AlienSpy is a cross platform Java RAT with support for Windows, Linux and Mac systems.
The samples I was able to analyze used a demo version of the Allatori Java Obfuscator (v5.3) which can be seen in the obfuscated method naming and Splash page shown when the malware is launched.
![]() |
Allatori Name Obfuscation |
![]() |
Allatori Splash Screen |
![]() |
Jar Overview |
- Init LoadStub Thread
- Load config.ini contents
- Spawn DecryptStub Thread
- Create key -- Load password.ini contents and append static_key (set in LoadPassword.class)
- Decrypt config.ini using created key
- Spawn LoadStubDecrypted
- Initialize JarInputStream object from decoded config data
- Spawn thread with decoded Jar
Unpacking the Payload
Analyzing the decryption method in the DecryptStub class shows the encryption has changed from previous versions. The payload stored in the config.ini file is encrypted using RC4 and the decrypt key is composed of the sha256 hash of a dynamic key stored in the password.ini file and a static key defined in the LoadPassword.class.
Looking at the de-obfuscated strings in the LoadPassword class shows the static key as ALSKEOPQLFKJDUSIKSJAUIE.
![]() |
Appending Static Key |
The sha256 hash is then created from the combined dynamic and static key.
key = sha256(dynamic_key + static_key)
For this sample the key is calculated using the following:
sha256('l85T4gI3' + 'ALSKEOPQLFKJDUSIKSJAUIE')
To extract the properties (config.xml) or the entire payload I've put together a script to decode the latest version of the AlienSpy rat.
https://github.com/idiom/IRScripts/blob/master/alienspy-decrypt.py
key = sha256(dynamic_key + static_key)
For this sample the key is calculated using the following:
sha256('l85T4gI3' + 'ALSKEOPQLFKJDUSIKSJAUIE')
To extract the properties (config.xml) or the entire payload I've put together a script to decode the latest version of the AlienSpy rat.
https://github.com/idiom/IRScripts/blob/master/alienspy-decrypt.py
Once the rat is decoded we can decompile it and take a look at the layout and functionality. The decoded AlienSpy RAT has a simple layout containing a two resources config.xml & keystore.test and a collection of classes within three packages.
Persistence
When the malware is launched it checks the INSTALL property which is populated from the config.xml resource. If the property is set to True the installation method is triggered using the following properties to generate the directory and file on the host system.
- JAR_FOLDER - Name of folder to copy malware into
- JAR_NAME - Name of the file
- JAR_EXTENSION - Extension of the file
- JAR_REGISTRY - Name of persistence setting
Windows
On Windows systems the malware is copied to new directory with %appdata% and a new value under the Run key is created to launch the malware. The value name is the string defined within the JAR_REGISTRY config setting and the value is the command line to launch the malware 'java -jar <path-to-jar>'. The jar path and file name is defined by the JAR_ properties described above.
Depending if the user is a local administrator or not the value is created under the Run key in HKLM or HKCU to either infect the system or only the current user. To check if the user is an administrator the file tem.txt is created within the Windows directory and deleted. If this succeeds the Administrator Property is set to true.
Linux
On a Linux system the jar file is copied to the hidden directory <JAR_FOLDER> within the user's home directory and renamed to <JAR_NAME>.<JAR_EXTENSION>. The malware then creates a .desktop file within the users autostart directory ~/.config/autostart/<JAR_REGISTRY>.desktop to launch the RAT when the desktop is started.
MacOS
Like on Linux systems the malware creates a file under a new directory <JAR_FOLDER> in the user's home. It then creates a new job within the user's Library/LaunchAgents directory com.<JAR_REGISTRY>.plist
The generated configuration file has the optional key RunAtLoad set to true; this instructs launchd to run the job once when it is loaded.
Once the job file is created, it then runs the command "chflags hidden <JAR_FOLDER>" to set the hidden flag and hide the directory from the UI.
Sandbox Detection
When executed AlienSpy checks if it is running within either a VirtualBox or VMWare environment. If it detects that it is running within a VM the application exits. The detection technique isn't advanced and is done by detecting files installed as part of the VM host guest tools.
