Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2024 09:04

General

  • Target

    5691f8daf89fcb97032f8ab5b4d671db_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    5691f8daf89fcb97032f8ab5b4d671db

  • SHA1

    8a7f6d40e5c44cc48e847806683cb419ed345f11

  • SHA256

    776d07a69fd0780e421400e5eb3d6469195d161eb063f712add08f25c6077fed

  • SHA512

    dd1d6f00c2e81af8daf8402390847028096b6746667b839bf8ee4ee13fde901f6bcebcb964deb041b59289befc1501cf6d6f59cebf70a8ab95d692dc58dd391e

  • SSDEEP

    24576:M29edV3EqRFllOCq4Bj5g13isqB4wWbouQ:D9a3FrlHq4vjsqB4wgK

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Extracted

Family

darkcomet

Botnet

Guest 777

C2

magnumbiz2.no-ip.biz:1000

Mutex

DC_MUTEX-WUY2B69

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    lbwAN2cQj9ve

  • install

    true

  • offline_keylogger

    true

  • password

    123456

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 31 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\fontdrvhost.exe
    "fontdrvhost.exe"
    1⤵
      PID:784
    • C:\Windows\system32\fontdrvhost.exe
      "fontdrvhost.exe"
      1⤵
        PID:792
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
          PID:332
        • C:\Windows\system32\sihost.exe
          sihost.exe
          1⤵
            PID:2648
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
            1⤵
              PID:2660
            • C:\Windows\system32\taskhostw.exe
              taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
              1⤵
                PID:2816
              • C:\Windows\Explorer.EXE
                C:\Windows\Explorer.EXE
                1⤵
                  PID:3368
                  • C:\Users\Admin\AppData\Local\Temp\5691f8daf89fcb97032f8ab5b4d671db_JaffaCakes118.exe
                    "C:\Users\Admin\AppData\Local\Temp\5691f8daf89fcb97032f8ab5b4d671db_JaffaCakes118.exe"
                    2⤵
                    • Modifies firewall policy service
                    • UAC bypass
                    • Windows security bypass
                    • Windows security modification
                    • Checks whether UAC is enabled
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    • System policy modification
                    PID:4636
                    • C:\Users\Admin\AppData\Local\Temp\5691f8daf89fcb97032f8ab5b4d671db_JaffaCakes118.exe
                      "C:\Users\Admin\AppData\Local\Temp\5691f8daf89fcb97032f8ab5b4d671db_JaffaCakes118.exe"
                      3⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:4748
                      • C:\Users\Admin\AppData\Local\Temp\CBSIDLM-TR1_5-YOONO_DESKTOP-10968233.EXE
                        "C:\Users\Admin\AppData\Local\Temp\CBSIDLM-TR1_5-YOONO_DESKTOP-10968233.EXE"
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Checks whether UAC is enabled
                        • System Location Discovery: System Language Discovery
                        PID:2984
                      • C:\Users\Admin\AppData\Local\Temp\CMDEXP.EXE
                        "C:\Users\Admin\AppData\Local\Temp\CMDEXP.EXE"
                        4⤵
                        • Modifies WinLogon for persistence
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Adds Run key to start application
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:4172
                        • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
                          "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
                          5⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of SetWindowsHookEx
                          PID:4260
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                  1⤵
                    PID:3540
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                    1⤵
                      PID:3764
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:3852
                      • C:\Windows\System32\RuntimeBroker.exe
                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                        1⤵
                          PID:3912
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                            PID:4004
                          • C:\Windows\System32\RuntimeBroker.exe
                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                            1⤵
                              PID:3424
                            • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
                              "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
                              1⤵
                                PID:2480
                              • C:\Windows\System32\RuntimeBroker.exe
                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                1⤵
                                  PID:2232
                                • C:\Windows\system32\backgroundTaskHost.exe
                                  "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca
                                  1⤵
                                    PID:3552
                                  • C:\Windows\system32\backgroundTaskHost.exe
                                    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                    1⤵
                                      PID:1072

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Temp\5691f8daf89fcb97032f8ab5b4d671db_JaffaCakes118.exe

