Analysis

  • max time kernel
    76s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2023 14:13

General

  • Target

    YoudaoDuiaSrtup.msi

  • Size

    102.2MB

  • MD5

    6dfa01c13a071656051a59c12bd3a760

  • SHA1

    b78d087029e220baa2d2e204515da2eb4c2d9e8b

  • SHA256

    7849fe61a8b3e0793c59a3f35d016416be77d65c6ca10e6a5436a972b9fb5156

  • SHA512

    8f348de3aacdfcd7aef38d86b9f95fc2b3c7768164d2210137f8eb0f4db6b5bea922ff6afbf786208487362b967744c772dbbef438e2dfd24c1a244070453c82

  • SSDEEP

    1572864:WEbB12iidE/5zM2fr5Z1fSAoyeldvp2BB9oH5irfdCT6a:zBed4zM2fr5zqAxqdvkBB9y5ibsea

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • VMProtect packed file 6 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\YoudaoDuiaSrtup.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4548
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5088
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 134883BF08212621CF3869045718D8CE C
      2⤵
      • Loads dropped DLL
      PID:4408
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4556
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 05AABD1A851B5069C89E90CCAB37F54D
        2⤵
        • Loads dropped DLL
        PID:4120
      • C:\Windows\Installer\MSI2B25.tmp
        "C:\Windows\Installer\MSI2B25.tmp" /EnforcedRunAsAdmin /RunAsAdmin "C:\Users\Admin\AppData\Roaming\YOUDAO\dnnt\2.bat"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3440
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C ""C:\Users\Admin\AppData\Roaming\YOUDAO\dnnt\2.bat" "
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1572
          • C:\Users\Admin\AppData\Roaming\YOUDAO\dnnt\netfist.exe
            C:\Users\Admin\AppData\Roaming\YOUDAO\dnnt\netfist.exe
            4⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            PID:3268
            • C:\windows\Runn\Yloux.exe
              "C:\windows\Runn\Yloux.exe"
              5⤵
                PID:1976
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        PID:1796
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:4292
        • C:\Users\Admin\AppData\Local\Temp\{E20728E1-84ED-454a-BA6F-7A9420812740}.exe
          "C:\Users\Admin\AppData\Local\Temp\{E20728E1-84ED-454a-BA6F-7A9420812740}.exe" /s "C:\Users\Admin\AppData\Local\Temp\\{0D695C7D-A59B-4bf7-A534-CC3626DBDE7C}"
          1⤵
            PID:384

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\e582537.rbs

            Filesize

            417KB

            MD5

            70a06896a191f0ebf2400c1671f613bf

            SHA1

            f751cf6f0f9a1dbb576e777d31cfe848ec5b9ce8

            SHA256

            f5ad813f3ba969d86d8269e0505c3e3be23003ac08def43386436fe60303b4da

            SHA512

            cd943a4647fadea1c8282163f0f563b07848c0de069db0ecd66ae4f2e1c827c891773af45ed50e445a2eb4bb85dda838c12cf82bb6f898eddb11ea61c29a4228

          • C:\Users\Admin\AppData\Local\Temp\MSI3F7A.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Users\Admin\AppData\Local\Temp\MSI3F7A.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Users\Admin\AppData\Local\Temp\MSI4094.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Users\Admin\AppData\Local\Temp\MSI4094.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Users\Admin\AppData\Local\Temp\MSI40B4.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Users\Admin\AppData\Local\Temp\MSI40B4.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Users\Admin\AppData\Local\Temp\MSI40B4.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Users\Admin\AppData\Local\Temp\MSI40C5.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Users\Admin\AppData\Local\Temp\MSI40C5.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Users\Admin\AppData\Local\Temp\MSI40D6.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Users\Admin\AppData\Local\Temp\MSI40D6.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Users\Admin\AppData\Local\Temp\MSI4192.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Users\Admin\AppData\Local\Temp\MSI4192.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Users\Admin\AppData\Local\Temp\MSI41A3.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Users\Admin\AppData\Local\Temp\MSI41A3.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Users\Admin\AppData\Local\Temp\RegWorkshop.ini

