File name:

TouchEn nxKey Installer.exe

Full analysis: https://app.any.run/tasks/9cb87181-9abc-4097-acc0-8ebcf2b32145
Verdict: Malicious activity
Analysis date: October 11, 2021, 19:58:29
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

5E6A57B26A11636634DB617F87104251

SHA1:

E484AFC77DAD0360FB90A41834BC8A0E3289C9E5

SHA256:

7561759CCE96662220EFAC50DDE4846B280B1FEC7F368F15E74DD5EFBE8886DB

SSDEEP:

196608:6w7FWG0s8Qz75ewZBUz48/BOqdnQODFc3vrNeqI2qLWLp3elHz2zqdd53Hvv:5GstzdrZOz48/BVd5Jc5qLWLhelHzR3h

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • TouchEn nxKey Installer.exe (PID: 2672)
      • CKSetup32.exe (PID: 4056)
      • raon_touchenex_Install.exe (PID: 4052)
      • CrossEX_LocalService_Install.exe (PID: 3044)
      • FFCert.exe (PID: 2020)
    • Changes settings of System certificates

      • CrossEX_LocalService_Install.exe (PID: 3044)
    • Changes the autorun value in the registry

      • CrossEX_LocalService_Install.exe (PID: 3044)
    • Steals credentials from Web Browsers

      • Firefox_CertUtil.exe (PID: 3272)
      • certutil.exe (PID: 1864)
    • Actions looks like stealing of personal data

      • Firefox_CertUtil.exe (PID: 3272)
      • certutil.exe (PID: 1864)
    • Loads dropped or rewritten executable

      • certutil.exe (PID: 1864)
      • CrossEX_LocalService_Install.exe (PID: 3044)
      • certutil.exe (PID: 2708)
      • TouchEn nxKey Installer.exe (PID: 2672)
      • raon_touchenex_Install.exe (PID: 4052)
    • Application was dropped or rewritten from another process

      • CKSetup32.exe (PID: 4056)
      • CrossEX_LocalService_Install.exe (PID: 3044)
      • CrossEXService.exe (PID: 1612)
      • FFCert.exe (PID: 2020)
      • certutil.exe (PID: 2708)
      • Firefox_CertUtil.exe (PID: 3272)
      • ObCrossEXService.exe (PID: 1424)
      • certutil.exe (PID: 1864)
      • raon_touchenex_Install.exe (PID: 4052)
  • SUSPICIOUS

    • Creates files in the Windows directory

      • TouchEn nxKey Installer.exe (PID: 2672)
      • CKSetup32.exe (PID: 4056)
    • Checks supported languages

      • TouchEn nxKey Installer.exe (PID: 2672)
      • CKSetup32.exe (PID: 4056)
      • raon_touchenex_Install.exe (PID: 4052)
      • CrossEX_LocalService_Install.exe (PID: 3044)
      • CrossEXService.exe (PID: 1612)
      • ns31E2.tmp (PID: 3744)
      • ns3251.tmp (PID: 2960)
      • ObCrossEXService.exe (PID: 1424)
      • FFCert.exe (PID: 2020)
      • ns3164.tmp (PID: 1892)
      • Firefox_CertUtil.exe (PID: 3272)
      • certutil.exe (PID: 2708)
      • certutil.exe (PID: 1864)
    • Reads the computer name

      • TouchEn nxKey Installer.exe (PID: 2672)
      • CKSetup32.exe (PID: 4056)
      • raon_touchenex_Install.exe (PID: 4052)
      • CrossEX_LocalService_Install.exe (PID: 3044)
      • CrossEXService.exe (PID: 1612)
      • ObCrossEXService.exe (PID: 1424)
      • certutil.exe (PID: 2708)
      • certutil.exe (PID: 1864)
      • FFCert.exe (PID: 2020)
    • Executable content was dropped or overwritten