                                      Filesize

                                      1.1MB

                                      MD5

                                      5691f8daf89fcb97032f8ab5b4d671db

                                      SHA1

                                      8a7f6d40e5c44cc48e847806683cb419ed345f11

                                      SHA256

                                      776d07a69fd0780e421400e5eb3d6469195d161eb063f712add08f25c6077fed

                                      SHA512

                                      dd1d6f00c2e81af8daf8402390847028096b6746667b839bf8ee4ee13fde901f6bcebcb964deb041b59289befc1501cf6d6f59cebf70a8ab95d692dc58dd391e

                                    • C:\Users\Admin\AppData\Local\Temp\CBSIDLM-TR1_5-YOONO_DESKTOP-10968233.EXE

                                      Filesize

                                      573KB

                                      MD5

                                      795ce399b0ff5850ec39b6ed73b68282

                                      SHA1

                                      76a33f18410cd93dc994975222aa0ac5606af1dc

                                      SHA256

                                      a8e30ceaeb1ae11c989c952e9dabdf19f4ea384fb7f7f1d9fd36d2a6312ae76f

                                      SHA512

                                      c3659798f63f52afbe3a98ad9b2c9331cfb87698a3769a6209c20b019908d53e86c70d4b03890c5205f41da777a0e214765c6c335c4767402f442530c45c591e

                                    • C:\Users\Admin\AppData\Local\Temp\CMDEXP.EXE

                                      Filesize

                                      252KB

                                      MD5

                                      b114dc094d0053f257e4933a95926119

                                      SHA1

                                      904c18ac98491444e311b04fc2aa9f658f518036

                                      SHA256

                                      ad77670d3b037dddd9a8fd565b499dcebe6e0e067f8348a480e1e04b8d381352

                                      SHA512

                                      f394a9477fc2ee6da9d00b4d65a7b7504b83c5701032bf3e6dd9b3a9f6bffa63e4a1c65dd738d7556b3315a8f0d75efb6b7f2b6c209c98c7e36f396914dc81c0

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\DownloadList.lua

                                      Filesize

                                      10KB

                                      MD5

                                      efcc382d98ba885e281d06f6448ab989

                                      SHA1

                                      7deff5310c8b09817f2cc001d9f7d5d721262f92

                                      SHA256

                                      8da165f4851b4ad8792c3a6069db855c27b151062805cc37cbe03fbbc2d8363d

                                      SHA512

                                      fd3dd0a700402453e2ce6f085d8af3c80dedae742d276d18d3d9a04945549276c146bea9ced6eb6e64a1a3661aac4df9397642d19842d82d0ebf63d7b106ce34

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\FloatingProgress.dll

                                      Filesize

                                      25KB

                                      MD5

                                      b592d0d9c7f00f86167b785770c16aa2

                                      SHA1

                                      b23d7dd1f8e4898f8ebae6fc991859ee56927138

                                      SHA256

                                      246b585650b61dd13b5cf61850bf13fddf327124cb59832952a0390f44c96ec0

                                      SHA512

                                      f8a06492e249a0a58793951a26c5145fa390f5cb8d0e1d2e79476dab3d7730c4894ff2b9f7ad2957270639114ab75ee6ac126cc7a6bfd066b725d6e6944b9697

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\LuaBridge.dll

                                      Filesize

                                      20KB

                                      MD5

                                      9d05719b084770dc9db32664d7c721df

                                      SHA1

                                      1b89b312f06ef282bb9509b58a0be8ef541fd903

                                      SHA256

                                      f80704c617aa9b65f390b93a52eb309e0f13a3b34b855617aad4f3126e6fe7a9

                                      SHA512

                                      dfc4680ded783a3f00122d8db098970e13028f58e14b87207fd70ce149bc6d0015f7cb5b4116cae71789f81d672e538e1c71ca70721162d7c719387f916e865c

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\LuaSocket\lua\ltn12.lua

                                      Filesize

                                      8KB

                                      MD5

                                      e440044afe6c761507a996b5b45ab0f9

                                      SHA1

                                      ef772c758fd5d6098b41375f35ac26f3963cc306

                                      SHA256

                                      b1864aed85c114354b04fbe9b3f41c5ebc4df6d129e08ef65a0c413d0daabd29

                                      SHA512

                                      8a82df90459929de1c91ed29a122a149749d42adbb85faf0c3123d0f0886babc90cb93de85105feb7497b46552a6747ae05b985f5a488d1d8f1a2a7db44077b4

