Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_00000001004153F0 SetServiceStatus,strdup,free,StartServiceCtrlDispatcherA,time,srandom,printf,getopt_long_only,free,wordfree,snprintf,snprintf,snprintf,strlen,strlen,fopen,fwrite,fclose,fclose,snprintf,CreateMutexA,GetLastError,CloseHandle,exit,chdir,close,close,close,open,dup,dup,fopen,getpid,fprintf,fclose,time,signal,signal,signal,CoInitialize,CoCreateInstance,CoUninitialize,__errno,__getreent,fflush,__getreent,fflush,GetLastError,GetLastError,WaitForSingleObject,WinDivertOpen,GetLastError,ReleaseMutex,CloseHandle,SetLastError,FormatMessageA,LocalFree,CreateEventW,GetLastError,__getreent,__getreent,fflush,usleep,WinDivertRecvEx,GetLastError,__errno,usleep,WaitForSingleObject,__errno,__errno,GetOverlappedResult,__errno,__errno,__errno,__errno,__errno,snprintf,WinDivertSend,GetLastError,__getreent,fflush,__getreent,fflush,ReleaseMutex,CloseHandle, | 8_2_00000001004153F0 |
Source: global traffic | HTTP traffic detected: GET /censorliber/zapret/raw/branch/main/WinDivert.dll HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: codeberg.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /censorliber/zapret/raw/branch/main/WinDivert64.sys HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: codeberg.org |
Source: global traffic | HTTP traffic detected: GET /censorliber/zapret/raw/branch/main/winws.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: codeberg.org |
Source: global traffic | HTTP traffic detected: GET /bypassblock HTTP/1.1Host: t.meConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /censorliber/zapret/raw/branch/main/version.txt HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: codeberg.org |
Source: global traffic | HTTP traffic detected: GET /file/s3vCUVV1oFSCO-dE5CqAY7IgPiKpdP2z8zxQN72D_TT9z56ahyE0msKqmuM_tk2PSEmQvnQwUvZb1H5LTpaO8JEmhF-5-DzRJn0IlgPUduazk5LN5P7paldIt115IoTuBIfpLYc9IcyeP_A6RfZJrgNinKpPj_KVprinZI2XeGxYV-Oc0kv7FigdkzDmuIUo82gNjtBCwxGg4jGao68ygfD4hQmU5yHjzaetNKqe2slF0f4nvrf0N7_9vCVoXLLhOJ2zVr1x-Jyq6PLsYys0HxH7NN2KH5LN_sO1jucDXW-MlsW7Iv6_BhYjfO3Mc2eDr_gKM9-O3DknTg7q8Q2omQ.jpg HTTP/1.1Host: cdn4.cdn-telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://t.me/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /css/font-roboto.css?1 HTTP/1.1Host: telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleReferer: https://t.me/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /css/bootstrap.min.css?3 HTTP/1.1Host: telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleReferer: https://t.me/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /css/telegram.css?242 HTTP/1.1Host: telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleReferer: https://t.me/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /js/tgwallpaper.min.js?3 HTTP/1.1Host: telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://t.me/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /file/s3vCUVV1oFSCO-dE5CqAY7IgPiKpdP2z8zxQN72D_TT9z56ahyE0msKqmuM_tk2PSEmQvnQwUvZb1H5LTpaO8JEmhF-5-DzRJn0IlgPUduazk5LN5P7paldIt115IoTuBIfpLYc9IcyeP_A6RfZJrgNinKpPj_KVprinZI2XeGxYV-Oc0kv7FigdkzDmuIUo82gNjtBCwxGg4jGao68ygfD4hQmU5yHjzaetNKqe2slF0f4nvrf0N7_9vCVoXLLhOJ2zVr1x-Jyq6PLsYys0HxH7NN2KH5LN_sO1jucDXW-MlsW7Iv6_BhYjfO3Mc2eDr_gKM9-O3DknTg7q8Q2omQ.jpg HTTP/1.1Host: cdn4.cdn-telegram.orgConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /js/tgwallpaper.min.js?3 HTTP/1.1Host: telegram.orgConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /img/tgme/pattern.svg?1 HTTP/1.1Host: telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://telegram.org/css/telegram.css?242Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /fonts/Roboto/KFOlCnqEu92Fr1MmWUlfBBc4AMP6lQ.woff2 HTTP/1.1Host: telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://t.mesec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: fontReferer: https://telegram.org/css/font-roboto.css?1Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /fonts/Roboto/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2 HTTP/1.1Host: telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://t.mesec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: fontReferer: https://telegram.org/css/font-roboto.css?1Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /fonts/Roboto/KFOlCnqEu92Fr1MmWUlfABc4AMP6lbBP.woff2 HTTP/1.1Host: telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://t.mesec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: fontReferer: https://telegram.org/css/font-roboto.css?1Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /fonts/Roboto/KFOmCnqEu92Fr1Mu5mxKKTU1Kvnz.woff2 HTTP/1.1Host: telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://t.mesec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: fontReferer: https://telegram.org/css/font-roboto.css?1Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /img/tgme/pattern.svg?1 HTTP/1.1Host: telegram.orgConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: powershell.exe, 00000000.00000002.4498106588.000001F5D6865000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D7F1E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://codeberg.org |