For VirtualBox this is either the file "/etc/init.d/vboxadd" in Linux or the directory "Oracle\Virtualbox Guest Additions" in Windows. If the RAT is running within a Mac environment it returns false.
![]() |
VirtualBox Detection |
Similarily for VMware this is the directory "/etc/vmware-tools" in Linux "/Library/Application Support/VMware Tools" in Mac and "VMware\VMware Tools" in Windows.
![]() |
VMWare Detection |
Communication
AlienSpy uses SSL Sockets to communicate with the C2 server. The server and port are both defined within the config.xml file.
- DNS - Hostname or IP address
- PORT - TCP port
The jar file contains a keystore resource keystore.test which is used to trust the C2 SSL certificate. Using keytool we can look at the contained certificates.
Note: The password for the keystore is 'storepass' and is defined in utils\AlienSSLSocket.class
When examining the certificate details I was able to trace it back to a how-to post on SSLSockets and creating a keystore.
The majority of settings for the certificate have just been directly copied from the examples in the article (keystore name, password and certificate properties).
C2 Subscription
To subscribe to the C2 server the rat first creates and configures the SSL connection then sends 1 then sends the properties describing the host system. At this point the malware is in listening mode waiting for commands from the C2 server.
![]() |
Commands
Once connected to the C2 server the RAT waits for a command. Commands have a simple syntax of command_id [1..10] and an optional payload for the command.
Id | Payload | Description |
---|---|---|
1 | [0] - Message Type
[1] - Option Type [2] - Title [3] - Message | Display Message Box |
2 | [0] - URL [1] - Number of times to open the URL | Open the URL the requested number of times. Hardcoded to sleep 2s every iteration. |
3 | N/A | Shutdown |
4 | N/A | Restart |
5 | N/A | Uninstall |
6 | N/A | Update Offline |
7 | URL for update. | Update Online |
8 | [0] - URL for download. [1] - Extension to append to file. |
Download & Execute |
9 | Plugin Name | Run Plugin |
10 | N/A | Start Heartbeat |
From what I've observed the first command after subscription is generally '10' which instructs the infected host to begin sending a heartbeat every 60 seconds.
The heartbeat will continue running on a separate user thread while the malware waits for the next command from the server.
- Write 1
- Write PINGPONG
- Sleep 60s
The heartbeat will continue running on a separate user thread while the malware waits for the next command from the server.
Updating
There are two commands the C2 server can send for updating infected hosts; an online update or an offline update.
An offline update instructs the client to make another connection to the C2 server. Once the updated rat is downloaded it will call uninstall to remove the existing version then launch the updated one from the temp file.
An online update includes a URL as the payload which instructs the RAT where to download the updated version from. A GET request is sent to the URL with the hardcoded UserAgent
Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36
The same process seen in the update offline is followed, the new version is downloaded into a temporary file and the client uninstalls the existing version and updates to the newly downloaded version.
Download & Execute
The server can issue the command Id 8 which instructs the client to download and execute the downloaded file. The payload for this command includes the URL to download the file from and the extension to append to the file once it is downloaded.Requests are made using the UserAgent:
Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.17 (KHTML, like Gecko) Chrome/24.0.1312.57 Safari/537.17
Once the file is downloaded the file is passed to an opener function where it determines how to launch the downloaded file. The opener first checks if the downloaded file ends in '.jar' if it does it will generate a string 'java -jar <downloaded jar>' and execute it.
If the malware is running on MacOS it will also append the argument -Dapple.awt.UIElement=true
If the file doesn't end in .jar the opener will use the preferred method to open files for the host OS. For Windows systems this is cmd, for Linux this is either /usr/bin/open or /usr/bin/xdg-open and for MacOs this is java.awt.Desktop.getDesktop().open
Open URL
The server can instruct clients to open a URL. The payload to this command contains the URL to open and the number of iterations. The client will then open the URL the requested number of times sleeping for 2 seconds between iterations.