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\LuaSocket\lua\mime.lua

                                      Filesize

                                      2KB

                                      MD5

                                      4bfdaaab9014fe129bc6388fd5687c8f

                                      SHA1

                                      2c6ff28245e1dc7ec9ac1c43c3cda354d07b2c4a

                                      SHA256

                                      e9167e0da842a0b856cbe6a2cf576f2d11bcedb5985e8e4c8c71a73486f6fa5a

                                      SHA512

                                      3a1a4d838bb5cafe71da262ee7bd6dccbd30dd4d7abe0d04f6ecf96bf704d5e111967be812894a47f2eb3374ee110620b7cc47eebac8b72ddcf7f506ba82a607

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\LuaSocket\lua\socket.lua

                                      Filesize

                                      4KB

                                      MD5

                                      74dbe1060e91112e1c21ef9870b4a587

                                      SHA1

                                      86afb6aecb0a8387ffa5dead1cc9808332f94310

                                      SHA256

                                      15fd138a169cae80fecf4c797b33a257d587ed446f02ecf3ef913e307a22f96d

                                      SHA512

                                      73218ebb2ad27d3402173054be997089549698d9112acb4b1c9fe044689a40ceda3df00304d336d2034e61c04832f52d971509240414838841d40f53fc0c3723

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\LuaSocket\lua\socket\ftp.lua

                                      Filesize

                                      9KB

                                      MD5

                                      7309f4294ae4abb4f6ae657b2a98d488

                                      SHA1

                                      327d143e9f7a1835a58fdaf569a8f7a937fcf2c0

                                      SHA256

                                      9ba5df91091c46f0ffe0a93ace577a4833c92cbec1742113d0a2da9e568f9a10

                                      SHA512

                                      a44d2603af63828e8a0b1fbc7455305c616e5bae4a351b429e7e94a6aa7e4d6425f69d57d6a44ba87ee5d29accfc01c1f3ff288652120ff8f08a66543d357895

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\LuaSocket\lua\socket\http.lua

                                      Filesize

                                      12KB

                                      MD5

                                      61a2a779da46e835338f1ad1efad1717

                                      SHA1

                                      091d49262b7c1d1f4a89655673710f6d8a37baf0

                                      SHA256

                                      68fd4bc835da98dd1d5509333f8cc8861133c9439d3de879bf29a96de462940a

                                      SHA512

                                      657594b8ea1a2584c45d85df6c57c5ed43bfae2ece2db534e52ad66a8c7f8c1f85f99bc9329fd8d88a06b6fd2b9121b8e359dbdfd532da0e26d94352a055ec14

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\LuaSocket\lua\socket\tp.lua

                                      Filesize

                                      3KB

                                      MD5

                                      2cad406e591cade482c7f16f39c21481

                                      SHA1

                                      84a3ab88ff7a9102c2c6d21bdb6eede6862167a4

                                      SHA256

                                      343afa62f69c7c140fbbf02b4ba2f7b2f711b6201bb6671c67a3744394084269

                                      SHA512

                                      ecc98991c25036b54f2bb71b3229e4bc8fb401e55db0e5f9c958c2a7b00b40fc9ae2d7e45002d4f2a03cec85535785c42ab6d20476fe095a76444d143493b145

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\LuaSocket\lua\socket\url.lua

                                      Filesize

                                      10KB

                                      MD5

                                      8fb662c362da002b833793ea7794fdaf

                                      SHA1

                                      7afaf1ad22c95690cbb3f55226b617121efc20eb

                                      SHA256

                                      269526c11dbb25b1b4b13eec4e7577e15de33ca18afa70a2be5f373b771bd1ab

                                      SHA512

                                      b0b766ac2b5cff879009ad9f74295f7ab0bf8b0628b8aece5597243e0fa96f4a85361728fd8a08eea7d2629dfc5e5d8b6aebca432075ad74c131ad3161a475c7

