# UDP Connections
o DNS Data
+ Name Server 192.168.1.200
# DNS Package:
* ID: $100
* Type: Query
* OP Code: Query
* Flags: RD
* R Code: NoError
* QD Count: 1
* AN Count: 0
* NS Count: 0
* AR Count: 0
o Question Section
+ Question:
# Name: bmcash.net
# Q Type: A
# Q Class: Internet
* ID: $100
* Type: Response
* OP Code: Query
* Flags: RD RA
* R Code: NoError
* QD Count: 1
* AN Count: 1
* NS Count: 4
* AR Count: 4
o Question Section
+ Question:
# Name: bmcash.net
# Q Type: A
# Q Class: Internet
o Answer Section
+ Resource Record:
# Name: bmcash.net
# Q Type: A
# Q Class: Internet
# TTL: 600
# RD Length: 4
* A rdata
o Address: 74.222.190.34
o Authority Record Section
+ Resource Record:
# Name: bmcash.net
# Q Type: NS
# Q Class: Internet
# TTL: 600
# RD Length: 23
* NS rdata
o NSD NAME: ns1.domainservice.com
# Name: bmcash.net
# Q Type: NS
# Q Class: Internet
# TTL: 600
# RD Length: 6
* NS rdata
o NSD NAME: ns2.domainservice.com
# Name: bmcash.net
# Q Type: NS
# Q Class: Internet
# TTL: 600
# RD Length: 6
* NS rdata
o NSD NAME: ns3.domainservice.com
# Name: bmcash.net
# Q Type: NS
# Q Class: Internet
# TTL: 600
# RD Length: 6
* NS rdata
o NSD NAME: ns4.domainservice.com
o Additional Record Section
+ Resource Record:
# Name: ns1.domainservice.com
# Q Type: A
# Q Class: Internet
# TTL: 600
# RD Length: 4
* A rdata
o Address: 208.73.210.41
# Name: ns2.domainservice.com
# Q Type: A
# Q Class: Internet
# TTL: 600
# RD Length: 4
* A rdata
o Address: 208.73.211.42
# Name: ns3.domainservice.com
# Q Type: A
# Q Class: Internet
# TTL: 600
# RD Length: 4
* A rdata
o Address: 208.73.210.43
# Name: ns4.domainservice.com
# Q Type: A
# Q Class: Internet
# TTL: 600
# RD Length: 4
* A rdata
o Address: 208.73.211.44
* ID: $100
* Type: Response
* OP Code: Query
* Flags: RD RA
* R Code: NoError
* QD Count: 1
* AN Count: 1
* NS Count: 4
* AR Count: 4
o Question Section
+ Question:
# Name: bmcash.net
# Q Type: A
# Q Class: Internet
o Answer Section
+ Resource Record:
# Name: bmcash.net
# Q Type: A
# Q Class: Internet
# TTL: 600
# RD Length: 4
* A rdata
o Address: 74.222.190.34
o Authority Record Section
+ Resource Record:
# Name: bmcash.net
# Q Type: NS
# Q Class: Internet
# TTL: 600
# RD Length: 23
* NS rdata
o NSD NAME: ns1.domainservice.com
# Name: bmcash.net
# Q Type: NS
# Q Class: Internet
# TTL: 600
# RD Length: 6
* NS rdata
o NSD NAME: ns2.domainservice.com
# Name: bmcash.net
# Q Type: NS
# Q Class: Internet
# TTL: 600
# RD Length: 6
* NS rdata
o NSD NAME: ns3.domainservice.com
# Name: bmcash.net
# Q Type: NS
# Q Class: Internet
# TTL: 600
# RD Length: 6
* NS rdata
o NSD NAME: ns4.domainservice.com
o Additional Record Section
+ Resource Record:
# Name: ns1.domainservice.com
# Q Type: A
# Q Class: Internet
# TTL: 600
# RD Length: 4
* A rdata
o Address: 208.73.210.41
# Name: ns2.domainservice.com
# Q Type: A
# Q Class: Internet
# TTL: 600
# RD Length: 4
* A rdata
o Address: 208.73.211.42
# Name: ns3.domainservice.com
# Q Type: A
# Q Class: Internet
# TTL: 600
# RD Length: 4
* A rdata
o Address: 208.73.210.43
