d3895b8a012c5ed086e3e38caee2e93

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\WimProvider.dll
                    Filesize

                    672KB

                    MD5

                    bcf8735528bb89555fc687b1ed358844

                    SHA1

                    5ef5b24631d2f447c58b0973f61cb02118ae4adc

                    SHA256

                    78b742deddee8305ea06d77f296ad9fe0f4b4a27d71b34dcdff8ae199364790c

                    SHA512

                    8b2be4e9a4334a5fc7f7c58579c20974c9194b771f7a872fd8e411d79f45fc5b7657df4c57ad11acb915d5ea5d1f0583c8a981b2c05104e3303b3ee1469b93f5

                  • C:\Users\Admin\AppData\Local\Temp\7739228E-0393-42BC-BB4E-DDBD4B2CE932\en-US\AppxProvider.dll.mui
                    Filesize

                    23KB

                    MD5

                    f70750a86cda23a3ced4a7ecf03feebd

                    SHA1

                    1c2d9d79974338ce21561b916130e696236fbb48

                    SHA256

                    8038c5177461aef977ac6e526ac0851bf7eff5928972462657176ff6b6d06050

                    SHA512

                    cfb6b5cdb451b12e7aee6e69ab743b91bec8bd417d4d2384def03010851fef0d7f2a65ff6349c4e62e564b44e742597aeb108e71a962a48020b1988a6c6f1a9a

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ubkdxgdp.ttm.ps1
                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • C:\Users\Admin\AppData\Roaming\XuanZhi9\ldopengl32x.dll
                    Filesize

                    73KB

                    MD5

                    b001f88504c8c9973e9a3b4dc03e6d1a

                    SHA1

                    a54b3046a70a4f2c792ad6a382b637b599f1dc48

                    SHA256

                    8ee4cbed114a588e934b5043f95c9c06f40468c2300fa0d1d938d16c1d46a8fd

                    SHA512

                    390e53be657fc35fb2e9f41b76b3b07c161a860d72445a4b1425ca973a6d8c0f32f6de6844719c6e9813e8d949ab65263642dea01c800a00285bd45595bed4d8

                  • C:\Windows\Logs\DISM\dism.log
                    Filesize

                    263KB

                    MD5

                    a367317c2c2180e61a2af4f0d1d9d16b

                    SHA1

                    2a3e65e4bea261e26267ca5e56e7db44a9d8c028

                    SHA256

                    24e52ca528a38eab999272d448f4a94dcb7491387b1422190b2b846332f1e249

                    SHA512

                    8b8ad3b56399fd04fdcb8965aabca2f59fdf989fb8ab11e54c89dffe8ee77bece48fae53705583c0c25a4690a60cdfdee75e3d39a7bea9623fc1d3e5acda5a15

                  • C:\Windows\Logs\DISM\dism.log
                    Filesize

                    266KB

                    MD5

                    3c51252dd9a79a90e31c1da0e8154493

                    SHA1

                    f4c899c4f95305b1ab228b97c5a41a3200758c39

                    SHA256

                    8e0f2986a8c374c6259fc6827b1a65dc751f07c2c5ce05b2666c57c46eecde5c

                    SHA512

                    7064fd1cef4f368aa0eeeb806a845bb3bddc30d0c5b0129cfbd648882e814fc075f50740cf16ad580bf4c02d225a193b5f3a5f4c605b4fe7f1272789b2c58119

                  • memory/1848-886-0x000000006E890000-0x000000006E8DC000-memory.dmp
                    Filesize

                    304KB

                  • memory/2640-853-0x0000000007430000-0x00000000074C6000-memory.dmp
                    Filesize

                    600KB

                  • memory/2640-836-0x0000000005E40000-0x0000000005E5E000-memory.dmp
                    Filesize

                    120KB

                  • memory/2640-826-0x0000000005950000-0x00000000059B6000-memory.dmp
                    Filesize

                    408KB

                  • memory/2640-823-0x0000000005320000-0x000000000594A000-memory.dmp
                    Filesize

                    6.2MB

                  • memory/2640-822-0x0000000002620000-0x0000000002656000-memory.dmp
                    Filesize