      • CKSetup32.exe (PID: 4056)
      • TouchEn nxKey Installer.exe (PID: 2672)
      • raon_touchenex_Install.exe (PID: 4052)
      • CrossEX_LocalService_Install.exe (PID: 3044)
      • FFCert.exe (PID: 2020)
    • Creates a software uninstall entry

      • CKSetup32.exe (PID: 4056)
      • CrossEX_LocalService_Install.exe (PID: 3044)
      • TouchEn nxKey Installer.exe (PID: 2672)
    • Removes files from Windows directory

      • CKSetup32.exe (PID: 4056)
    • Drops a file that was compiled in debug mode

      • CKSetup32.exe (PID: 4056)
      • CrossEX_LocalService_Install.exe (PID: 3044)
      • raon_touchenex_Install.exe (PID: 4052)
      • FFCert.exe (PID: 2020)
      • TouchEn nxKey Installer.exe (PID: 2672)
    • Creates a directory in Program Files

      • TouchEn nxKey Installer.exe (PID: 2672)
      • raon_touchenex_Install.exe (PID: 4052)
      • CrossEX_LocalService_Install.exe (PID: 3044)
    • Drops a file with too old compile date

      • TouchEn nxKey Installer.exe (PID: 2672)
      • raon_touchenex_Install.exe (PID: 4052)
      • CrossEX_LocalService_Install.exe (PID: 3044)
    • Creates/Modifies COM task schedule object

      • TouchEn nxKey Installer.exe (PID: 2672)
      • raon_touchenex_Install.exe (PID: 4052)
    • Creates files in the program directory

      • raon_touchenex_Install.exe (PID: 4052)
      • CrossEX_LocalService_Install.exe (PID: 3044)
      • TouchEn nxKey Installer.exe (PID: 2672)
    • Starts application with an unusual extension

      • CrossEX_LocalService_Install.exe (PID: 3044)
    • Starts SC.EXE for service management

      • ns3164.tmp (PID: 1892)
      • ns31E2.tmp (PID: 3744)
      • ns3251.tmp (PID: 2960)
    • Executed as Windows Service

      • ObCrossEXService.exe (PID: 1424)
    • Creates files in the user directory

      • certutil.exe (PID: 1864)
  • INFO

    • Reads settings of System Certificates

      • CrossEX_LocalService_Install.exe (PID: 3044)
      • TouchEn nxKey Installer.exe (PID: 2672)
    • Reads the computer name

      • sc.exe (PID: 3600)
      • sc.exe (PID: 4024)
      • sc.exe (PID: 496)
    • Checks supported languages

      • sc.exe (PID: 4024)
      • sc.exe (PID: 496)
      • sc.exe (PID: 3600)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (28.6)
.exe | UPX compressed Win32 Executable (28)
.exe | Win32 EXE Yoda's Crypter (27.5)
.dll | Win32 Dynamic Link Library (generic) (6.8)
.exe | Win32 Executable (generic) (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:09:18 09:06:22+02:00
PEType: PE32
LinkerVersion: 8
CodeSize: 9408512
InitializedDataSize: 8192
UninitializedDataSize: 3911680
EntryPoint: 0xcb43d0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.63
ProductVersionNumber: 1.0.0.63
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: TouchEn nxKey Keyboard Protector Installer
CompanyName: RaonSecure Co., Ltd.
FileDescription: TouchEn nxKey Keyboard Protector Installer
FileVersion: 1, 0, 0, 63
InternalName: TouchEn nxKey Installer
LegalCopyright: Copyright(C)2013 RaonSecure Co., Ltd.
OriginalFileName: TouchEn nxKey Installer.exe
ProductName: TouchEn nxKey Installer
ProductVersion: 1, 0, 0, 63

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 18-Sep-2017 07:06:22
Detected languages:
  • English - United States
  • Korean - Korea
Comments: TouchEn nxKey Keyboard Protector Installer
CompanyName: RaonSecure Co., Ltd.
FileDescription: TouchEn nxKey Keyboard Protector Installer
FileVersion: 1, 0, 0, 63
InternalName: TouchEn nxKey Installer
LegalCopyright: Copyright(C)2013 RaonSecure Co., Ltd.
OriginalFilename: TouchEn nxKey Installer.exe
ProductName: TouchEn nxKey Installer
ProductVersion: 1, 0, 0, 63