Source: WinDivert64.sys.0.dr | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04 |
Source: WinDivert64.sys.0.dr | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06 |
Source: powershell.exe, 00000000.00000002.4498106588.000001F5D7FEF000.00000004.00000800.00020000.00000000.sdmp, WinDivert64.sys.0.dr | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0 |
Source: WinDivert64.sys.0.dr | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0 |
Source: WinDivert64.sys.0.dr | String found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t |
Source: svchost.exe, 00000005.00000002.4498565832.000001D671400000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.ver) |
Source: powershell.exe, 00000000.00000002.4498106588.000001F5D7FEF000.00000004.00000800.00020000.00000000.sdmp, WinDivert64.sys.0.dr | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0# |
Source: WinDivert64.sys.0.dr | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0# |
Source: WinDivert64.sys.0.dr | String found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0# |
Source: svchost.exe, 00000005.00000002.4499004275.000001D6714F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://edgedl.me.gvt1.com/ |
Source: qmgr.db.5.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU |
Source: qmgr.db.5.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n |
Source: qmgr.db.5.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/ |
Source: qmgr.db.5.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567 |
Source: svchost.exe, 00000005.00000002.4498782058.000001D671460000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.4498721911.000001D67144F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.4498721911.000001D671457000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.2816925871.000001D671332000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.4497858683.000001D66C702000.00000004.00000020.00020000.00000000.sdmp, edb.log.5.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adm5fg7myczym5ugfpmw2lireirq_2024.11.8.0/ |
Source: qmgr.db.5.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg |
Source: qmgr.db.5.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe |
Source: svchost.exe, 00000005.00000002.4498782058.000001D671485000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://edgedl.me.gvt1.com:80 |
Source: edb.log.5.dr | String found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20 |
Source: chromecache_84.6.dr | String found in binary or memory: http://getbootstrap.com) |
Source: chromecache_84.6.dr | String found in binary or memory: http://getbootstrap.com/customize/?id=92d2ac1b31978642b6b6) |
Source: powershell.exe, 00000000.00000002.4519498169.000001F5E61D8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4519498169.000001F5E6325000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: WinDivert64.sys.0.dr | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: WinDivert64.sys.0.dr | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: powershell.exe, 00000000.00000002.4498106588.000001F5D7FEF000.00000004.00000800.00020000.00000000.sdmp, WinDivert64.sys.0.dr | String found in binary or memory: http://ocsp.sectigo.com0H |
Source: powershell.exe, 00000000.00000002.4498106588.000001F5D6349000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000000.00000002.4498106588.000001F5D6121000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000000.00000002.4498106588.000001F5D6349000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000000.00000002.4524003437.000001F5EE330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.microsoft.co_E |
Source: powershell.exe, 00000000.00000002.4498106588.000001F5D6121000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore68 |
Source: powershell.exe, 00000000.00000002.4498106588.000001F5D7BB6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D7F4D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D6349000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D6865000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D804F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://codeberg.org |
Source: powershell.exe, 00000000.00000002.4498106588.000001F5D8065000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D7F4D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D6980000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D7FEF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://codeberg.org/ |
Source: powershell.exe, 00000000.00000002.4519498169.000001F5E6190000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D7BB6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D6349000.00000004.00000800.00020000.00000000.sdmp, 5dFLJyS86S.ps1 | String found in binary or memory: https://codeberg.org/censorliber/zapret/raw/branch/main/WinDivert.dll |
