Analysis

  • max time kernel
    93s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2024 13:28

General

  • Target

    2024-09-13_c097e06be926f7496a7c58896b9692a4_hijackloader_poet-rat_snatch.exe

  • Size

    8.1MB

  • MD5

    c097e06be926f7496a7c58896b9692a4

  • SHA1

    8efebbfced6fd53f9d0f3850408bbdbf88c23d2b

  • SHA256

    b5d0b945169391a9d4df8fa698472e0a7a6a51a25ac4f583db4e5b96e52c78cc

  • SHA512

    c4ce0633aab7c017ab61d85e6e2837530bf8834ddcad5f9fdd4ecaaf20c8b2553fe08be416c460d5c746810e50b829f9bafbd46e26ab4179530458d224c40baf

  • SSDEEP

    98304:PsMhTgTfuJENBHvu4PxMCURCAgTs7UHloh6K7jMy3MPm:kMxMuobUUI7Uw6KXMyY

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Drops file in Drivers directory 3 IoCs
  • Manipulates Digital Signatures 1 TTPs 8 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Drops file in System32 directory 42 IoCs
  • Drops file in Program Files directory 16 IoCs
  • Drops file in Windows directory 6 IoCs
  • Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 38 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-13_c097e06be926f7496a7c58896b9692a4_hijackloader_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-13_c097e06be926f7496a7c58896b9692a4_hijackloader_poet-rat_snatch.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\SysWOW64\route.exe
      route print
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3872
    • C:\Windows\SysWOW64\arp.exe
      arp -a 10.127.0.1
      2⤵
      • Network Service Discovery
      • System Location Discovery: System Language Discovery
      PID:448
    • C:\Users\Admin\AppData\Local\Temp\chaospc.exe
      ./chaospc.exe chaos
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3284
      • C:\Windows\SysWOW64\reg.exe
        reg add " hkcu\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /t REG_SZ /v C:\Users\Admin\AppData\Local\Temp\chaospcap.exe /d RunAsInvoker
        3⤵
        • Access Token Manipulation: Create Process with Token
        • System Location Discovery: System Language Discovery
        PID:2792
      • C:\Users\Admin\AppData\Local\Temp\chaospcap.exe
        C:\Users\Admin\AppData\Local\Temp\chaospcap.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2364
        • C:\Users\Admin\AppData\Local\Temp\nsq885C.tmp\NPFInstall.exe
          "C:\Users\Admin\AppData\Local\Temp\nsq885C.tmp\NPFInstall.exe" -n -check_dll
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2608
        • C:\Windows\SysWOW64\certutil.exe
          certutil -addstore -f "Root" "C:\Users\Admin\AppData\Local\Temp\nsq885C.tmp\roots.p7b"
          4⤵
          • Manipulates Digital Signatures
          • System Location Discovery: System Language Discovery
          PID:4908
        • C:\Windows\SysWOW64\certutil.exe
          certutil -addstore -f "TrustedPublisher" "C:\Users\Admin\AppData\Local\Temp\nsq885C.tmp\signing.p7b"
          4⤵
          • Manipulates Digital Signatures
          • System Location Discovery: System Language Discovery
          PID:3636
        • C:\Program Files\Npcap\NPFInstall.exe
          "C:\Program Files\Npcap\NPFInstall.exe" -n -c
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:4792
          • C:\Windows\SYSTEM32\pnputil.exe
            pnputil.exe -e
            5⤵
              PID:2724
          • C:\Program Files\Npcap\NPFInstall.exe
            "C:\Program Files\Npcap\NPFInstall.exe" -n -iw
            4⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            PID:4416
          • C:\Program Files\Npcap\NPFInstall.exe
            "C:\Program Files\Npcap\NPFInstall.exe" -n -i
            4⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Drops file in System32 directory
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Checks SCSI registry key(s)
            PID:1016
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoProfile -WindowStyle Hidden -NonInteractive -Command "Microsoft.PowerShell.Management\Start-Service -Name npcap -PassThru | Microsoft.PowerShell.Management\Stop-Service -PassThru | Microsoft.PowerShell.Management\Start-Service"
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2000
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoProfile -WindowStyle Hidden -NonInteractive -Command "ScheduledTasks\Register-ScheduledTask -Force -TaskName 'npcapwatchdog' -Description 'Ensure Npcap service is configured to start at boot' -Action (ScheduledTasks\New-ScheduledTaskAction -Execute 'C:\Program Files\Npcap\CheckStatus.bat') -Principal (ScheduledTasks\New-ScheduledTaskPrincipal -UserId 'SYSTEM' -LogonType ServiceAccount) -Trigger (ScheduledTasks\New-ScheduledTaskTrigger -AtStartup) -Settings (ScheduledTasks\New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Compatibility Win8)"
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:336
        • C:\Windows\SysWOW64\reg.exe
          reg delete "hkcu\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v C:\Users\Admin\AppData\Local\Temp\chaospcap.exe /f
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4556
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5024
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{ae11d38f-5588-2048-816e-6d44486d9c5a}\NPCAP.inf" "9" "405306be3" "000000000000014C" "WinSta0\Default" "000000000000015C" "208" "C:\Program Files\Npcap"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:232