            Filesize

            564B

            MD5

            1351ab9e060fb71eba8266b29c52a3af

            SHA1

            bea8f84f5419be2c62bfcc3e6e795292baa09461

            SHA256

            f4a2e5c61bcd73105acb1717ca98ec601bb411a1a64410c3ab31dcb726e3bf97

            SHA512

            4b89feb3aed7f121673b1f8380f2536b9e5efe9a48cd3c7b284ff5f1039b3742dae8bb53d60e295de96786ab88d69eb8e0e682d0d1ff7754c9cb0a3112600c05

          • C:\Users\Admin\AppData\Local\Temp\RegWorkshop.ini

            Filesize

            774B

            MD5

            06e787ee10831e3616ff90a163e70af8

            SHA1

            2d920df852ce510e96f6750a3faef11d7265d8a8

            SHA256

            926844631533053e09423edf9c7771d1f97008157bd048dc1c2666bacbbbeae8

            SHA512

            a59107eade07445d850e5670d2b5de108319189c5ab687b82742de0e0621cf41a8c3d066ded586d83ff568961406d90c8374aea97fdba51dcc248478acffcde4

          • C:\Users\Admin\AppData\Local\Temp\RegWorkshop.ini

            Filesize

            1KB

            MD5

            33bfe9b7bbc0eca278d651a0093f7c7d

            SHA1

            0c42c681ebbbdb27ef9f548e79a3169490cce9d4

            SHA256

            1acd0c93d55a8268eb93e4790f78eb46c3677c3dab57a0a4284d42e49f00745c

            SHA512

            48d9aebba4743ef6645d5b821cf104c5fe8b06a32e0089f7d202aa3b03def6b33f2bbd4ba367b9996d896bcae443f5ed13c1998c47951534c3661f2b5c2d4a09

          • C:\Users\Admin\AppData\Local\Temp\RegWorkshop.ini

            Filesize

            2KB

            MD5

            ff0c7c2667dff4f3ed588f40d047c642

            SHA1

            1162c83bd0bb0d81b7ab7f616cb012b790aa4adf

            SHA256

            02af5cb061fd8075e9475c45ab20e86cf2bb4ca9511ddad348645ed5183b9fc7

            SHA512

            539b1d443232758b6c60a287f2a40200e6e3ba7353f11f18e29ba265c9569a4610e4a80910f79660368a916576ab9c486efa248bf3257e522ef5bfb3d42ef3c3

          • C:\Users\Admin\AppData\Local\Temp\{0D695C7D-A59B-4bf7-A534-CC3626DBDE7C}

            Filesize

            215B

            MD5

            5dc25d2942537f4a0ce0fa4cdacdf193

            SHA1

            9daf5b9143b22b904fbb2edfc8ccec30d0c88d14

            SHA256

            1b175565337571bb9abec94cae637fcbc6492c5c6bd1e0e56dd64a51d9903ced

            SHA512

            995d3b5db94397a5567bf31d12d9ec01d4f4893283d7b33db079410c0e173f57d47976f1d877ee2962c0801e2ca7603088ab306fa9e0141469e872bc716a63ee

          • C:\Users\Admin\AppData\Local\Temp\{E20728E1-84ED-454a-BA6F-7A9420812740}.exe

            Filesize

            1.0MB

            MD5

            217dc98e219a340cb09915244c992a52

            SHA1

            a04f101ca7180955d62e4a1aaeccdcca489209da

            SHA256

            27c8bd76150ddda5b09d6db11f67269cee2eecac345df67f93aab3e3aaabde7c

            SHA512

            dddc15992533c8c13000163c7dd59b20e2fbdedbf611338c04f6f9209ec1a95d1f93aaeeae2778890214d333320978f5d2554348722ea6c8489320f0ef1c4c85

          • C:\Users\Admin\AppData\Local\Temp\{E20728E1-84ED-454a-BA6F-7A9420812740}.exe

            Filesize

            1.0MB

            MD5

            217dc98e219a340cb09915244c992a52

            SHA1

            a04f101ca7180955d62e4a1aaeccdcca489209da

            SHA256

            27c8bd76150ddda5b09d6db11f67269cee2eecac345df67f93aab3e3aaabde7c

            SHA512

            dddc15992533c8c13000163c7dd59b20e2fbdedbf611338c04f6f9209ec1a95d1f93aaeeae2778890214d333320978f5d2554348722ea6c8489320f0ef1c4c85

