Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 17:03 UTC
Static task
static1
Behavioral task
behavioral1
Sample
bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe
Resource
win10v2004-20230915-en
General
-
Target
bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe
-
Size
399KB
-
MD5
6b536c7f28c331c46c88e5e1827f83d0
-
SHA1
c55b37d2fcbe8c5178f065b7fb08395aafd68dc9
-
SHA256
bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb
-
SHA512
7e22107cb788c71459510aef25a2123c058855e03c7c4ea6530f457246b7d84aad965b8cce90ed305d94f66ca8e9699d26e80b03572b13e710738dc77112d5e0
-
SSDEEP
6144:XKiYJL+K7EQ5vrt5AVfL8haEK4sDzLPFZcEOkCybEaQRXr9HNdvOa:LqEU0Vf4ha0sDzDOkx2LIa
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\CYL43yt.sys rdpsign.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe -
Executes dropped EXE 2 IoCs
pid Process 1540 b9de8270 548 rdpsign.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
Drops file in System32 directory 16 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies b9de8270 File created C:\Windows\system32\ \Windows\System32\VGfNGtuR.sys rdpsign.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft b9de8270 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E b9de8270 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A b9de8270 File created C:\Windows\SysWOW64\b9de8270 bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData b9de8270 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content b9de8270 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE b9de8270 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A b9de8270 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DED9969D7ED2C6E555C5C9254A43EDE4 b9de8270 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DED9969D7ED2C6E555C5C9254A43EDE4 b9de8270 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache b9de8270 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 b9de8270 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E b9de8270 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 b9de8270 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\rdpsign.exe Explorer.EXE File opened for modification C:\Program Files\rdpsign.exe Explorer.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\1a5d88 b9de8270 File created C:\Windows\KqT11CK.sys rdpsign.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 rdpsign.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 rdpsign.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName rdpsign.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 708 timeout.exe 2468 timeout.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\Desktop\WindowMetrics\Shell Icon Size = "31" rdpsign.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\Desktop\WindowMetrics\Shell Icon Size = "32" rdpsign.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing b9de8270 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ b9de8270 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" b9de8270 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" b9de8270 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" b9de8270 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix b9de8270 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" b9de8270 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" b9de8270 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" b9de8270 -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1540 b9de8270 1540 b9de8270 1540 b9de8270 1540 b9de8270 1540 b9de8270 1540 b9de8270 1540 b9de8270 1540 b9de8270 1540 b9de8270 1540 b9de8270 3172 Explorer.EXE 3172 Explorer.EXE 3172 Explorer.EXE 3172 Explorer.EXE 1540 b9de8270 1540 b9de8270 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3172 Explorer.EXE -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 2196 bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe Token: SeTcbPrivilege 2196 bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe Token: SeDebugPrivilege 1540 b9de8270 Token: SeTcbPrivilege 1540 b9de8270 Token: SeDebugPrivilege 1540 b9de8270 Token: SeDebugPrivilege 3172 Explorer.EXE Token: SeDebugPrivilege 3172 Explorer.EXE Token: SeDebugPrivilege 1540 b9de8270 Token: SeIncBasePriorityPrivilege 2196 bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe Token: SeDebugPrivilege 548 rdpsign.exe Token: SeDebugPrivilege 548 rdpsign.exe Token: SeDebugPrivilege 548 rdpsign.exe Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeIncBasePriorityPrivilege 1540 b9de8270 Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3172 Explorer.EXE 3172 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3172 Explorer.