Source: powershell.exe, 00000000.00000002.4519498169.000001F5E6190000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D7F4D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D6349000.00000004.00000800.00020000.00000000.sdmp, 5dFLJyS86S.ps1 | String found in binary or memory: https://codeberg.org/censorliber/zapret/raw/branch/main/WinDivert64.sys |
Source: powershell.exe, 00000000.00000002.4519498169.000001F5E6190000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D6349000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D6865000.00000004.00000800.00020000.00000000.sdmp, 5dFLJyS86S.ps1 | String found in binary or memory: https://codeberg.org/censorliber/zapret/raw/branch/main/version.txt |
Source: powershell.exe, 00000000.00000002.4519498169.000001F5E6190000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D6349000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D804F000.00000004.00000800.00020000.00000000.sdmp, 5dFLJyS86S.ps1 | String found in binary or memory: https://codeberg.org/censorliber/zapret/raw/branch/main/winws.exe |
Source: powershell.exe, 00000000.00000002.4519498169.000001F5E6325000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000000.00000002.4519498169.000001F5E6325000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000000.00000002.4519498169.000001F5E6325000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: edb.log.5.dr | String found in binary or memory: https://g.live.com/odclientsettings/Prod/C: |
Source: svchost.exe, 00000005.00000003.2192605111.000001D671330000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.dr | String found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C: |
Source: chromecache_84.6.dr | String found in binary or memory: https://gist.github.com/92d2ac1b31978642b6b6 |
Source: powershell.exe, 00000000.00000002.4498106588.000001F5D6349000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000000.00000002.4519498169.000001F5E6190000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D6349000.00000004.00000800.00020000.00000000.sdmp, 5dFLJyS86S.ps1 | String found in binary or memory: https://github.com/censorliber/youtube_unblock |
Source: powershell.exe, 00000000.00000002.4519498169.000001F5E6190000.00000004.00000800.00020000.00000000.sdmp, 5dFLJyS86S.ps1 | String found in binary or memory: https://github.com/notepad-plus-plus/notepad-plus-plus/releases) |
Source: chromecache_84.6.dr | String found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE) |
Source: powershell.exe, 00000000.00000002.4498106588.000001F5D748F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://go.micro |
Source: 5dFLJyS86S.ps1 | String found in binary or memory: https://jnn-pa.googleapis.com |
Source: powershell.exe, 00000000.00000002.4519498169.000001F5E61D8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4519498169.000001F5E6325000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: qmgr.db.5.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe/C: |
Source: chromecache_85.6.dr | String found in binary or memory: https://osx.telegram.org/updates/site/artboard.png) |
Source: chromecache_85.6.dr | String found in binary or memory: https://osx.telegram.org/updates/site/artboard_2x.png); |
Source: WinDivert64.sys.0.dr | String found in binary or memory: https://reqrypt.org/windivert.html |
Source: powershell.exe, 00000000.00000002.4498106588.000001F5D7FEF000.00000004.00000800.00020000.00000000.sdmp, WinDivert64.sys.0.dr | String found in binary or memory: https://sectigo.com/CPS0 |
Source: 5dFLJyS86S.ps1 | String found in binary or memory: https://t.me/bypassblock |
Source: powershell.exe, 00000000.00000002.4524081444.000001F5EE444000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/bypassblock$ |
Source: powershell.exe, 00000000.00000002.4524081444.000001F5EE444000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/bypassblock( |
Source: powershell.exe, 00000000.00000002.4524081444.000001F5EE444000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/bypassblockd |
Source: powershell.exe, 00000000.00000002.4519498169.000001F5E6190000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4498106588.000001F5D6349000.00000004.00000800.00020000.00000000.sdmp, 5dFLJyS86S.ps1 | String found in binary or memory: https://zapret.now.sh/script.user.js |
Source: unknown | Network traffic detected: HTTP traffic on port 49674 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49722 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49721 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49720 |
Source: unknown | Network traffic detected: HTTP traffic on port 49706 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49731 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49741 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49740 |
Source: unknown | Network traffic detected: HTTP traffic on port 50009 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49727 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49704 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49725 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49741 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49729 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49748 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49719 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49720 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49722 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49719 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49718 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49714 |
