Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2024, 09:32 UTC

General

  • Target

    JaffaCakes118_a06ee1723dc0aa2b257b726285b2c22b5da68324e61de922c0c6227641f3f8f5.exe

  • Size

    1.3MB

  • MD5

    4ad809c14e6fe0754261e40918631bdd

  • SHA1

    6906920b61fe65bace9f610eeefcf4121d257325

  • SHA256

    a06ee1723dc0aa2b257b726285b2c22b5da68324e61de922c0c6227641f3f8f5

  • SHA512

    3e907d35bb970b00a21bbcab2a9ab3987151078131434a0dfc86d3e6b33036411069bb31414492afafc66346aff632039a21e8f0c9bae62af6d4146e07c61ba6

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 17 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 16 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 15 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a06ee1723dc0aa2b257b726285b2c22b5da68324e61de922c0c6227641f3f8f5.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a06ee1723dc0aa2b257b726285b2c22b5da68324e61de922c0c6227641f3f8f5.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4436
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3844
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:920
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3056
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\SKB\SppExtComObj.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3588
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Defender\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4676
          • C:\Windows\SKB\SppExtComObj.exe
            "C:\Windows\SKB\SppExtComObj.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3360
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\D2zd9hDRps.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4108
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:4852
                • C:\Windows\SKB\SppExtComObj.exe
                  "C:\Windows\SKB\SppExtComObj.exe"
                  7⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1940
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HiXkD60p2N.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2280
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:740
                      • C:\Windows\SKB\SppExtComObj.exe
                        "C:\Windows\SKB\SppExtComObj.exe"
                        9⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3968
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1CKPPXbanu.bat"
                          10⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1868
                          • C:\Windows\system32\w32tm.exe
                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                            11⤵
                              PID:1796
                            • C:\Windows\SKB\SppExtComObj.exe
                              "C:\Windows\SKB\SppExtComObj.exe"
                              11⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:1236
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Iu2jWrKESR.bat"
                                12⤵
                                • Suspicious use of WriteProcessMemory
                                PID:3312
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  13⤵
                                    PID:2940
                                  • C:\Windows\SKB\SppExtComObj.exe
                                    "C:\Windows\SKB\SppExtComObj.exe"
                                    13⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:800
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\z9xTb8lNHs.bat"
                                      14⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:2596
                                      • C:\Windows\system32\w32tm.exe
                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                        15⤵
                                          PID:1432
                                        • C:\Windows\SKB\SppExtComObj.exe
                                          "C:\Windows\SKB\SppExtComObj.exe"
                                          15⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Modifies registry class
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:3496
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\53OVnhiNRT.bat"
                                            16⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:1696
                                            • C:\Windows\system32\w32tm.exe
                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                              17⤵
                                                PID:1960
                                              • C:\Windows\SKB\SppExtComObj.exe
                                                "C:\Windows\SKB\SppExtComObj.exe"
                                                17⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of WriteProcessMemory
                                                PID:4668
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AvSbArq942.bat"
                                                  18⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:4424
                                                  • C:\Windows\system32\w32tm.exe
                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                    19⤵
                                                      PID:3848
                                                    • C:\Windows\SKB\SppExtComObj.exe
                                                      "C:\Windows\SKB\SppExtComObj.exe"
                                                      19⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:1816
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hGj9C4kLBH.bat"
                                                        20⤵
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:2392
                                                        • C:\Windows\system32\w32tm.exe
                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          21⤵
                                                            PID:4528
                                                          • C:\Windows\SKB\SppExtComObj.exe
                                                            "C:\Windows\SKB\SppExtComObj.exe"
                                                            21⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:4992
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HiXkD60p2N.bat"
                                                              22⤵
                                                                PID:2200
                                                                • C:\Windows\system32\w32tm.exe
                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                  23⤵
                                                                    PID:400
                                                                  • C:\Windows\SKB\SppExtComObj.exe
                                                                    "C:\Windows\SKB\SppExtComObj.exe"
                                                                    23⤵
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • Modifies registry class
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:1448
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mJIFszAWFu.bat"
                                                                      24⤵
                                                                        PID:2808
                                                                        • C:\Windows\system32\w32tm.exe
                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                          25⤵
                                                                            PID:3508
                                                                          • C:\Windows\SKB\SppExtComObj.exe
                                                                            "C:\Windows\SKB\SppExtComObj.exe"
                                                                            25⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:4472
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bYn7JG6kRk.bat"
                                                                              26⤵
                                                                                PID:1564
                                                                                • C:\Windows\system32\w32tm.exe
                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                  27⤵
                                                                                    PID:1648
                                                                                  • C:\Windows\SKB\SppExtComObj.exe
                                                                                    "C:\Windows\SKB\SppExtComObj.exe"
                                                                                    27⤵
                                                                                    • Checks computer location settings
                                                                                    • Executes dropped EXE
                                                                                    • Modifies registry class
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:3844
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mJIFszAWFu.bat"
                                                                                      28⤵
                                                                                        PID:2768
                                                                                        • C:\Windows\system32\w32tm.exe
                                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                          29⤵
                                                                                            PID:3684
                                                                                          • C:\Windows\SKB\SppExtComObj.exe
                                                                                            "C:\Windows\SKB\SppExtComObj.exe"
                                                                                            29⤵
                                                                                            • Checks computer location settings
                                                                                            • Executes dropped EXE
                                                                                            • Modifies registry class
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:1952
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kNGCBu7dv8.bat"
                                                                                              30⤵
                                                                                                PID:4672
                                                                                                • C:\Windows\system32\w32tm.exe
                                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                  31⤵
                                                                                                    PID:636
                                                                                                  • C:\Windows\SKB\SppExtComObj.exe
                                                                                                    "C:\Windows\SKB\SppExtComObj.exe"
                                                                                                    31⤵
                                                                                                    • Checks computer location settings
                                                                                                    • Executes dropped EXE
                                                                                                    • Modifies registry class
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:4612
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Ph8sa6VtQm.bat"
                                                                                                      32⤵
                                                                                                        PID:4648
                                                                                                        • C:\Windows\system32\w32tm.exe
                                                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                          33⤵
                                                                                                            PID:4068
                                                                                                          • C:\Windows\SKB\SppExtComObj.exe
                                                                                                            "C:\Windows\SKB\SppExtComObj.exe"
                                                                                                            33⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:3068
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Windows\SKB\SppExtComObj.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4072
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\SKB\SppExtComObj.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1480
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 14 /tr "'C:\Windows\SKB\SppExtComObj.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2892
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Defender\csrss.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:692
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4264
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Defender\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:60