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1540 wrote to memory of 3172 1540 b9de8270 39 PID 1540 wrote to memory of 3172 1540 b9de8270 39 PID 1540 wrote to memory of 3172 1540 b9de8270 39 PID 1540 wrote to memory of 3172 1540 b9de8270 39 PID 1540 wrote to memory of 3172 1540 b9de8270 39 PID 3172 wrote to memory of 548 3172 Explorer.EXE 88 PID 3172 wrote to memory of 548 3172 Explorer.EXE 88 PID 3172 wrote to memory of 548 3172 Explorer.EXE 88 PID 3172 wrote to memory of 548 3172 Explorer.EXE 88 PID 3172 wrote to memory of 548 3172 Explorer.EXE 88 PID 3172 wrote to memory of 548 3172 Explorer.EXE 88 PID 3172 wrote to memory of 548 3172 Explorer.EXE 88 PID 1540 wrote to memory of 584 1540 b9de8270 3 PID 1540 wrote to memory of 584 1540 b9de8270 3 PID 1540 wrote to memory of 584 1540 b9de8270 3 PID 1540 wrote to memory of 584 1540 b9de8270 3 PID 1540 wrote to memory of 584 1540 b9de8270 3 PID 2196 wrote to memory of 2412 2196 bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe 91 PID 2196 wrote to memory of 2412 2196 bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe 91 PID 2196 wrote to memory of 2412 2196 bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe 91 PID 2412 wrote to memory of 708 2412 cmd.exe 93 PID 2412 wrote to memory of 708 2412 cmd.exe 93 PID 2412 wrote to memory of 708 2412 cmd.exe 93 PID 1540 wrote to memory of 4604 1540 b9de8270 96 PID 1540 wrote to memory of 4604 1540 b9de8270 96 PID 1540 wrote to memory of 4604 1540 b9de8270 96 PID 4604 wrote to memory of 2468 4604 cmd.exe 98 PID 4604 wrote to memory of 2468 4604 cmd.exe 98 PID 4604 wrote to memory of 2468 4604 cmd.exe 98
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:584
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe"C:\Users\Admin\AppData\Local\Temp\bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\timeout.exetimeout /t 14⤵
- Delays execution with timeout.exe
PID:708
-
-
-
-
C:\Program Files\rdpsign.exe"C:\Program Files\rdpsign.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
C:\Windows\Syswow64\b9de8270C:\Windows\Syswow64\b9de82701⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Windows\Syswow64\b9de8270"2⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2468
-
-
Network
-
Remote address:114.114.114.114:53Requestdown.nugong.asiaIN AResponsedown.nugong.asiaIN CNAMEdown.nugong.asia.cdn.dnsv1.com.cndown.nugong.asia.cdn.dnsv1.com.cnIN CNAMEofgk41rd.slt.sched.tdnsv8.comofgk41rd.slt.sched.tdnsv8.comIN A122.189.171.111ofgk41rd.slt.sched.tdnsv8.comIN A211.93.212.232ofgk41rd.slt.sched.tdnsv8.comIN A123.12.213.243ofgk41rd.slt.sched.tdnsv8.comIN A221.15.67.145ofgk41rd.slt.sched.tdnsv8.comIN A119.36.226.232ofgk41rd.slt.sched.tdnsv8.comIN A58.144.226.248ofgk41rd.slt.sched.tdnsv8.comIN A36.248.54.85ofgk41rd.slt.sched.tdnsv8.comIN A122.189.171.55ofgk41rd.slt.sched.tdnsv8.comIN A119.36.226.196ofgk41rd.slt.sched.tdnsv8.comIN A42.56.81.104ofgk41rd.slt.sched.tdnsv8.comIN A125.39.165.235ofgk41rd.slt.sched.tdnsv8.comIN A110.249.196.101ofgk41rd.slt.sched.tdnsv8.comIN A218.29.50.234ofgk41rd.slt.sched.tdnsv8.comIN A123.12.213.187ofgk41rd.slt.sched.tdnsv8.comIN A42.231.136.87
-
Remote address:8.8.8.8:53Request158.240.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request254.105.26.67.in-addr.arpaIN PTRResponse
-
Remote address:122.189.171.111:443RequestGET /pgm/mpr/c995ec7fd4f57c0d/69f335c8397887d4.zip HTTP/1.1
Accept-Encoding: gzip, deflate
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "9622e382ef8f51e5dc3cfdeaacf2f928"
Content-Type: application/zip
Date: Mon, 11 Sep 2023 19:04:34 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 4589936052107238770
x-cos-request-id: NjRmZjY0YzJfNmNkMTc2MWVfMzQ3M18xNTQ3MjVi
Content-Length: 462740
Accept-Ranges: bytes
X-NWS-LOG-UUID: 18237741092755376616
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:8.8.8.8:53Request114.114.114.114.in-addr.arpaIN PTRResponse114.114.114.114.in-addr.arpaIN PTRpublic1114dnscom
-
Remote address:8.8.8.8:53Request111.171.189.122.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request140.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request108.211.229.192.in-addr.arpaIN PTRResponse
-
Remote address:122.189.171.111:80RequestGET /cfg/cmc/ping.txt HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "bdf198e2733b39eae21f211114395f67"