Source: unknown | Network traffic detected: HTTP traffic on port 49675 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49732 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49731 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50009 |
Source: unknown | Network traffic detected: HTTP traffic on port 49673 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49707 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49730 |
Source: unknown | Network traffic detected: HTTP traffic on port 49732 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49705 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49730 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49703 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49740 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49728 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49721 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49707 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49729 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49706 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49728 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49705 |
Source: unknown | Network traffic detected: HTTP traffic on port 49714 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49727 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49704 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49748 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49703 |
Source: unknown | Network traffic detected: HTTP traffic on port 49718 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49725 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_00007FF848F39EF3 | 0_2_00007FF848F39EF3 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Code function: 0_2_00007FF848F39890 | 0_2_00007FF848F39890 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_6280466E | 8_2_6280466E |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_6280466E | 8_2_6280466E |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_62801B91 | 8_2_62801B91 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_62807BB6 | 8_2_62807BB6 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_628067DC | 8_2_628067DC |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_628069B9 | 8_2_628069B9 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_0000000100401426 | 8_2_0000000100401426 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_00000001004153F0 | 8_2_00000001004153F0 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_0000000100401000 | 8_2_0000000100401000 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_000000010040DC04 | 8_2_000000010040DC04 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_00000001004134E0 | 8_2_00000001004134E0 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_0000000100416D3A | 8_2_0000000100416D3A |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_0000000100401CE7 | 8_2_0000000100401CE7 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_0000000100411118 | 8_2_0000000100411118 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_000000010040D996 | 8_2_000000010040D996 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_0000000100405E0C | 8_2_0000000100405E0C |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_0000000100410A10 | 8_2_0000000100410A10 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_00000001004012C8 | 8_2_00000001004012C8 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_000000010040BB60 | 8_2_000000010040BB60 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_0000000100412EF0 | 8_2_0000000100412EF0 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_0000000100413B70 | 8_2_0000000100413B70 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_0000000100411380 | 8_2_0000000100411380 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_000000010040478A | 8_2_000000010040478A |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_000000010040DF95 | 8_2_000000010040DF95 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_0000000100409396 | 8_2_0000000100409396 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_00000001004153F0 SetServiceStatus,strdup,free,StartServiceCtrlDispatcherA,time,srandom,printf,getopt_long_only,free,wordfree,snprintf,snprintf,snprintf,strlen,strlen,fopen,fwrite,fclose,fclose,snprintf,CreateMutexA,GetLastError,CloseHandle,exit,chdir,close,close,close,open,dup,dup,fopen,getpid,fprintf,fclose,time,signal,signal,signal,CoInitialize,CoCreateInstance,CoUninitialize,__errno,__getreent,fflush,__getreent,fflush,GetLastError,GetLastError,WaitForSingleObject,WinDivertOpen,GetLastError,ReleaseMutex,CloseHandle,SetLastError,FormatMessageA,LocalFree,CreateEventW,GetLastError,__getreent,__getreent,fflush,usleep,WinDivertRecvEx,GetLastError,__errno,usleep,WaitForSingleObject,__errno,__errno,GetOverlappedResult,__errno,__errno,__errno,__errno,__errno,snprintf,WinDivertSend,GetLastError,__getreent,fflush,__getreent,fflush,ReleaseMutex,CloseHandle, | 