                                          Network

                                          • flag-us
                                            DNS
                                            28.118.140.52.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            28.118.140.52.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            134.32.126.40.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            134.32.126.40.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            95.221.229.192.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            95.221.229.192.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            232.168.11.51.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            232.168.11.51.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            raw.githubusercontent.com
                                            SppExtComObj.exe
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            raw.githubusercontent.com
                                            IN A
                                            Response
                                            raw.githubusercontent.com
                                            IN A
                                            185.199.108.133
                                            raw.githubusercontent.com
                                            IN A
                                            185.199.110.133
                                            raw.githubusercontent.com
                                            IN A
                                            185.199.111.133
                                            raw.githubusercontent.com
                                            IN A
                                            185.199.109.133
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            SppExtComObj.exe
                                            Remote address:
                                            185.199.108.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: DA94:39D8B8:441DE8:596B25:6766E7B4
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 09:33:03 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lon420117-LON
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734859983.267629,VS0,VE1
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 2a3b154bb27e5fb806c5d573f30664271dfa17b2
                                            Expires: Sun, 22 Dec 2024 09:38:03 GMT
                                            Source-Age: 213
                                          • flag-us
                                            DNS
                                            133.108.199.185.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            133.108.199.185.in-addr.arpa
                                            IN PTR
                                            Response
                                            133.108.199.185.in-addr.arpa
                                            IN PTR
                                            cdn-185-199-108-133githubcom
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            SppExtComObj.exe
                                            Remote address:
                                            185.199.108.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: DA94:39D8B8:441DE8:596B25:6766E7B4
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 09:33:16 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lon4228-LON
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734859997.796183,VS0,VE1
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 4a17dde1d8a78748eb83c8111a0e1f27d5ccd5d3
                                            Expires: Sun, 22 Dec 2024 09:38:16 GMT
                                            Source-Age: 227
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            SppExtComObj.exe
                                            Remote address:
                                            185.199.108.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: DA94:39D8B8:441DE8:596B25:6766E7B4
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 09:33:24 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lon4252-LON
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734860004.477303,VS0,VE1
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 43a0d7738540ff3555dfe403da449b7852287fa1
                                            Expires: Sun, 22 Dec 2024 09:38:24 GMT
                                            Source-Age: 235
                                          • flag-us
                                            DNS
                                            53.210.109.20.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            53.210.109.20.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            171.39.242.20.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            171.39.242.20.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            SppExtComObj.exe
                                            Remote address:
                                            185.199.108.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 09:33:39 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600094-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 2
                                            X-Timer: S1734860019.367973,VS0,VE0
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: a350f090ffa19baaaaaeac2bb68f4b7785c32864
                                            Expires: Sun, 22 Dec 2024 09:38:39 GMT
                                            Source-Age: 240
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            SppExtComObj.exe
                                            Remote address:
                                            185.199.108.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: DA94:39D8B8:441DE8:596B25:6766E7B4
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 09:33:54 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lon420128-LON
                                            X-Cache: HIT
                                            X-Cache-Hits: 2
                                            X-Timer: S1734860034.390849,VS0,VE0
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: ad3cbbe682e0fd944463558eacd9ffee1a17de85
                                            Expires: Sun, 22 Dec 2024 09:38:54 GMT
                                            Source-Age: 264
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            SppExtComObj.exe
                                            Remote address:
                                            185.199.108.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 09:34:02 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600082-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734860043.562389,VS0,VE1
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: d801fc96986f3e061e2f80ca69d46d06070d63a4
                                            Expires: Sun, 22 Dec 2024 09:39:02 GMT
                                            Source-Age: 263
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            SppExtComObj.exe
                                            Remote address:
                                            185.199.108.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 09:34:13 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600057-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734860054.665576,VS0,VE1