Content-Type: text/plain
Date: Mon, 11 Sep 2023 18:02:31 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 3269775211629437622
x-cos-meta-md5: bdf198e2733b39eae21f211114395f67
x-cos-request-id: NjRmZjU2MzdfNTc5NjdmMGJfMzFjMV9hOTZiMTA=
Content-Length: 16
Accept-Ranges: bytes
X-NWS-LOG-UUID: 4203355729219439325
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:122.189.171.111:80RequestGET /cfg/cmc/ping.txt HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "bdf198e2733b39eae21f211114395f67"
Content-Type: text/plain
Date: Mon, 11 Sep 2023 18:02:31 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 3269775211629437622
x-cos-meta-md5: bdf198e2733b39eae21f211114395f67
x-cos-request-id: NjRmZjU2MzdfNTc5NjdmMGJfMzFjMV9hOTZiMTA=
Content-Length: 16
Accept-Ranges: bytes
X-NWS-LOG-UUID: 3481312161968609272
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:122.189.171.111:80RequestGET /cfg/cmc/userchange.txt HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "fc45e837e3ce86dbec3d2c37cf4902de"
Content-Type: text/plain
Date: Tue, 10 Oct 2023 09:22:22 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 12006462995938776668
x-cos-request-id: NjUyNTE3Y2VfOTZhMjA4MDlfMTVjMl80NzM3Y2Rk
Content-Length: 80
Accept-Ranges: bytes
X-NWS-LOG-UUID: 10905350539667753015
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:122.189.171.111:80RequestGET /cfg/cmc/userpq.zip HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "adc490d0b07f1be911590c5b795aebea"
Content-Type: application/zip
Date: Sun, 15 Oct 2023 12:17:13 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 2623325120400499928
x-cos-request-id: NjUyYmQ4NDlfYTBhZmFmMDlfMmE5NF8xNTFmYzZm
Content-Length: 14048
Accept-Ranges: bytes
X-NWS-LOG-UUID: 4408665578442023211
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:122.189.171.111:80RequestGET /cfg/cmc/blacklist.txt HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "0df08590c5e267537d4ea37bf856ff07"
Content-Type: text/plain
Date: Tue, 10 Oct 2023 08:15:33 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 2970137862095809835
x-cos-request-id: NjUyNTA4MjVfMTI3NmIyMDlfOWU1MV8zNjliMmVj
Content-Length: 13312
Accept-Ranges: bytes
X-NWS-LOG-UUID: 16786581235747152934
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:122.189.171.111:80RequestGET /cfg/user/c995ec7fd4f57c0d/69f335c8397887d4.json HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "9d521f6ead300ca3ecac2f59c201b009"
Content-Type: application/json
Date: Mon, 11 Sep 2023 19:04:36 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 11522679188396684273
x-cos-request-id: NjRmZjY0YzRfYzQzNjY4MDlfNzU2MF9iNDQ2YmM=
Content-Length: 2176
Accept-Ranges: bytes
X-NWS-LOG-UUID: 12998831159411314338
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:122.189.171.111:80RequestGET /cfg/pub/ms.json HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "08d385dd32607b44989f5f7d93cfb1a4"
Content-Type: application/json
Date: Tue, 17 Oct 2023 06:24:06 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 5642918650456635813
x-cos-request-id: NjUyZTI4ODZfMjhjZDExMGJfMjgzZGNfNDNlMzIxNg==
Content-Length: 70816
Accept-Ranges: bytes
X-NWS-LOG-UUID: 9661404336593585327
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:122.189.171.111:80RequestGET /cfg/pub/ps.json HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "38f11ea8d0226630fb9251be3a7b1e4b"
Content-Type: application/json
Date: Tue, 17 Oct 2023 06:24:05 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 5867845126828716719
x-cos-request-id: NjUyZTI4ODRfZDFiNWFmMDlfZWFlYV80MjQ1NTgw
Content-Length: 14496
Accept-Ranges: bytes
X-NWS-LOG-UUID: 263157557074778901
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
GEThttp://down.nugong.asia/pgm/mds/6e3a93a55cea3a23/557a93a3c14e34f52a4c5d41926016b1dd2f3f7d426160b564.ziprdpsign.exeRemote address:122.189.171.111:80RequestGET /pgm/mds/6e3a93a55cea3a23/557a93a3c14e34f52a4c5d41926016b1dd2f3f7d426160b564.zip HTTP/1.1
Host: down.nugong.asia
User-Agent: CHM_MSDN
ResponseHTTP/1.1 200 OK
Etag: "98b2cfa00e1b12ee10d1c93ef1d3dedc"
Content-Type: application/zip
Date: Mon, 09 Oct 2023 22:18:32 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 3940288121217723607
x-cos-request-id: NjUyNDdjMzhfNTBiMzAzMDlfMTY3Ml80NmExZWQx
Content-Length: 330316
Accept-Ranges: bytes
X-NWS-LOG-UUID: 10491646738914027669
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