8_2_00000001004153F0 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_00000001004153F0 SetServiceStatus,strdup,free,StartServiceCtrlDispatcherA,time,srandom,printf,getopt_long_only,free,wordfree,snprintf,snprintf,snprintf,strlen,strlen,fopen,fwrite,fclose,fclose,snprintf,CreateMutexA,GetLastError,CloseHandle,exit,chdir,close,close,close,open,dup,dup,fopen,getpid,fprintf,fclose,time,signal,signal,signal,CoInitialize,CoCreateInstance,CoUninitialize,__errno,__getreent,fflush,__getreent,fflush,GetLastError,GetLastError,WaitForSingleObject,WinDivertOpen,GetLastError,ReleaseMutex,CloseHandle,SetLastError,FormatMessageA,LocalFree,CreateEventW,GetLastError,__getreent,__getreent,fflush,usleep,WinDivertRecvEx,GetLastError,__errno,usleep,WaitForSingleObject,__errno,__errno,GetOverlappedResult,__errno,__errno,__errno,__errno,__errno,snprintf,WinDivertSend,GetLastError,__getreent,fflush,__getreent,fflush,ReleaseMutex,CloseHandle, | 8_2_00000001004153F0 |
Source: C:\Users\user\Desktop\bin\winws.exe | Code function: 8_2_00000001004153F0 SetServiceStatus,strdup,free,StartServiceCtrlDispatcherA,time,srandom,printf,getopt_long_only,free,wordfree,snprintf,snprintf,snprintf,strlen,strlen,fopen,fwrite,fclose,fclose,snprintf,CreateMutexA,GetLastError,CloseHandle,exit,chdir,close,close,close,open,dup,dup,fopen,getpid,fprintf,fclose,time,signal,signal,signal,CoInitialize,CoCreateInstance,CoUninitialize,__errno,__getreent,fflush,__getreent,fflush,GetLastError,GetLastError,WaitForSingleObject,WinDivertOpen,GetLastError,ReleaseMutex,CloseHandle,SetLastError,FormatMessageA,LocalFree,CreateEventW,GetLastError,__getreent,__getreent,fflush,usleep,WinDivertRecvEx,GetLastError,__errno,usleep,WaitForSingleObject,__errno,__errno,GetOverlappedResult,__errno,__errno,__errno,__errno,__errno,snprintf,WinDivertSend,GetLastError,__getreent,fflush,__getreent,fflush,ReleaseMutex,CloseHandle, | 8_2_00000001004153F0 |
Source: unknown | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\5dFLJyS86S.ps1" | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://t.me/bypassblock | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2524,i,17522185104263954872,595179964274981035,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Users\user\Desktop\bin\winws.exe "C:\Users\user\Desktop\bin\winws.exe" --wf-tcp=80,443 --wf-udp=443,50000-50100 --filter-tcp=443 --ipset="C:\Users\user\Desktop\lists\\russia-youtube-rtmps.txt" --dpi-desync=syndata --dpi-desync-fake-syndata="C:\Users\user\Desktop\bin\\tls_clienthello_4.bin" --dpi-desync-autottl --new --filter-udp=443 --hostlist="C:\Users\user\Desktop\lists\\youtubeQ.txt" --dpi-desync=fake,udplen --dpi-desync-udplen-increment=4 --dpi-desync-fake-quic="C:\Users\user\Desktop\bin\\quic_3.bin" --dpi-desync-cutoff=n3 --dpi-desync-repeats=2 --new --filter-tcp=443 --hostlist="C:\Users\user\Desktop\lists\\youtube_v2.txt" --dpi-desync=multisplit --dpi-desync-split-seqovl=1 --dpi-desync-split-pos=midsld+1 --new --filter-tcp=443 --hostlist="C:\Users\user\Desktop\lists\\youtubeGV.txt" --dpi-desync=multisplit --dpi-desync-split-seqovl=1 --dpi-desync-split-pos=midsld-1 --new --filter-tcp=443 --hostlist="C:\Users\user\Desktop\lists\\other.txt" --dpi-desync=fake,multisplit --dpi-desync-split-seqovl=1 --dpi-desync-split-pos=midsld-1 --dpi-desync-fooling=md5sig,badseq --dpi-desync-fake-tls="C:\Users\user\Desktop\bin\\tls_clienthello_4.bin" --dpi-desync-ttl=2 --new --filter-tcp=443 --ipset="C:\Users\user\Desktop\lists\\ipset-discord.txt" --dpi-desync=syndata --dpi-desync-fake-syndata="C:\Users\user\Desktop\bin\\tls_clienthello_3.bin" --dpi-desync-autottl --new --filter-tcp=443 --hostlist="C:\Users\user\Desktop\lists\\discord.txt" --dpi-desync=fakedsplit --dpi-desync-split-pos=1 --dpi-desync-fooling=badseq --dpi-desync-repeats=10 --dpi-desync-autottl --new --filter-udp=443 --hostlist="C:\Users\user\Desktop\lists\\discord.txt" --dpi-desync=fake,udplen --dpi-desync-udplen-increment=5 --dpi-desync-udplen-pattern=0xDEADBEEF --dpi-desync-fake-quic="C:\Users\user\Desktop\bin\\quic_2.bin" --dpi-desync-repeats=7 --dpi-desync-cutoff=n2 --new --filter-udp=50000-50090 --dpi-desync=fake --dpi-desync-any-protocol --dpi-desync-cutoff=n3 --new --filter-tcp=443 --ipset-ip=XXX.XXX.XXX.XXX/XX,XXX.XXX.XXX.XXX/XX --wssize=1:6 --hostlist-domains=googlevideo.com --dpi-desync=multidisorder --dpi-desync-split-seqovl=1 --dpi-desync-split-pos=1,host+2,sld+2,sld+5,sniext+1,sniext+2,endhost-2 --new --filter-tcp=443 --hostlist="C:\Users\user\Desktop\lists\\faceinsta.txt" --dpi-desync=split2 --dpi-desync-split-seqovl=652 --dpi-desync-split-pos=2 --dpi-desync-split-seqovl-pattern="C:\Users\user\Desktop\bin\\tls_clienthello_4.bin" --new | |
