Malware Analysis Report

2024-07-28 06:56

Sample ID 240614-gwmwtsxgng
Target a84d4871bc54d3bc8f528ca389f2fff0_NeikiAnalytics.exe
SHA256 b8610155ca07903d431160950f72eb23450f0793d6268cdf83d20d18e1b6d306
Tags
upx persistence microsoft phishing product:outlook
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b8610155ca07903d431160950f72eb23450f0793d6268cdf83d20d18e1b6d306

Threat Level: Known bad

The file a84d4871bc54d3bc8f528ca389f2fff0_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

upx persistence microsoft phishing product:outlook

Detected microsoft outlook phishing page

UPX packed file

Executes dropped EXE

Adds Run key to start application

Drops file in Windows directory

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-14 06:09

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 06:09

Reported

2024-06-14 06:11

Platform

win7-20240221-en

Max time kernel

150s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a84d4871bc54d3bc8f528ca389f2fff0_NeikiAnalytics.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\services.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" C:\Users\Admin\AppData\Local\Temp\a84d4871bc54d3bc8f528ca389f2fff0_NeikiAnalytics.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" C:\Windows\services.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\java.exe C:\Users\Admin\AppData\Local\Temp\a84d4871bc54d3bc8f528ca389f2fff0_NeikiAnalytics.exe N/A
File created C:\Windows\services.exe C:\Users\Admin\AppData\Local\Temp\a84d4871bc54d3bc8f528ca389f2fff0_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\java.exe C:\Users\Admin\AppData\Local\Temp\a84d4871bc54d3bc8f528ca389f2fff0_NeikiAnalytics.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a84d4871bc54d3bc8f528ca389f2fff0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\a84d4871bc54d3bc8f528ca389f2fff0_NeikiAnalytics.exe"

C:\Windows\services.exe

"C:\Windows\services.exe"

Network

Country Destination Domain Proto
N/A 10.0.2.15:1034 tcp
N/A 192.168.2.103:1034 tcp
N/A 172.16.1.166:1034 tcp
N/A 192.168.2.15:1034 tcp
N/A 192.168.2.15:1034 tcp
US 8.8.8.8:53 alumni.caltech.edu udp
US 8.8.8.8:53 alumni-caltech-edu.mail.protection.outlook.com udp
US 8.8.8.8:53 gzip.org udp
US 52.101.8.44:25 alumni-caltech-edu.mail.protection.outlook.com tcp
US 8.8.8.8:53 gzip.org udp
US 85.187.148.2:25 gzip.org tcp
N/A 192.168.2.102:1034 tcp
US 8.8.8.8:53 alumni.caltech.edu udp
US 99.83.190.102:25 alumni.caltech.edu tcp
US 85.187.148.2:25 gzip.org tcp
N/A 192.168.2.18:1034 tcp
US 8.8.8.8:53 mx.alumni.caltech.edu udp
US 8.8.8.8:53 mail.alumni.caltech.edu udp
US 8.8.8.8:53 smtp.alumni.caltech.edu udp
N/A 192.168.2.14:1034 tcp
US 8.8.8.8:53 apple.com udp
US 8.8.8.8:53 mx-in-rno.apple.com udp
US 17.179.253.242:25 mx-in-rno.apple.com tcp
US 8.8.8.8:53 unicode.org udp
US 8.8.8.8:53 alt3.aspmx.l.google.com udp
SG 74.125.200.26:25 alt3.aspmx.l.google.com tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
N/A 142.250.187.196:80 tcp
N/A 212.82.100.137:80 tcp
US 8.8.8.8:53 udp
N/A 212.82.100.137:443 tcp
N/A 142.250.187.196:80 tcp
N/A 209.202.254.10:80 tcp
N/A 209.202.254.10:443 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
N/A 2.18.24.9:80 tcp
N/A 212.82.100.137:80 tcp

Files

memory/2204-0-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2204-4-0x0000000000220000-0x0000000000228000-memory.dmp

