Malware Analysis Report

2024-11-16 13:08

Sample ID 241108-kp9c2aylfv
Target 8c01c6d9cdc82805e9bc47f71404615498d3623c078657c4cf494500a20db845
SHA256 8c01c6d9cdc82805e9bc47f71404615498d3623c078657c4cf494500a20db845
Tags
discovery redline sectoprat infostealer rat trojan cheat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral14

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral11

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral12

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral9

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral10

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral13

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8c01c6d9cdc82805e9bc47f71404615498d3623c078657c4cf494500a20db845

Threat Level: Known bad

The file 8c01c6d9cdc82805e9bc47f71404615498d3623c078657c4cf494500a20db845 was found to be: Known bad.

Malicious Activity Summary

discovery redline sectoprat infostealer rat trojan cheat

RedLine payload

Redline family

Sectoprat family

RedLine

SectopRAT

SectopRAT payload

Unsigned PE

System Location Discovery: System Language Discovery

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-08 08:47

Signatures

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Sectoprat family

sectoprat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-08 08:47

Reported

2024-11-08 08:50

Platform

win10v2004-20241007-en

Max time kernel

93s

Max time network

138s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Kurome.Builder.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Kurome.Builder.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Kurome.Builder.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Kurome.Builder.exe

"C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Kurome.Builder.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 75.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp

Files

memory/716-0-0x000000007478E000-0x000000007478F000-memory.dmp

memory/716-1-0x00000000009E0000-0x0000000000A08000-memory.dmp

memory/716-2-0x0000000074780000-0x0000000074F30000-memory.dmp

memory/716-3-0x0000000074780000-0x0000000074F30000-memory.dmp

memory/716-4-0x0000000005C40000-0x00000000061E4000-memory.dmp

memory/716-5-0x0000000005500000-0x0000000005592000-memory.dmp

memory/716-6-0x0000000005450000-0x000000000545A000-memory.dmp

memory/716-7-0x0000000005B70000-0x0000000005BCE000-memory.dmp

memory/716-8-0x0000000074780000-0x0000000074F30000-memory.dmp

memory/716-9-0x000000007478E000-0x000000007478F000-memory.dmp

memory/716-10-0x0000000074780000-0x0000000074F30000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-11-08 08:47

Reported

2024-11-08 08:50

Platform

win7-20240729-en

Max time kernel

120s

Max time network

122s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Mono.Cecil.Mdb.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Mono.Cecil.Mdb.dll,#1

Network

N/A

Files

N/A

Analysis: behavioral14

Detonation Overview

Submitted

2024-11-08 08:47

Reported

2024-11-08 08:50

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\stub.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Sectoprat family

sectoprat

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\stub.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\stub.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\stub.exe

"C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\stub.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 74.209.201.84.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp

Files

memory/3252-0-0x0000000074A8E000-0x0000000074A8F000-memory.dmp

memory/3252-1-0x0000000000810000-0x000000000082E000-memory.dmp

memory/3252-2-0x0000000005940000-0x0000000005EE4000-memory.dmp

memory/3252-3-0x0000000005EF0000-0x0000000006508000-memory.dmp

memory/3252-4-0x00000000053C0000-0x0000000005452000-memory.dmp

memory/3252-5-0x0000000005360000-0x0000000005372000-memory.dmp

memory/3252-6-0x00000000054A0000-0x00000000054DC000-memory.dmp

memory/3252-7-0x00000000058E0000-0x000000000592C000-memory.dmp

memory/3252-8-0x0000000074A80000-0x0000000075230000-memory.dmp

memory/3252-9-0x0000000007B70000-0x0000000007C7A000-memory.dmp

memory/3252-10-0x0000000074A8E000-0x0000000074A8F000-memory.dmp

memory/3252-11-0x0000000074A80000-0x0000000075230000-memory.dmp

Analysis: behavioral11

Detonation Overview

Submitted

2024-11-08 08:47

Reported

2024-11-08 08:50

Platform

win7-20240903-en

Max time kernel

131s

Max time network

140s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\build.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Sectoprat family

sectoprat

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\build.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\build.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\build.exe

"C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\build.exe"

Network

Country Destination Domain Proto
TR 194.145.138.85:28105 tcp
TR 194.145.138.85:28105 tcp
TR 194.145.138.85:28105 tcp
TR 194.145.138.85:28105 tcp
TR 194.145.138.85:28105 tcp
TR 194.145.138.85:28105 tcp

Files

memory/2524-0-0x00000000744FE000-0x00000000744FF000-memory.dmp

memory/2524-1-0x00000000012D0000-0x00000000012EE000-memory.dmp

memory/2524-2-0x00000000744F0000-0x0000000074BDE000-memory.dmp

memory/2524-3-0x00000000744FE000-0x00000000744FF000-memory.dmp

memory/2524-4-0x00000000744F0000-0x0000000074BDE000-memory.dmp

Analysis: behavioral12

Detonation Overview

Submitted

2024-11-08 08:47

Reported

2024-11-08 08:50

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\build.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Sectoprat family

sectoprat

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\build.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\build.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\build.exe

