Malware Analysis Report

2024-08-06 19:33

Sample ID 240517-hcxglaeb65
Target c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe
SHA256 9326464f19bda14ced7ac0a829c5d693bd4314b1bdb27f34f3016bdd28c743f0
Tags
darkcomet 1339 rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

9326464f19bda14ced7ac0a829c5d693bd4314b1bdb27f34f3016bdd28c743f0

Threat Level: Known bad

The file c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

darkcomet 1339 rat trojan

Darkcomet

Checks computer location settings

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Modifies registry class

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-17 06:36

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-17 06:36

Reported

2024-05-17 06:38

Platform

win7-20240419-en

Max time kernel

150s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe"

Signatures

Darkcomet

trojan rat darkcomet

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 992 set thread context of 2692 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeImpersonatePrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: 34 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: 35 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 992 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 992 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 992 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 992 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 992 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 992 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 992 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 992 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 992 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 992 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 992 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 992 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 992 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 992 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\SysWOW64\WScript.exe
PID 992 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\SysWOW64\WScript.exe
PID 992 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\SysWOW64\WScript.exe
PID 992 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\SysWOW64\WScript.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe

C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe

C:\Windows\SysWOW64\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cc.vbs"

Network

Country Destination Domain Proto
US 8.8.8.8:53 silentdark.no-ip.biz udp

Files

memory/992-0-0x0000000074331000-0x0000000074332000-memory.dmp

memory/992-1-0x0000000074330000-0x00000000748DB000-memory.dmp

memory/992-2-0x0000000074330000-0x00000000748DB000-memory.dmp

memory/2692-3-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-5-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-13-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-20-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-19-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-15-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-11-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2692-9-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-7-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-4-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-23-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-24-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-25-0x0000000000400000-0x00000000004B2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cc.vbs

MD5 c5d022b76e42b1032bac4e696df50fb4
SHA1 886799a964de08fe6515f0a40762c6dfe9c7981d
SHA256 202d2a3b2a40762b1674e9cc4c2f38d46bf18e971dcc1114cd931c0fac0ecdaa
SHA512 78f245ea5640da7b5c46154a98adc8f968166a8081bf8a72ba7af89034178465f87a6eec4939e55888ba0bde7a7e0545fe9c87047d6fe032404d64bd6b23cf39

memory/2692-29-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-30-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/992-31-0x0000000074330000-0x00000000748DB000-memory.dmp

memory/2692-32-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-33-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-34-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-35-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-36-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-37-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-38-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-39-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-40-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-41-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-42-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-43-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-44-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-45-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2692-46-0x0000000000400000-0x00000000004B2000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-17 06:36

Reported

2024-05-17 06:38

Platform

win10v2004-20240508-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe"

Signatures

Darkcomet

trojan rat darkcomet

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1704 set thread context of 2796 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeImpersonatePrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: 34 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: 35 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A
Token: 36 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1704 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 1704 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 1704 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 1704 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 1704 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 1704 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 1704 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 1704 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 1704 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 1704 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 1704 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 1704 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 1704 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 1704 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
PID 1704 wrote to memory of 3064 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\SysWOW64\WScript.exe
PID 1704 wrote to memory of 3064 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\SysWOW64\WScript.exe
PID 1704 wrote to memory of 3064 N/A C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe C:\Windows\SysWOW64\WScript.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\c2fd694263b65228c8bcf5ac855a2e90_NeikiAnalytics.exe"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe

C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe

C:\Windows\SysWOW64\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cc.vbs"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp
US 8.8.8.8:53 silentdark.no-ip.biz udp

Files

memory/1704-0-0x00000000753C2000-0x00000000753C3000-memory.dmp

memory/1704-1-0x00000000753C0000-0x0000000075971000-memory.dmp

memory/1704-2-0x00000000753C0000-0x0000000075971000-memory.dmp

memory/2796-3-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-4-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-5-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-9-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-8-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-13-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-12-0x0000000000400000-0x00000000004B2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cc.vbs

MD5 c5d022b76e42b1032bac4e696df50fb4
SHA1 886799a964de08fe6515f0a40762c6dfe9c7981d
SHA256 202d2a3b2a40762b1674e9cc4c2f38d46bf18e971dcc1114cd931c0fac0ecdaa
SHA512 78f245ea5640da7b5c46154a98adc8f968166a8081bf8a72ba7af89034178465f87a6eec4939e55888ba0bde7a7e0545fe9c87047d6fe032404d64bd6b23cf39

memory/1704-16-0x00000000753C0000-0x0000000075971000-memory.dmp

memory/2796-17-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-18-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-19-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-20-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-21-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-22-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-23-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-24-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-25-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-26-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-27-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-28-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-29-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2796-30-0x0000000000400000-0x00000000004B2000-memory.dmp