# Name: ns4.domainservice.com
# Q Type: A
# Q Class: Internet
# TTL: 600
# RD Length: 4
* A rdata
o Address: 208.73.211.44
* ID: $200
* Type: Query
* OP Code: Query
* Flags: RD
* R Code: NoError
* QD Count: 1
* AN Count: 0
* NS Count: 0
* AR Count: 0
o Question Section
+ Question:
# Name: 131.133.128.64.in-addr.arpa
# Q Type: PTR
# Q Class: Internet
* ID: $200
* Type: Response
* OP Code: Query
* Flags: RD RA
* R Code: NoError
* QD Count: 1
* AN Count: 1
* NS Count: 2
* AR Count: 0
o Question Section
+ Question:
# Name: 131.133.128.64.in-addr.arpa
# Q Type: PTR
# Q Class: Internet
o Answer Section
+ Resource Record:
# Name: 131.133.128.64.in-addr.arpa
# Q Type: PTR
# Q Class: Internet
# TTL: 600
# RD Length: 37
* PTR rdata
o PTR NAME: 64-128-133-131.static.twtelecom.net
o Authority Record Section
+ Resource Record:
# Name: 133.128.64.in-addr.arpa
# Q Type: NS
# Q Class: Internet
# TTL: 600
# RD Length: 6
* NS rdata
o NSD NAME: ns1.twtelecom.net
# Name: 133.128.64.in-addr.arpa
# Q Type: NS
# Q Class: Internet
# TTL: 600
# RD Length: 6
* NS rdata
o NSD NAME: ns2.twtelecom.net
* ID: $200
* Type: Response
* OP Code: Query
* Flags: RD RA
* R Code: NoError
* QD Count: 1
* AN Count: 1
* NS Count: 2
* AR Count: 0
o Question Section
+ Question:
# Name: 131.133.128.64.in-addr.arpa
# Q Type: PTR
# Q Class: Internet
o Answer Section
+ Resource Record:
# Name: 131.133.128.64.in-addr.arpa
# Q Type: PTR
# Q Class: Internet
# TTL: 600
# RD Length: 37
* PTR rdata
o PTR NAME: 64-128-133-131.static.twtelecom.net
o Authority Record Section
+ Resource Record:
# Name: 133.128.64.in-addr.arpa
# Q Type: NS
# Q Class: Internet
# TTL: 600
# RD Length: 6
* NS rdata
o NSD NAME: ns1.twtelecom.net
# Name: 133.128.64.in-addr.arpa
# Q Type: NS
# Q Class: Internet
# TTL: 600
# RD Length: 6
* NS rdata
o NSD NAME: ns2.twtelecom.net
+ Name Server 192.168.1.200
# DNS Package:
* ID: $100
* Type: Query
* OP Code: Query
* Flags: RD
* R Code: NoError
* QD Count: 1
* AN Count: 0
* NS Count: 0
* AR Count: 0
o Question Section
+ Question:
# Name: 131.133.128.64.sbl-xbl.spamhaus.org
# Q Type: A
# Q Class: Internet
* ID: $100
* Type: Response
* OP Code: Query
* Flags: RD RA
* R Code: NameError
* QD Count: 1
* AN Count: 0
* NS Count: 1
* AR Count: 0
o Question Section
+ Question:
# Name: 131.133.128.64.sbl-xbl.spamhaus.org
# Q Type: A
# Q Class: Internet
o Authority Record Section
+ Resource Record:
# Name: sbl-xbl.spamhaus.org
# Q Type: SOA
# Q Class: Internet
# TTL: 150
# RD Length: 52
* SOA rdata
o M Name: need.to.know.only
o R Name: hostmaster.spamhaus.org
o Serial: 1002161815
o Refresh: 3600
o Retry: 600
o Expire: 432000
o Minimum: 150
* ID: $100
* Type: Response
* OP Code: Query
* Flags: RD RA
* R Code: NameError
* QD Count: 1
* AN Count: 0
* NS Count: 1
* AR Count: 0
o Question Section
+ Question:
# Name: 131.133.128.64.sbl-xbl.spamhaus.org
# Q Type: A
# Q Class: Internet
o Authority Record Section
+ Resource Record:
# Name: sbl-xbl.spamhaus.org
# Q Type: SOA
# Q Class: Internet
# TTL: 150
# RD Length: 52
* SOA rdata
o M Name: need.to.know.only
o R Name: hostmaster.spamhaus.org
o Serial: 1002161815
o Refresh: 3600