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000F0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 18-Sep-2017 07:06:22
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
UPX0
0x00001000
0x003BB000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
UPX1
0x003BC000
0x008F9000
0x008F8600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.8092
.rsrc
0x00CB5000
0x00002000
0x00001600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.53941

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.05265
1397
UNKNOWN
Korean - Korea
RT_MANIFEST
12
7.59211
1274
UNKNOWN
Korean - Korea
RT_STRING
13
7.48363
654
UNKNOWN
Korean - Korea
RT_STRING
108
1.91924
20
UNKNOWN
Korean - Korea
RT_GROUP_ICON
109
7.3099
340
UNKNOWN
Korean - Korea
RT_DIALOG
218
7.92569
16224
UNKNOWN
Korean - Korea
RT_BITMAP
219
0
12617280
UNKNOWN
Korean - Korea
BIN

Imports

ADVAPI32.dll
COMCTL32.dll
CRYPT32.dll
GDI32.dll
KERNEL32.DLL
OLEAUT32.dll
PSAPI.DLL
SHELL32.dll
SHLWAPI.dll
USER32.dll
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
56
Monitored processes
17
Malicious processes
7
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start drop and start start drop and start drop and start touchen nxkey installer.exe cksetup32.exe raon_touchenex_install.exe crossex_localservice_install.exe crossexservice.exe no specs ns3164.tmp no specs sc.exe no specs ns31e2.tmp no specs sc.exe no specs ns3251.tmp no specs sc.exe no specs obcrossexservice.exe no specs ffcert.exe firefox_certutil.exe certutil.exe no specs certutil.exe touchen nxkey installer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
496sc start "CrossEX Live Checker"C:\Windows\system32\sc.exens3251.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
A tool to aid in developing services for WindowsNT
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1424"C:\Program Files\iniLINE\CrossEX\crossex\ObCrossEXService.exe"C:\Program Files\iniLINE\CrossEX\crossex\ObCrossEXService.exeservices.exe
User:
SYSTEM
Company:
iniLINE Co., Ltd.
Integrity Level:
SYSTEM
Description:
CrossEX Live Checker
Exit code:
0
Version:
1.0.2.4
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\program files\iniline\crossex\crossex\obcrossexservice.exe
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
1612"C:\Program Files\iniLINE\CrossEX\crossex\CrossEXService.exe"C:\Program Files\iniLINE\CrossEX\crossex\CrossEXService.exeCrossEX_LocalService_Install.exe
User:
admin
Company:
iniLINE Co., Ltd.
Integrity Level:
HIGH
Description:
CrossEX Service
Exit code:
0
Version:
1.0.2.4
Modules
Images
c:\program files\iniline\crossex\crossex\crossexservice.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
1864"C:\Users\admin\AppData\Local\Temp\ffcert_raon\bin\certutil.exe" -A -d "C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default" -i "C:\Program Files\iniLINE\CrossEX\crossex\rootCA.crt" -n "iniLINE CrossEx RootCA" -t "CT,C,C"C:\Users\admin\AppData\Local\Temp\ffcert_raon\bin\certutil.exe