C:\Windows\services.exe

MD5 b0fe74719b1b647e2056641931907f4a
SHA1 e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256 bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA512 9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/2204-15-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2240-16-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2240-21-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2204-22-0x0000000000220000-0x0000000000228000-memory.dmp

memory/2240-27-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2240-29-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2240-34-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2240-39-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2204-40-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2240-41-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2240-46-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 89d48bf3f10362a135676934a075b138
SHA1 a7d01bcc58dddeb76e86510353120e96683f6520
SHA256 58ed5e1d690d3c8e8f65e7ae35c3bbb2026395af7f65f38685cd59488cef7141
SHA512 8ed35e34b171b21df5d1fa3c1385e678e2f5c64588022bb9aeab38e97b90c26a3244f3c6ca383f36a3722b400706138ca18f6867b6a4fc877afac6162cee1b0a

C:\Users\Admin\AppData\Local\Temp\tmp7BE6.tmp

MD5 f37da8cf1c8c9795a7ee7f569c708493
SHA1 b44b7e202c03fed7077c1e69a20423fd97bb340b
SHA256 0ecc13a7e3843ee0c3f495a70421f6c1add974f8c9dcc68ae47bc1841cd82499
SHA512 d2e83950e8850259387a920287cdd5e8fa0c890ee8e2d1451220b138de94b3d49a8394b614741a78de8c2010dc83fe89cf560a3ee1493ee41198c43a3f4154ec

memory/2204-66-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2240-67-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2204-68-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2240-69-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2204-73-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2240-74-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2240-79-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2204-80-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2240-81-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2240-86-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 3fa5b823f19fd4ad59aef1de63c906ca
SHA1 85dd7a1396bf3541faa045eeb1b517246d564076
SHA256 d63a1fcf4fa748548170a5df8b1916223f5c2287f86bcd179750f5ab7893d2f5
SHA512 27f85f98a1300862fb51dcf8627fb9dd742862207292d23e611efb8c36b56be4d204ebf867e462327fde282fbcb2ad7070d8ff39b023cfc7f8bbd08f6daf9a33

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 06:09

Reported

2024-06-14 06:11

Platform

win10v2004-20240611-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a84d4871bc54d3bc8f528ca389f2fff0_NeikiAnalytics.exe"

Signatures

Detected microsoft outlook phishing page

phishing microsoft product:outlook

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\services.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" C:\Users\Admin\AppData\Local\Temp\a84d4871bc54d3bc8f528ca389f2fff0_NeikiAnalytics.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" C:\Windows\services.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\services.exe C:\Users\Admin\AppData\Local\Temp\a84d4871bc54d3bc8f528ca389f2fff0_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\java.exe C:\Users\Admin\AppData\Local\Temp\a84d4871bc54d3bc8f528ca389f2fff0_NeikiAnalytics.exe N/A
File created C:\Windows\java.exe C:\Users\Admin\AppData\Local\Temp\a84d4871bc54d3bc8f528ca389f2fff0_NeikiAnalytics.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a84d4871bc54d3bc8f528ca389f2fff0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\a84d4871bc54d3bc8f528ca389f2fff0_NeikiAnalytics.exe"

C:\Windows\services.exe

"C:\Windows\services.exe"