"C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\build.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
TR 194.145.138.85:28105 tcp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
TR 194.145.138.85:28105 tcp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
TR 194.145.138.85:28105 tcp
TR 194.145.138.85:28105 tcp
US 8.8.8.8:53 104.208.201.84.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
TR 194.145.138.85:28105 tcp
TR 194.145.138.85:28105 tcp

Files

memory/1596-0-0x0000000074D6E000-0x0000000074D6F000-memory.dmp

memory/1596-1-0x0000000000850000-0x000000000086E000-memory.dmp

memory/1596-2-0x0000000005830000-0x0000000005E48000-memory.dmp

memory/1596-3-0x0000000005230000-0x0000000005242000-memory.dmp

memory/1596-4-0x0000000005290000-0x00000000052CC000-memory.dmp

memory/1596-5-0x00000000052D0000-0x000000000531C000-memory.dmp

memory/1596-6-0x0000000074D60000-0x0000000075510000-memory.dmp

memory/1596-7-0x0000000005520000-0x000000000562A000-memory.dmp

memory/1596-8-0x0000000074D6E000-0x0000000074D6F000-memory.dmp

memory/1596-9-0x0000000074D60000-0x0000000075510000-memory.dmp

Analysis: behavioral4

Detonation Overview

Submitted

2024-11-08 08:47

Reported

2024-11-08 08:50

Platform

win10v2004-20241007-en

Max time kernel

95s

Max time network

149s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Mono.Cecil.Mdb.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Mono.Cecil.Mdb.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 75.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 70.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral7

Detonation Overview

Submitted

2024-11-08 08:47

Reported

2024-11-08 08:50

Platform

win7-20241010-en

Max time kernel

121s

Max time network

126s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Mono.Cecil.Rocks.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Mono.Cecil.Rocks.dll,#1

Network

N/A

Files

N/A

Analysis: behavioral8

Detonation Overview

Submitted

2024-11-08 08:47

Reported

2024-11-08 08:50

Platform

win10v2004-20241007-en

Max time kernel

94s

Max time network

137s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Mono.Cecil.Rocks.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Mono.Cecil.Rocks.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 73.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 75.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral9

Detonation Overview

Submitted

2024-11-08 08:47

Reported

2024-11-08 08:50

Platform

win7-20240903-en

Max time kernel

121s

Max time network

122s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Mono.Cecil.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Mono.Cecil.dll,#1

Network

N/A

Files

N/A

Analysis: behavioral10

Detonation Overview

Submitted

2024-11-08 08:47

Reported

2024-11-08 08:50

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

153s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Mono.Cecil.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Mono.Cecil.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-08 08:47

Reported

2024-11-08 08:50

Platform

win7-20241010-en

Max time kernel

14s

Max time network

18s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Kurome.Builder.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Kurome.Builder.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Kurome.Builder.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Kurome.Builder.exe

"C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Kurome.Builder.exe"

Network

N/A

Files

memory/2256-0-0x00000000744EE000-0x00000000744EF000-memory.dmp

memory/2256-1-0x0000000001020000-0x0000000001048000-memory.dmp

memory/2256-2-0x00000000744E0000-0x0000000074BCE000-memory.dmp

memory/2256-3-0x00000000744E0000-0x0000000074BCE000-memory.dmp

memory/2256-4-0x0000000000D90000-0x0000000000DEE000-memory.dmp

memory/2256-5-0x00000000744E0000-0x0000000074BCE000-memory.dmp

memory/2256-6-0x00000000744EE000-0x00000000744EF000-memory.dmp

memory/2256-7-0x00000000744E0000-0x0000000074BCE000-memory.dmp

Analysis: behavioral13

Detonation Overview

Submitted

2024-11-08 08:47

Reported

2024-11-08 08:50

Platform

win7-20240903-en

Max time kernel

148s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\stub.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Sectoprat family

sectoprat

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\stub.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\stub.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\stub.exe

"C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\stub.exe"

Network

N/A

Files

memory/2568-0-0x0000000074C9E000-0x0000000074C9F000-memory.dmp

memory/2568-1-0x0000000000C10000-0x0000000000C2E000-memory.dmp

memory/2568-2-0x0000000074C90000-0x000000007537E000-memory.dmp

memory/2568-3-0x0000000074C9E000-0x0000000074C9F000-memory.dmp

memory/2568-4-0x0000000074C90000-0x000000007537E000-memory.dmp

Analysis: behavioral5

Detonation Overview

Submitted

2024-11-08 08:47

Reported

2024-11-08 08:50

Platform

win7-20240903-en

Max time kernel

119s

Max time network

120s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Mono.Cecil.Pdb.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Mono.Cecil.Pdb.dll,#1

Network

N/A

Files

N/A

Analysis: behavioral6

Detonation Overview

Submitted

2024-11-08 08:47

Reported

2024-11-08 08:50

Platform

win10v2004-20241007-en

Max time kernel

93s

Max time network

139s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Mono.Cecil.Pdb.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Kurome.Builder\Mono.Cecil.Pdb.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 73.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

N/A