GEThttp://nreprot.nugong.asia/report/report_data?data=b26a79cea204f54a2a7ea9235e2fcd905bb992835b01fa10c618d25ea412d14e66ead333985d7880e6e7acd03017a34fb40b3f84ce717f77b29e0c7abd541979b0bd17bd4bf4784ebe7dd605a6b6025e3b7de54cf1cc28f1c0d6329c26e45207b0b6022d35e3984a25cea5bca79c5a2065722515486458a1dc051ebed21888d3145a24cbc4f4a537a7c77962d6adad85a13e3cde3b845993fd0a5880de28558ab7e2a43c4bf3efa1c81eb5b608d7a4f6e5687d60f521df126096198579ba176b2dd3dd34e2654138c3c74eaffdbab1ec2a6ed1c4da0f6448a5eca47dc9fee3469f90b405159314a5248e446cc9c8ea907461bcfa8ad13436b47819f4994f07de772311f956ef1a01db15ef30690ef35fb8ef85233cab2f080c55d9ba6167a1f0ad747e96a429edbc735421c71cc139656b3e329a5e060356e730f00072ffc1f56e0caf5bb5c049f57b46c63f456a33889713703c62ca479ee5af5f4c20409904d8894f4dc26a1fc456445ba7c593ef2e7348b01d78a2649fc1569beb45238f2e18fcc15d26981ca21227236b549b0e65ed95992ef346896c83a8180ed437f6912937e0ee2680c0b853c393bc1d7d9142e598fdd8ce6e7f18419deaa524a1e818a1a03c7d833a001654d87d0b5fb0aeef0763900497c6ffc0085f2fb14b1ad299b020057ddea2b1dd0351de412c0a1ad84d04c0dd65b494328643f289e5fc2042rdpsign.exeRemote address:122.189.171.111:80RequestGET /report/report_data?data=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 HTTP/1.1
Host: nreprot.nugong.asia
ResponseHTTP/1.1 200 OK
Date: Tue, 17 Oct 2023 07:38:27 GMT
Content-Type: text/html; charset=utf-8
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
X-Cache-Lookup: Cache Miss
X-Cache-Lookup: Hit From Inner Cluster
Cache-Control: private
Content-Length: 3
X-NWS-LOG-UUID: 15260473372039476250
Connection: keep-alive
X-Cache-Lookup: Cache Miss
-
GEThttp://mprrpt.nugong.asia/report.php?data=b26a79cea204f54a2a7ea9235e2fcd905bb992835b01fa10c618d25ea412d14e66ead333985d7880e6e7acd03017a34fb40b3f84ce717f77b29e0c7abd541979b0bd17bd4bf4784ebe7dd605a6b6025e3b7de54cf1cc28f1c0d6329c26e45207b0b6022d35e3984a25cea5bca79c5a2065722515486458a1dc051ebed21888d3145a24cbc4f4a537a7c77962d6adad85a13e3cde3b845993fd0a5880de28558ab7e2a43c4bf3efa1c81eb5b608d7a4f6e5687d60f521df126096198579ba176b2dd3dd34e2654138c3c74eaffdbab1ec2a6ed1c4da0f6448a5eca47dc9fee3469f90b405159314a5248e446cc9c8ea907461bcfa8ad13436b47819f4994f07de772311f956ef1a01db15ef30690ef35fb8ef85233cab2f080c55d9ba6167a1f0ad747e96a429edbc735421c71cc139656b3e329a5e060356e730f00072ffc1f56e0caf5bb5c049f57b46c63f456a33889713703c62ca479ee5af5f4c20409904d8894f4dc26a1fc456445ba7c593ef2e7348b01d78a2649fc1569beb45238f2e18fcc15d26981ca21227236b549b0e65ed95992ef346896c83a8180ed437f6912937e0ee2680c0b853c393bc1d7d9142e598fdd8ce6e7f18419deaa524a1e818a1a03c7d833a001654d87d0b5fb0aeef0763900497c6ffc0085f2fb14b1ad299b020057ddea2b1dd0351de412c0a1ad84d04c0dd65b494328643f289e5fc2042rdpsign.exeRemote address:122.189.171.111:80RequestGET /report.php?data=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 HTTP/1.1
Host: mprrpt.nugong.asia
ResponseHTTP/1.1 200 OK
Date: Tue, 17 Oct 2023 07:38:26 GMT
Content-Type: application/octet-stream
Content-Type: text/html
X-Cache-Lookup: Cache Miss
Content-Length: 3
X-NWS-LOG-UUID: 16181278050411485289
Connection: keep-alive
X-Cache-Lookup: Cache Miss
-
Remote address:122.189.171.111:80RequestGET /cfg/cmc/zbcfg_exe.txt HTTP/1.1
Host: down.nugong.asia
ResponseHTTP/1.1 200 OK
Etag: "964b0b85a18cfe842b0ccfbf6900209a"
Content-Type: text/plain
Date: Mon, 16 Oct 2023 16:34:14 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 11792530854517344045
x-cos-request-id: NjUyZDY2MDZfNmRlZjk4MWVfMTZmYjBfNDM4NGU5NQ==
Content-Length: 1376
Accept-Ranges: bytes
X-NWS-LOG-UUID: 5318320631035226075
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:8.8.8.8:53Requestapps.game.qq.comIN AResponseapps.game.qq.comIN A101.227.134.27apps.game.qq.comIN A101.227.134.49
-
Remote address:101.227.134.27:443RequestGET /comm-htdocs/ip/get_ip.php HTTP/1.1
Accept-Encoding: gzip, deflate
Host: apps.game.qq.com
Connection: Close
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 49
Connection: close
Server: swoole-http-server
Content-Encoding: gzip
-
Remote address:8.8.8.8:53Requestocsp.digicert.cnIN AResponseocsp.digicert.cnIN CNAMEocsp.digicert.cn.w.cdngslb.comocsp.digicert.cn.w.cdngslb.comIN A47.246.48.205
-
GEThttp://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbJNRrm8KxusAb7DCqnMkE%3Drdpsign.exeRemote address:47.246.48.205:80RequestGET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbJNRrm8KxusAb7DCqnMkE%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/10.0
Host: ocsp.digicert.cn