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~1\Npcap\npcap.cat

      Filesize

      12KB

      MD5

      3fd9a520f8b768eee9ee35eedec6bf3d

      SHA1

      302f9b44e602c00f309cef47e0657148b8b0a741

      SHA256

      612f6989db53adf27aa9e53f9c6ff7061012a529853849019f0cb6da5ab67d8e

      SHA512

      4ef544970857028641da7c5d59a2feb28a5eded8d3b37f6e7b43b0a036d83b27bb2d8b49f9ed9b73a89ce70f310efda2e49220306a982d8893177740d0b3d6c9

    • C:\PROGRA~1\Npcap\npcap.sys

      Filesize

      75KB

      MD5

      c41047f5dc12cb06027b8c9180ba50ec

      SHA1

      b3990659a5d926bebbd3677123bf5150700d521c

      SHA256

      34d8eb66ba1bb1bc4a0f342d6346868e1d6049d19034a4ce9c6e98f0c1ecfc99

      SHA512

      962e8c728f9269ddcf3547cb8d78a1d893e64e6ccc75191ca718500e1a5ae3b58530721f8703ccd6a8e0db316a09b0f99fc03ca79acd16f1082c63f46b159b3a

    • C:\Program Files\Npcap\NPCAP.inf

      Filesize

      8KB

      MD5

      04c7944e5a04629fc393cadf44293136

      SHA1

      6d292051319573e4315c9e2988f53501793c57dc

      SHA256

      6b9273ab4333e5ec67fd4ff044c43916dfc6939bfefadc911f5c5a2dfae2db65

      SHA512

      2070fde243093f7f2d970cf9af876fbc829e72c43c929d03db5ac617d8c2d6d007e767cbe0f56563b7acb8b507bb7cb1f6cbb85d77c3a686fc0d1cdd3bddae88

    • C:\Program Files\Npcap\NPCAP_wfp.inf

      Filesize

      2KB

      MD5

      722fc22cb6b7556bd826c80a5d593607

      SHA1

      0863253fa38d0a4b7379846d415a9e43a2b5396f

      SHA256

      a68b8379090572eb3c4d7b8f4fd00c10ce31708e32c2fb86fb6b4581b6085720

      SHA512

      b2fafa2c0ccc5cbb6d707077bc3d147ac3b3b7a005b68a53d0e8df1268879aa29addd8bf36f01fd30f13a76cea311b521a8e2e38101df0516bf48b799b856a55