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\LuaSocket\mime\core.dll

                                      Filesize

                                      52KB

                                      MD5

                                      4a4845ba1666907f708c9c10a31ec227

                                      SHA1

                                      1ebf626adc84147e5114885ce779f92d6eb68f3a

                                      SHA256

                                      a1ffee9687ab4a23a78b3251888aff09e2896d76f8d16d713367b265f125188d

                                      SHA512

                                      d009f5e2a2ecfbec5e5e788ade142d612846d0c99921774e4a11b060998dfb0680cf1e1a54604535d5560738093f9ae166866cb23eee5c7d9c4e5cc5a33e7464

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\LuaSocket\socket\core.dll

                                      Filesize

                                      80KB

                                      MD5

                                      4bf7db111acfa7c28ad36606107b3322

                                      SHA1

                                      6f20b9f6663ce0c309a2ce60e718d64ffb6c75b3

                                      SHA256

                                      bfe8445c38ee71240e856f85d79e94123d7179bf43688de0e2a14e32e6ef21b0

                                      SHA512

                                      0a5e66a65b80e15d8198f2934c58227ae17680f0fbea9865b2f44af82a29c53d4f95cf9616b4dfd75202420eb73b7d962cf2c84fdad6ce26afe1eb4bb978d0b6

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\LuaXml_lib.dll

                                      Filesize

                                      11KB

                                      MD5

                                      7292b642bd958aeb7fd7cfd19e45b068

                                      SHA1

                                      19a800620d041634abae5b5d096cb0e87ce4c188

                                      SHA256

                                      90f1bb98e034fcf7bfddb8cb0a85b27a9c9ddb01b926b4e139e1e8fc53d41d09

                                      SHA512

                                      bd758e0833454e0aa2af976ac94fde17c5401102c5991887cefbe8e337974381584c73e2d1e50e49263c55c3788e24dc7f8bd0b9d2a76a6cbe38e48dd9d6c44a

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\System.dll

                                      Filesize

                                      10KB

                                      MD5

                                      7e3c808299aa2c405dffa864471ddb7f

                                      SHA1

                                      b5de7804dd35ed7afd0c3b59d866f1a0749495e0

                                      SHA256

                                      91c47a9a54a3a8c359e89a8b4e133e6b7296586748ed3e8f4fe566abd6c81ddd

                                      SHA512

                                      599f61d5270227a68e5c4b8db41b5aa7bc17a4bbe91dd7336b410516fa6107f4f5bf0bbb3f6cc4b2e15b16bf9495fdc70832bab6262046cb136ad18f0c9b3738

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\UACInfo.dll

                                      Filesize

                                      4KB

                                      MD5

                                      d02a497be5f89c44827f142c4662f591

                                      SHA1

                                      38f83ccbac11de069df0e1cd79a6fdf7f006516c

                                      SHA256

                                      6d29dfd24695535b5973d8261d93373603ceaae03ab97662fe1b3dcc47d18226

                                      SHA512

                                      81c87f9d56a8ab7703a4effd3ba7b982b6765ecbdc0dbb1c595f549c4310a5db57dcdc38929eafe56983ea8cefc0b572c3faf82a4b62eb7c564b05550215f1c1

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\definitions.lua

                                      Filesize

                                      4KB

                                      MD5

                                      840fd3d93db939b1e4b504d8fe587ed1

                                      SHA1

                                      98f0dd4aca7765c158bcd1fe1d11bbee5e1e586e

                                      SHA256

                                      e2d0e6bcd2d6cb69a6d9e84d80f9cb182fb0b6db5592d8b304ad6eb98590c35c

                                      SHA512

                                      570ae6db31df726b8fe9aff35e553ad669d4c25deabce424b865b96597933225ab644a7e2944b8507e2d5a0b0e04396025ce711cba9beac7bc5844c435ab76a1

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\json.lua

                                      Filesize

                                      18KB

                                      MD5

                                      29b3c5e9e82d2bb50dabb265e95a63eb

                                      SHA1

                                      4be64773dbf6784f480d82b564aed19a91518977

                                      SHA256

                                      ce576da68ae4f8636849a50d3f03278ee414109b6232014e5c1ba3c107ecf469

                                      SHA512

                                      300cf2335aeb6d78d2c1bb9c7b81553c0ec91e8cb872dab0cc2b7d5ee54d7b9368c1acb92d64e9ddd895c7fccd066eaf0ae94d24a371c854e3931e8d9acb6c33

