| File name: | RIP_YOUR_PC_LOL.exe |
| Full analysis: | https://app.any.run/tasks/f1c48679-9f01-4aab-9ee4-c6019c6ed37e |
| Verdict: | Malicious activity |
| Threats: | A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices. |
| Analysis date: | January 14, 2022, 22:56:11 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 52867174362410D63215D78E708103EA |
| SHA1: | 7AE4E1048E4463A4201BDEAF224C5B6FACE681BF |
| SHA256: | 37D8E1CE3B6E6488942717AA78CB54785EDC985143BCC8D9BA9F42D73A3DBD7A |
| SSDEEP: | 393216:HJLgf7BPkdKzrZciLxv8naSNtPr5rn57M84UTB9xO5/VWvJKJPkwdnfZ4y5SDkF/:poBPQwxMR7pn5qUTB9xOFVWvJKJPkwdd |
| .exe | | | Win32 Executable Microsoft Visual Basic 6 (51) |
|---|---|---|
| .exe | | | InstallShield setup (26.7) |
| .exe | | | UPX compressed Win32 Executable (16.8) |
| .exe | | | Win32 Executable (generic) (2.8) |
| .exe | | | Generic Win/DOS Executable (1.2) |
| AssemblyVersion: | 14.5.48.86 |
|---|---|
| ProductVersion: | 14.5.48.86 |
| ProductName: | open |
| OriginalFileName: | foampounding.exe |
| LegalCopyright: | emerge © brutal |
| InternalName: | foampounding.exe |
| FileVersion: | 14.5.48.86 |
| FileDescription: | earfalserust |
| CompanyName: | brawler |
| CharacterSet: | Unicode |
| LanguageCode: | Neutral |
| FileSubtype: | - |
| ObjectFileType: | Executable application |
| FileOS: | Win32 |
| FileFlags: | (none) |
| FileFlagsMask: | 0x003f |
| ProductVersionNumber: | 14.5.48.86 |
| FileVersionNumber: | 14.5.48.86 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 4 |
| ImageVersion: | - |
| OSVersion: | 4 |
| EntryPoint: | 0x168b4ae |
| UninitializedDataSize: | - |
| InitializedDataSize: | 2048 |
| CodeSize: | 23631360 |
| LinkerVersion: | 11 |
| PEType: | PE32 |
| TimeStamp: | 2021:12:11 22:08:53+01:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 11-Dec-2021 21:08:53 |
| CompanyName: | brawler |
| FileDescription: | earfalserust |
| FileVersion: | 14.5.48.86 |
| InternalName: | foampounding.exe |
| LegalCopyright: | emerge © brutal |
| OriginalFilename: | foampounding.exe |
| ProductName: | open |
| ProductVersion: | 14.5.48.86 |
| Assembly Version: | 14.5.48.86 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000080 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 3 |
| Time date stamp: | 11-Dec-2021 21:08:53 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00002000 | 0x016894B4 | 0x01689600 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.78918 |
.rsrc | 0x0168C000 | 0x00000598 | 0x00000600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.08611 |
.reloc | 0x0168E000 | 0x0000000C | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.11837 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.00112 | 490 | UNKNOWN | UNKNOWN | RT_MANIFEST |