o Retry: 600
o Expire: 432000
o Minimum: 150
# Transport Protocol: TCP
# Remote Address: 74.222.190.34
# Remote Port: 2227
# Protocol: Unknown
# Connection Established: 1
# Socket: 1320
Registry Changes by all processes
Create or Open
Changes HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun “Microsoft(R) System Manager” = C:WINDOWSsystem3254d734.exe
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TcpTimedWaitDelay” = [REG_DWORD, value: 0000001E]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “MaxUserPort” = [REG_DWORD, value: 00008000]
Reads HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlSession ManagerAppCompatibility “DisableAppCompat”
HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{56F9679E-7826-4C84-81F3-532071A8BCC5}InprocServer32 “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlersFile “ProgID”
HKEY_LOCAL_MACHINESOFTWAREClassesfile “ShellFolder”
HKEY_LOCAL_MACHINESOFTWAREClassesMapi “ShellFolder”
HKEY_LOCAL_MACHINESOFTWAREClassesOutlookexpress “ShellFolder”
HKEY_LOCAL_MACHINESOFTWAREClassesOTFS “ShellFolder”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “ScriptOk”
HKEY_LOCAL_MACHINESYSTEMWPAMediaCenter “Installed”
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParametersInterfaces{16000DB8-0561-4BC0-97A3-B73E3DDAD13D} “NameServer”
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParametersInterfaces{16000DB8-0561-4BC0-97A3-B73E3DDAD13D} “DhcpNameServer”
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParametersInterfaces{1BE68DBD-1099-491C-9BCE-62B99CC6D22C} “NameServer”
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParametersInterfaces{1BE68DBD-1099-491C-9BCE-62B99CC6D22C} “DhcpNameServer”
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParametersInterfaces{258AF46D-E6CF-43B8-90A6-135709B2EB09} “NameServer”
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParametersInterfaces{258AF46D-E6CF-43B8-90A6-135709B2EB09} “DhcpNameServer”
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParametersInterfaces{5ADF3B46-75F3-4EAE-B4C0-E39E9F08CEC3} “NameServer”
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParametersInterfaces{5ADF3B46-75F3-4EAE-B4C0-E39E9F08CEC3} “DhcpNameServer”
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParametersInterfaces{5D19E473-BE30-416B-B5C7-D8A091C41D2F} “NameServer”
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParametersInterfaces{5D19E473-BE30-416B-B5C7-D8A091C41D2F} “DhcpNameServer”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftRpcSecurityService “DefaultAuthLevel”
Enums HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlers
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlersFile
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedType
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParametersInterfaces
File Changes by all processes
New Files C:WINDOWSsystem32msvcrt2.dll
C:WINDOWSsystem3254d734.exe
Opened Files C:WINDOWSsystem32msvcrt2.dll
c:bmcash3.exe
.PIPEwkssvc
.PIPElsarpc
C:ProgrammeWindows Desktop SearchMSNLNamespaceMgr.dll
C:WINDOWSRegistrationR000000000007.clb