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 20bddbc80eb99a9679ff24ea880d2f422104f993
                                            Expires: Sun, 22 Dec 2024 09:39:13 GMT
                                            Source-Age: 274
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            SppExtComObj.exe
                                            Remote address:
                                            185.199.108.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36 Edg/96.0.1054.29
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 09:34:25 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600081-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734860066.930426,VS0,VE3
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 7f47d2290e17a9fdadf0fc2c34d11d02592e4c93
                                            Expires: Sun, 22 Dec 2024 09:39:25 GMT
                                            Source-Age: 287
                                          • flag-us
                                            DNS
                                            14.227.111.52.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            14.227.111.52.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            SppExtComObj.exe
                                            Remote address:
                                            185.199.108.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: DA94:39D8B8:441DE8:596B25:6766E7B4
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 09:34:32 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lon4220-LON
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734860073.799154,VS0,VE2
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 1f8c8b8a9fd63e11eba27e6a2004717d2b621de4
                                            Expires: Sun, 22 Dec 2024 09:39:32 GMT
                                            Source-Age: 1
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            SppExtComObj.exe
                                            Remote address:
                                            185.199.108.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 09:34:42 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600021-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734860083.585683,VS0,VE1
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 01599912d05af99c3c5ec815a0406165e6040563
                                            Expires: Sun, 22 Dec 2024 09:39:42 GMT
                                            Source-Age: 3
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            SppExtComObj.exe
                                            Remote address:
                                            185.199.108.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 09:34:55 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600073-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734860095.309248,VS0,VE1
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: d0482555dc169cf73352c996ea6e81dc2f0fe1e9
                                            Expires: Sun, 22 Dec 2024 09:39:55 GMT
                                            Source-Age: 16
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            SppExtComObj.exe
                                            Remote address:
                                            185.199.108.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 09:35:01 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600042-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734860102.580689,VS0,VE1
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 684ce3dc900e9171cb3f30707c55ae9e96ff97c5
                                            Expires: Sun, 22 Dec 2024 09:40:01 GMT
                                            Source-Age: 22
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            SppExtComObj.exe
                                            Remote address:
                                            185.199.108.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: DA94:39D8B8:441DE8:596B25:6766E7B4
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 09:35:09 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lon420102-LON
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734860110.531989,VS0,VE1
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: a7c075d6cf5b3848a14844250019b011f63aeb4a
                                            Expires: Sun, 22 Dec 2024 09:40:09 GMT
                                            Source-Age: 38
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            SppExtComObj.exe
                                            Remote address:
                                            185.199.108.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 09:35:17 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600067-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734860118.510456,VS0,VE1
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 92e12e86d0c22b5ffc66a23ebc7942c9d71daafb
                                            Expires: Sun, 22 Dec 2024 09:40:17 GMT
                                            Source-Age: 38
                                          • 185.199.108.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            SppExtComObj.exe
                                            897 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.108.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            SppExtComObj.exe
                                            897 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.108.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            SppExtComObj.exe
                                            914 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.108.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            SppExtComObj.exe
                                            861 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.108.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            SppExtComObj.exe
                                            861 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.108.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            SppExtComObj.exe
                                            914 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.108.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            SppExtComObj.exe
                                            849 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.108.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            SppExtComObj.exe
                                            914 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.108.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            SppExtComObj.exe
                                            914 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.108.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            SppExtComObj.exe
                                            914 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.108.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            SppExtComObj.exe
                                            897 B
                                            5.1kB
                                            8
                                            10

