Malware Analysis Report

2024-11-30 15:58

Sample ID 220712-p88m3abcbn
Target 4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965
SHA256 4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965
Tags
imminent spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965

Threat Level: Known bad

The file 4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965 was found to be: Known bad.

Malicious Activity Summary

imminent spyware trojan

Imminent RAT

Drops startup file

Drops desktop.ini file(s)

Suspicious use of SetThreadContext

Drops file in Windows directory

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-07-12 13:01

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-07-12 13:01

Reported

2022-07-12 18:15

Platform

win7-20220414-en

Max time kernel

151s

Max time network

50s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe"

Signatures

Imminent RAT

trojan spyware imminent

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dhHWkV.url C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1836 set thread context of 1620 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1836 wrote to memory of 1980 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
PID 1836 wrote to memory of 1980 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
PID 1836 wrote to memory of 1980 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
PID 1836 wrote to memory of 1980 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
PID 1980 wrote to memory of 1576 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
PID 1980 wrote to memory of 1576 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
PID 1980 wrote to memory of 1576 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
PID 1980 wrote to memory of 1576 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
PID 1836 wrote to memory of 1620 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1836 wrote to memory of 1620 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1836 wrote to memory of 1620 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1836 wrote to memory of 1620 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1836 wrote to memory of 1620 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1836 wrote to memory of 1620 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1836 wrote to memory of 1620 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1836 wrote to memory of 1620 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1836 wrote to memory of 1620 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1836 wrote to memory of 1620 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1836 wrote to memory of 1620 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1836 wrote to memory of 1620 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe

Processes

C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe

"C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0cjbpzd0\0cjbpzd0.cmdline"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES42CB.tmp" "c:\Users\Admin\AppData\Local\Temp\0cjbpzd0\CSCB0488408E2744401A67D642CCB4EC1F.TMP"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"

C:\Windows\system32\wbem\WmiApSrv.exe

C:\Windows\system32\wbem\WmiApSrv.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 zynovahk.duckdns.org udp

Files

memory/1836-54-0x0000000000870000-0x000000000096A000-memory.dmp

memory/1980-55-0x0000000000000000-mapping.dmp

\??\c:\Users\Admin\AppData\Local\Temp\0cjbpzd0\0cjbpzd0.cmdline

MD5 fad33035f10ecb80a3ad3ca0ed37c969
SHA1 33bdbb57df103c5b63558a1af7ef985754bbfd19
SHA256 51446fc0783d5220e43ea59c881baff9c5e6bf01a57b1f20d7ae44b8c34b51c0
SHA512 138a0c849484d6c10adbce8d65189a21b395ef3d2203b7b763f77a511ba81a6cac7df9fdc8860848451f57bce54038f369c2392e25fd0fc8c08ad2eb55b8e5d3

\??\c:\Users\Admin\AppData\Local\Temp\0cjbpzd0\0cjbpzd0.0.cs

MD5 28edcfb4f812ac360c0072ac9dd8a697
SHA1 f742a998c6cc565cffaef5e36a0d7aa06eb575a3
SHA256 ff3733077d6d202680050c3e15f207e7c1379b5f730072c6740704238444080b
SHA512 028ec59a0012de42ae78a76e4a9309525e9da0cf95d230de2b678d936ea6514f65131a567a0a7e29a12e68c32cb6e76d9d2d31e506acd847ff2d54d5589fd469

memory/1576-58-0x0000000000000000-mapping.dmp

\??\c:\Users\Admin\AppData\Local\Temp\0cjbpzd0\CSCB0488408E2744401A67D642CCB4EC1F.TMP

MD5 d884944ed3d3f6b58b3a2512566b1d10
SHA1 33d854cfc07eac5baaf5108fa87210e7f2a6e77e
SHA256 a82f667f0bc00c11ed9e97cc0765e229f0dd1cc36adf4e1901910a0b414e0c95
SHA512 d6d5ef4691f79c226db76af186844d3c956aab7c438c07df4fc4130179a8ba2ae9714b1ae979c02f45eaa5baf404c634bd36ec3e64dddae9a8bca17144a2fcd6

C:\Users\Admin\AppData\Local\Temp\RES42CB.tmp

MD5 ae093a4191be6871227a763f6fcf37e4
SHA1 644410d18d4a9404fdfbdba79be4e8eb1fdd2541
SHA256 0c4371425084e433c0df9cc5a86a6c56c0fb0724be09e064e50d19355943234c
SHA512 c0d3cdd62c866fc93ab8ed1c2a0e5d0fafed65c2ad3c2829139eea9efac7ee4e000c8376abc5a248959473f61ebf9c51f2e864835b6a127494bc5c134e909c21