          • C:\Users\Admin\AppData\Roaming\YOUDAO\dnnt\2.bat

            Filesize

            41B

            MD5

            12c6e814a8844f939daa8ec4d4a6a3c7

            SHA1

            abfd9552064ad03839a9395ead502262d9cb8d01

            SHA256

            c886afbc6940d821cbc534c0d56f3c759efc455af15662ff27c24952ed766306

            SHA512

            e7bcc3c07dfe7f00084be67e135c62337375f10c7f31cd4f07de8170f70ea4e6310adc38e342b1a3d2b192470ff6cfc6962e020c33bf1372ac1b0bc818f6d031

          • C:\Users\Admin\AppData\Roaming\YOUDAO\dnnt\netfist.exe

            Filesize

            5.4MB

            MD5

            7f1a45d1319d27be5e9caca49a70a231

            SHA1

            9997ae59f4690081727b00888c839bf3347590b9

            SHA256

            c40586e069e2516850436961f3848b7c03d27e8c150c362af3f8c1961ff70101

            SHA512

            fb674be9647eb485fac2f6795f606844815f86980ba3c1b2e22a4d832e8c1993156c55cf0739663327f967aaa98a76a1e8e85f151f724fa6255d1f16d33beddc

          • C:\Users\Admin\AppData\Roaming\YOUDAO\dnnt\netfist.exe

            Filesize

            5.4MB

            MD5

            7f1a45d1319d27be5e9caca49a70a231

            SHA1

            9997ae59f4690081727b00888c839bf3347590b9

            SHA256

            c40586e069e2516850436961f3848b7c03d27e8c150c362af3f8c1961ff70101

            SHA512

            fb674be9647eb485fac2f6795f606844815f86980ba3c1b2e22a4d832e8c1993156c55cf0739663327f967aaa98a76a1e8e85f151f724fa6255d1f16d33beddc

          • C:\Windows\Installer\MSI25C3.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Windows\Installer\MSI25C3.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Windows\Installer\MSI2660.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Windows\Installer\MSI2660.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Windows\Installer\MSI2B25.tmp

            Filesize

            409KB

            MD5

            f7e1ad874fba884ceabfdb0f8edf74bb

            SHA1

            dcd89a248a6e3d85bb3f7eae624a41cef9704654

            SHA256

            bbce37f9e20f5bc59ab45dc49c985d115b13bb214561ddb874118fd91fb52ce8

            SHA512

            5e59de04305aff37703e928a594b9114fb728e3285c09aae7706339d9f9ee77652271de5899738e8410d13224838efb3e30f5ab4e149c21458d3c971010dd209

          • C:\Windows\Installer\e582536.msi

            Filesize

            75.3MB

            MD5

            25e9bbd61398dd018520a0f0d294268f

            SHA1

            ea9463bdc2a283c24a6f6393ae79fa7a10e513f8

            SHA256

            7963c372cd804955297d0367f69616d8fd8bb1c01712f27930da60cb159f9e81

            SHA512

            e33a6a33b4717643dccb74eaf4fe7732954805685fb18cb0103c307be91a13df74be683a7e1010c46248f5cea84faa45cd5c12ac45e86deb6782e0cb04785aa6

          • C:\Windows\Runn\Yloux.exe

            Filesize

            3.0MB

            MD5

            0f0880c90d955267cd848fe6e8498d4f

            SHA1

            64c0ed793909f2b29374ddb00f05222e9578bb6f

            SHA256

            701e76db5b7d4c8a5f5339cce7d7521096854acdb2b3f6541f63f759b17c5636

            SHA512

            fb42bcf1acad5a60c4cefa3d5d84e2a8ccdfc05b950279a0358022844857e789d00c35c46c32c24888ca263aff916dc4550f29a3950f19353584c37e74253462

          • C:\Windows\Runn\Yloux.exe

            Filesize

            3.0MB

            MD5

            0f0880c90d955267cd848fe6e8498d4f

            SHA1

            64c0ed793909f2b29374ddb00f05222e9578bb6f

            SHA256

            701e76db5b7d4c8a5f5339cce7d7521096854acdb2b3f6541f63f759b17c5636

            SHA512

            fb42bcf1acad5a60c4cefa3d5d84e2a8ccdfc05b950279a0358022844857e789d00c35c46c32c24888ca263aff916dc4550f29a3950f19353584c37e74253462