Firefox_CertUtil.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\temp\ffcert_raon\bin\certutil.exe
c:\windows\system32\kernel32.dll
c:\users\admin\appdata\local\temp\ffcert_raon\bin\nssutil3.dll
c:\users\admin\appdata\local\temp\ffcert_raon\bin\libplc4.dll
c:\windows\system32\msvcrt.dll
c:\users\admin\appdata\local\temp\ffcert_raon\bin\libnspr4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\advapi32.dll
1892"C:\Users\admin\AppData\Local\Temp\nsn3106.tmp\ns3164.tmp" sc create "CrossEX Live Checker" binpath= "C:\Program Files\iniLINE\CrossEX\crossex\ObCrossEXService.exe" start= autoC:\Users\admin\AppData\Local\Temp\nsn3106.tmp\ns3164.tmpCrossEX_LocalService_Install.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\users\admin\appdata\local\temp\nsn3106.tmp\ns3164.tmp
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
2020"C:\Users\admin\AppData\Local\Temp\~RAPack1059609\FFCert.exe" -nocesC:\Users\admin\AppData\Local\Temp\~RAPack1059609\FFCert.exe
TouchEn nxKey Installer.exe
User:
admin
Company:
RaonSecure Co., Ltd.
Integrity Level:
HIGH
Description:
FFCert
Exit code:
0
Version:
1.0.0.4
Modules
Images
c:\users\admin\appdata\local\temp\~rapack1059609\ffcert.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2364"C:\Users\admin\AppData\Local\Temp\TouchEn nxKey Installer.exe" C:\Users\admin\AppData\Local\Temp\TouchEn nxKey Installer.exeExplorer.EXE
User:
admin
Company:
RaonSecure Co., Ltd.
Integrity Level:
MEDIUM
Description:
TouchEn nxKey Keyboard Protector Installer
Exit code:
3221226540
Version:
1, 0, 0, 63
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\appdata\local\temp\touchen nxkey installer.exe
2672"C:\Users\admin\AppData\Local\Temp\TouchEn nxKey Installer.exe" C:\Users\admin\AppData\Local\Temp\TouchEn nxKey Installer.exe
Explorer.EXE
User:
admin
Company:
RaonSecure Co., Ltd.
Integrity Level:
HIGH
Description:
TouchEn nxKey Keyboard Protector Installer
Exit code:
0
Version:
1, 0, 0, 63
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\appdata\local\temp\touchen nxkey installer.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
2708"C:\Users\admin\AppData\Local\Temp\ffcert_raon\bin\certutil.exe" -L -d "C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.defaultC:\Users\admin\AppData\Local\Temp\ffcert_raon\bin\certutil.exeFirefox_CertUtil.exe
User:
admin
Integrity Level:
HIGH
Exit code:
255
Modules
Images
c:\users\admin\appdata\local\temp\ffcert_raon\bin\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\temp\ffcert_raon\bin\nssutil3.dll
c:\users\admin\appdata\local\temp\ffcert_raon\bin\libplc4.dll
c:\users\admin\appdata\local\temp\ffcert_raon\bin\libnspr4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
2960"C:\Users\admin\AppData\Local\Temp\nsn3106.tmp\ns3251.tmp" sc start "CrossEX Live Checker"C:\Users\admin\AppData\Local\Temp\nsn3106.tmp\ns3251.tmpCrossEX_LocalService_Install.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nsn3106.tmp\ns3251.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
9 988
Read events
9 899
Write events
82
Delete events
7