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.108.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            SppExtComObj.exe
                                            896 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.108.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            SppExtComObj.exe
                                            914 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.108.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            SppExtComObj.exe
                                            914 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 8.8.8.8:53
                                            28.118.140.52.in-addr.arpa
                                            dns
                                            72 B
                                            158 B
                                            1
                                            1

                                            DNS Request

                                            28.118.140.52.in-addr.arpa

                                          • 8.8.8.8:53
                                            134.32.126.40.in-addr.arpa
                                            dns
                                            72 B
                                            158 B
                                            1
                                            1

                                            DNS Request

                                            134.32.126.40.in-addr.arpa

                                          • 8.8.8.8:53
                                            95.221.229.192.in-addr.arpa
                                            dns
                                            73 B
                                            144 B
                                            1
                                            1

                                            DNS Request

                                            95.221.229.192.in-addr.arpa

                                          • 8.8.8.8:53
                                            232.168.11.51.in-addr.arpa
                                            dns
                                            72 B
                                            158 B
                                            1
                                            1

                                            DNS Request

                                            232.168.11.51.in-addr.arpa

                                          • 8.8.8.8:53
                                            raw.githubusercontent.com
                                            dns
                                            SppExtComObj.exe
                                            71 B
                                            135 B
                                            1
                                            1

                                            DNS Request

                                            raw.githubusercontent.com

                                            DNS Response

                                            185.199.108.133
                                            185.199.110.133
                                            185.199.111.133
                                            185.199.109.133

                                          • 8.8.8.8:53
                                            133.108.199.185.in-addr.arpa
                                            dns
                                            74 B
                                            118 B
                                            1
                                            1

                                            DNS Request

                                            133.108.199.185.in-addr.arpa

                                          • 8.8.8.8:53
                                            53.210.109.20.in-addr.arpa
                                            dns
                                            72 B
                                            158 B
                                            1
                                            1

