Analysis Overview
SHA256
6a1f0457ec907801ab79abcb70c7b1725afa9a000d7995b6d83d13154691a7dc
Threat Level: Known bad
The file 6742d12ccd2243002f975210f9e16f30N.exe was found to be: Known bad.
Malicious Activity Summary
MetamorpherRAT
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Uses the VBS compiler for execution
Adds Run key to start application
Enumerates physical storage devices
Unsigned PE
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-07-18 04:38
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-18 04:38
Reported
2024-07-18 04:40
Platform
win7-20240704-en
Max time kernel
119s
Max time network
123s
Command Line
Signatures
MetamorpherRAT
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\tmp15F1.tmp.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe | N/A |
Uses the VBS compiler for execution
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" | C:\Users\Admin\AppData\Local\Temp\tmp15F1.tmp.exe | N/A |
Enumerates physical storage devices
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\tmp15F1.tmp.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe
"C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yrcqamvj.cmdline"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1A07.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc19F6.tmp"
C:\Users\Admin\AppData\Local\Temp\tmp15F1.tmp.exe
"C:\Users\Admin\AppData\Local\Temp\tmp15F1.tmp.exe" C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | bejnz.com | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
Files
memory/1948-0-0x0000000074BF1000-0x0000000074BF2000-memory.dmp
memory/1948-1-0x0000000074BF0000-0x000000007519B000-memory.dmp
memory/1948-2-0x0000000074BF0000-0x000000007519B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\yrcqamvj.cmdline
| MD5 | 7f86c6c53aecb07a54126369bf7f480b |
| SHA1 | 2a85255faf46f2ea57bf7bd6417291b85594d696 |
| SHA256 | 59e963a4376d6a5ed4162c7d04149af591990b28362d418fc8df01faed81f7bd |
| SHA512 | f3c76bee86f5158b72cfda7d759a98ddbb64425c1f27036854f7c40dce610a39b4020f5759ee5190cc950a3ad88046cd76e981245b8d3fe30a7be2d5016dc944 |
memory/2260-8-0x0000000074BF0000-0x000000007519B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\yrcqamvj.0.vb
| MD5 | acecc6acc5abc68499bf7871b1d706d8 |
| SHA1 | 10e56e95f17c968ad3ab8de2c37c339d4065854b |
| SHA256 | 5e25aa622fb2adfa3cb1c855af9620ba7852774dac24163f648b43c37091e97f |
| SHA512 | 7454241e3e02b70df7eae9a279e568619d4af37a7524cb27e42f15869a95af443c7bc87b20a1b4d9378afcf6228db239d65bc2725a55d168047fe6a79c86d2c4 |
C:\Users\Admin\AppData\Local\Temp\zCom.resources
| MD5 | aa4bdac8c4e0538ec2bb4b7574c94192 |
| SHA1 | ef76d834232b67b27ebd75708922adea97aeacce |
| SHA256 | d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430 |
| SHA512 | 0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65 |
C:\Users\Admin\AppData\Local\Temp\vbc19F6.tmp
| MD5 | 66c92720beee6c9a918e1be9786b50c9 |
| SHA1 | 51b280b92d4139a49ef74744f39578cb749f2e7f |
| SHA256 | 51ef340657f0e9e6d8769a729bf40391d8b3cb3ce3a71fd4252ee55cee2af7b8 |
| SHA512 | 2376b0a19c6879d18959b37e127b07627f387a9455f06a78598bf7a3fa24f11d0876a497b267a6ce178483e5166d6c46a8d1003caf6d62ba3d192d5a0807c76b |
C:\Users\Admin\AppData\Local\Temp\RES1A07.tmp
| MD5 | cc0374be6624d2a6c85e9701c2b2ccd2 |
| SHA1 | 91b04d5918c647e32091626340db08ecbdcbd705 |
| SHA256 | 33cd3cf68415accb49139d4ec732d7694ff488e139731cea011b224ffff04222 |
| SHA512 | a7351af7256bf4d2c26edddc6c5342c38e75f52862ff4377eef016b8e238a580ce3ce15bf001ad3c76d52e3d147959fcdc363cde4f27fa7e712279c4f0df4006 |
memory/2260-18-0x0000000074BF0000-0x000000007519B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp15F1.tmp.exe
| MD5 | 26b568e33f9c35acc0a34166c023a184 |
| SHA1 | 1397f59269febdd6fa02582a5764d3a95cb80a59 |
| SHA256 | e6b8c30759f7ede87b4c7f747b78a8e2680bdbe67440ecf77d60edd295a3ee0b |
| SHA512 | 08ae405a580bf9219802bae97e7706c3b9d6741a44f5d33ede74c3a96249ee17500b4c3152e8253feb164dc35e1321b513c57c1668080d4acec71600075dd34f |
memory/1948-24-0x0000000074BF0000-0x000000007519B000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-18 04:38