- For MacOS it will launch the URL using: open -a Safari <URL>
- For Windows it will launch the URL using: cmd.exe /c START iexplore.exe <URL>
- For Linux it will launch the URL using: /usr/bin/xdg-open <URL>
Conclusion
Incident Responders looking for systems compromised by AlienSpy can extract host and network indicators from the properties defined in the config.xml file. Additionally systems would also be beaconing to the C2 server every 60 seconds.
AlienSpy is used to deliver other malicious payloads to infected systems. Detecting the presence of AlienSpy should be considered to be only part of the compromise.
If you have any samples, would like to collaborate feel free to reach out to me on twitter @seanmw. I'm interested in looking at how AlienSpy is being used in phishing campaigns to deliver malware.
Samples
The samples I used for the post can be found using the hashes below:- Sample 1: f3366d437f9461f1486406972f52e7aab47174db
- Sample 2: c932064fe6a7dfc96fb2a3ffec2b7f4e5b7e048f
References
- http://contagiodump.blogspot.ca/2014/11/alienspy-java-rat-samples-and-traffic.html
- https://developer.gnome.org/autostart-spec/
- https://developer.apple.com/library/mac/documentation/MacOSX/Conceptual/BPSystemStartup/Chapters/CreatingLaunchdJobs.html
- https://developer.apple.com/library/mac/documentation/Darwin/Reference/ManPages/man5/launchd.plist.5.html#//apple_ref/doc/man/5/launchd.plist
great writeup, thanks. Would have been nice if you included the network artifacts as well.
ReplyDeleteHi Alexander,
DeleteI'm still looking at how the RAT is used to deliver malware onto infected systems, so I hope to have another post soon which will include packet captures.
IEEE Final Year projects Project Center in Chennai are consistently sought after. Final Year Students Projects take a shot at them to improve their aptitudes, while specialists like the enjoyment in interfering with innovation. For experts, it's an alternate ball game through and through. Smaller than expected IEEE Final Year project centers ground for all fragments of CSE & IT engineers hoping to assemble. <Final Year Projects for CSE It gives you tips and rules that is progressively critical to consider while choosing any final year project point.
DeleteJavaScript Training in Chennai
JavaScript Training in Chennai
The Angular Training covers a wide range of topics including Components, project projects for cseAngular Directives, Angular Services, Pipes, security fundamentals, Routing, and Angular programmability. The new Angular TRaining will lay the foundation you need to specialise in Single Page Application developer. Angular Training
Creating "a Run key" for persistence wouldn't necessarily do anything...creating a _value_ beneath the appropriate Run key, with data pointing to the file to be launched, does provide persistence.
ReplyDeleteIs there anything known about the value name? Is it consistent, random every time?
Hi Harlan,
DeleteMy bad, I should have been more descriptive (dangers of late night posting).
I've made a update to better explain that a value is created under the run key. The value name is defined in the JAR_REGISTRY config setting which would be random. And the data is a command line to launch the jar file.
Has anyone managed to get this exploit to actually work (execute the .jar, create the subdirectories, go after the payload and drop it into place, and then execute the malware in the payload) in Linux? So far all I've seen is that the source code mentions Linux, OSX, Android, etc. But little evidence of actually working in those platforms.
ReplyDeleteGreat article....thanks for sharing this information
ReplyDeleteSelenium training in chennai | Selenium training in velachery
I think this is an informative post and knowledgeable. Thank you for sharing this wonderful post! I’m glad that I came across your article. Java Training in Chennai
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteNice post....Thanks for sharing.
ReplyDeletePython training in Chennai
It is very beneficial information for me, I really impressed. This is very nice article and continues sharing with us...
ReplyDeleteUnix Training in Chennai
Unix Shell Scripting Training in Chennai
Embedded System Course Chennai
Linux Training in Chennai
Corporate Training in Chennai
Oracle DBA Training in Chennai
Tableau Training in Chennai
Pega Training in Chennai
Oracle Training in Chennai
Unix Training in OMR
Unix Training in Velachery
Thanks for your valuable content, it is easy to understand and follow.
