Malware Analysis Report

2025-03-15 00:31

Sample ID 240603-2f772scc96
Target 9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7
SHA256 9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7
Tags
persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7

Threat Level: Shows suspicious behavior

The file 9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7 was found to be: Shows suspicious behavior.

Malicious Activity Summary

persistence

Executes dropped EXE

Loads dropped DLL

Modifies system executable filetype association

Drops file in System32 directory

Drops file in Windows directory

Unsigned PE

Suspicious use of WriteProcessMemory

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-03 22:32

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-03 22:32

Reported

2024-06-03 22:35

Platform

win7-20240508-en

Max time kernel

149s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\system\rundll32.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Windows\system\rundll32.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\¢«.exe C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
File created C:\Windows\SysWOW64\¢«.exe C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
File created C:\Windows\SysWOW64\notepad¢¬.exe C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\system\rundll32.exe C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
File created C:\Windows\system\rundll32.exe C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1717453957" C:\Windows\system\rundll32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\MSipv C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\MSipv C:\Windows\system\rundll32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1717453957" C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command C:\Windows\system\rundll32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\system\rundll32.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe

"C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe"

C:\Windows\system\rundll32.exe

C:\Windows\system\rundll32.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.zigui.org udp
HK 103.251.237.123:80 www.zigui.org tcp

Files

memory/1848-0-0x0000000000400000-0x0000000000415A00-memory.dmp

C:\Windows\SysWOW64\notepad¢¬.exe

MD5 4220779b389377fb094ca0880f191a72
SHA1 09349b8e752dafb51ec491720f6a10fdf809887b
SHA256 965f9f5ee4efcee5c01cafde63c8f958db2646505794567342a5a5d92110bde5
SHA512 1a770510a381ca05826682df20a25d8e17de1a1af65c50736ec44e7047d9adb5c3a2e879a04650c59f1612a43ef8b34b0ce9ad9a8ba0b3cfa0499d167518e41f

\Windows\system\rundll32.exe

MD5 5769bdc60fc855be4c4d2395daa9e893
SHA1 9efd4e73fab8494a31771a5b8d41f70ca36e7a9d
SHA256 487359aca0c0c2a7f6deec4ebcd2076f202dbcfc0532a52dff54635bf2a8f969
SHA512 4282a23030be07faa05a479c016bd03b641e1e4f45aa221de69051b86231cea14e0dff19fe9d2c3839180816cdab1f4d5fec7df6fbcf2f8eba43b341a5bd97b6

memory/1848-18-0x00000000002E0000-0x00000000002F6000-memory.dmp

memory/1848-17-0x00000000002E0000-0x00000000002F6000-memory.dmp

memory/1848-20-0x0000000000400000-0x0000000000415A00-memory.dmp

memory/1848-21-0x00000000002E0000-0x00000000002F6000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-03 22:32

Reported

2024-06-03 22:35

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

102s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\system\rundll32.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\¢«.exe C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
File created C:\Windows\SysWOW64\notepad¢¬.exe C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
File opened for modification C:\Windows\SysWOW64\¢«.exe C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\system\rundll32.exe C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
File created C:\Windows\system\rundll32.exe C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\MSipv C:\Windows\system\rundll32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1717453956" C:\Windows\system\rundll32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1717453956" C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\MSipv C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" C:\Windows\system\rundll32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\system\rundll32.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe

"C:\Users\Admin\AppData\Local\Temp\9f240473e54113b206e777b13b32f04532a9a60d10d474550d8255e9de536da7.exe"

C:\Windows\system\rundll32.exe

C:\Windows\system\rundll32.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 www.zigui.org udp
HK 103.251.237.123:80 www.zigui.org tcp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 98.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp

Files

memory/3980-0-0x0000000000400000-0x0000000000415A00-memory.dmp

C:\Windows\SysWOW64\notepad¢¬.exe

MD5 cdb8cc76778cbd396be570197f67342a
SHA1 7830aac4e2421615ab9dce0b1a4c88f5f23106ed
SHA256 7dbc29a6b767b8c987b7373d9cdc2dbb60eab60b7eb9ab6ea5e66ecbd648b89f
SHA512 814d86d7be469fa2373a81ed22594970a4d36de0b75fe4379e53ef49f3f51c3fbcddad4b5c6d6da07a16e56c7f177224dc9fbb612b4b8a9c33e940e8cf387c9c

C:\Windows\System\rundll32.exe

MD5 d2c0dd76e05e3ed2106089468b2d65a2
SHA1 642967312de7e370e19515651b6cb460bec6e87e
SHA256 13cd0eb0d1b9065937173ff5e79f8b5088e0690d65e60d3782a491366697d2e3
SHA512 8e9c96fe25347aa869797e0ceba8adf0d74ad34a76a24e4fb9eb23dfdfe521b130802e3b2c8ee303f365b2bce51e70ff7bd211645c0c20b79a7ceba5d0dfc69a

memory/3980-13-0x0000000000400000-0x0000000000415A00-memory.dmp