    • C:\Program Files\Npcap\NPFInstall.log

      Filesize

      1KB

      MD5

      3311e904afa64c695db00af82f4d4e19

      SHA1

      e35b7241e60a3490b721e277a1630fda12960987

      SHA256

      99ecc530dc8c466e18174b1106d3b73bad6c24f606ef6320be5da93d85242a29

      SHA512

      abaaf4cd9d3d5c5097e92bad77317e9054297f03104bd500e5e19f63cd3b0ef724455c0c233bcdf660b2cfad8910bc37fee50a1cf36b4bf9dcc73b064b069fd2

    • C:\Program Files\Npcap\NPFInstall.log

      Filesize

      1KB

      MD5

      8eb265ddf17aa7a6a2c88c1b1d0c0bdf

      SHA1

      4b93a16d353e71a5d05d1c6eba376bcc179775b5

      SHA256

      1fdba7d8e363ba36203ab91d11cb58d0911ef676b60903d53b6a48a9edb87b5f

      SHA512

      bc9da58411198bc732b62c22cc7e546d089276135bdca95b4d1caf595219256fb9c7fb461f026acb7502196981e3a2c2918b1efe8bafdbb8025d2e9a90e110c7

    • C:\Program Files\Npcap\NPFInstall.log

      Filesize

      2KB

      MD5

      dcd482e325e7910eb6f2b93be21e35a6

      SHA1

      e610cf00a8d209a3455ba9c534c96369ee7e20de

      SHA256

      024dad9b3ada13dde1732b34e6404cc78fb0d082f28af3b8fd75203d0d56f7e7

      SHA512

      3fc230dc37db06fbfca6e3edf20f937e3d12cbf3666eff0e3d50388de7dca50edc00da063c5ae3e65da7268f550ad1c1eff4990971dedc50e2f36fd3388132bd

    • C:\Program Files\Npcap\NPFInstall.log

      Filesize

      2KB

      MD5

      7571ecf27e41ee57e07ecb72f46fa738

      SHA1

      1363a92128883c9e313e1bd8ffb98ecee5d1aa97

      SHA256

      9ab28dd0e3a257fa8ad9dbd29e2be32fe498549349be03ab8e3c4817fae234df

      SHA512

      85d52b2860a9b00667af6437d16759e3195b7355f9d2c21c0d8f2d9e06dc5065a0e311a51e69557606208ace18f6d8b1a78621953b8ee4222e1438ac3633713f

    • C:\Program Files\Npcap\NPFInstall.log

      Filesize

      2KB

      MD5

      5ac83056bf9a02775647d6b231b29aac

      SHA1

      2286d3db11f54eece83e88c5a7b06c6143edf4a2

      SHA256

      c37548d5f2ecf0edc4495cb46900996377e47955e50e1a51100104e78f747acf

      SHA512

      1d4fe565717babb4a5cdae63b9d64832b0830d8ceb9fb0623fe1790a149c2c584e3b5bd063b9a2a2a71525439987dcf1d1b7f4c5df3dee38df6847565abf3253

    • C:\Program Files\Npcap\NPFInstall.log

      Filesize

      3KB

      MD5

      dd462c95b7a91156e91bac0b1562887c

      SHA1

      dcd6bcd4cd43adbab5166c0730f5d9b56b8de49c

      SHA256

      0a1409ccbd34cbbd585f1f114812210ff84811c9347758f1d076a5bf06ebcf7d

      SHA512

      1e761ec6bfb1a8906b7dc49c5f1354d5e20b28173e6e8e7a43815cdc655c85b8df3e719dbe97d2895df5c5167e04284de3373965c562e95dc199381a9a60b44f

    • C:\Program Files\Npcap\NPFInstall.log

      Filesize

      3KB

      MD5

      0006731148d26487fd5815f21b7e7110

      SHA1

      4071f7ddc027445fd26cc012ffa9eafa88585473

      SHA256

      782761d52f0552a38717f2d04725d2959a7472a99cfa34241ef800ac57abce7b

      SHA512

      137ab6032f6d792365580667b56d7c6a2f348916b5a77a82617e9de783236c3448aa92aac2390a5d2b184ff965f576fae4843c227ddc407f46ea624e36c2078c