ReplyDeleteEthical Hacking Course in Chennai
Hacking Course in Chennai
Ethical hacking course in bangalore
Ethical hacking course in coimbatore
Hacking course in coimbatore
Ethical hacking training in coimbatore
Ethical hacking in coimbatore
Data Science Courses in Bangalore
Your info is really amazing with impressive content..Excellent blog with informative concept. Really I feel happy to see this useful blog, Thanks for sharing such a nice blog..
ReplyDeleteIf you are looking for any Data science Related information please visit our website Data science courses in Pune page!
This is really too useful and have more ideas and keep sharing many techniques. Eagerly waiting for your new blog keep doing more.
ReplyDeleteDevOps Training in Chennai
DevOps certification in Chennai
DevOps course in Chennai
UiPath Training in Chennai
Blue Prism Training in Chennai
Machine Learning course in Chennai
DevOps Training in Anna Nagar
DevOps Training in T Nagar
DevOps Training in OMR
DevOps Training in Porur
You are the smartest, you are much louder and I hope you give me a heart zero city zombie shelter survival hack
ReplyDeletei thank you for your post cyber security online training india
ReplyDeleteAwesome post. Good Post. I like your blog. You Post is very informative. Thanks for Sharing.
ReplyDeletePython Training Institute in Noida
Machine Learning Training Institute in Noida
Core Java Training Institute in Noida
Hadoop Training Institute in Noida
Such A nice post... thanks For Sharing !!Great information for new guy like Hanuman Chalisa Lyrics
ReplyDeleteit's working fine for me! Thank you for sharing this with us dominations hack
ReplyDeletevery informative post..!
ReplyDeleteinplant training in chennai
inplant training in chennai
inplant training in chennai for it
Australia hosting
mexico web hosting
moldova web hosting
albania web hosting
andorra hosting
australia web hosting
denmark web hosting
very nice.....!
ReplyDeleteinplant training in chennai
inplant training in chennai
inplant training in chennai for it
italy web hosting
afghanistan hosting
angola hosting
afghanistan web hosting
bahrain web hosting
belize web hosting
india shared web hosting
nice..
ReplyDeleteinplant training in chennai
inplant training in chennai
inplant training in chennai for it
hosting
india hosting
india web hosting
iran web hosting
technology 11 great image sites like imgur hosting
final year project dotnet server hacking what is web hosting
macao web hosting
inplant training in chennai
ReplyDeleteinplant training in chennai
inplant training in chennai for it.php
chile web hosting
colombia web hosting
croatia web hosting
cyprus web hosting
bahrain web hosting
india web hosting
iran web hosting
nice...................
ReplyDeleteinplant training in chennai
inplant training in chennai
inplant training in chennai for it
algeeria hosting
angola hostig
shared hosting
bangladesh hosting
botswana hosting
central african republi hosting
shared hosting
Very Nice...
ReplyDeleteinternship in chennai for ece students with stipend
internship for mechanical engineering students in chennai
inplant training in chennai
free internship in pune for computer engineering students
internship in chennai for mca
iot internships
internships for cse students in
implant training in chennai
internship for aeronautical engineering students in bangalore
inplant training certificate
Oh my goodness! Impressive article dude! Thank you, However I am going through problems with your RSS. I don’t know the reason why I cannot join it. Is there anybody getting the same RSS issues? Anyone that knows the solution will you kindly respond? Thanks!! asus display replacement An outstanding share! I've just forwarded this onto a colleague who has been conducting a little research on this. And he in fact bought me breakfast simply because I stumbled upon it for him... lol. So allow me to reword this.... Thank YOU for the meal!! But yeah, thanks for spending some time to talk about this matter here on your web page. onsite mobile repair bangalore After going over a few of the articles on your web page, I truly like your way of writing a blog. I saved as a favorite it to my bookmark site list and will be checking back in the near future. Please check out my web site as well and let me know what you think. huawei display repair bangalore
ReplyDeleteGreetings! Very helpful advice in this particular post! It is the little changes that produce the largest changes. Many thanks for sharing! motorola display repair bangalore Hi there! This blog post couldn’t be written much better! Looking at this post reminds me of my previous roommate! He always kept talking about this. I most certainly will send this post to him. Fairly certain he's going to have a great read. Thanks for sharing! vivo charging port replacement Howdy, I believe your web site could possibly be having web browser compatibility problems. Whenever I look at your web site in Safari, it looks fine however, when opening in I.E., it has some overlapping issues. I just wanted to give you a quick heads up! Aside from that, great blog! lg service center Bangalore
ReplyDeletevery nice post blog.........