mscoree.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 308 | C:\Windows\System32\TXPlatforn.exe -auto | C:\Windows\System32\TXPlatforn.exe | — | services.exe | |||||||||||
User: SYSTEM Integrity Level: SYSTEM Exit code: 0 Modules
| |||||||||||||||
| 348 | netsh ipsec static add filter filterlist=Filter1 srcaddr=any dstaddr=Me dstport=445 protocol=UDP | C:\Windows\system32\netsh.exe | — | 22.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 472 | "C:\Program Files\Internet Explorer\iexplore.exe" http://localhost:12231/ | C:\Program Files\Internet Explorer\iexplore.exe | gay.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 580 | netsh ipsec static add filteraction name=FilteraAtion1 action=block | C:\Windows\system32\netsh.exe | — | 22.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 664 | C:\Windows\System32\svchost.exe -k "������������ģ��" | C:\Windows\System32\svchost.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 772 | "C:\Users\admin\AppData\Roaming\0fd7de5367376231a788872005d7ed4f.exe" | C:\Users\admin\AppData\Roaming\0fd7de5367376231a788872005d7ed4f.exe | 0fd7de5367376231a788872005d7ed4f.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 904 | "C:\Users\admin\AppData\Roaming\gay.exe" | C:\Users\admin\AppData\Roaming\gay.exe | healastounding.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 904 | netsh ipsec static add filterlist name=Filter1 | C:\Windows\system32\netsh.exe | — | 22.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1040 | "C:\Users\admin\AppData\Roaming\___11.19.exe" | C:\Users\admin\AppData\Roaming\___11.19.exe | — | RIP_YOUR_PC_LOL.exe | |||||||||||
User: admin Company: Osama bin Mohammed bin Awad bin Laden Integrity Level: MEDIUM Description: ???? Exit code: 3221226540 Version: 8.9.8.9 Modules
| |||||||||||||||
| 1320 | schtasks.exe /create /tn "test" /sc minute /mo 14 /tr "'C:\Users\admin\AppData\Roaming\0fd7de5367376231a788872005d7ed4f\test.exe'" /f | C:\Windows\system32\schtasks.exe | — | wmiprvse.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (3416) RIP_YOUR_PC_LOL.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3416) RIP_YOUR_PC_LOL.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3416) RIP_YOUR_PC_LOL.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3416) RIP_YOUR_PC_LOL.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3076) healastounding.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3076) healastounding.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3076) healastounding.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3076) healastounding.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (904) gay.exe | Key: | HKEY_CURRENT_USER |