ResponseHTTP/1.1 200 OK
Content-Type: application/ocsp-response
Content-Length: 471
Connection: keep-alive
Cache-Control: max-age=7200
Date: Tue, 17 Oct 2023 06:39:23 GMT
Ali-Swift-Global-Savetime: 1697524763
Via: cache2.l2de2[51,50,200-0,M], cache1.l2de2[52,0], cache1.l2de2[53,0], cache5.nl2[0,-1,200-0,H], cache4.nl2[22,0]
Age: 3536
X-Cache: HIT TCP_MEM_HIT dirn:1:61464607
X-Swift-SaveTime: Tue, 17 Oct 2023 06:39:23 GMT
X-Swift-CacheTime: 3600
Timing-Allow-Origin: *
EagleId: 2ff6309816975282998335874e
-
GEThttp://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQhnxEBNL9LgIhfSsTcHsrTt204QgQURNnISjOO01KNp5KUYR%2BayKW37MsCEAlZRMywkYGXHkcMpMgpr8c%3Drdpsign.exeRemote address:47.246.48.205:80RequestGET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBQhnxEBNL9LgIhfSsTcHsrTt204QgQURNnISjOO01KNp5KUYR%2BayKW37MsCEAlZRMywkYGXHkcMpMgpr8c%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/10.0
Host: ocsp.digicert.cn
ResponseHTTP/1.1 200 OK
Content-Type: application/ocsp-response
Content-Length: 471
Connection: keep-alive
Cache-Control: max-age=7200
Date: Tue, 17 Oct 2023 06:49:55 GMT
Ali-Swift-Global-Savetime: 1697525395
Via: cache5.l2de2[0,0,200-0,H], cache7.l2de2[1,0], cache8.nl2[0,0,200-0,H], cache4.nl2[1,0]
Age: 2904
X-Cache: HIT TCP_MEM_HIT dirn:11:365779980
X-Swift-SaveTime: Tue, 17 Oct 2023 07:23:36 GMT
X-Swift-CacheTime: 1579
Timing-Allow-Origin: *
EagleId: 2ff6309816975282999326168e
-
Remote address:8.8.8.8:53Request27.134.227.101.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request205.48.246.47.in-addr.arpaIN PTRResponse
-
GEThttps://nreprot.nugong.asia/report.php?type=client&data=c7f89dc64da77380b9e063f0950731f26303ad887c545e7380f702d94883cc002f8772e105d493c6d38caceeb3d91a29207a241567b1c2bd69e4c84ded81e8b3b7d206fc6c395650f8ce890c9949165727f7e26621c03fb29296721880bceb543ee0f217537d9faa3418e0573a6af38632b666cbd2e111a42e6f54c54357f2ad9df263ce8b6d21e463992f3c8167402b51ba1a2943c4bf96b2a7403109ad437a29dad3edf8b411b17986d0524295c1a9014ab0e046277536cd9b8ac2f31c5621522394db5833817b37057f01f7992245dde928f9a61bbf1e2ef9368e5e8172a17bfe32fcc26644b4b9de8270Remote address:122.189.171.111:443RequestGET /report.php?type=client&data=c7f89dc64da77380b9e063f0950731f26303ad887c545e7380f702d94883cc002f8772e105d493c6d38caceeb3d91a29207a241567b1c2bd69e4c84ded81e8b3b7d206fc6c395650f8ce890c9949165727f7e26621c03fb29296721880bceb543ee0f217537d9faa3418e0573a6af38632b666cbd2e111a42e6f54c54357f2ad9df263ce8b6d21e463992f3c8167402b51ba1a2943c4bf96b2a7403109ad437a29dad3edf8b411b17986d0524295c1a9014ab0e046277536cd9b8ac2f31c5621522394db5833817b37057f01f7992245dde928f9a61bbf1e2ef9368e5e8172a17bfe32fcc26644b4 HTTP/1.1
Accept-Encoding: gzip, deflate
Host: nreprot.nugong.asia
Connection: Close
ResponseHTTP/1.1 200 OK
Date: Tue, 17 Oct 2023 07:38:22 GMT
Content-Type: text/html; charset=utf-8
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
X-Cache-Lookup: Cache Miss
Cache-Control: private
Content-Length: 3
X-NWS-LOG-UUID: 7379929138276653248
Connection: close
X-Cache-Lookup: Cache Miss
-
Remote address:8.8.8.8:53Requestsp1.baidu.comIN AResponsesp1.baidu.comIN CNAMEwww.a.shifen.comwww.a.shifen.comIN CNAMEwww.wshifen.comwww.wshifen.comIN A104.193.88.77www.wshifen.comIN A104.193.88.123
-
Remote address:8.8.8.8:53Request101.14.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestocsp.trust-provider.cnIN AResponseocsp.trust-provider.cnIN CNAMEocsp.trust-provider.cn.c.vedcdnlb.comocsp.trust-provider.cn.c.vedcdnlb.comIN CNAMEbd-l7-online-tob-oversea-opt.s.vedsalb.combd-l7-online-tob-oversea-opt.s.vedsalb.comIN A111.13.153.152bd-l7-online-tob-oversea-opt.s.vedsalb.comIN A111.48.138.18bd-l7-online-tob-oversea-opt.s.vedsalb.comIN A111.206.23.199bd-l7-online-tob-oversea-opt.s.vedsalb.comIN A112.50.95.96bd-l7-online-tob-oversea-opt.s.vedsalb.comIN A117.27.246.96bd-l7-online-tob-oversea-opt.s.vedsalb.comIN A119.36.90.164bd-l7-online-tob-oversea-opt.s.vedsalb.comIN A36.143.236.7bd-l7-online-tob-oversea-opt.s.vedsalb.comIN A36.248.38.100
-
GEThttps://sp1.baidu.com/8aQDcjqpAAV3otqbppnN2DJv/api.php?query=154.61.71.13&resource_id=6006&ie=utf8&oe=gbk&format=jsonrdpsign.exeRemote address:104.193.88.77:443RequestGET /8aQDcjqpAAV3otqbppnN2DJv/api.php?query=154.61.71.13&resource_id=6006&ie=utf8&oe=gbk&format=json HTTP/1.1
Accept-Encoding: gzip
User-Agent: CHM_MSDN
Host: sp1.baidu.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Content-Length: 354
Content-Type: application/json;charset=gbk