    • C:\Program Files\Npcap\NPFInstall.log

      Filesize

      4KB

      MD5

      56e140dd4fb1515b6f7e058431e7b6f6

      SHA1

      5b5386fbc7214f09dec1ced4e33b80814a770525

      SHA256

      6d89ac58bd0d8e9e4979ca74ad6e716f0b3f762555b364e6f408a8f17ecd688b

      SHA512

      fc585a38766383b7c07718d933fcb52ea89dcece438285aa5425cab93dd11f07e8c6cf1c6dce0851e88f75adb12371bdbfaeb4155ee64cdd6c2d9135a9a9b6a8

    • C:\Program Files\Npcap\NPFInstall.log

      Filesize

      4KB

      MD5

      4a7e7f5adc101b1820f6be28ccc9da22

      SHA1

      b183254bff83a7ff2aeacb74d3a7d7a165941cd4

      SHA256

      1280eacb1971c39707c23436b6d8a8cb6e6110ab1c955220fab5dbdd183a506a

      SHA512

      b7bea50e2accfe4eb408d2b51355a03595a0a5c7e2761723c6e5f658197af69140779c3025e279fd8e1ec4783b74c59e60dc6598d991995c747c2bff05ca6e1c

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      1KB

      MD5

      def65711d78669d7f8e69313be4acf2e

      SHA1

      6522ebf1de09eeb981e270bd95114bc69a49cda6

      SHA256

      aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

      SHA512

      05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      17KB

      MD5

      c48d8f2922af06aab9f047e9d068e414

      SHA1

      9e711c7dbbceea1de18f71798a77650bcd7f3233

      SHA256

      e295daf7ab9b0da7b695abd786cc192b0414b89b2171e49a7547c06b4cd251dc

      SHA512

      d49145cd2594081d6eee04e0347b41df6a754c190e53f1964488693076b2da1c667cdd5db739ef70365cfa2f22f4f7c9d8e68237c949e812efccf4470e0f4923

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_el3bz5ty.vn2.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\chaospc.exe

      Filesize

      1.9MB

      MD5

      e16fef8f8f9d64ccda412e749581c847

      SHA1

      dec31e41e8006fd4682344c91adfdf5e3d108ab9

      SHA256

      471ad500f690fa241a5fca425aeeb6a9af63ec1c450b835f2e1b870dc079d080

      SHA512

      be1f1a33a5ca73fda6317219b42442d5d2dd0185207df5c40f74505a5d4d8855caa036cfcc0cf85eee8578eeb5b1aa2ec8909c481dab86b210a8733bf32351bb

    • C:\Users\Admin\AppData\Local\Temp\chaospcap.exe

      Filesize

      1.1MB

      MD5

      cab256acf99dc6e0685c0567ea6ee658

      SHA1

      08aefa7d9a941ffe7d5c29d6b65d115109b5e2b7

      SHA256

      b0efd269d32e581da747e5050ef98d2eb91e6de9080e0918f5af85b485a4bdd1

      SHA512

      7f2147cd7d2e0e044e4e46c26df015decc4ae4c51d8500e91f1155cfe91e58c38d5f9a10710e6c70ba7ab590a4828e344ac32f28ecefaf9557429caac626af9b

    • C:\Users\Admin\AppData\Local\Temp\nsq885C.tmp\InstallOptions.dll

      Filesize

      22KB

      MD5

      170c17ac80215d0a377b42557252ae10

      SHA1

      4cbab6cc189d02170dd3ba7c25aa492031679411

      SHA256

      61ea114d9d0cd1e884535095aa3527a6c28df55a4ecee733c8c398f50b84cc3d

      SHA512

      0fd65cad0fcaa98083c2021de3d6429e79978658809c62ae9e4ed630c016915ced36aa52f2f692986c3b600c92325e79fd6d757634e8e02d5e582ff03679163f