| Operation: | write | Name: | di |
Value: ! | |||
| (PID) Process: | (3356) 8f1c8b40c7be588389a8d382040b23bb.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3416 | RIP_YOUR_PC_LOL.exe | C:\Users\admin\AppData\Roaming\Pluto Panel.exe | executable | |
MD5:ED666BF7F4A0766FCEC0E9C8074B089B | SHA256:D1330D349BFBD3AEA545FA08EF63339E82A3F4D04E27216ECC4C45304F079264 | |||
| 3076 | healastounding.exe | C:\Users\admin\AppData\Roaming\gay.exe | executable | |
MD5:8EEDC01C11B251481DEC59E5308DCCC3 | SHA256:0184983A425FEF55D46B7E0EB729A245730EE26414EBE4B155917C0124A19C2D | |||
| 3416 | RIP_YOUR_PC_LOL.exe | C:\Users\admin\AppData\Roaming\22.exe | executable | |
MD5:DBF9DAA1707B1037E28A6E0694B33A4B | SHA256:A604A3FF78644533FAC5EE9F198E9C5F2FA1AE2A5828186367A9E00935CFF6B6 | |||
| 1908 | Opus.exe | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\run.dat | binary | |
MD5:— | SHA256:— | |||
| 3416 | RIP_YOUR_PC_LOL.exe | C:\Users\admin\AppData\Roaming\0fd7de5367376231a788872005d7ed4f.exe | executable | |
MD5:0FD7DE5367376231A788872005D7ED4F | SHA256:9083992637E90E412E6F4E77331EB69EE8DB821C54BBC38533E0F889CC4CA9DD | |||
| 3416 | RIP_YOUR_PC_LOL.exe | C:\Users\admin\AppData\Roaming\healastounding.exe | executable | |
MD5:6FB798F1090448CE26299C2B35ACF876 | SHA256:B4F86FF48C5F6B01E0AD4543FB78E0435E81F3EC2AACA89866862157C0DACF4F | |||
| 2368 | Pluto Panel.exe | C:\Users\admin\AppData\Roaming\pid.txt | text | |
MD5:466ACCBAC9A66B805BA50E42AD715740 | SHA256:50F33355A7EE09448ECD0E3A6C4FF600E0E15F9545BE01108DC163B36ADF141D | |||
| 1420 | 4.exe | C:\Users\admin\AppData\Roaming\3.exe | executable | |
MD5:748A4BEA8C0624A4C7A69F67263E0839 | SHA256:220D8F8FF82D413C81BD02DFA001E1C478E8FBEA44BAD24F21B3A5284E15632E | |||
| 3076 | healastounding.exe | C:\Users\admin\AppData\Roaming\a.exe | executable | |
MD5:52CFD35F337CA837D31DF0A95CE2A55E | SHA256:5975E737584DDF2601C02E5918A79DAD7531DF0E13DCA922F0525F66BEC4B448 | |||
| 3356 | 8f1c8b40c7be588389a8d382040b23bb.exe | C:\Users\admin\AppData\Local\Temp\FFDvbcrdfqs.exe | executable | |
MD5:78D40B12FFC837843FBF4DE2164002F6 | SHA256:308A15DABDC4CE6B96DD54954A351D304F1FCB59E8C93221BA1C412BCDFD1C44 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2884 | 8f1c8b40c7be588389a8d382040b23bb.exe | GET | — | 194.180.174.53:80 | http://194.180.174.53/brikitiki | DE | — | — | malicious |
2092 | gay.exe | GET | 200 | 92.63.107.12:80 | http://92.63.107.12/Poll/Phptrack8request/6python7Uploads/Lowtemporarypoll0/public/Proton/0Default/videoflower.php?APDPxlzzzJEssid0YiAYZ1ClAH=t7cM53DwaT&b413d86971fc42e54d3bceda7c50d277=1f7739aa83855b8bf4bc8f883f476c45&a9982c9e61949b25e6414a873df9509b=AN1kzYilDOyMmM5QDZ3AzN2MTMzYGNmZTM4IWYxMjNzYmM3MmZzE2M&APDPxlzzzJEssid0YiAYZ1ClAH=t7cM53DwaT | RU | text | 2.11 Kb | malicious |
