Author: Pig

ds32v7k3.knaqu.eu

Uncategorized

Remote Host Port Number ds32v7k3.knaqu.eu 4244 PASS letmein NICK [00|USA|492973] USER XP-1626 * 0 :COMPUTERNAME * To mark the presence in the system, the following Mutex object was created: o LiNbagGgsag * The following ports were open in the system: Port Protocol Process 1033 TCP F1reFox32.exe (%Windir%F1reFox32.exe) 1034 TCP f1refox32.exe (%Windir%f1refox32.exe) * The following HostRead more...

92.241.190.166

Uncategorized

92.241.190.166:81 Server : srv.apache.net Now talking in #final# Topic On: [ #final# ] [ , ] Topic By: [ s ] s for SnK kak pazhivajesh kolega lol

spy.burimche.net

Uncategorized

Remote Host Port Number spy.burimche.net 1111 NICK UserName15 USER UserName15 “hotmail.com” “spy.burimche.net” :UserName Other details * To mark the presence in the system, the following Mutex object was created: o d3st0y * The following ports were open in the system: Port Protocol Process 113 TCP [file and pathname of the sample #1] 1033 TCP [fileRead more...

bb.milan-fans.com

Uncategorized

Remote Host Port Number bb.milan-fans.com 1234 NICK n[USA|XP]6675103 USER 3281 “” “lol” :3281 JOIN #cc# NICK [USA|XP]6816119 USER 7658 “” “lol” :7658 To mark the presence in the system, the following Mutex object was created: SLKJSN848L The following ports were open in the system: Port Protocol Process 1034 TCP msnmgr.exe (%Windir%msnmgr.exe) 1036 TCP msnmgr.exe (%Windir%msnmgr.exe)Read more...

winupdservice.net

Uncategorized

Remote Host Port Number winupdservice.net 81 NICK [USA|XP]vsauaea USER s s s :s JOIN #twizt# NICK n[USA|XP]rdcsdfo NICK [USA|XP]ciirgkj Other details * To mark the presence in the system, the following Mutex object was created: o L6C8D3B8H7E3N6 * The following ports were open in the system: Port Protocol Process 1034 TCP winsvcn.exe (%AppData%winsvcn.exe) 1035 TCPRead more...

stores.dellhp.net

Uncategorized

Remote Host Port Number stores.dellhp.net 1234 NICK [USA|XP]8106732 USER 3546 “” “lol” :3546 JOIN #dl# NICK n[USA|XP]4637818 USER 8703 “” “lol” :8703 Other details To mark the presence in the system, the following Mutex object was created: SN8JSN868L The following ports were open in the system: Port Protocol Process 1034 TCP secfil.exe (%Windir%secfil.exe) 1035 TCPRead more...

poo.panjsheri.com

Uncategorized

Remote Host Port Number poo.panjsheri.com 1234 NICK [USA|XP]5234294 USER 8687 “” “lol” :8687 JOIN #po# NICK n[USA|XP]0719163 USER 3151 “” “lol” :3151 Other details * To mark the presence in the system, the following Mutex object was created: o SN5JSN868L * The following ports were open in the system: Port Protocol Process 1034 TCP winmbu.exeRead more...

boxdeccode.vaiosys.com

Uncategorized

Remote Host Port Number boxdeccode.vaiosys.com 1234 Resolved : [boxdeccode.vaiosys.com] To [85.234.144.237] Resolved : [boxdeccode.vaiosys.com] To [216.246.99.115] Resolved : [boxdeccode.vaiosys.com] To [212.117.166.201] NICK {NEW}[USA][XP-SP2]678388 USER 5100 “” “lol” :5100 JOIN #b# NICK [USA][XP-SP2]229885 USER 3392 “” “lol” :3392 NICK [USA][XP-SP2]567630 USER 9099 “” “lol” :9099 NICK [USA][XP-SP2]336902 USER 8944 “” “lol” :8944 Other details * ToRead more...

n33d.r00taccess.com

Uncategorized

Remote Host Port Number n33d.r00taccess.com 6769 NICK {NEW}[USA][XP-SP2]447382 USER 6799 “” “lol” :6799 JOIN #r00t# rootroot NICK [USA][XP-SP2]408098 USER 5014 “” “lol” :5014 NICK [USA][XP-SP2]094963 USER 3399 “” “lol” :3399 Other details * To mark the presence in the system, the following Mutex object was created: o gHJHTthrtTRu * The following port was open inRead more...

irc.soccerboss.net

Uncategorized

una.exe : INFECTED with W32/Backdoor (Signature: W32/Spybot) [ DetectionInfo ] * Filename: C:analyzerscanuna.exe. * Sandbox name: W32/Backdoor. * Signature name: W32/Spybot.EDJV. * Compressed: NO. * TLS hooks: NO. * Executable type: Application. * Executable file structure: OK. * Filetype: PE_I386. [ General information ] * Drops files in %WINSYS% folder. * File length: 261120 bytes.Read more...