    • C:\Users\Admin\AppData\Local\Temp\nsq885C.tmp\NPFInstall.exe

      Filesize

      301KB

      MD5

      69a2863281739e40702e40fde07ef72d

      SHA1

      8cf737fb5845a45445483cb1fae533c5a61da028

      SHA256

      5c2e569db9c5a978004b8fbf04ed372071ad998d759a12e5aaba470df158889e

      SHA512

      2315a4aa52f579a3633bd9c61c293b9fa78725d8331deee6ca24db70fb2565f431fc0f7f1ee84881b2e34b778ffc91c45e1b694ae517cdd266b0875e7089f178

    • C:\Users\Admin\AppData\Local\Temp\nsq885C.tmp\System.dll

      Filesize

      19KB

      MD5

      f020a8d9ede1fb2af3651ad6e0ac9cb1

      SHA1

      341f9345d669432b2a51d107cbd101e8b82e37b1

      SHA256

      7efe73a8d32ed1b01727ad4579e9eec49c9309f2cb7bf03c8afa80d70242d1c0

      SHA512

      408fa5a797d3ff4b917bb4107771687004ba507a33cb5944b1cc3155e0372cb3e04a147f73852b9134f138ff709af3b0fb493cd8fa816c59e9f3d9b5649c68c4

    • C:\Users\Admin\AppData\Local\Temp\nsq885C.tmp\final.ini

      Filesize

      568B

      MD5

      cae757421db8d011e41266bfd9439885

      SHA1

      7108a9f0740ee4e3a118f6ac9212e0446f074181

      SHA256

      ff350a68202aadb145f590c8579f9284d2e3c324b0369fde39e5a3a31d7b8204

      SHA512

      785d19c796834065c823a7da99036378bba54b932ea1e47d4ba0c1d123a0a09ec307a3459fb862221de74ce61d9a8d7ec73901c9de007d31e7b39eb7a19b16b5

    • C:\Users\Admin\AppData\Local\Temp\nsq885C.tmp\nsExec.dll

      Filesize

      14KB

      MD5

      f9e61a25016dcb49867477c1e71a704e

      SHA1

      c01dc1fa7475e4812d158d6c00533410c597b5d9

      SHA256

      274e53dc8c5ddc273a6f5683b71b882ef8917029e2eaf6c8dbee0c62d999225d

      SHA512

      b4a6289ef9e761e29dd5362fecb1707c97d7cb3e160f4180036a96f2f904b2c64a075b5bf0fea4a3bb94dea97f3cfa0d057d3d6865c68da65fdcb9c3070c33d8

    • C:\Users\Admin\AppData\Local\Temp\nsq885C.tmp\options.ini

      Filesize

      2KB

      MD5

      3ae95e7aa4279543a4b0716328c3a243

      SHA1

      27c408b466036ff60ea481727e7647cc0cfe8893

      SHA256

      5180fe925d502f9faafdc24c7839c76a62463cee2167dd5c8b2fa129eedb6367

      SHA512

      c9d31450ddddb765e95b79184937a89ecf0d043afb64099185e168d0a63296cf30080b3dd1f8a6ac9a3d10c3b6d3bcd4a2d81f608ba273e7e7c0a349387e841c

    • C:\Users\Admin\AppData\Local\Temp\nsq885C.tmp\options.ini

      Filesize

      2KB

      MD5

      924e8d57fd505728e9e4c11497169946

      SHA1

      ddbb7c9ca35cc7de3dddaf309a7c7e51df2f6503

      SHA256

      43020343ded3f552e0e1344cefc88056be15a9c153c526c48a37de85fb501dd6

      SHA512

      1206758ccaaa88909d76db686dd41bc0f61377d419e23b6c7f9fbe87c2484e0da679556f9e766e7dd13a2c1355b697d1b837b7c65f9ca8cb96215b3d959d6d62