2092 | gay.exe | GET | 200 | 92.63.107.12:80 | http://92.63.107.12/Poll/Phptrack8request/6python7Uploads/Lowtemporarypoll0/public/Proton/0Default/videoflower.php?APDPxlzzzJEssid0YiAYZ1ClAH=t7cM53DwaT&7f528aaf1d498f0ae42141d6f48dd180=ANlFjZjlTZxQTN4gDNzITYxgjNyUWO1EDNwgzYldzMxQTOyMzM3cjY5gjM2QDN0kjMxIjNxQjM&a9982c9e61949b25e6414a873df9509b=ANjBTMkVmNyUDM2UWZ0QmMidTO2M2M1MDOycTZkBzY3MjY5EzN3ImZ&ad34a48e6d8df718784ff1d749fc05c5=0VfiIiOiEDNhJjMjJDNihDOlZ2Y2ImY5EzY2YmM5EGOzgzY0EGZiwiIyUjNxMWZ4gjZlRWO2IzMkVTOwQmNlZDNkVTM1YjYhNzYldTZxYGOhJiOiYjN2ETZ3ADOllzN3UWMmFjZzIjZjFTZ5UmMlhTYzMGZiwiIhVTYhdDZzEDNycDO4gTYzQDNmFmYjJDM1kTNlJDZ2ITYiF2N0EDOzIiOiQWNiFWM3UTO3ITY5UmZ2kTOjZmNwI2MyMzN2ATN0YTYis3W | RU | text | 2.11 Kb | malicious |
2092 | gay.exe | GET | 200 | 92.63.107.12:80 | http://92.63.107.12/Poll/Phptrack8request/6python7Uploads/Lowtemporarypoll0/public/Proton/0Default/videoflower.php?APDPxlzzzJEssid0YiAYZ1ClAH=t7cM53DwaT&7f528aaf1d498f0ae42141d6f48dd180=ANlFjZjlTZxQTN4gDNzITYxgjNyUWO1EDNwgzYldzMxQTOyMzM3cjY5gjM2QDN0kjMxIjNxQjM&a9982c9e61949b25e6414a873df9509b=ANjBTMkVmNyUDM2UWZ0QmMidTO2M2M1MDOycTZkBzY3MjY5EzN3ImZ&ad34a48e6d8df718784ff1d749fc05c5=0VfiIiOiEDNhJjMjJDNihDOlZ2Y2ImY5EzY2YmM5EGOzgzY0EGZiwiIyUjNxMWZ4gjZlRWO2IzMkVTOwQmNlZDNkVTM1YjYhNzYldTZxYGOhJiOiYjN2ETZ3ADOllzN3UWMmFjZzIjZjFTZ5UmMlhTYzMGZiwiIhVTYhdDZzEDNycDO4gTYzQDNmFmYjJDM1kTNlJDZ2ITYiF2N0EDOzIiOiQWNiFWM3UTO3ITY5UmZ2kTOjZmNwI2MyMzN2ATN0YTYis3W | RU | text | 2.11 Kb | malicious |
2092 | gay.exe | GET | 200 | 92.63.107.12:80 | http://92.63.107.12/Poll/Phptrack8request/6python7Uploads/Lowtemporarypoll0/public/Proton/0Default/videoflower.php?APDPxlzzzJEssid0YiAYZ1ClAH=t7cM53DwaT&7f528aaf1d498f0ae42141d6f48dd180=ANlFjZjlTZxQTN4gDNzITYxgjNyUWO1EDNwgzYldzMxQTOyMzM3cjY5gjM2QDN0kjMxIjNxQjM&a9982c9e61949b25e6414a873df9509b=ANjBTMkVmNyUDM2UWZ0QmMidTO2M2M1MDOycTZkBzY3MjY5EzN3ImZ&179e5ef963d7209557ce6d2e775acbf9=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 | RU | text | 2.11 Kb | malicious |
2092 | gay.exe | GET | 200 | 92.63.107.12:80 | http://92.63.107.12/Poll/Phptrack8request/6python7Uploads/Lowtemporarypoll0/public/Proton/0Default/videoflower.php?APDPxlzzzJEssid0YiAYZ1ClAH=t7cM53DwaT&7f528aaf1d498f0ae42141d6f48dd180=ANlFjZjlTZxQTN4gDNzITYxgjNyUWO1EDNwgzYldzMxQTOyMzM3cjY5gjM2QDN0kjMxIjNxQjM&a9982c9e61949b25e6414a873df9509b=ANjBTMkVmNyUDM2UWZ0QmMidTO2M2M1MDOycTZkBzY3MjY5EzN3ImZ&179e5ef963d7209557ce6d2e775acbf9=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 | RU | text | 2.11 Kb | malicious |
