Analysis Overview
SHA256
eaba03bf14493232eb1f6a3367cb9074edac1386053f1842a465aad039050ea0
Threat Level: Known bad
The file 258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Metasploit family
Event Triggered Execution: Image File Execution Options Injection
Drops file in System32 directory
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Runs net.exe
Suspicious behavior: LoadsDriver
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-07-04 10:07
Signatures
Metasploit family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-04 10:07
Reported
2024-07-04 10:09
Platform
win7-20240611-en
Max time kernel
149s
Max time network
124s
Command Line
Signatures
Event Triggered Execution: Image File Execution Options Injection
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavsvc.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rising.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVmonD.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravtimer.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVFW.EXE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ati2evxx.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\runiep.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\runiep.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rising.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navapsvc.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavsvc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVmon.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rav.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVFW.EXE.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVwsc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ati2evxx.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVsvcUI.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVsvcUI.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navapsvc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVsrvXP.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVmonD.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravtimer.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rav.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVsrvXP.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVwsc.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapw32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapw32.exe | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\tpnc.bat | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\wpcap.dll | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\tutilitys.txt | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| File created | C:\Windows\SysWOW64\wsusb32.sys | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeRestorePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe"
C:\Windows\SysWOW64\cmd.exe
cmd /c C:\Windows\system32\tpnc.bat
C:\Windows\SysWOW64\net.exe
net stop sharedaccess
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop sharedaccess
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | www.aaat8.com | udp |
| US | 208.91.197.46:80 | www.aaat8.com | tcp |
Files
C:\Windows\SysWOW64\tpnc.bat
| MD5 | 7b16cc4ebd5af5d255eeb8a7b487875b |
| SHA1 | 3f679d76efb21f7b2249ddc2a0d8a68d71220d16 |
| SHA256 | 5040cfcc7def4d52830218981dc6cb729abe9eb3b1a38d8df5c56698336098b1 |
| SHA512 | 7f16419eddc8cedb0e133fe482a958cf6997b8b30456a3f3949066e9279fef888e1297065850f77bdae189a5d93e6bc69eb6e33d73ef1e0d64642f2fb2ff61d0 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-04 10:07
Reported
2024-07-04 10:09
Platform
win10v2004-20240508-en
Max time kernel
149s
Max time network
150s
Command Line
Signatures
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\wpcap.dll | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\tutilitys.txt | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| File created | C:\Windows\SysWOW64\wsusb32.sys | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| File created | C:\Windows\SysWOW64\tpnc.bat | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\B^«Ê?ó×õ íÓ$Á | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeRestorePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\258c8503cbaefd8b7b59d81490a4d68c_JaffaCakes118.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Windows\system32\tpnc.bat
C:\Windows\SysWOW64\net.exe
net stop sharedaccess
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop sharedaccess
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 74.32.126.40.in-addr.arpa | udp |
| N/A | 10.127.1.176:445 | tcp | |
| US | 8.8.8.8:53 | www.aaat8.com | udp |
| N/A | 10.127.1.226:445 | tcp | |
| US | 208.91.197.46:80 | www.aaat8.com | tcp |
| N/A | 10.127.1.176:139 | tcp | |
| N/A | 10.127.1.151:445 | tcp | |
| N/A | 10.127.1.76:445 | tcp | |
| N/A | 10.127.1.51:445 | tcp | |
| N/A | 10.127.1.26:445 | tcp | |
| N/A | 10.127.1.201:445 | tcp | |
| N/A | 10.127.1.126:445 | tcp | |
| N/A | 10.127.1.101:445 | tcp | |
| N/A | 10.127.1.1:445 | tcp | |
| N/A | 10.127.1.226:139 | tcp | |
| US | 8.8.8.8:53 | 46.197.91.208.in-addr.arpa | udp |
| N/A | 10.127.1.151:139 | tcp | |
| N/A | 10.127.1.201:139 | tcp | |
| N/A | 10.127.1.51:139 | tcp | |
| N/A | 10.127.1.76:139 | tcp | |
| N/A | 10.127.1.101:139 | tcp | |
| N/A | 10.127.1.26:139 | tcp | |
| N/A | 10.127.1.1:139 | tcp | |
| N/A | 10.127.1.126:139 | tcp | |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 176.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 226.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 76.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 151.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 51.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 201.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 126.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 101.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| N/A | 10.127.1.176:445 | tcp | |
| N/A | 10.127.1.226:445 | tcp | |
| N/A | 10.127.1.176:139 | tcp | |
| N/A | 10.127.1.76:445 | tcp | |
| N/A | 10.127.1.151:445 | tcp | |
| N/A | 10.127.1.26:445 | tcp | |
| N/A | 10.127.1.1:445 | tcp | |
| N/A | 10.127.1.51:445 | tcp | |
| N/A | 10.127.1.201:445 | tcp | |
| N/A | 10.127.1.101:445 | tcp | |
| N/A | 10.127.1.126:445 | tcp | |
| N/A | 10.127.1.226:139 | tcp | |
| N/A | 10.127.1.151:139 | tcp | |
| N/A | 10.127.1.76:139 | tcp | |
| N/A | 10.127.1.1:139 | tcp | |
| N/A | 10.127.1.26:139 | tcp | |
| N/A | 10.127.1.201:139 | tcp | |
| N/A | 10.127.1.51:139 | tcp | |
| N/A | 10.127.1.101:139 | tcp | |
| N/A | 10.127.1.126:139 | tcp | |
| N/A | 10.127.1.202:445 | tcp | |
| N/A | 10.127.1.177:445 | tcp | |
| N/A | 10.127.1.227:445 | tcp | |
| N/A | 10.127.1.2:445 | tcp | |
| N/A | 10.127.1.127:445 | tcp | |
| N/A | 10.127.1.77:445 | tcp | |
| N/A | 10.127.1.52:445 | tcp | |
| N/A | 10.127.1.102:445 | tcp | |
| N/A | 10.127.1.152:445 | tcp | |
| N/A | 10.127.1.27:445 | tcp | |
| N/A | 10.127.1.202:139 | tcp | |
| N/A | 10.127.1.177:139 | tcp | |
| N/A | 10.127.1.227:139 | tcp | |
| N/A | 10.127.1.2:139 | tcp | |
| N/A | 10.127.1.127:139 | tcp | |
| N/A | 10.127.1.27:139 | tcp | |
| N/A | 10.127.1.152:139 | tcp | |
| N/A | 10.127.1.77:139 | tcp | |
| N/A | 10.127.1.102:139 | tcp | |
| N/A | 10.127.1.52:139 | tcp | |
| US | 8.8.8.8:53 | 202.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 227.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 127.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 27.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 77.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 177.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 52.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 102.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 152.1.127.10.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 130.109.69.13.in-addr.arpa | udp |
Files
C:\Windows\SysWOW64\tpnc.bat
| MD5 | 7b16cc4ebd5af5d255eeb8a7b487875b |
| SHA1 | 3f679d76efb21f7b2249ddc2a0d8a68d71220d16 |
| SHA256 | 5040cfcc7def4d52830218981dc6cb729abe9eb3b1a38d8df5c56698336098b1 |
| SHA512 | 7f16419eddc8cedb0e133fe482a958cf6997b8b30456a3f3949066e9279fef888e1297065850f77bdae189a5d93e6bc69eb6e33d73ef1e0d64642f2fb2ff61d0 |