C:WINDOWSAppPatchsysmain.sdb
C:WINDOWSAppPatchsystest.sdb
DeviceNamedPipeShimViewer
C:WINDOWSsystem32
C:WINDOWSsystem32msvcrt2.dll
C:WINDOWSsystem3254d734.exe
.PIPElsarpc
Deleted Files c:bmcash3.exe
Chronological Order Get File Attributes: WINDOWSSYSTEM32 Flags: (SECURITY_ANONYMOUS)
Open File: C:WINDOWSsystem32msvcrt2.dll (OPEN_EXISTING)
Create File: C:WINDOWSsystem32msvcrt2.dll
Open File: c:bmcash3.exe (OPEN_EXISTING)
Create File: C:WINDOWSsystem3254d734.exe
Open File: .PIPEwkssvc (OPEN_EXISTING)
Get File Attributes: c: Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSsystem3254d734.exe Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWS Flags: (SECURITY_ANONYMOUS)
Open File: .PIPElsarpc (OPEN_EXISTING)
Get File Attributes: C:Dokumente und EinstellungenAdministratorEigene Dateiendesktop.ini Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:Dokumente und EinstellungenAll UsersDokumentedesktop.ini Flags: (SECURITY_ANONYMOUS)
Open File: C:ProgrammeWindows Desktop SearchMSNLNamespaceMgr.dll (OPEN_EXISTING)
Get File Attributes: C:WINDOWSRegistration Flags: (SECURITY_ANONYMOUS)
Open File: C:WINDOWSRegistrationR000000000007.clb (OPEN_EXISTING)
Get File Attributes: C:WINDOWSsystem3254d734.exe:Zone.Identifier Flags: (SECURITY_ANONYMOUS)
Open File: C:WINDOWSAppPatchsysmain.sdb (OPEN_EXISTING)
Open File: C:WINDOWSAppPatchsystest.sdb (OPEN_EXISTING)
Open File: DeviceNamedPipeShimViewer (OPEN_EXISTING)
Open File: C:WINDOWSsystem32 ()
Find File: C:WINDOWSsystem3254d734.exe
Get File Attributes: WINDOWSSYSTEM32 Flags: (SECURITY_ANONYMOUS)
Delete File: c:bmcash3.exe
Open File: C:WINDOWSsystem32msvcrt2.dll (OPEN_EXISTING)
Open File: C:WINDOWSsystem3254d734.exe (OPEN_EXISTING)
Open File: .PIPElsarpc (OPEN_EXISTING)
UDP Connections
Remote IP Address: 10.1.13.1 Port: 53
Send Datagram: packet(s) of size 28
Send Datagram: packet(s) of size 44
Recv Datagram: packet(s) of size 143
Recv Datagram: 2 packet(s) of size 2048
Recv Datagram: packet(s) of size 233
Remote IP Address: 10.1.13.1 Port: 53
Send Datagram: packet(s) of size 52
Recv Datagram: packet(s) of size 136
Recv Datagram: packet(s) of size 2048
Outgoing connection to remote server: 74.222.190.34 port 2227
Outgoing connection to remote server: 74.222.190.34 port 2227
* SMTP: 209.85.135.27:25
* Username / Password: /
SMTP: 61.197.181.246:25
SMTP: 61.197.181.246:25
SMTP: 205.188.155.72:25
SMTP: 209.202.254.41:25
SMTP: 74.6.136.65:25
SMTP: 67.195.168.31:25
SMTP: 67.195.168.31:25
SMTP: 68.142.202.128:25
SMTP: 206.190.54.127:25
SMTP: 206.190.54.127:25
SMTP: 195.50.106.143:25
SMTP: 68.142.202.247:25
SMTP: 64.12.137.207:25
SMTP: 65.55.92.136:25
SMTP: 98.137.55.20:25
SMTP: 98.137.55.20:25
SMTP: 65.55.92.152:25
* SMTP: 84.243.62.142:25
* Username / Password: /
SMTP: 98.137.55.21:25
SMTP: 91.196.124.36:25
SMTP: 205.188.59.194:25
SMTP: 205.188.146.193:25
SMTP: 207.69.189.40:25
SMTP: 67.195.169.27:25
SMTP: 65.55.37.120:25
SMTP: 67.195.169.28:25
SMTP: 205.188.103.2:25
SMTP: 69.87.54.1:25
SMTP: 67.28.113.136:25
SMTP: 67.28.113.136:25
SMTP: 72.29.71.60:25
SMTP: 174.90.33.42:25
* SMTP: 80.74.128.22:25
* Username / Password: /