2092 | gay.exe | GET | 200 | 92.63.107.12:80 | http://92.63.107.12/Poll/Phptrack8request/6python7Uploads/Lowtemporarypoll0/public/Proton/0Default/videoflower.php?APDPxlzzzJEssid0YiAYZ1ClAH=t7cM53DwaT&7f528aaf1d498f0ae42141d6f48dd180=ANlFjZjlTZxQTN4gDNzITYxgjNyUWO1EDNwgzYldzMxQTOyMzM3cjY5gjM2QDN0kjMxIjNxQjM&a9982c9e61949b25e6414a873df9509b=ANjBTMkVmNyUDM2UWZ0QmMidTO2M2M1MDOycTZkBzY3MjY5EzN3ImZ&d1e7b4781b4cb2b6aa49613b1a4398b8=d1nIhZWYmljZ4cjMkJDM2kDOwYGO2MjYlRDZxITZyQDZwQmYkRTYlVjZxIiOiYjN2ETZ3ADOllzN3UWMmFjZzIjZjFTZ5UmMlhTYzMGZiwiIhVTYhdDZzEDNycDO4gTYzQDNmFmYjJDM1kTNlJDZ2ITYiF2N0EDOzIiOiQWNiFWM3UTO3ITY5UmZ2kTOjZmNwI2MyMzN2ATN0YTYis3W&ad34a48e6d8df718784ff1d749fc05c5=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 | RU | text | 104 b | malicious |
2092 | gay.exe | GET | 200 | 92.63.107.12:80 | http://92.63.107.12/Poll/Phptrack8request/6python7Uploads/Lowtemporarypoll0/public/Proton/0Default/videoflower.php?APDPxlzzzJEssid0YiAYZ1ClAH=t7cM53DwaT&7f528aaf1d498f0ae42141d6f48dd180=ANlFjZjlTZxQTN4gDNzITYxgjNyUWO1EDNwgzYldzMxQTOyMzM3cjY5gjM2QDN0kjMxIjNxQjM&a9982c9e61949b25e6414a873df9509b=ANjBTMkVmNyUDM2UWZ0QmMidTO2M2M1MDOycTZkBzY3MjY5EzN3ImZ&d1e7b4781b4cb2b6aa49613b1a4398b8=d1nIhZWYmljZ4cjMkJDM2kDOwYGO2MjYlRDZxITZyQDZwQmYkRTYlVjZxIiOiYjN2ETZ3ADOllzN3UWMmFjZzIjZjFTZ5UmMlhTYzMGZiwiIhVTYhdDZzEDNycDO4gTYzQDNmFmYjJDM1kTNlJDZ2ITYiF2N0EDOzIiOiQWNiFWM3UTO3ITY5UmZ2kTOjZmNwI2MyMzN2ATN0YTYis3W&ad34a48e6d8df718784ff1d749fc05c5=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 | RU | text | 104 b | malicious |
2092 | gay.exe | GET | 200 | 92.63.107.12:80 | http://92.63.107.12/Poll/Phptrack8request/6python7Uploads/Lowtemporarypoll0/public/Proton/0Default/videoflower.php?APDPxlzzzJEssid0YiAYZ1ClAH=t7cM53DwaT&7f528aaf1d498f0ae42141d6f48dd180=ANlFjZjlTZxQTN4gDNzITYxgjNyUWO1EDNwgzYldzMxQTOyMzM3cjY5gjM2QDN0kjMxIjNxQjM&a9982c9e61949b25e6414a873df9509b=ANjBTMkVmNyUDM2UWZ0QmMidTO2M2M1MDOycTZkBzY3MjY5EzN3ImZ&d1e7b4781b4cb2b6aa49613b1a4398b8=d1nIhZWYmljZ4cjMkJDM2kDOwYGO2MjYlRDZxITZyQDZwQmYkRTYlVjZxIiOiYjN2ETZ3ADOllzN3UWMmFjZzIjZjFTZ5UmMlhTYzMGZiwiIhVTYhdDZzEDNycDO4gTYzQDNmFmYjJDM1kTNlJDZ2ITYiF2N0EDOzIiOiQWNiFWM3UTO3ITY5UmZ2kTOjZmNwI2MyMzN2ATN0YTYis3W&ad34a48e6d8df718784ff1d749fc05c5=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 | RU | text | 104 b | malicious |
2092 | gay.exe | GET | 200 | 92.63.107.12:80 | http://92.63.107.12/Poll/Phptrack8request/6python7Uploads/Lowtemporarypoll0/public/Proton/0Default/videoflower.php?APDPxlzzzJEssid0YiAYZ1ClAH=t7cM53DwaT&7f528aaf1d498f0ae42141d6f48dd180=ANlFjZjlTZxQTN4gDNzITYxgjNyUWO1EDNwgzYldzMxQTOyMzM3cjY5gjM2QDN0kjMxIjNxQjM&a9982c9e61949b25e6414a873df9509b=ANjBTMkVmNyUDM2UWZ0QmMidTO2M2M1MDOycTZkBzY3MjY5EzN3ImZ&d1e7b4781b4cb2b6aa49613b1a4398b8=d1nIhZWYmljZ4cjMkJDM2kDOwYGO2MjYlRDZxITZyQDZwQmYkRTYlVjZxIiOiYjN2ETZ3ADOllzN3UWMmFjZzIjZjFTZ5UmMlhTYzMGZiwiIhVTYhdDZzEDNycDO4gTYzQDNmFmYjJDM1kTNlJDZ2ITYiF2N0EDOzIiOiQWNiFWM3UTO3ITY5UmZ2kTOjZmNwI2MyMzN2ATN0YTYis3W&ad34a48e6d8df718784ff1d749fc05c5=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 | RU | text | 104 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1908 | Opus.exe | 172.98.92.42:58491 | — | Total Server Solutions L.L.C. | US | malicious |
4036 | a.exe | 185.82.202.246:81 | yabynennet.xyz | Host Sailor Ltd. | NL | malicious |
772 | 0fd7de5367376231a788872005d7ed4f.exe | 54.91.59.199:80 | api.ipify.org | Amazon.com, Inc. | US | malicious |
3156 | 22.exe | 222.99.11.146:80 | 22ssh.com | Korea Telecom | KR | malicious |
772 | 0fd7de5367376231a788872005d7ed4f.exe | 80.87.192.115:80 | — | JSC ISPsystem | RU | malicious |
2264 | HD____11.19.exe | 59.56.110.231:8898 | — | Fuzhou | CN | unknown |
2892 | test.exe | 179.13.1.253:8050 | gfhhjgh.duckdns.org | EPM Telecomunicaciones S.A. E.S.P. | CO | malicious |
2884 | 8f1c8b40c7be588389a8d382040b23bb.exe | 194.180.174.53:80 | — | — | DE | malicious |
3816 | mediaget.exe | 37.201.193.214:1470 | kazya1.hopto.org | Liberty Global Operations B.V. | DE | malicious |
2092 | gay.exe | 92.63.107.12:80 | — | JSC ISPsystem | RU | malicious |
Domain | IP | Reputation |
|---|---|---|
pretorian.ac.ug |
| malicious |
prepepe.ac.ug |
| malicious |
whatismyipaddress.com |
| shared |
yabynennet.xyz |
| malicious |
22ssh.com |
| malicious |
api.ipify.org |
| shared |
hackerinvasion.f3322.net |
| malicious |
gfhhjgh.duckdns.org |
| malicious |
api.ip.sb |
| whitelisted |
kazya1.hopto.org |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
2368 | Pluto Panel.exe | Potential Corporate Privacy Violation | ET POLICY Known External IP Lookup Service Domain in SNI |
2368 | Pluto Panel.exe | Potential Corporate Privacy Violation | ET POLICY Known External IP Lookup Service Domain in SNI |
772 | 0fd7de5367376231a788872005d7ed4f.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup (ipify .org) |
— | — | Misc activity | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain |
2092 | gay.exe | A Network Trojan was detected | ET TROJAN DCRAT Activity (GET) |
— | — | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.hopto .org |
2092 | gay.exe | A Network Trojan was detected | ET TROJAN Win32/DCRat CnC Exfil |
3740 | aaa.exe | A Network Trojan was detected | ET TROJAN Fareit/Pony Downloader Checkin 2 |
3740 | aaa.exe | Potential Corporate Privacy Violation | ET POLICY Windows 98 User-Agent Detected - Possible Malware or Non-Updated System |
3740 | aaa.exe | A Network Trojan was detected | ET TROJAN Pony Downloader HTTP Library MSIE 5 Win98 |