                                            DNS Request

                                            53.210.109.20.in-addr.arpa

                                          • 8.8.8.8:53
                                            171.39.242.20.in-addr.arpa
                                            dns
                                            72 B
                                            158 B
                                            1
                                            1

                                            DNS Request

                                            171.39.242.20.in-addr.arpa

                                          • 8.8.8.8:53
                                            14.227.111.52.in-addr.arpa
                                            dns
                                            72 B
                                            158 B
                                            1
                                            1

                                            DNS Request

                                            14.227.111.52.in-addr.arpa

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SppExtComObj.exe.log

                                            Filesize

                                            1KB

                                            MD5

                                            baf55b95da4a601229647f25dad12878

                                            SHA1

                                            abc16954ebfd213733c4493fc1910164d825cac8

                                            SHA256

                                            ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

                                            SHA512

                                            24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                            Filesize

                                            2KB

                                            MD5

                                            d85ba6ff808d9e5444a4b369f5bc2730

                                            SHA1

                                            31aa9d96590fff6981b315e0b391b575e4c0804a

                                            SHA256

                                            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                            SHA512

                                            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            77d622bb1a5b250869a3238b9bc1402b

                                            SHA1

                                            d47f4003c2554b9dfc4c16f22460b331886b191b

                                            SHA256

                                            f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                            SHA512

                                            d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                          • C:\Users\Admin\AppData\Local\Temp\1CKPPXbanu.bat

                                            Filesize

                                            196B

                                            MD5

                                            ba6150b8b46580fcd1b64b659f79b95b

                                            SHA1

                                            cf920f739830cecf383aeb520950174d944a84d3

                                            SHA256

                                            2eeb2f55e13c069a91091bf20578be01f8d7edc4fb105349455a5e7a513c5b05

                                            SHA512

                                            2ed0530ac3930966a12bca16e1c771d32c510bb2423e1c0584578dcda522b5f5ea4aa7e414e97c1eaedd7d2672c94658c21e38f0c0d2c2dee86adc9cf417b439

                                          • C:\Users\Admin\AppData\Local\Temp\53OVnhiNRT.bat

                                            Filesize

                                            196B

                                            MD5

                                            266fcf6a89dfaa75f85c98d42f6f6489

                                            SHA1

                                            9bcb5fcd71a83ea8b4440f7b264c0cef6e080006

                                            SHA256

                                            386cbaa6b181de5e5dd56536da3fce6206d9b755b3c8b763c277fa261e5b5ef1

                                            SHA512

                                            1137f45de68ed2ea6321f0768eabbdebcdc832f4ea0a110c42c0fddb3999da9f43df777d88df1d4ab1e26c62bfc0adf7fa6b4e05ab919d6607c24c6e766deec1

                                          • C:\Users\Admin\AppData\Local\Temp\AvSbArq942.bat

                                            Filesize

                                            196B

                                            MD5

                                            4d216efed92a6921991063301c333bc9

                                            SHA1

                                            adf8ba6462b2521fbc6f595e4cc7bcc6f8137031

                                            SHA256

                                            b8bc1d8396062e41f80b73f75aad0fbbc6668f1faaeb304a2104c37e7ee8541d

                                            SHA512

                                            3b1f023396e2deedc7a75b478199b896121a44fce50cb71ae2f4767171e6daa2f40bb8d05e1dfde3029a957f01157900b44d79a4be5bcc10b2790ac9185ec79e

                                          • C:\Users\Admin\AppData\Local\Temp\D2zd9hDRps.bat

                                            Filesize

                                            196B

                                            MD5

                                            27985bb9dda78f3292dcfaf3b84aaf3e

                                            SHA1

                                            377678fee8d0c816cc8fb42a7e3de31da5dfb101

                                            SHA256

                                            ddc2dd181058d0178bf477b2ee31c92c0781f18b5ce22c266f80cf00a3f1fc64

                                            SHA512

                                            26fd381f2e9df7ad3494c4b7bc55fb815e8b0bacda3814c3845eeb1337225a2f97533da2ff5123e785e42adf44deef334d531d530eed888590a1c2374dfa18b9