SMTP: 64.12.90.1:25
SMTP: 66.94.236.34:25
SMTP: 69.89.31.207:25
* SMTP: 209.85.211.40:25
* Username / Password: /
SMTP: 65.55.92.168:25
SMTP: 64.12.90.98:25
SMTP: 98.137.54.238:25
SMTP: 205.188.146.194:25
SMTP: 208.65.144.2:25
* SMTP: 64.18.5.14:25
* Username / Password: /
SMTP: 98.137.54.237:25
SMTP: 67.195.168.230:25
SMTP: 209.191.88.254:25
SMTP: 217.146.188.189:25
SMTP: 64.26.60.153:25
SMTP: 207.178.142.214:25
SMTP: 68.6.19.3:25
SMTP: 65.55.92.184:25
SMTP: 66.199.31.140:25
SMTP: 80.160.76.237:25
* SMTP: 209.198.49.40:25
* Username / Password: /
SMTP: 211.43.197.154:25
SMTP: 216.239.127.176:25
* SMTP: 213.75.3.30:25
* Username / Password: /
* SMTP: 64.6.45.70:25
* Username / Password: /
SMTP: 68.28.3.32:25
* SMTP: 80.67.170.52:25
* Username / Password: /
* SMTP: 202.239.125.22:25
* Username / Password: /
SMTP: 65.54.188.72:25
* SMTP: 207.126.147.12:25
* Username / Password: /
SMTP: 67.231.144.94:25
SMTP: 205.188.157.18:25
SMTP: 65.55.37.104:25
* SMTP: 123.100.1.206:25
* Username / Password: /
SMTP: 64.136.52.37:25
* SMTP: 192.116.181.157:25
* Username / Password: /
SMTP: 205.188.155.110:25
* SMTP: 213.171.216.111:25
* Username / Password: /
SMTP: 64.12.90.34:25
SMTP: 66.163.169.186:25
SMTP: 165.212.8.32:25
SMTP: 205.188.190.1:25
SMTP: 143.166.224.193:25
* SMTP: 208.89.132.27:25
* Username / Password: /
SMTP: 64.35.208.48:25
SMTP: 204.232.236.141:25
SMTP: 64.12.90.66:25
SMTP: 216.69.186.201:25
SMTP: 139.177.224.67:25
SMTP: 206.65.164.155:25
SMTP: 76.96.62.116:25
SMTP: 65.54.188.94:25
SMTP: 64.12.90.33:25
SMTP: 64.12.90.97:25
SMTP: 208.43.69.170:25
SMTP: 208.43.69.170:25
SMTP: 208.43.69.170:25
SMTP: 70.84.243.86:25
* SMTP: 64.70.94.151:25
* Username / Password: /
* SMTP: 64.18.4.13:25
* Username / Password: /
SMTP: 193.10.249.137:25
SMTP: 64.12.137.169:25
SMTP: 205.188.190.2:25
SMTP: 174.143.82.69:25
SMTP: 65.54.188.110:25
SMTP: 64.35.208.48:25
SMTP: 65.254.254.52:25
SMTP: 65.54.188.126:25
SMTP: 65.55.37.72:25
SMTP: 64.12.90.65:25
SMTP: 217.72.192.149:25
* SMTP: 128.242.120.13:25
* Username / Password: /
SMTP: 65.55.37.88:25
* SMTP: 65.39.254.20:25
* Username / Password: /
SMTP: 64.255.237.184:25
SMTP: 12.102.252.75:25
* SMTP: 200.50.161.205:25
* Username / Password: /
* SMTP: 216.146.33.5:25
* Username / Password: /
SMTP: 209.86.93.229:25
SMTP: 212.227.15.186:25
SMTP: 166.102.165.121:25
SMTP: 216.32.180.22:25
SMTP: 204.127.217.16:25
* SMTP: 216.146.33.1:25
* Username / Password: /
SMTP: 67.195.169.28:25
* SMTP: 213.133.101.118:25
* Username / Password: /
SMTP: 65.121.17.167:25
SMTP: 68.142.202.247:25
SMTP: 208.65.144.12:25
SMTP: 98.137.55.21:25
SMTP: 74.6.136.65:25
SMTP: 64.12.138.153:25
SMTP: 209.80.4.39:25
SMTP: 192.237.35.30:25
SMTP: 205.188.59.193:25
SMTP: 207.172.157.50:25
SMTP: 64.234.192.11:25
SMTP: 205.188.103.1:25
SMTP: 74.52.113.226:25
SMTP: 204.209.205.52:25
SMTP: 208.65.144.3:25
SMTP: 209.86.93.228:25
SMTP: 207.69.189.219:25
SMTP: 67.104.241.165:25
SMTP: 192.195.66.33:25
SMTP: 65.17.138.250:25
SMTP: 217.72.192.188:25
SMTP: 208.131.143.30:25
SMTP: 207.115.21.24:25
SMTP: 205.178.149.7:25
SMTP: 209.86.93.227:25