Date: Tue, 17 Oct 2023 07:38:22 GMT
Expires: Tue, 17 Oct 2023 07:38:22 GMT
P3p: CP=" OTI DSP COR IVA OUR IND COM "
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Server: Apache
Set-Cookie: BAIDUID=5D16934795C09A11CC095B3B33C6B15A:FG=1; expires=Wed, 16-Oct-24 07:38:22 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1
Set-Cookie: BAIDUID=A4FC91B6CB4CAE79F0E67D013DC81899:FG=1; expires=Wed, 16-Oct-24 07:38:22 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1
Tracecode: 23024345590415660810101715
Tracecode: 23024341420407075594101715
X-Powered-By: HHVM
-
GEThttp://ocsp.trust-provider.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTRK6%2BKMEm7xEAA7oRlXypSzGx%2FAgQUyPPFCRszol%2BmEquQ1gC2XPyNHAYCEFeRTDpozwT3OxvpMIocpu0%3Db9de8270Remote address:111.13.153.152:80RequestGET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBTRK6%2BKMEm7xEAA7oRlXypSzGx%2FAgQUyPPFCRszol%2BmEquQ1gC2XPyNHAYCEFeRTDpozwT3OxvpMIocpu0%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/10.0
Host: ocsp.trust-provider.cn
ResponseHTTP/1.1 200 OK
Content-Type: application/ocsp-response
Content-Length: 599
Connection: keep-alive
Date: Tue, 17 Oct 2023 07:38:22 GMT
Age: 1
CF-Cache-Status: HIT
CF-RAY: 816301a1de422544-SJC
ETag: "45ca5445b1ecdd148809b4c7123fe87594c33cb1"
Expires: Sat, 21 Oct 2023 21:19:06 GMT
Last-Modified: Sat, 14 Oct 2023 21:19:07 GMT
WS-Cache-Status: 0
X-CCACDN-Proxy-ID: scdpinlb2
X-Frame-Options: SAMEORIGIN
X-Via: 1.1 PS-CZX-01YIQ141:4 (Cdn Cache Server V2.0), 1.1 PSbjyd4dq13:7 (Cdn Cache Server V2.0)
X-Ws-Request-Id: 652e2f4b_PSbjyd4hh12_39853-31280
cache-via: cache.n173-159-130.bdcdn-bjcm
x-request-ip: 154.61.71.13
x-tt-trace-tag: id=5
x-dsa-trace-id: 1697528302b17e28311cc3ea8e2357e705230bdac7
X-Bdsa-Cache-Status: HIT
Cache-Via-Status: cache.n173-159-130.bdcdn-bjcm(HIT)
X-Bdsa-Cache-Tm: 1697525579-877
Accept-Ranges: bytes
via: n173-159-129.bdcdn-bjcm.ToB
X-Dsa-Origin-Status: 200
server-timing: cdn-cache;desc=HIT, origin;dur=0, edge;dur=0
-
Remote address:8.8.8.8:53Request77.88.193.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request101.15.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request226.21.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request152.153.13.111.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.2.2.234.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request211.112.123.233.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestdown.xy58.topIN AResponsedown.xy58.topIN CNAMEdown.xy58.top.cdn.dnsv1.com.cndown.xy58.top.cdn.dnsv1.com.cnIN CNAMEfrnfx6xf.slt.sched.tdnsv8.comfrnfx6xf.slt.sched.tdnsv8.comIN A221.15.67.145frnfx6xf.slt.sched.tdnsv8.comIN A123.12.213.187frnfx6xf.slt.sched.tdnsv8.comIN A42.56.81.104frnfx6xf.slt.sched.tdnsv8.comIN A58.144.226.248frnfx6xf.slt.sched.tdnsv8.comIN A125.39.165.235frnfx6xf.slt.sched.tdnsv8.comIN A110.249.196.101frnfx6xf.slt.sched.tdnsv8.comIN A36.248.54.85frnfx6xf.slt.sched.tdnsv8.comIN A119.36.226.196frnfx6xf.slt.sched.tdnsv8.comIN A119.36.226.232frnfx6xf.slt.sched.tdnsv8.comIN A123.12.213.243frnfx6xf.slt.sched.tdnsv8.comIN A122.189.171.55frnfx6xf.slt.sched.tdnsv8.comIN A122.189.171.111frnfx6xf.slt.sched.tdnsv8.comIN A211.93.212.232frnfx6xf.slt.sched.tdnsv8.comIN A42.231.136.87frnfx6xf.slt.sched.tdnsv8.comIN A218.29.50.234
-
Remote address:8.8.8.8:53Requestdown.xy58.topIN AResponsedown.xy58.topIN CNAMEdown.xy58.top.cdn.dnsv1.com.cndown.xy58.top.cdn.dnsv1.com.cnIN CNAMEfrnfx6xf.slt.sched.tdnsv8.comfrnfx6xf.slt.sched.tdnsv8.comIN A211.93.212.232frnfx6xf.slt.sched.tdnsv8.comIN A58.144.226.248frnfx6xf.slt.sched.tdnsv8.comIN A123.12.213.187frnfx6xf.slt.sched.tdnsv8.comIN A122.189.171.111frnfx6xf.slt.sched.tdnsv8.comIN A122.189.171.55frnfx6xf.slt.sched.tdnsv8.comIN A42.231.136.87frnfx6xf.slt.sched.tdnsv8.comIN A221.15.67.145frnfx6xf.slt.sched.tdnsv8.comIN A36.248.54.85frnfx6xf.slt.sched.tdnsv8.comIN A125.39.165.235frnfx6xf.slt.sched.tdnsv8.comIN A123.12.213.243frnfx6xf.slt.sched.tdnsv8.comIN A218.29.50.234frnfx6xf.slt.sched.tdnsv8.comIN A42.56.81.104frnfx6xf.slt.sched.tdnsv8.comIN A119.36.226.232frnfx6xf.slt.sched.tdnsv8.comIN A119.36.226.196frnfx6xf.slt.sched.tdnsv8.comIN A110.249.196.101
-
Remote address:221.15.67.145:80RequestGET /res/icos/9.ico HTTP/1.1
Accept-Encoding: gzip
User-Agent: CHM_MSDN
Host: down.xy58.top
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Etag: "e00fb9f91bcbbccb56a2455456d2b70a"
Content-Type: image/vnd.microsoft.icon
Date: Sat, 07 Oct 2023 17:54:03 GMT