Reported
2024-07-18 04:40
Platform
win10v2004-20240709-en
Max time kernel
119s
Max time network
120s
Command Line
Signatures
MetamorpherRAT
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\tmpC60F.tmp.exe | N/A |
Uses the VBS compiler for execution
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" | C:\Users\Admin\AppData\Local\Temp\tmpC60F.tmp.exe | N/A |
Enumerates physical storage devices
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\tmpC60F.tmp.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe
"C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\jud3oby3.cmdline"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC709.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD3637A7BCA1C429AB1696AF5C1B5867D.TMP"
C:\Users\Admin\AppData\Local\Temp\tmpC60F.tmp.exe
"C:\Users\Admin\AppData\Local\Temp\tmpC60F.tmp.exe" C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | bejnz.com | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | 105.84.221.44.in-addr.arpa | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 8.8.8.8:53 | hackorchronix.no-ip.biz | udp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
| US | 44.221.84.105:80 | bejnz.com | tcp |
Files
memory/2948-0-0x0000000074752000-0x0000000074753000-memory.dmp
memory/2948-1-0x0000000074750000-0x0000000074D01000-memory.dmp
memory/2948-2-0x0000000074750000-0x0000000074D01000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\jud3oby3.cmdline
| MD5 | 18384a764e8950e80ac5ef4fea9bdbed |
| SHA1 | 97ac73ad4ca6ce85531a195a7c9b8cf31f0912f2 |
| SHA256 | b9cd4d2ca34d60c171bacef359d8f094b5babade27527f88e8d0c67385786b06 |
| SHA512 | 5a4eab3d89531cbc999101897e2962d56bee505b661abc4dc2e121e76215333182cfb1c6ae86508c2d88bc7833f6f4436e9899deb16bd2334376b72f09170a71 |
C:\Users\Admin\AppData\Local\Temp\jud3oby3.0.vb
| MD5 | 717bb9976ca5d957d7c13cd566ea0fe3 |
| SHA1 | 607c1032cd199830c735ccca13fecf205ef95452 |
| SHA256 | 3c2aa9e560ae662724aa2ac0ea761e11166f56ca1861cd3f78a3890554bca162 |
| SHA512 | 346dffd45175389cfc8d4fb0a30939fca25e155ba6a3dadedb71a932829d9a40ba44e3a21d1f93e873d6256d292737274836051b9fe785bd7be36d5dd687def2 |
memory/4936-8-0x0000000074750000-0x0000000074D01000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\zCom.resources
| MD5 | aa4bdac8c4e0538ec2bb4b7574c94192 |
| SHA1 | ef76d834232b67b27ebd75708922adea97aeacce |
| SHA256 | d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430 |
| SHA512 | 0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65 |
C:\Users\Admin\AppData\Local\Temp\vbcD3637A7BCA1C429AB1696AF5C1B5867D.TMP
| MD5 | 927098e5a01f72a952fdf8aa1719fdfc |
| SHA1 | 48bedbd5ce8de0089849789beea45a10429d4218 |
| SHA256 | 6d7db10048d4de17cae129bee35aad53f2ce860e3793574e4af318d44b3ec2db |
| SHA512 | b2e304d01493811ad53ea9cd1c30fdd5f3f760a4cbc30da1153dac911e0e5d8c0111bd7e0f29b8309cdea999ea672392ff28ca04009f0c88351659778c5632ce |
C:\Users\Admin\AppData\Local\Temp\RESC709.tmp
| MD5 | cffd08d5e8bdcc5356f1259edd1568b0 |
| SHA1 | 3676ccb83ac3cb7fe04f5b2224ada69687514fed |
| SHA256 | 0dd52885d61515cc8352e300de815adf07ea8ab62c78ee98cdfbc8042050965f |
| SHA512 | d234dbc7b68cbc37af41739778d0590006dd1b0eecfa2f6bac8ea1797153ced83cc719c499d45c71e3312160fb7dd445cad3574c1e75bbd126bf73fa0c944dc0 |
memory/4936-18-0x0000000074750000-0x0000000074D01000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmpC60F.tmp.exe
| MD5 | a3f5a3aa7e613139e90fb4f637bdce4f |
| SHA1 | f4b96ea88ea21f1bda7b64aef674aec4701cb0f5 |
| SHA256 | 354df2e7626a8dd8fa66a3dd62f75fd5488af8ebb7657efa04bd092290af3713 |
| SHA512 | cfcc644678ba246462d79be21b6fdc63c9c3a58835bcbdbb9d0bda095c398c632bd3f1f3960ff7d5fdecffee79ad590e70ec25a55e2a6fa5586a6b1dc0c35075 |
memory/2948-22-0x0000000074750000-0x0000000074D01000-memory.dmp
memory/60-24-0x0000000074750000-0x0000000074D01000-memory.dmp
memory/60-23-0x0000000074750000-0x0000000074D01000-memory.dmp
memory/60-26-0x0000000074750000-0x0000000074D01000-memory.dmp
memory/60-27-0x0000000074750000-0x0000000074D01000-memory.dmp
memory/60-28-0x0000000074750000-0x0000000074D01000-memory.dmp