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\lua51.dll

                                      Filesize

                                      160KB

                                      MD5

                                      13c3a33c1f6e43f38de533fd0b766c98

                                      SHA1

                                      6b92c3d6694ddc40d9b75853baa51cb2f9f8db13

                                      SHA256

                                      4158063b0a868431f6430f54c1192bf20e58a43a6d3d03b740e090951e2f4427

                                      SHA512

                                      d64466c03deec744e7c0bfc23e54ee91a4eff4075fb92ef97c0014bbfb00e0d21731119a3a199fb9cac4a528419e8b8066589eddadb16b445ea298d67b037c15

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\luacom.dll

                                      Filesize

                                      287KB

                                      MD5

                                      ed7f7857933b38e5d10daf828e79af19

                                      SHA1

                                      7f1445f87f7e2256efc33ef56da20c3b23a1e0f9

                                      SHA256

                                      9dd5218bc2d12f4d07e268bc6ec01d6eefde4b99a07246d0a96d18477d331b5b

                                      SHA512

                                      ceaf9597d4cb725c4ec8b7af8d1090b38df102b52ca7606a24e9a094fc81f450f93ad22770c905db9115e271fa5fa4f5731caa7b1875e204edb10fb691741715

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\utils.lua

                                      Filesize

                                      39KB

                                      MD5

                                      1a08e6701868d895a482039de5f19872

                                      SHA1

                                      ea3acc57b598ce7564994f4131e7e7029f098503

                                      SHA256

                                      5ee55478e71a8d5e4697ec52495fb9e1bea104e30d783475b876a04e10781657

                                      SHA512

                                      0892c0177414bee95ea687753d85d5e4cb95f0eb8e0e97ea0f30840f0e0d9418ce60ddfdb58dea1ede52eae749704a45759f539de12cecca93247bcdaa58d56d

                                    • C:\Users\Admin\AppData\Local\Temp\nseF57E.tmp\version.dll

                                      Filesize

                                      6KB

                                      MD5

                                      ebc5bb904cdac1c67ada3fa733229966

                                      SHA1

                                      3c6abfa0ddef7f3289f38326077a5041389b15d2

                                      SHA256

                                      3eba921ef649b71f98d9378dee8105b38d2464c9ccde37a694e4a0cd77d22a75

                                      SHA512

                                      fa71afcc166093fbd076a84f10d055f5a686618711d053ab60d8bd060e78cb2fdc15fa35f363822c9913413251c718d01ddd6432ab128816d98f9aabf5612c9f

                                    • memory/2984-429-0x00000000033D0000-0x00000000033D9000-memory.dmp

                                      Filesize

                                      36KB

                                    • memory/2984-303-0x0000000003450000-0x000000000345C000-memory.dmp

                                      Filesize

                                      48KB

                                    • memory/2984-304-0x0000000003450000-0x000000000345C000-memory.dmp

                                      Filesize

                                      48KB

                                    • memory/2984-190-0x0000000003420000-0x000000000342E000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/2984-81-0x0000000002E00000-0x0000000002E28000-memory.dmp