    • C:\Users\Admin\AppData\Local\Temp\nsq885C.tmp\roots.p7b

      Filesize

      1KB

      MD5

      397a5848d3696fc6ba0823088fea83db

      SHA1

      9189985f027de80d4882ab5e01604c59d6fc1f16

      SHA256

      ad3bca6f2b0ec032c7f1fe1adb186bd73be6a332c868bf16c9765087fff1c1ca

      SHA512

      66129a206990753967cd98c14a0a3e0e2a73bc4cd10cf84a5a05da7bf20719376989d64c6c7880a3e4754fc74653dd49f2ffeffd55fc4ee5966f65beb857118c

    • C:\Users\Admin\AppData\Local\Temp\nsq885C.tmp\signing.p7b

      Filesize

      7KB

      MD5

      dd4bc901ef817319791337fb345932e8

      SHA1

      f8a3454a09d90a09273935020c1418fdb7b7eb7c

      SHA256

      8e681692403c0f7c0b24160f4642daa1eb080ce5ec754b6f47cc56b43e731b71

      SHA512

      0a67cc346f9752e1c868b7dc60b25704255ab1e6ea745850c069212f2724eba62ffaaa48309d5eba6ae0235223518610fb4b60fc422e4babba4f33d331c71db5

    • C:\Windows\SysWOW64\packet.dll

      Filesize

      170KB

      MD5

      908021dd2189d48a78ec95e847c196a2

      SHA1

      2cbde84bb30774a6465f4059b9d61deedaf6f760

      SHA256

      3bef0e2e292eefb9e3fd6dfc4f6ee5ae9fdec59bb55d4236a149f30e82d85107

      SHA512

      a28c62e2a282375d2c6f6a6bbc8cc0f0ac61de6c1247200f75fd745171475d35dc23b08b27f22f7600322c9b5e1988afb7302ac66955092b97f1438735a306b9

    • C:\Windows\SysWOW64\wpcap.dll

      Filesize

      409KB

      MD5

      297d3c108982cc4fe4a700a267d75847

      SHA1

      4bc3be377dde90d118ecf2147ef94d60cfc219b8

      SHA256

      ac8184c6bf7d6fe01048e1d1463da0e3429c88510470c41c2e5b9a3c1014bbb2

      SHA512

      186d4db43c43f069aeb8100853a354b6111cf352bce46b29852e7e22324cbe0a7c63bc48d26eb01d249e110d1c372db0595e6c1f41b86ee30d428095cc994373

    • memory/336-476-0x0000000007BC0000-0x0000000007BF2000-memory.dmp

      Filesize

      200KB

    • memory/2000-438-0x0000000002550000-0x0000000002586000-memory.dmp

      Filesize

      216KB

    • memory/2000-454-0x0000000005B40000-0x0000000005B8C000-memory.dmp

      Filesize

      304KB

    • memory/2000-455-0x0000000006060000-0x00000000060F6000-memory.dmp

      Filesize

      600KB

    • memory/2000-456-0x0000000005F20000-0x0000000005F3A000-memory.dmp

      Filesize

      104KB

    • memory/2000-457-0x0000000005F70000-0x0000000005F92000-memory.dmp

      Filesize

      136KB

    • memory/2000-458-0x00000000070C0000-0x0000000007664000-memory.dmp

      Filesize

      5.6MB

    • memory/2000-453-0x0000000005B10000-0x0000000005B2E000-memory.dmp

      Filesize

      120KB

    • memory/2000-452-0x0000000005540000-0x0000000005894000-memory.dmp

      Filesize

      3.3MB

    • memory/2000-442-0x00000000054D0000-0x0000000005536000-memory.dmp

      Filesize

      408KB

    • memory/2000-441-0x0000000005460000-0x00000000054C6000-memory.dmp

      Filesize

      408KB

    • memory/2000-440-0x0000000004B50000-0x0000000004B72000-memory.dmp

      Filesize

      136KB

    • memory/2000-439-0x0000000004CC0000-0x00000000052E8000-memory.dmp

      Filesize

      6.2MB