ReplyDeleter programming training in chennai
internship in bangalore for ece students
inplant training for mechanical engineering students
summer internships in hyderabad for cse students 2019
final year project ideas for information technology
bba internship certificate
internship in bangalore for ece
internship for cse students in hyderabad
summer training for ece students after second year
robotics courses in chennai
This has been discussed by many Android users, where they have found an Android Keylogger: https://www.spyic.com/android-keylogger.html which suitable for the device they are using. With it, you can then know every keyboard stroke input that the victim apply, thus making you know the password they are using.
ReplyDeleteBest-AWS-training-institute-center-in-Noida-sector-62.php
ReplyDeletemachine learning training in Noida sector 63
salesforce training in noida sector 62
Email marketing training course in noida sector 63
AWS training institute center in Noida sector 64
android training center in noida sector 63
digital marketing training center in noida sector 16
ReplyDeleteUi Path training center in Noida
digital marketing training center in noida sector 18
linux training center in noida sector 15
python training in noida sector 62
linux training center in noida sector 63
android training center in noida sector 62
ReplyDeletedigital marketing training center in noida sector 15
python training in noida sector 63
sap sd training in noida
devops training in noida
Email marketing training course in noida sector 62
ReplyDeletedevops training in center noida
blue prism training center in noida
cloud computing training in noida sector 15
hadoop training center in noida
python training in noida sector 15
sap sd training center in noida
ReplyDeletelinux training center in noida sector 62
Email marketing training course in noida sector 15
salesforce training in noida sector 63
openstack training in noida sector 15
machine learning training in Noida sector 62
AWS training institute center in Noida sector 63
ReplyDeleteandroid training center in noida sector 15
salesforce training in noida sector 18
sap sd training course in noida
sap fico training in noida
hadoop training center in noida
ReplyDeletedata science training course in noida
data science training center in noida
php training center in noida
php training course in noida
web design training course in noida
web design training center in noida
oracle training center in noida
oracle training course in noida
https://myhrcvs.home.blog/2019/12/15/strength-medication-storage-and-disposal/
ReplyDeletehttps://mycvvshr.blogspot.com/2019/12/myhr-cvs-portal-register-login-and.html
https://sites.google.com/view/cvssmyhr/home
http://cvs-hr.jouwweb.nl/
https://cvslogin.tumblr.com/post/189680989267/cvs-health-site
customer plan individuals to fill their upkeep remedies through mail request conveyance or at a CVS Pharmacy retail location at a similar cost
Great post. keep sharing such a worthy information
ReplyDeleteSoftware Testing Training in Chennai
Software Testing Training in Bangalore
Software Testing Training in Coimbatore
Software Testing Training in Madurai
Best Software Testing Institute in Bangalore
Software Testing Course in Bangalore
Software Testing Training Institute in Bangalore
Selenium Course in Bangalore
I really enjoyed to read this blog. Thanks for sharing the useful information.
ReplyDeleteDevOps Training in Chennai
DevOps Training in Bangalore
DevOps Training in Coimbatore
Best DevOps Training in Bangalore
DevOps Course in Bangalore
DevOps Training Bangalore
DevOps Training Institutes in Bangalore
DevOps Training in Marathahalli
AWS Training in Bangalore
Data Science Courses in Bangalore
Nice Blog, Very Informative Content,waiting for next update...