Modification events

(PID) Process:(4056) CKSetup32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{6CE20149-ABE3-462E-A1B4-5B549971AA38}
Operation:writeName:Compatibility Flags
Value:
0
(PID) Process:(4056) CKSetup32.exeKey:HKEY_CLASSES_ROOT\VirtualStore\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{6CE20149-ABE3-462E-A1B4-5B549971AA38}
Operation:writeName:Compatibility Flags
Value:
0
(PID) Process:(4056) CKSetup32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8FD68F8A-641E-4204-AE47-DD835C1AE756}
Operation:writeName:Compatibility Flags
Value:
0
(PID) Process:(4056) CKSetup32.exeKey:HKEY_CLASSES_ROOT\VirtualStore\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8FD68F8A-641E-4204-AE47-DD835C1AE756}
Operation:writeName:Compatibility Flags
Value:
0
(PID) Process:(4056) CKSetup32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6CE20149-ABE3-462E-A1B4-5B549971AA39}
Operation:writeName:AppName
Value:
CKAgentNXE.exe
(PID) Process:(4056) CKSetup32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6CE20149-ABE3-462E-A1B4-5B549971AA39}
Operation:writeName:AppPath
Value:
C:\Windows\system32
(PID) Process:(4056) CKSetup32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6CE20149-ABE3-462E-A1B4-5B549971AA39}
Operation:writeName:Policy
Value:
3
(PID) Process:(4056) CKSetup32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\TouchEn\Key
Operation:writeName:ucount
Value:
0
(PID) Process:(4056) CKSetup32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\TouchEn nxKey
Operation:writeName:DisplayName
Value:
TouchEn nxKey with E2E for 32bit
(PID) Process:(4056) CKSetup32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\TouchEn nxKey
Operation:writeName:UninstallString
Value:
C:\Windows\system32\CKSetup32.exe /uninstall appm
Executable files
48
Suspicious files
4
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
2672TouchEn nxKey Installer.exeC:\Users\admin\AppData\Local\Temp\~RAPack1059609\_Chunk.zipcompressed
MD5:
SHA256:
2672TouchEn nxKey Installer.exeC:\Users\admin\AppData\Local\Temp\~RAPack1059609\_Install.iniini
MD5:
SHA256:
4056CKSetup32.exeC:\Windows\System32\JRSKD24.SYSexecutable
MD5:
SHA256:
4056CKSetup32.exeC:\Windows\system32\temp_JRSKD24.SYSexecutable
MD5:
SHA256:
4056CKSetup32.exeC:\Windows\system32\temp_JRSUKD25.SYSexecutable
MD5:
SHA256:
4056CKSetup32.exeC:\Windows\System32\JRSUKD25.SYSexecutable
MD5:
SHA256:
4056CKSetup32.exeC:\Windows\system32\CKAgentNXE.exeexecutable
MD5:7C0A5AF4B35B5BE418AAE05496E31C8C
SHA256:F22F2914498BE17728919894D8A7F53144EF7C808BE2990E2FEEF73C5CBC1A09
4056CKSetup32.exeC:\Windows\system32\CKAgent.datexecutable
MD5:CB07407D4E0E2DE3041B4C81DC60702D
SHA256:3F83330B92591FE4ABF7CA9C9424B0E37E1754E885E7799CCB83CC3691B9A08B
4056CKSetup32.exeC:\Windows\system32\CKAgentNXE.datexecutable
MD5:7C0A5AF4B35B5BE418AAE05496E31C8C
SHA256:F22F2914498BE17728919894D8A7F53144EF7C808BE2990E2FEEF73C5CBC1A09
4056CKSetup32.exeC:\Windows\system32\CKAgent_t.exeexecutable
MD5:CB07407D4E0E2DE3041B4C81DC60702D
SHA256:3F83330B92591FE4ABF7CA9C9424B0E37E1754E885E7799CCB83CC3691B9A08B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
Process
Message
TouchEn nxKey Installer.exe
20141130 fn : C:\Users\admin\AppData\Local\Temp\~RAPack1059609\_Chunk.zip, C:\Users\admin\AppData\Local\Temp\~RAPack1059609 315
TouchEn nxKey Installer.exe
20141211 1.szResVersion : 3,1,1,34
TouchEn nxKey Installer.exe
20141130 fn : C:\Windows\system32\CKSetup32.exe, C:\Windows\system32(size=2745360) 558
TouchEn nxKey Installer.exe
20141130 1203_.\TouchEn_nxKey_Installer.cpp
TouchEn nxKey Installer.exe
C:\Windows\system32\CKSetup32.exe /install appm
CKSetup32.exe
[TK] KillProcessByImageName = CKAgentNXE.exe
CKSetup32.exe
[TK] KillProcessByImageName return = 0
CKSetup32.exe
[TK] KillProcessByImageName = CKAgent.exe
CKSetup32.exe
[TK] KillProcessByImageName return = 0
CKSetup32.exe
[TK] [CKSETUP 20130627 DOSPathFileName] \SystemRoot\System32\smss.exe