                    216KB

                  • memory/2640-856-0x00000000074D0000-0x00000000074EA000-memory.dmp
                    Filesize

                    104KB

                  • memory/2640-855-0x00000000073F0000-0x00000000073FE000-memory.dmp
                    Filesize

                    56KB

                  • memory/2640-854-0x00000000073B0000-0x00000000073C1000-memory.dmp
                    Filesize

                    68KB

                  • memory/2640-824-0x0000000004FC0000-0x0000000004FE2000-memory.dmp
                    Filesize

                    136KB

                  • memory/2640-852-0x0000000007220000-0x000000000722A000-memory.dmp
                    Filesize

                    40KB

                  • memory/2640-851-0x00000000071A0000-0x00000000071BA000-memory.dmp
                    Filesize

                    104KB

                  • memory/2640-850-0x00000000077E0000-0x0000000007E5A000-memory.dmp
                    Filesize

                    6.5MB

                  • memory/2640-849-0x0000000006E40000-0x0000000006EE4000-memory.dmp
                    Filesize

                    656KB

                  • memory/2640-838-0x0000000006E00000-0x0000000006E34000-memory.dmp
                    Filesize

                    208KB

                  • memory/2640-848-0x0000000006420000-0x000000000643E000-memory.dmp
                    Filesize

                    120KB

                  • memory/2640-839-0x000000006E890000-0x000000006E8DC000-memory.dmp
                    Filesize

                    304KB

                  • memory/2640-837-0x0000000005E90000-0x0000000005EDC000-memory.dmp
                    Filesize

                    304KB

                  • memory/2640-825-0x0000000005260000-0x00000000052C6000-memory.dmp
                    Filesize

                    408KB

                  • memory/2640-835-0x00000000059C0000-0x0000000005D17000-memory.dmp
                    Filesize

                    3.3MB

                  • memory/2692-1108-0x0000000070770000-0x0000000070D16000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/2692-1107-0x0000000070DA0000-0x000000007279B000-memory.dmp
                    Filesize

                    26.0MB

                  • memory/2692-1109-0x00000000705B0000-0x000000007062E000-memory.dmp
                    Filesize

                    504KB

                  • memory/2692-1110-0x0000000070530000-0x00000000705AA000-memory.dmp
                    Filesize

                    488KB

                  • memory/2692-1111-0x00000000704D0000-0x0000000070529000-memory.dmp
                    Filesize

                    356KB

                  • memory/2692-1097-0x0000000036340000-0x0000000036350000-memory.dmp
                    Filesize

                    64KB

                  • memory/3444-859-0x0000000005A20000-0x0000000005D77000-memory.dmp
                    Filesize

                    3.3MB

                  • memory/3444-868-0x000000006E890000-0x000000006E8DC000-memory.dmp
                    Filesize

                    304KB

                  • memory/3476-1074-0x00000000705B0000-0x000000007062E000-memory.dmp
                    Filesize

                    504KB

                  • memory/3476-1088-0x0000000070DA0000-0x000000007279B000-memory.dmp
                    Filesize

                    26.0MB

                  • memory/3476-1084-0x00000000705B0000-0x000000007062E000-memory.dmp
                    Filesize

                    504KB

                  • memory/3476-1085-0x0000000070770000-0x0000000070D16000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/3476-990-0x0000000001070000-0x0000000001086000-memory.dmp
                    Filesize

                    88KB

                  • memory/3476-1086-0x0000000070530000-0x00000000705AA000-memory.dmp
                    Filesize

                    488KB

                  • memory/3476-1087-0x00000000704D0000-0x0000000070529000-memory.dmp
                    Filesize

                    356KB

                  • memory/3476-1078-0x0000000070DA0000-0x000000007279B000-memory.dmp
                    Filesize

                    26.0MB

                  • memory/3476-1076-0x0000000070530000-0x00000000705AA000-memory.dmp
                    Filesize

                    488KB

                  • memory/3476-1075-0x0000000070770000-0x0000000070D16000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/3476-1077-0x00000000704D0000-0x0000000070529000-memory.dmp
                    Filesize

                    356KB

                  • memory/3476-1003-0x0000000036340000-0x0000000036350000-memory.dmp
                    Filesize

                    64KB