                                      Filesize

                                      160KB

                                    • memory/2984-128-0x00000000033E0000-0x00000000033F6000-memory.dmp

                                      Filesize

                                      88KB

                                    • memory/2984-232-0x0000000003480000-0x00000000034CE000-memory.dmp

                                      Filesize

                                      312KB

                                    • memory/4172-63-0x0000000000400000-0x00000000004B7000-memory.dmp

                                      Filesize

                                      732KB

                                    • memory/4172-311-0x0000000000400000-0x00000000004B7000-memory.dmp

                                      Filesize

                                      732KB

                                    • memory/4260-437-0x0000000000400000-0x00000000004B7000-memory.dmp

                                      Filesize

                                      732KB

                                    • memory/4260-436-0x0000000000400000-0x00000000004B7000-memory.dmp

                                      Filesize

                                      732KB

                                    • memory/4260-433-0x0000000000400000-0x00000000004B7000-memory.dmp

                                      Filesize

                                      732KB

                                    • memory/4260-432-0x0000000000400000-0x00000000004B7000-memory.dmp

                                      Filesize

                                      732KB

                                    • memory/4260-431-0x0000000000400000-0x00000000004B7000-memory.dmp

                                      Filesize

                                      732KB

                                    • memory/4260-430-0x0000000000400000-0x00000000004B7000-memory.dmp

                                      Filesize

                                      732KB

                                    • memory/4260-441-0x0000000000400000-0x00000000004B7000-memory.dmp

                                      Filesize

                                      732KB

                                    • memory/4260-438-0x0000000000400000-0x00000000004B7000-memory.dmp

                                      Filesize

                                      732KB

                                    • memory/4260-434-0x0000000000400000-0x00000000004B7000-memory.dmp

                                      Filesize

                                      732KB

                                    • memory/4260-440-0x0000000000400000-0x00000000004B7000-memory.dmp

                                      Filesize

                                      732KB

                                    • memory/4260-435-0x0000000000400000-0x00000000004B7000-memory.dmp

                                      Filesize

                                      732KB

                                    • memory/4636-19-0x0000000002CB0000-0x0000000003D3E000-memory.dmp

                                      Filesize

                                      16.6MB

                                    • memory/4636-7-0x00000000024D0000-0x00000000024D1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4636-15-0x0000000000770000-0x0000000000772000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/4636-11-0x0000000000770000-0x0000000000772000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/4636-9-0x0000000002CB0000-0x0000000003D3E000-memory.dmp

                                      Filesize

                                      16.6MB

                                    • memory/4636-5-0x0000000002CB0000-0x0000000003D3E000-memory.dmp

                                      Filesize

                                      16.6MB

                                    • memory/4636-4-0x0000000002CB0000-0x0000000003D3E000-memory.dmp

                                      Filesize

                                      16.6MB

                                    • memory/4636-13-0x0000000002CB0000-0x0000000003D3E000-memory.dmp

                                      Filesize

                                      16.6MB

                                    • memory/4636-0-0x0000000000400000-0x00000000005B6000-memory.dmp

                                      Filesize

                                      1.7MB

                                    • memory/4636-3-0x0000000002CB0000-0x0000000003D3E000-memory.dmp

                                      Filesize

                                      16.6MB

                                    • memory/4636-12-0x0000000002CB0000-0x0000000003D3E000-memory.dmp

                                      Filesize

                                      16.6MB

                                    • memory/4636-8-0x0000000002CB0000-0x0000000003D3E000-memory.dmp

                                      Filesize

                                      16.6MB

                                    • memory/4636-1-0x0000000002CB0000-0x0000000003D3E000-memory.dmp

                                      Filesize

                                      16.6MB

                                    • memory/4636-10-0x0000000002CB0000-0x0000000003D3E000-memory.dmp

                                      Filesize

                                      16.6MB

                                    • memory/4636-6-0x0000000000770000-0x0000000000772000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/4636-17-0x0000000002CB0000-0x0000000003D3E000-memory.dmp

                                      Filesize

                                      16.6MB

                                    • memory/4636-18-0x0000000002CB0000-0x0000000003D3E000-memory.dmp

                                      Filesize

                                      16.6MB

                                    • memory/4636-32-0x0000000000770000-0x0000000000772000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/4636-41-0x0000000000400000-0x00000000005B6000-memory.dmp

                                      Filesize

                                      1.7MB

                                    • memory/4636-27-0x0000000002CB0000-0x0000000003D3E000-memory.dmp

                                      Filesize

                                      16.6MB

                                    • memory/4748-22-0x0000000000400000-0x00000000004E0000-memory.dmp

                                      Filesize

                                      896KB

                                    • memory/4748-25-0x0000000000400000-0x00000000004E0000-memory.dmp

                                      Filesize

                                      896KB

                                    • memory/4748-65-0x0000000000400000-0x00000000004E0000-memory.dmp

                                      Filesize

                                      896KB

                                    • memory/4748-23-0x0000000000400000-0x00000000004E0000-memory.dmp

                                      Filesize

                                      896KB

                                    • memory/4748-20-0x0000000000400000-0x00000000004E0000-memory.dmp

                                      Filesize

                                      896KB