Network

Country Destination Domain Proto
N/A 10.0.2.15:1034 tcp
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
N/A 192.168.2.103:1034 tcp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
N/A 172.16.1.166:1034 tcp
N/A 192.168.2.15:1034 tcp
US 8.8.8.8:53 m-ou.se udp
US 8.8.8.8:53 aspmx4.googlemail.com udp
US 8.8.8.8:53 acm.org udp
SG 74.125.200.27:25 aspmx4.googlemail.com tcp
US 8.8.8.8:53 mail.mailroute.net udp
US 8.8.8.8:53 cs.stanford.edu udp
US 199.89.3.120:25 mail.mailroute.net tcp
US 8.8.8.8:53 smtp1.cs.stanford.edu udp
US 8.8.8.8:53 burtleburtle.net udp
US 171.64.64.25:25 smtp1.cs.stanford.edu tcp
US 171.64.64.25:25 smtp1.cs.stanford.edu tcp
US 8.8.8.8:53 mx.burtleburtle.net udp
US 65.254.254.51:25 mx.burtleburtle.net tcp
US 8.8.8.8:53 alumni.caltech.edu udp
US 8.8.8.8:53 alumni-caltech-edu.mail.protection.outlook.com udp
US 8.8.8.8:53 gzip.org udp
US 52.101.11.15:25 alumni-caltech-edu.mail.protection.outlook.com tcp
US 8.8.8.8:53 gzip.org udp
US 85.187.148.2:25 gzip.org tcp
US 8.8.8.8:53 www.altavista.com udp
IE 212.82.100.137:80 www.altavista.com tcp
US 8.8.8.8:53 search.lycos.com udp
US 8.8.8.8:53 www.google.com udp
GB 142.250.187.196:80 www.google.com tcp
US 8.8.8.8:53 search.yahoo.com udp
US 209.202.254.10:80 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 8.8.8.8:53 196.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 10.254.202.209.in-addr.arpa udp
US 8.8.8.8:53 137.100.82.212.in-addr.arpa udp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 8.8.8.8:53 r11.o.lencr.org udp
NL 23.63.101.177:80 r11.o.lencr.org tcp
IE 212.82.100.137:443 search.yahoo.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 8.8.8.8:53 177.101.63.23.in-addr.arpa udp
US 8.8.8.8:53 32.25.90.104.in-addr.arpa udp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 8.8.8.8:53 hachyderm.io udp
US 8.8.8.8:53 alt1.aspmx.l.google.com udp
GB 142.250.187.196:80 www.google.com tcp
NL 142.251.9.27:25 alt1.aspmx.l.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:80 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:80 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
N/A 192.168.2.15:1034 tcp
US 8.8.8.8:53 aspmx.l.google.com udp
NL 142.250.102.26:25 aspmx.l.google.com tcp
US 8.8.8.8:53 acm.org udp
US 104.17.79.30:25 acm.org tcp
US 8.8.8.8:53 cs.stanford.edu udp
US 171.64.64.64:25 cs.stanford.edu tcp
US 171.64.64.64:25 cs.stanford.edu tcp
US 8.8.8.8:53 burtleburtle.net udp
US 65.254.227.224:25 burtleburtle.net tcp
US 8.8.8.8:53 alumni.caltech.edu udp
US 99.83.190.102:25 alumni.caltech.edu tcp
US 85.187.148.2:25 gzip.org tcp
US 8.8.8.8:53 alt4.aspmx.l.google.com udp
TW 142.250.157.27:25 alt4.aspmx.l.google.com tcp
N/A 192.168.2.102:1034 tcp
NL 142.251.9.27:25 alt1.aspmx.l.google.com tcp
US 8.8.8.8:53 mx.acm.org udp
US 8.8.8.8:53 mail.acm.org udp
US 8.8.8.8:53 smtp2.cs.stanford.edu udp
US 8.8.8.8:53 smtp.acm.org udp
US 171.64.64.26:25 smtp2.cs.stanford.edu tcp
US 171.64.64.26:25 smtp2.cs.stanford.edu tcp
US 65.254.254.51:25 mx.burtleburtle.net tcp
US 8.8.8.8:53 smtp1.cs.stanford.edu udp
US 8.8.8.8:53 mx.alumni.caltech.edu udp
US 171.64.64.25:25 smtp1.cs.stanford.edu tcp
US 8.8.8.8:53 mail.alumni.caltech.edu udp
US 8.8.8.8:53 mx.gzip.org udp
US 8.8.8.8:53 smtp.alumni.caltech.edu udp
US 8.8.8.8:53 mail.gzip.org udp
US 85.187.148.2:25 mail.gzip.org tcp
US 8.8.8.8:53 outlook.com udp
US 8.8.8.8:53 outlook-com.olc.protection.outlook.com udp
US 52.101.194.10:25 outlook-com.olc.protection.outlook.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 8.8.8.8:53 alt2.aspmx.l.google.com udp
FI 142.250.150.26:25 alt2.aspmx.l.google.com tcp
N/A 192.168.2.18:1034 tcp
US 8.8.8.8:53 aspmx5.googlemail.com udp
TW 142.250.157.27:25 aspmx5.googlemail.com tcp
US 171.64.64.64:25 cs.stanford.edu tcp
US 171.64.64.64:25 cs.stanford.edu tcp
US 8.8.8.8:53 mail.burtleburtle.net udp
US 171.64.64.64:25 cs.stanford.edu tcp
US 65.254.250.102:25 mail.burtleburtle.net tcp
US 8.8.8.8:53 smtp.gzip.org udp
NL 142.251.9.27:25 alt1.aspmx.l.google.com tcp
US 8.8.8.8:53 outlook.com udp
US 52.96.222.226:25 outlook.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:80 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
NL 142.250.102.26:25 aspmx.l.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 209.202.254.10:80 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:80 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
N/A 192.168.2.14:1034 tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 209.202.254.10:80 search.lycos.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 8.8.8.8:53 13.73.50.20.in-addr.arpa udp
US 209.202.254.10:443 search.lycos.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
GB 142.250.187.196:80 www.google.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
GB 142.250.187.196:80 tcp
US 209.202.254.10:80 tcp
GB 142.250.187.196:80 tcp
GB 142.250.187.196:80 tcp