Source: C:\Users\user\Desktop\bin\winws.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://t.me/bypassblock | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Users\user\Desktop\bin\winws.exe "C:\Users\user\Desktop\bin\winws.exe" --wf-tcp=80,443 --wf-udp=443,50000-50100 --filter-tcp=443 --ipset="C:\Users\user\Desktop\lists\\russia-youtube-rtmps.txt" --dpi-desync=syndata --dpi-desync-fake-syndata="C:\Users\user\Desktop\bin\\tls_clienthello_4.bin" --dpi-desync-autottl --new --filter-udp=443 --hostlist="C:\Users\user\Desktop\lists\\youtubeQ.txt" --dpi-desync=fake,udplen --dpi-desync-udplen-increment=4 --dpi-desync-fake-quic="C:\Users\user\Desktop\bin\\quic_3.bin" --dpi-desync-cutoff=n3 --dpi-desync-repeats=2 --new --filter-tcp=443 --hostlist="C:\Users\user\Desktop\lists\\youtube_v2.txt" --dpi-desync=multisplit --dpi-desync-split-seqovl=1 --dpi-desync-split-pos=midsld+1 --new --filter-tcp=443 --hostlist="C:\Users\user\Desktop\lists\\youtubeGV.txt" --dpi-desync=multisplit --dpi-desync-split-seqovl=1 --dpi-desync-split-pos=midsld-1 --new --filter-tcp=443 --hostlist="C:\Users\user\Desktop\lists\\other.txt" --dpi-desync=fake,multisplit --dpi-desync-split-seqovl=1 --dpi-desync-split-pos=midsld-1 --dpi-desync-fooling=md5sig,badseq --dpi-desync-fake-tls="C:\Users\user\Desktop\bin\\tls_clienthello_4.bin" --dpi-desync-ttl=2 --new --filter-tcp=443 --ipset="C:\Users\user\Desktop\lists\\ipset-discord.txt" --dpi-desync=syndata --dpi-desync-fake-syndata="C:\Users\user\Desktop\bin\\tls_clienthello_3.bin" --dpi-desync-autottl --new --filter-tcp=443 --hostlist="C:\Users\user\Desktop\lists\\discord.txt" --dpi-desync=fakedsplit --dpi-desync-split-pos=1 --dpi-desync-fooling=badseq --dpi-desync-repeats=10 --dpi-desync-autottl --new --filter-udp=443 --hostlist="C:\Users\user\Desktop\lists\\discord.txt" --dpi-desync=fake,udplen --dpi-desync-udplen-increment=5 --dpi-desync-udplen-pattern=0xDEADBEEF --dpi-desync-fake-quic="C:\Users\user\Desktop\bin\\quic_2.bin" --dpi-desync-repeats=7 --dpi-desync-cutoff=n2 --new --filter-udp=50000-50090 --dpi-desync=fake --dpi-desync-any-protocol --dpi-desync-cutoff=n3 --new --filter-tcp=443 --ipset-ip=XXX.XXX.XXX.XXX/XX,XXX.XXX.XXX.XXX/XX --wssize=1:6 --hostlist-domains=googlevideo.com --dpi-desync=multidisorder --dpi-desync-split-seqovl=1 --dpi-desync-split-pos=1,host+2,sld+2,sld+5,sniext+1,sniext+2,endhost-2 --new --filter-tcp=443 --hostlist="C:\Users\user\Desktop\lists\\faceinsta.txt" --dpi-desync=split2 --dpi-desync-split-seqovl=652 --dpi-desync-split-pos=2 --dpi-desync-split-seqovl-pattern="C:\Users\user\Desktop\bin\\tls_clienthello_4.bin" --new | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2524,i,17522185104263954872,595179964274981035,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: linkinfo.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ntshrui.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cscapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: taskflowdataengine.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cdp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dsreg.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.shell.servicehostbuilder.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ieframe.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mshtml.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msiso.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: qmgr.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsperf.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: xmllite.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: firewallapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: esent.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwbase.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: flightsettings.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netprofm.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: npmproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsigd.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: upnp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ssdpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: appxdeploymentclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wsmauto.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wsmsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dsrole.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: pcwum.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msv1_0.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntlmshared.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rmclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: usermgrcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: samlib.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: es.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\bin\winws.exe | Section loaded: cygwin1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\bin\winws.exe | Section loaded: wlanapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\bin\winws.exe | Section loaded: windivert.dll | Jump to behavior |
Source: C:\Users\user\Desktop\bin\winws.exe | Section loaded: profapi.dll | Jump to behavior |