C:\Users\Admin\AppData\Local\Temp\0cjbpzd0\0cjbpzd0.pdb

MD5 413f191494568ecf7d355b4f56b32460
SHA1 227622ac85ead5da9e23289044aa98068e0f0c8a
SHA256 808b12316ca4cb38f0ef80ad44439c444ee37239a8e3a496ba74fa18e63d1642
SHA512 1cb1f553ee1f4d833ae8fc35c41a8ec9b1d3f95a11ab12f0ea7d344435cb3cad07c23df661d9e6b5a0fc746d0e8dc9a47a20ec43212a5a723b047e4687e5a506

C:\Users\Admin\AppData\Local\Temp\0cjbpzd0\0cjbpzd0.dll

MD5 3e4b6a51a6537125b9daf45290ea3928
SHA1 393caf3f50446a85390ce364d5841e471f08d021
SHA256 2da0e35e3c84f5df2aaae56692383930b6c8baa104f5ebe9808ab18803179181
SHA512 9a05f2a8d2059ffd175d79c59065df117fa3ccf50a637bf3e3eccefe1e0d5bf54d5dfd3649a88dff338b4dcacdd5e64b930fbcba73b33e39177347d7b07294cf

memory/1836-63-0x00000000001C0000-0x00000000001CE000-memory.dmp

memory/1836-64-0x0000000000800000-0x0000000000860000-memory.dmp

memory/1836-65-0x0000000000270000-0x000000000027C000-memory.dmp

memory/1836-66-0x0000000075741000-0x0000000075743000-memory.dmp

memory/1836-67-0x0000000004310000-0x0000000004366000-memory.dmp

memory/1620-68-0x0000000000400000-0x0000000000456000-memory.dmp

memory/1620-69-0x0000000000400000-0x0000000000456000-memory.dmp

memory/1620-71-0x0000000000400000-0x0000000000456000-memory.dmp

memory/1620-72-0x0000000000400000-0x0000000000456000-memory.dmp

memory/1620-73-0x0000000000400000-0x0000000000456000-memory.dmp

memory/1620-74-0x0000000000451E5E-mapping.dmp

memory/1620-78-0x0000000000400000-0x0000000000456000-memory.dmp

memory/1620-76-0x0000000000400000-0x0000000000456000-memory.dmp

memory/1620-80-0x0000000074A50000-0x0000000074FFB000-memory.dmp

memory/1620-81-0x0000000074A50000-0x0000000074FFB000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-07-12 13:01

Reported

2022-07-12 18:15

Platform

win10v2004-20220414-en

Max time kernel

151s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe"

Signatures

Imminent RAT

trojan spyware imminent

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dhHWkV.url C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File created C:\Windows\assembly\Desktop.ini C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A
File opened for modification C:\Windows\assembly\Desktop.ini C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4528 set thread context of 4524 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\assembly C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A
File created C:\Windows\assembly\Desktop.ini C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A
File opened for modification C:\Windows\assembly\Desktop.ini C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4528 wrote to memory of 3100 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
PID 4528 wrote to memory of 3100 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
PID 4528 wrote to memory of 3100 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
PID 3100 wrote to memory of 4640 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
PID 3100 wrote to memory of 4640 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
PID 3100 wrote to memory of 4640 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
PID 4528 wrote to memory of 4524 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 4528 wrote to memory of 4524 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 4528 wrote to memory of 4524 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 4528 wrote to memory of 4524 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 4528 wrote to memory of 4524 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 4528 wrote to memory of 4524 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 4528 wrote to memory of 4524 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 4528 wrote to memory of 4524 N/A C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe

Processes

C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe

"C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ba21n4wt\ba21n4wt.cmdline"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB03A.tmp" "c:\Users\Admin\AppData\Local\Temp\ba21n4wt\CSC4396276D585B42E3B435A72A6F57C03D.TMP"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"

C:\Windows\system32\wbem\WmiApSrv.exe

C:\Windows\system32\wbem\WmiApSrv.exe

Network

Country Destination Domain Proto
IE 52.109.76.32:443 tcp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
FR 2.18.109.224:443 tcp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
IE 13.69.239.73:443 tcp
US 104.18.25.243:80 tcp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
NL 104.110.191.140:80 tcp
NL 104.110.191.140:80 tcp
US 209.197.3.8:80 tcp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 93.184.220.29:80 tcp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp
US 8.8.8.8:53 zynovahk.duckdns.org udp