ReplyDeletejavascript training in chennai
javascript course fees in chennai
javascript class
javascript training in T nagar
javascript training in Guindy
javascript training in chennai
core java training in chennai
Photoshop Classes in Chennai
Manual Testing Training in Chennai
Drupal Training in Chennai
Really informative blog for all people. Thanks for sharing it.
ReplyDeleteSpoken English Classes in Chennai
Spoken English Course in Chennai
german classes
Best IELTS Coaching in Chennai
learn Japanese in Chennai
TOEFL Coaching Centres in Chennai
content writing course in chennai
spanish coaching in chennai
Spoken English Classes in Anna Nagar
Spoken English Classes in Tnagar
Nice Blog...Thanks for sharing the article waiting for next update...
ReplyDeleteArtificial Intelligence Course in Chennai
best artificial intelligence training in chennai
C C++ Training in Chennai
javascript training in chennai
Html5 Training in Chennai
QTP Training in Chennai
Spring Training in Chennai
DOT NET Training in Chennai
i tried it, great.
ReplyDeleteseaport hack
I am inspired with your post writing style & how continuously you describe this topic on cyber security training . After reading your post, thanks for taking the time to discuss this, I feel happy about it and I love learning more about this topic.
ReplyDelete
ReplyDeleteExcellent trick this great friend, this was what I was looking for a long time and finally something that works. I recommend them all if it is real is not a lie. Thanks friend. Keep it up mini golf king hack
Thank you for this article. I am sure alienspy has many benefit. Although I want to talk about this free gps phone tracker to track a cell phone location without them knowing on Clickfree. Similar to your software, this is great!
ReplyDeleteTechnology has given us everything. With the help of technology anyone can steal your important data from your phone. Do you know that? But if you have best keylogger for android http://minspy.com/phone-spy/best-keylogger-for-android/ set up in your device. Therefore, you are secure enough. Anyone can't easily steal your data now. It's best to use a keylogger.
ReplyDeleteI feel so blessed with this article which able to let me learn on how to track my child's phone without them knowing: http://spyier.com/phone-tracker/track-my-childs-phone-without-them-knowing/. Thank you for this guide I am able to monitor his behavior and knowing who he is messaging with as I am so worry for his well being.
ReplyDeleteHave you ever used a keylogger for your Android device? If yes, which one? Is that one for free or paid? I would like to inform you guys about a best keylogger for android try here http://spyine.com/mobile-spy/best-keylogger-for-android/. This will help you to keep your mobile data more secure.
ReplyDeleteHey everyone I am so excited about this tutorial because it has helped me to I really appreciate thanks for sharing horse riding tales hack
ReplyDeleteIt would have been the happiest moment for you,I mean if we have been waiting for something to happen and when it happens we forgot all hardwork and wait for getting that happened.
ReplyDeleteAWS training in chennai | AWS training in annanagar | AWS training in omr | AWS training in porur | AWS training in tambaram | AWS training in velachery
Great to come accross something that actually works, and at the same time is not hopelessly complicated. i really enjoy to read this content
ReplyDeleteAi & Artificial Intelligence Course in Chennai
PHP Training in Chennai
Ethical Hacking Course in Chennai Blue Prism Training in Chennai
UiPath Training in Chennai
Amazing idea...! you gave a post very depth content about this topic and surely this post helps to in my future. Please continue this great job...
ReplyDeleteSalesforce Training | Online Course | Certification in chennai | Salesforce Training | Online Course | Certification in bangalore | Salesforce Training | Online Course | Certification in hyderabad | Salesforce Training | Online Course | Certification in pune
Thanks a lot for sharing such a good source with all, i appreciate your efforts taken for the same. I found this worth sharing and must share this with all.
ReplyDeleteDot Net Training in Chennai | Dot Net Training in anna nagar | Dot Net Training in omr | Dot Net Training in porur | Dot Net Training in tambaram | Dot Net Training in velachery
nice blog..valuable information....thanks for sharing...