Server: tencent-cos
x-cos-hash-crc64ecma: 15586908648096285918
x-cos-meta-md5: e00fb9f91bcbbccb56a2455456d2b70a
x-cos-request-id: NjUyMTliM2JfZGUzMTIyMDlfZjg3Zl80NTAxMjJi
Content-Length: 187798
Accept-Ranges: bytes
X-NWS-LOG-UUID: 15068315473125540156
Connection: keep-alive
X-Cache-Lookup: Cache Hit
-
Remote address:8.8.8.8:53Request145.67.15.221.in-addr.arpaIN PTRResponse145.67.15.221.in-addr.arpaIN PTRhnkdjzadsl
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request8.3.197.209.in-addr.arpaIN PTRResponse8.3.197.209.in-addr.arpaIN PTRvip0x008map2sslhwcdnnet
-
Remote address:8.8.8.8:53Request13.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request195.98.74.40.in-addr.arpaIN PTRResponse
-
122.189.171.111:443https://down.nugong.asia/pgm/mpr/c995ec7fd4f57c0d/69f335c8397887d4.ziptls, httpb9de827018.3kB 484.9kB 359 357
HTTP Request
GET https://down.nugong.asia/pgm/mpr/c995ec7fd4f57c0d/69f335c8397887d4.zipHTTP Response
200 -
19.6kB 466.1kB 365 359
HTTP Request
GET http://down.nugong.asia/cfg/cmc/ping.txtHTTP Response
200HTTP Request
GET http://down.nugong.asia/cfg/cmc/ping.txtHTTP Response
200HTTP Request
GET http://down.nugong.asia/cfg/cmc/userchange.txtHTTP Response
200HTTP Request
GET http://down.nugong.asia/cfg/cmc/userpq.zipHTTP Response
200HTTP Request
GET http://down.nugong.asia/cfg/cmc/blacklist.txtHTTP Response
200HTTP Request
GET http://down.nugong.asia/cfg/user/c995ec7fd4f57c0d/69f335c8397887d4.jsonHTTP Response
200HTTP Request
GET http://down.nugong.asia/cfg/pub/ms.jsonHTTP Response
200HTTP Request
GET http://down.nugong.asia/cfg/pub/ps.jsonHTTP Response
200HTTP Request
GET http://down.nugong.asia/pgm/mds/6e3a93a55cea3a23/557a93a3c14e34f52a4c5d41926016b1dd2f3f7d426160b564.zipHTTP Response
200HTTP Request
GET http://nreprot.nugong.asia/report/report_data?data=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 Response
200HTTP Request
GET http://mprrpt.nugong.asia/report.php?data=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 Response
200HTTP Request
GET http://down.nugong.asia/cfg/cmc/zbcfg_exe.txtHTTP Response
200 -
1.1kB 4.4kB 14 12
HTTP Request
GET https://apps.game.qq.com/comm-htdocs/ip/get_ip.phpHTTP Response
200 -
47.246.48.205:80http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQhnxEBNL9LgIhfSsTcHsrTt204QgQURNnISjOO01KNp5KUYR%2BayKW37MsCEAlZRMywkYGXHkcMpMgpr8c%3Dhttprdpsign.exe782 B 2.2kB 7 5
HTTP Request
GET http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbJNRrm8KxusAb7DCqnMkE%3DHTTP Response
200HTTP Request
GET http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQhnxEBNL9LgIhfSsTcHsrTt204QgQURNnISjOO01KNp5KUYR%2BayKW37MsCEAlZRMywkYGXHkcMpMgpr8c%3DHTTP Response
200 -
122.189.171.111:443https://nreprot.nugong.asia/report.php?type=client&data=c7f89dc64da77380b9e063f0950731f26303ad887c545e7380f702d94883cc002f8772e105d493c6d38caceeb3d91a29207a241567b1c2bd69e4c84ded81e8b3b7d206fc6c395650f8ce890c9949165727f7e26621c03fb29296721880bceb543ee0f217537d9faa3418e0573a6af38632b666cbd2e111a42e6f54c54357f2ad9df263ce8b6d21e463992f3c8167402b51ba1a2943c4bf96b2a7403109ad437a29dad3edf8b411b17986d0524295c1a9014ab0e046277536cd9b8ac2f31c5621522394db5833817b37057f01f7992245dde928f9a61bbf1e2ef9368e5e8172a17bfe32fcc26644b4tls, httpb9de82701.6kB 1.0kB 13 12
HTTP Request
GET https://nreprot.nugong.asia/report.php?type=client&data=c7f89dc64da77380b9e063f0950731f26303ad887c545e7380f702d94883cc002f8772e105d493c6d38caceeb3d91a29207a241567b1c2bd69e4c84ded81e8b3b7d206fc6c395650f8ce890c9949165727f7e26621c03fb29296721880bceb543ee0f217537d9faa3418e0573a6af38632b666cbd2e111a42e6f54c54357f2ad9df263ce8b6d21e463992f3c8167402b51ba1a2943c4bf96b2a7403109ad437a29dad3edf8b411b17986d0524295c1a9014ab0e046277536cd9b8ac2f31c5621522394db5833817b37057f01f7992245dde928f9a61bbf1e2ef9368e5e8172a17bfe32fcc26644b4HTTP Response
200 -
104.193.88.77:443https://sp1.baidu.com/8aQDcjqpAAV3otqbppnN2DJv/api.php?query=154.61.71.13&resource_id=6006&ie=utf8&oe=gbk&format=jsontls, httprdpsign.exe1.4kB 7.1kB 19 16
HTTP Request
GET https://sp1.baidu.com/8aQDcjqpAAV3otqbppnN2DJv/api.php?query=154.61.71.13&resource_id=6006&ie=utf8&oe=gbk&format=jsonHTTP Response
200 -
111.13.153.152:80http://ocsp.trust-provider.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTRK6%2BKMEm7xEAA7oRlXypSzGx%2FAgQUyPPFCRszol%2BmEquQ1gC2XPyNHAYCEFeRTDpozwT3OxvpMIocpu0%3Dhttpb9de8270565 B 2.0kB 7 7
HTTP Request