Files

memory/4528-130-0x0000000000D70000-0x0000000000E6A000-memory.dmp

memory/3100-131-0x0000000000000000-mapping.dmp

\??\c:\Users\Admin\AppData\Local\Temp\ba21n4wt\ba21n4wt.cmdline

MD5 a93fd8c177639da409958d5118235374
SHA1 241aa4bb38c85f6c027353e8199d5b7bfc3f5de6
SHA256 c6dc8c69b24836b60ecf5e949b5f4baea37e35f1428df9a74c4c38602149dc5f
SHA512 d5cb9d4501ef1097582ffd754baf26ba513426743b357ead59ceed4fd1a4cb52342282b2f13cae474000224206edb9165ea94205a14d82cd41af6d54c7054dfa

\??\c:\Users\Admin\AppData\Local\Temp\ba21n4wt\ba21n4wt.0.cs

MD5 28edcfb4f812ac360c0072ac9dd8a697
SHA1 f742a998c6cc565cffaef5e36a0d7aa06eb575a3
SHA256 ff3733077d6d202680050c3e15f207e7c1379b5f730072c6740704238444080b
SHA512 028ec59a0012de42ae78a76e4a9309525e9da0cf95d230de2b678d936ea6514f65131a567a0a7e29a12e68c32cb6e76d9d2d31e506acd847ff2d54d5589fd469

memory/4640-134-0x0000000000000000-mapping.dmp

\??\c:\Users\Admin\AppData\Local\Temp\ba21n4wt\CSC4396276D585B42E3B435A72A6F57C03D.TMP

MD5 079196d084bc4efccabadd5a2bdcf2a9
SHA1 2af2a95bbcc270f747335aa9a1b102edc0d4b7e1
SHA256 f7c0e9f77673d53017942d05449b05b362997b9a28e0fa4d8cbb0d9a864b9ce9
SHA512 db3b02a6cc1fa10174ff0ee26cd4c9245d969a53b5b6a828268769b2316d25f9de93173cf38f3b1e679a3831f250d6c9ae149cf6473aacda3bb0e0e8b8ac80d8

C:\Users\Admin\AppData\Local\Temp\RESB03A.tmp

MD5 4645c35e7e65d4cf076f028e8cf4e515
SHA1 c6b26981aab8ac0dfb41e84245f3049eefa26e0e
SHA256 1851e6d939afabfe99baee8788b87995c6462a79e0faba5e4b0dd58b89e46207
SHA512 802e333ff3d06b6cd83819dc10de7f9305fafe20f4c25de29637c9b83f3f9af3e1971fb260022c5f9bb8dc7d0403995aadc11292255093647f09c41c8f8ef5aa

C:\Users\Admin\AppData\Local\Temp\ba21n4wt\ba21n4wt.pdb

MD5 97fc8deb43503817b005abdf345bebc7
SHA1 81b332a7477bbddde8555af5619442c5c57035cf
SHA256 1ae8546c68e3007b2ce6a1639b0ac1c57022f2ce2bb6016e2c4fcebf7487ab30
SHA512 66002f2ebe5e3407358226777cb92b91edd557f87f50d116384b0e38972828b904811792e7e3cfaf9cd8486efe7c6c552b8ace20c377c53627396acf8963af7e

C:\Users\Admin\AppData\Local\Temp\ba21n4wt\ba21n4wt.dll

MD5 b0427f51a3f606d9128dbb107ca140fd
SHA1 d9281af6821b2a9cc570d0f4e89711b0a52fe45d
SHA256 6cb20ded227a866a76f30c8f0c421153ad294d9e7f21bb027afa17cce1eda305
SHA512 45a8634b3909ab7dbb4a7452784dc483b1454cfe8788b9bdb1c4c0e8033239c7de6d655eba7fd709c6fd8430947563c993629314238343b05190b085fda7bdf1

memory/4528-139-0x0000000005700000-0x0000000005792000-memory.dmp

memory/4528-140-0x0000000005DA0000-0x0000000005E3C000-memory.dmp

memory/4524-141-0x0000000000000000-mapping.dmp

memory/4524-142-0x0000000000400000-0x0000000000456000-memory.dmp

memory/4524-143-0x0000000074F80000-0x0000000075531000-memory.dmp

memory/4524-144-0x0000000074F80000-0x0000000075531000-memory.dmp