ReplyDeleteStudy Abroad Consultants in Kerala
study abroad consultants in thrissur
Study Abroad Consultants in Calicut
abroad job consultancy in coimbatore
best overseas education consultants in thrissur
overseas education consultants in kozhikode
study abroad
study in poland
study in europe
free abroad study
The development of artificial intelligence (AI) has propelled more programming architects, information scientists, and different experts to investigate the plausibility of a vocation in machine learning. Notwithstanding, a few newcomers will in general spotlight a lot on hypothesis and insufficient on commonsense application. machine learning projects for final year In case you will succeed, you have to begin building machine learning projects in the near future.
ReplyDeleteProjects assist you with improving your applied ML skills rapidly while allowing you to investigate an intriguing point. Furthermore, you can include projects into your portfolio, making it simpler to get a vocation, discover cool profession openings, and Final Year Project Centers in Chennai even arrange a more significant compensation.
Data analytics is the study of dissecting crude data so as to make decisions about that data. Data analytics advances and procedures are generally utilized in business ventures to empower associations to settle on progressively Python Training in Chennai educated business choices. In the present worldwide commercial center, it isn't sufficient to assemble data and do the math; you should realize how to apply that data to genuine situations such that will affect conduct. In the program you will initially gain proficiency with the specialized skills, including R and Python dialects most usually utilized in data analytics programming and usage; Python Training in Chennai at that point center around the commonsense application, in view of genuine business issues in a scope of industry segments, for example, wellbeing, promoting and account.
Nice article...Waiting for next update...
ReplyDeleteui ux design course in chennai
ux design course in chennai
ui design course in chennai
VMware course in Chennai
VMware course in Bangalore
R Programming Training in Bangalore
R Training in Chennai
Awesome blog, informative content...thanks for sharing...
ReplyDeleteSocial Media Marketing Courses in Chennai
Social Media Marketing Training in Chennai
Social Media Training in Chennai
google analytics course certification
oet coaching in chennai
valuable blog,Informative content...thanks for sharing, Waiting for the next update...
ReplyDeletesharepoint course in chennai
sharepoint training in chennai
sharepoint training
sharepoint course
advanced excel training in chennai
mysql course
Nice Blog...Thanks for sharing the article waiting for the next update...
ReplyDeleteswift developer course in chennai
swift developer training in chennai
swift developer certification training in chennai
swift developer course certification in chennai
google ads training courses in chennai
sales course in chennai
I read this blog, Nice article...Thanks for sharing and waiting for the next...
ReplyDeletecore java training in chennai
core java training institutes in chennai
Best core java Training in Chennai
MEAN Stack Course in Chennai
C Training in Chennai
it is really a great and helpful piece of info. I am glad that you shared this helpful information with
ReplyDeletemalaysian embassy singapore
Amazing Article,Really useful information to all So, I hope you will share more information to be check and share here.thanks for sharing .
ReplyDeleteWebsite: Trip to Vietnam
I enjoyed over read your blog post. This was actually what i was looking for and i am glad to came here!
ReplyDeleteWebsite: Imitation jewellery manufacturers
I see that this article has been talking about how to protect the phone itself. But this guide about Android spy app by redirect to FoneMonitor on how to hack a phone which can be done easily. How can we prevent this leak of information from happening?
ReplyDeleteJust read check it out article if you want to hack Android spy app by phone number. I have tried it myself and it works brilliant. Although it can not be done in single day sometimes, you will need time for the messages to be delivered to target users.
ReplyDeletePost is very good its amzazing post I love them thanks for sharing.
ReplyDeletevisit here- lok sabha election comedy
Nice Blog!!! Waiting for your new post... thanks for sharing with us.
ReplyDeletefuture of digital marketing
big data analytics
best technology to learn for future
graphic design examples
rpa interview questions and answers pdf
it is really a great and helpful piece of info. I am glad that you shared this helpful information with us. Please keep us informed like this. Thank you for sharing.