Files

memory/4164-1-0x0000000000500000-0x0000000000510200-memory.dmp

C:\Windows\services.exe

MD5 b0fe74719b1b647e2056641931907f4a
SHA1 e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256 bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA512 9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

memory/2700-5-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/4164-13-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2700-14-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2700-19-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2700-24-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2700-26-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2700-31-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4164-35-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2700-36-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 93d851dddfdab3fd999ead3e0390e861
SHA1 1a3c2d0989abc54c335281ea12c95d0d73f836f7
SHA256 f4732e1641a797aaef5ef05a6865aed2954266aaa887200dde96bbcbeff4f7bc
SHA512 f428fda981c34c68b2b551e29f46789eacd914379751070064eb7c23934b550b80af72cd943af07b4c8472e26758c41710558d09e3361c5d92c8a5e4721bd833

C:\Users\Admin\AppData\Local\Temp\tmp441B.tmp

MD5 9645ff95497f12d2993d937cffea83ec
SHA1 3ca35212bac95b909c27402aeb7989b8caafc09c
SHA256 f58f867fdda61be42089bd0e938b5a179c114960cec0e3cbf8d98d105145e4dd
SHA512 e9ece95ee941112f10e7af7d7714838e879a70aefc484b000570c0f7aa16ec85b1abdfb7a6ac09d0c0b5e63dd5bbd1cff0b73e568ed22ee22472dac2432b62a9

memory/2700-92-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4164-91-0x0000000000500000-0x0000000000510200-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EROQDKB0\JUBQ07OQ.htm

MD5 3f3d235a9162dabba344aee0f7fd25af
SHA1 5988e1d9a53ab0cc72ca5120db2cc39a68c79401
SHA256 46020d324d9311679b93d50c4bc0409a12385457926dba5680e729d44050a6cc
SHA512 5cb72c320e7610e6ffafc90047515fb124f0d202a8e39c498e2304b90dd6f591a93d20a3d86e97e4abee5b973cda5bb381ac5188197fb07992269ee0f34ad7a5

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3NQFXGDW\search[3].htm

MD5 8ba61a16b71609a08bfa35bc213fce49
SHA1 8374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA256 6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA512 5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3NQFXGDW\search[4].htm