                                          • C:\Users\Admin\AppData\Local\Temp\HiXkD60p2N.bat

                                            Filesize

                                            196B

                                            MD5

                                            4fab33c9f86ad72b5889292fc8b0de20

                                            SHA1

                                            2d6e2c055aa1a0f8ef5dfbd28027f3da41777399

                                            SHA256

                                            f1d9e24c2cec04cea68e307064b6cb22b2509d3cde276aa81d1f6e5e643aeea2

                                            SHA512

                                            f7b4726d7a5e196734094c3b8a98442b3ccb9aa9316c72233b35e196e53dc5cf255ef864f078dc8a0be435e066bd1e2ad1fe69669733fd0d27d8d1341d8a287d

                                          • C:\Users\Admin\AppData\Local\Temp\Iu2jWrKESR.bat

                                            Filesize

                                            196B

                                            MD5

                                            38c4361ab9bdd98d47c0fcc0409e21a8

                                            SHA1

                                            3ba5db52de0f7d9452d5796afa3d99dfbd1e573b

                                            SHA256

                                            e4dfd3e7921c5a3a06f0db858b6b8fce972889232b6a799c646defc62cbb5eb8

                                            SHA512

                                            dbdf1e56f1583ed7db3a780610d5d585ce873b2396cf4f9d95bae711df856ce9841075e7b93111bbaf6b8cf98b55b9d39cecafd3702ca04fc1f1df3feef77a5b

                                          • C:\Users\Admin\AppData\Local\Temp\Ph8sa6VtQm.bat

                                            Filesize

                                            196B

                                            MD5

                                            4d36e8d2e90bfea0ffcd464ee5aafaf3

                                            SHA1

                                            fb3077689cf2b432126f008f686a3ebefdce88ff

                                            SHA256

                                            d73bc42810636b3c251e7cda3c4e2384e3e5fb89b1e38ec4c7eda65e5b39047b

                                            SHA512

                                            41753c44785b2d099a9751f6d9cd8f985df0d072700aea4bf9fcd6a9ccd16c05bf4dc0e5fa092056cf37f63c48433e1626cf9c1741bd744e4c7e33356cdec574

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_g1avchho.gmq.ps1

                                            Filesize

                                            60B

                                            MD5

                                            d17fe0a3f47be24a6453e9ef58c94641

                                            SHA1

                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                            SHA256

                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                            SHA512

                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                          • C:\Users\Admin\AppData\Local\Temp\bYn7JG6kRk.bat

                                            Filesize

                                            196B

                                            MD5

                                            44c832184663e27d40cdade7392492d2

                                            SHA1

                                            e846f46b6e5dc1c693c19a332700db9edc9fb698

                                            SHA256

                                            a0e26a5e945ff0835423729ce7f6ddae6167c2309916bb08d44ecbc21cff3f8e

                                            SHA512

                                            7aaf53993a76065e4a28808ce1e02844133fc361f7d950f93a639623a7b3bf78cafe252c76d0780179665a75489f514d8dc92d81ff5307df700337160e2b6b74

                                          • C:\Users\Admin\AppData\Local\Temp\hGj9C4kLBH.bat

                                            Filesize

                                            196B

                                            MD5

                                            a0a610a55c787355143504692004185e

                                            SHA1

                                            38af061657966f961d5892cc3237bef0dfa186a0

                                            SHA256

                                            e916470ade0ae3d725c42aa029e2789c198318af3d8cdca12ef14ba3ffc842d0

                                            SHA512

                                            fa58be39d16915b59dbf5a9fbda6d4fb8fc38664e2f02f1cefff468a3d7290fe05905bca0178e5fe7d2b3ad04909f46cbbbb8ae568f66f52b99bef64806e5115