ReplyDeletechinese visa application centre
We are a well-known writing service provider in Australia. If anyone looking for a genuine assignment help service provider over there, then come to us for guaranteed results.
ReplyDeleteAssignment Help Sydney
Thank you for sharing.
ReplyDeleteData Science Online Training
Python Online Training
Salesforce Online Training
Very well written information. It will be supportive to everyone who employess it, including yours truly. Keep up the good work - can'r wait to read more posts.
ReplyDeleteVisit here :- Best Seo Company In India
it is really a great and helpful piece of info. I am glad that you shared this helpful information with us. Please keep us informed like this. Thank you for sharing.
ReplyDeleteWebsite: Lohri bumper lottery 2021
Fantasy Power 11 if you have a good knowledge of Cricket you Can earn real money or Paytm cash. Download Link, and Review.If You have skills related to cricket, football, Kabaddi so you can play fantasy cricket in Fantasy Power11 fantasy cricket
ReplyDeleteNice post ! I love its your site after reading ! thanks for sharing.
ReplyDeletebewafa shayari
best shayari on life
dard bhari shayari video
I am new here. I like your post very much. It is very usefull post for me.
ReplyDeletewebsite: free market research reports
Nice Post...Thanks..
ReplyDeleteBest Location to Buy Real Estate in Pune.Some factor shapes many other major decisions such as: Lifestyle, Environment ,Weather, Education, Career, Social Networks.
I am really enjoying reading your well written articles. I think you spend numerous effort and time updating your blog.
ReplyDeleteonline electronics shopping sites in india
I always like to read a quality content having accurate information regarding the subject and the same thing I found in this post.
ReplyDeleteWebsite : Website Development Company |
Good day! This is kind of off topic but I need some help from an established blog. Is it very hard to set up your own blog? I m not very technical but I can figure things out pretty quick. I'm thinking about setting up my own but I'm not sure where to begin. Do you have any tips or suggestions? Thanks .
ReplyDeleteWebsite : Craigslist Posting Service for Car Dealers |
This is really amazing website that I have been found on google regarding website Blog Commenting sites. and I would like to thank admin who also given us to post the link on his side.
ReplyDeleteWebsite : Lubbock moving company |
This was something I was looking for, really helpful, and great work is done. Thank you so much for sharing such valuable information.
ReplyDeleteWebsite : Car Auction Software |
It’s really a cool and helpful piece of information. I am glad that you shared this useful information with us. Please keep us up to date like this. Thanks for sharing.
ReplyDeleteWebsite : Best CRM for Small Businesses |
I am really like it very much for the interesting info in this blog that to this website is providing the wonderful info in this blog that to utilize the great technology in this blog.
ReplyDeleteWebsite : Web Development Company in Gwalior |
Thanks for giving me good information. It is really useful for getting more information.
ReplyDeletefeatures of android operating system
ui path tool
bdd framework in selenium
basics of tally
why ethical hacking
rpa interview questions and answers pdf
Communication is a two way process. If done properly, it gives excellent result. Thus opting for the best Integrated Marketing Communication Course on Talentedge is wise. To know more visit:
ReplyDeleteThis information is very interesting to read. Thanks for updating.
ReplyDeleteconvert list into string in python
convert list into string in python
บาคาร่า
ReplyDeleteคาสิโนออนไลน์
ufabet
ufa
เว็บบอล
เว็บแทงบอล
ReplyDeleteufabet
ufa
พวงหรีด
โควิด
Thanks for sharing such nice info. I hope you will share more information like this. please keep on sharing!
ReplyDeletePython Training In Bangalore | Python Online Training
Artificial Intelligence Training In Bangalore | Artificial Intelligence Online Training
Data Science Training In Bangalore | Data Science Online Training
Machine Learning Training In Bangalore | Machine Learning Online Training
AWS Training In Bangalore | AWS Online Training
IoT Training In Bangalore | IoT Online Training
Adobe Experience Manager (AEM) Training In Bangalore | Adobe Experience Manager (AEM) Online Training
Oracle Apex Training In Bangalore | Oracle Apex Online Training