MD5 d14cde4e1158106448e2a732aca5002d
SHA1 88739fcfdcde69b29f7af045565e67961ec16a81
SHA256 93ac3106735ecc87f981cd1d2cc800da2330146b76ec58cdebe9cd29fd5207ca
SHA512 649c1e6d54623593982ef8dd7a18bd75342042893ef312b6cf796d4db2f5ebf7bbe8e75c3e76cd3ce1af4a39c979097abd588db9a62810ec51f2bcc11b381ddd

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 ac0d2d75d85873c17e1d03901c399261
SHA1 c0b30e8ff8d2592182d94c74079595a6531dee41
SHA256 80b1c6e1b801c9eec5bb867a2372b6e8aec2e0b6f1f6e4ebef930cc4f2a37d46
SHA512 4fe3461e6e7c9e57aab8e793df099308047e950aef67ee7464a70f4946e826743730bb5c793ed22b31a539a37bf5960f59baa21dda10e1896607a2d32d3095c1

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3NQFXGDW\search[6].htm

MD5 137f92a667322f9f6dc00e8d4998a710
SHA1 296c05f8e01a277758d16d5b7bf0f9ae9f05934a
SHA256 9ccdb07f5b4639dbb9340872fe11042a395d639b35790f098a47aa2f3b62c4c5
SHA512 58fa1301a386ce291b6255c320f1869f5eb0ec18b159df71bf20c93bba2ae42fc4930f6358bce742800eef5c0ff40bb51909b765650bbff3d4de956da503beb1

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0K2PF59Z\results[3].htm

MD5 35a826c9d92a048812533924ecc2d036
SHA1 cc2d0c7849ea5f36532958d31a823e95de787d93
SHA256 0731a24ba3c569a734d2e8a74f9786c4b09c42af70457b185c56f147792168ea
SHA512 fd385904a466768357de812d0474e34a0b5f089f1de1e46bd032d889b28f10db84c869f5e81a0e2f1c8ffdd8a110e0736a7d63c887d76de6f0a5fd30bb8ebecd

memory/4164-236-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2700-237-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4164-240-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2700-241-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2700-243-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4164-247-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2700-248-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 b1947bc787122c576f2e0cae3b8af595
SHA1 03458716c1478dfc54b717e8b01b74635e119200
SHA256 adbbe2610f4851f34bbedf2f6f6bb5169f4d2d75bb933c4eabaa8e8e5252f70a
SHA512 f7340be6e45e25c9a61053c02d7b0cbbd622c39847404e9d538c325de574fc7180648a0de0458bcdff2767a4b0e472958bf318ffa9e104053da6542f770324d2

memory/4164-304-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2700-305-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4164-306-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2700-307-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 fd815a2b7dcf0062cc3a13bae4a572cd
SHA1 9a5fa049954dc6dad412a43a53990b77824f9561
SHA256 d25e638f9f387b7f1bfb5906c6e53f36b75ece51cd60848a0c25a5511ee3aab8
SHA512 2596b345bd080096f6bb3dda0c951d21b9501941fd689548056f759707f2b95a7b41f4837d048c3048bde2002cad2eb1b4e18cac6a04595731e03544b47c0606

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3NQFXGDW\search[8].htm

MD5 84915115ddf99ef274d03820bf25cef0
SHA1 582dbcfae6715052743882ec3c242a25589ade11
SHA256 064292de2dbd47ea370984234af424c15a738e772f44c94a593d65fc52a6322a
SHA512 1bcf21c07211fd34a40798c82df36b01acdcef6f0f6da50211b06dd0318fa305067007d9b0355aea1dcece4819c4d4f7abcfc2e5552d9c0a8b5ee0fde6396ca9

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RYAG7OSV\searchJDCF1TTB.htm

MD5 03eafa25b020f23e613d7d0642d2fa67
SHA1 23aa30ee54ac77076bc119ae2085db3041699b56
SHA256 064353b43f8ba6627240da8f413470ccbfb3192a6bac0f0cba46e5709a0ae536
SHA512 53805d227a3a30a7152ce96edb38a8bc24c74bcfa7c59625326de4c43c18affb150878db2523fa71c584cf40678946df1412cbbf1eb7bc1c15e6bdf5d24b6be9