          • C:\windows\Runn\1.bin

            Filesize

            378KB

            MD5

            3d4a9ff9ca614bc1a25b1ffec75cc10f

            SHA1

            d5b451d8ed1730da915419fb195278f973f1b7ce

            SHA256

            518df94659ce71ce2e23ea66bc681bd9e9bbb88a64db534e95baa24a3dcaff9d

            SHA512

            8adc9c383bea9f8f9a72c44973edcdaeb1ad988657ae18b0f782ec83a6943b1b31557848d61e5bd48dcf0250d7b6488ee5f17be9d072ce77fdb4e5ce32ee0f7b

          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

            Filesize

            23.0MB

            MD5

            cc356455aab73b58b55e2ccc1a40530a

            SHA1

            1758723347ef22ee2618067ac994bda5930d3ace

            SHA256

            30752b4f08b3d07cf72e6eec32489f365417573f16ebf1fbf7f4350011ec7092

            SHA512

            f084c923d14afb1bde519a5a7e4bb658706a681d485d7913c0294ea7cb4bebb58d671c6880fa3cafb06e3528d75058588027e28d464cf3e102c5934d15222c81

          • \??\Volume{bb5f8783-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{894711c9-1598-482d-a6a6-3e3b9ba8bc51}_OnDiskSnapshotProp

            Filesize

            6KB

            MD5

            6585a17b67eb901ff72f30c06446c4b8

            SHA1

            2c7a1b2f3d3637e1a46ae71080ec09e9a5f93da5

            SHA256

            eef63e809533ea5e6f6c784b3e1c23632bc343a8b0f29530420dd32da839dfbb

            SHA512

            2287426b5efcc7fba904dd31190abf867fc669c9e9c18fcaf2741f52ade5b7773d7a55540d055d6af416c42b6ad7ab3c1891bb9b6e6fc98d5e3ab9c5ce9b8e4c

          • memory/1976-262-0x0000000180000000-0x0000000180066000-memory.dmp

            Filesize

            408KB

          • memory/1976-256-0x0000000180000000-0x0000000180066000-memory.dmp

            Filesize

            408KB

          • memory/1976-100-0x0000000000790000-0x00000000007EF000-memory.dmp

            Filesize

            380KB

          • memory/1976-273-0x0000000180000000-0x0000000180066000-memory.dmp

            Filesize

            408KB

          • memory/1976-271-0x00000000033B0000-0x00000000033F2000-memory.dmp

            Filesize

            264KB

          • memory/1976-272-0x00000000033B0000-0x00000000033F2000-memory.dmp

            Filesize

            264KB

          • memory/1976-270-0x00000000033B0000-0x00000000033F2000-memory.dmp

            Filesize

            264KB

          • memory/1976-266-0x0000000003370000-0x00000000033AC000-memory.dmp

            Filesize

            240KB

          • memory/1976-255-0x0000000180000000-0x0000000180066000-memory.dmp

            Filesize

            408KB

          • memory/1976-249-0x0000000180000000-0x0000000180066000-memory.dmp

            Filesize

            408KB

          • memory/1976-264-0x0000000180000000-0x0000000180066000-memory.dmp

            Filesize

            408KB

          • memory/1976-265-0x00000000033B0000-0x00000000033F2000-memory.dmp

            Filesize

            264KB

          • memory/1976-261-0x0000000180000000-0x0000000180066000-memory.dmp

            Filesize

            408KB

          • memory/1976-263-0x0000000000400000-0x0000000000590000-memory.dmp

            Filesize

            1.6MB

          • memory/1976-267-0x00000000033B0000-0x00000000033F2000-memory.dmp

            Filesize

            264KB

          • memory/3268-77-0x0000000000060000-0x00000000008E5000-memory.dmp

            Filesize

            8.5MB

          • memory/3268-76-0x0000000000060000-0x00000000008E5000-memory.dmp

            Filesize

            8.5MB

          • memory/3268-260-0x0000000000060000-0x00000000008E5000-memory.dmp

            Filesize

            8.5MB

          • memory/3268-101-0x0000000000060000-0x00000000008E5000-memory.dmp

            Filesize

            8.5MB

          • memory/3268-75-0x00000000009F0000-0x00000000009F1000-memory.dmp

            Filesize

            4KB

          • memory/3268-81-0x0000000002C10000-0x0000000003245000-memory.dmp

            Filesize

            6.2MB

          • memory/3268-82-0x0000000010000000-0x0000000010639000-memory.dmp

            Filesize

            6.2MB