                                          • C:\Users\Admin\AppData\Local\Temp\kNGCBu7dv8.bat

                                            Filesize

                                            196B

                                            MD5

                                            bbd8c9c00d5a8998391712e5437fb587

                                            SHA1

                                            360efc987380fdc978245c72cac98910f3fd2a61

                                            SHA256

                                            7b3556f1ddd2c3a1cf6c236f908852e0cff44a08f8a36cad1b1f8b9113bdc867

                                            SHA512

                                            ddaeba345b959ebc26d2f52f35b82cea8137a1fc65ddff7f6b30e0085a59015ef343fbc126d20906b9e5fec4b4504f0f272bc5c4f37bdb5bb008737316b9a454

                                          • C:\Users\Admin\AppData\Local\Temp\mJIFszAWFu.bat

                                            Filesize

                                            196B

                                            MD5

                                            69d0cc2fecfda8155ca1d37e4afdb76f

                                            SHA1

                                            d604d62b1f2f4beb45a59368fa4898ac6ed3607d

                                            SHA256

                                            6b5f171d23271a7f8d4ea6d37f15ad2b9af30e8eca8837cc4d5f6c04efe8e81a

                                            SHA512

                                            93287f5e0531ad31d56f2b7459fdbc2081dfb65c680bd0b1acac51bb8302691eaa528380a576820c21a190036a589759a84e82c96eef5d13dd13cdbf6376d835

                                          • C:\Users\Admin\AppData\Local\Temp\z9xTb8lNHs.bat

                                            Filesize

                                            196B

                                            MD5

                                            a10196ea4169e1def056790d8be308d5

                                            SHA1

                                            dfa09ece15305b06f0232ed1c980056120b200e5

                                            SHA256

                                            74b47fd913106564137358983e3c3b87a1f5c4d02c56f13cf1337796113d2e1e

                                            SHA512

                                            ef1fd2d9319bcbdbe44c74d485f91bb1c08e9b5c37a57dab3e31d5c36d57d96a63ef620c578e78dbd2e372dc70ee6369b789f2168262050e8d64858423c19b82

                                          • C:\providercommon\1zu9dW.bat

                                            Filesize

                                            36B

                                            MD5

                                            6783c3ee07c7d151ceac57f1f9c8bed7

                                            SHA1

                                            17468f98f95bf504cc1f83c49e49a78526b3ea03

                                            SHA256

                                            8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                            SHA512

                                            c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                          • C:\providercommon\DllCommonsvc.exe

                                            Filesize

                                            1.0MB

                                            MD5

                                            bd31e94b4143c4ce49c17d3af46bcad0

                                            SHA1

                                            f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                            SHA256

                                            b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                            SHA512

                                            f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                          • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                            Filesize

                                            197B

                                            MD5

                                            8088241160261560a02c84025d107592

                                            SHA1

                                            083121f7027557570994c9fc211df61730455bb5

                                            SHA256

                                            2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                            SHA512

                                            20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                          • memory/920-16-0x0000000003050000-0x000000000305C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/920-12-0x00007FFA2EC83000-0x00007FFA2EC85000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/920-13-0x0000000000E10000-0x0000000000F20000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/920-14-0x0000000003040000-0x0000000003052000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/920-15-0x0000000003060000-0x000000000306C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/920-17-0x0000000003070000-0x000000000307C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/1816-117-0x00000000026C0000-0x00000000026D2000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/1940-77-0x0000000002720000-0x0000000002732000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/1940-82-0x000000001BF90000-0x000000001C139000-memory.dmp

                                            Filesize

                                            1.7MB

                                          • memory/3360-61-0x000000001B3C0000-0x000000001B3D2000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/3844-143-0x000000001B440000-0x000000001B452000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/3968-89-0x000000001C470000-0x000000001C619000-memory.dmp

                                            Filesize

                                            1.7MB

                                          • memory/4668-110-0x0000000002810000-0x0000000002822000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/4676-42-0x000002ADB1CF0000-0x000002ADB1D12000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/4992-124-0x0000000000CA0000-0x0000000000CB2000-memory.dmp

                                            Filesize

                                            72KB

                                          We care about your privacy.

                                          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.