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EROQDKB0\search[2].htm

MD5 a649102e64c57ed4c90eed697bd7e20d
SHA1 714c0d107831504f513802a81cc1184d06d1ca53
SHA256 00f5189c636d37e8792494aea2e1002cd179eb714f85285ecc70f3315b8a5edd
SHA512 ed895f1802ef5fc19242ae9f0bf88ede0ead8f3e3be9a60432e40b5a981921ad5dd2869d8cc0ada83c0444e2b26500d3ce28123149baa1dcb801fd4dc43cbe68

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EROQDKB0\search[9].htm

MD5 c2bfbf4e55d73c90da23dd2d54d8d40f
SHA1 d9129a0807c98e756c2a419c7c544c18f2c9a3fa
SHA256 3ea2362d232ab0a21b95f19d317073126236c36ea6d82ae1921df56251e3dc90
SHA512 fd95b6072e3f2d09f805b51b6712b5431f6e5809bef7221625802de015208568171319c97bb09d9afcf2354bd6fdf3613f6c44c38fdd03d04b3e88525b37d865

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RYAG7OSV\searchGVTLGF8T.htm

MD5 2bbbf0c9af8ba27b13440d772e5c4c0b
SHA1 f90ab8010615cb0ad954dec6ed38153aef7bc60a
SHA256 8a844da1b2950f57c4e017849610ff88b57233b3e0ab44c03c18768088850b58
SHA512 b6a5601b771fe47ba12d177b2760e4440e2d3898686fdc2ede4aa6d0b497cbb6f5e5648545bf7ad3a144941a726ed918cd0dfa0b13a7fa103939e0e5fab4e5a2

memory/4164-436-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2700-437-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RYAG7OSV\default[2].htm

MD5 5431b34b55fc2e8dfe8e2e977e26e6b5
SHA1 87cf8feeb854e523871271b6f5634576de3e7c40
SHA256 3d7c76daab98368a0dd25cd184db039cdd5d1bc9bd6e9bb91b289119047f5432
SHA512 6f309dd924ba012486bcf0e3bafe64899007893ea9863b6f4e5428384ad23d9942c74d17c42a5cf9922a0e0fd8d61c287a2288a945a775586125d53376b9325c

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3NQFXGDW\search9KZEIT3R.htm

MD5 7b89bcb82688d8e01f68c3048cda4527
SHA1 5c406b157492376f8da6bd09253828963acdc6f6
SHA256 8e8953deb273f19e8f364f972736c64946ce33e64bd6d8c6be4d33f06860e0a7
SHA512 55e23d0ac0276ab79b08aabfce03f912f1c1f6da7f59b442efb298447606e2bc4ccec9a6d39c2f792aa0220e8e6cf5eaa85f908e1c348b2b04df899dabeb4f4d

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RYAG7OSV\default[4].htm

MD5 c15952329e9cd008b41f979b6c76b9a2
SHA1 53c58cc742b5a0273df8d01ba2779a979c1ff967
SHA256 5d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA512 6aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EROQDKB0\results[3].htm

MD5 211da0345fa466aa8dbde830c83c19f8
SHA1 779ece4d54a099274b2814a9780000ba49af1b81
SHA256 aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5
SHA512 37fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0K2PF59Z\search[9].htm

MD5 7be34a16a11f06586aa153c8038121b2
SHA1 9ba1920577ad1442cf53b61bdce82a7f2527eef6
SHA256 ce608e8c9562b918353197d76924a21f8acf12bf96897f347d72546ab97d8db9
SHA512 832719d471e64df953e30d24f630b12422b80d0d2956d6926c09795564b9bca22db01f7b2f25d2a256b015e74b01f6ef6b7ffca15bd946e23fdfea16f4ebc894