GET http://ocsp.trust-provider.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTRK6%2BKMEm7xEAA7oRlXypSzGx%2FAgQUyPPFCRszol%2BmEquQ1gC2XPyNHAYCEFeRTDpozwT3OxvpMIocpu0%3DHTTP Response
200 -
6.8kB 194.1kB 145 144
HTTP Request
GET http://down.xy58.top/res/icos/9.icoHTTP Response
200
-
62 B 392 B 1 1
DNS Request
down.nugong.asia
DNS Response
122.189.171.111211.93.212.232123.12.213.243221.15.67.145119.36.226.23258.144.226.24836.248.54.85122.189.171.55119.36.226.19642.56.81.104125.39.165.235110.249.196.101218.29.50.234123.12.213.18742.231.136.87
-
73 B 147 B 1 1
DNS Request
158.240.127.40.in-addr.arpa
-
72 B 126 B 1 1
DNS Request
254.105.26.67.in-addr.arpa
-
74 B 106 B 1 1
DNS Request
114.114.114.114.in-addr.arpa
-
74 B 162 B 1 1
DNS Request
111.171.189.122.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
140.32.126.40.in-addr.arpa
-
74 B 145 B 1 1
DNS Request
108.211.229.192.in-addr.arpa
-
62 B 94 B 1 1
DNS Request
apps.game.qq.com
DNS Response
101.227.134.27101.227.134.49
-
62 B 122 B 1 1
DNS Request
ocsp.digicert.cn
DNS Response
47.246.48.205
-
73 B 132 B 1 1
DNS Request
27.134.227.101.in-addr.arpa
-
72 B 143 B 1 1
DNS Request
205.48.246.47.in-addr.arpa
-
59 B 144 B 1 1
DNS Request
sp1.baidu.com
DNS Response
104.193.88.77104.193.88.123
-
72 B 134 B 1 1
DNS Request
101.14.18.104.in-addr.arpa
-
68 B 300 B 1 1
DNS Request
ocsp.trust-provider.cn
DNS Response
111.13.153.152111.48.138.18111.206.23.199112.50.95.96117.27.246.96119.36.90.16436.143.236.736.248.38.100
-
72 B 126 B 1 1
DNS Request
77.88.193.104.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
101.15.18.104.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
226.21.18.104.in-addr.arpa
-
73 B 138 B 1 1
DNS Request
152.153.13.111.in-addr.arpa
-
138 B 3
-
184 B 2
-
68 B 125 B 1 1
DNS Request
2.2.2.234.in-addr.arpa
-
74 B 131 B 1 1
DNS Request
211.112.123.233.in-addr.arpa
-
118 B 772 B 2 2
DNS Request
down.xy58.top
DNS Request
down.xy58.top
DNS Response
221.15.67.145123.12.213.18742.56.81.10458.144.226.248125.39.165.235110.249.196.10136.248.54.85119.36.226.196119.36.226.232123.12.213.243122.189.171.55122.189.171.111211.93.212.23242.231.136.87218.29.50.234
DNS Response
211.93.212.23258.144.226.248123.12.213.187122.189.171.111122.189.171.5542.231.136.87221.15.67.14536.248.54.85125.39.165.235123.12.213.243218.29.50.23442.56.81.104119.36.226.232119.36.226.196110.249.196.101
-
72 B 99 B 1 1
DNS Request
145.67.15.221.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
70 B 111 B 1 1
DNS Request
8.3.197.209.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
13.227.111.52.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
195.98.74.40.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5a85f09a9d65752c5ea50eba8431b87af
SHA1578655a959acb372602b6715e6589ded4ad45032
SHA2568cb8a09b32c56c8e1c7bca6b2ef24c9705fb494ec2ca834256b56ec378c90159
SHA512781acb6bbd7fe53a2c6e80839c4c7168a1f0919df06d296953f7a4f25c891c346041f82f4517941b0c4cac976a91697002e5a441aab012674ced8343fd80dc2d
-
Filesize
145KB
MD5d2a1752df6431ac0b448cc8f25d0b3d4
SHA187afaeb38c8bec3278830a470f94ef39726fb26c
SHA2569f4665e08fbfb72b2317bafa85b9ed9491f7df32dd9d818ca726d6d2ae2d4f35
SHA5128411240eea9dd8b048da8a8023f87a2e3411ab67e8f2961ca5098b9df7ba27a5d2b31e339bb2d122a18880633dac569bbf3b6061619656a2582fe5fb16293688
-
Filesize
183KB
MD5e00fb9f91bcbbccb56a2455456d2b70a
SHA19ad3517db35b63ac08185f395a34980eea5d0840
SHA25607b1a5e314075499de803a074a431ac7376121412b190c1f2deae5976b55403f
SHA512ea3c303976e0ad18a0071c8d16570153ad03f257cc3f5bc59ac3ca3d680a18e714f9711938aa0ebba45532fa4a2b43863f6d210a7ef67ce95d576dd5153cdd20
-
Filesize
1KB
MD5fbde3b58e62193a9ab361622026c866a
SHA108fb1e1a42bca541bf9eb1c2f139ab824e570247
SHA256d171bf7d203bf38b882776ded1482f7a6ae6fa5de63b5f91c44dee9e291d6369
SHA51264fa8b59523b2e00b78128dca68324c87d769d37cd7f04e21d5c3ed856325b3d2ed88a08e1c1f900a18eba8df8714fe8d099a7b970446eef1330e2ab3ff89377
-
Filesize
399KB
MD596e1bdff0b93a2b3b55c270933efcbe5
SHA13b976d555733d10026c2dfcae146f119ff7d6596
SHA25638f71d47fa8ba9eded1309e2b7930e03ea814eea417f0efc5542e94c523693a4
SHA512917ffe3c482cf62e669ee1190e65441c614edeed7419e624665d80e366f1493099ac6a3560560babac629e15a16d28e26a3fac252af7c9671ac934c2bb36e9f2
-
Filesize
399KB
MD596e1bdff0b93a2b3b55c270933efcbe5
SHA13b976d555733d10026c2dfcae146f119ff7d6596
SHA25638f71d47fa8ba9eded1309e2b7930e03ea814eea417f0efc5542e94c523693a4
SHA512917ffe3c482cf62e669ee1190e65441c614edeed7419e624665d80e366f1493099ac6a3560560babac629e15a16d28e26a3fac252af7c9671ac934c2bb36e9f2