Summary | ZeroBOX

Monetary_Funding_Sheet_2024.js

Category Machine Started Completed
FILE s1_win7_x6403_us July 29, 2024, 4:48 p.m. July 29, 2024, 4:51 p.m.
Size 785.2KB
Type ASCII text, with very long lines, with no line terminators
MD5 71b47c3b941616d457f0edc4234a91a0
SHA256 35fe092e603725bfbc916c503e2cd94c84f907a7f1b4a8d16d3dc46aa41eab73
CRC32 B28C5F53
ssdeep 3072:a1ypfxlBitFQeQW8mXec2/JdjHKj2fn+Aq22Dp//fAeP76T/rmIKj8:a1ypfxGtFQGOc2/LOon+AKp//dIM8
Yara None matched

Name Response Post-Analysis Lookup
pastie.io 172.67.162.195
IP Address Status Action
164.124.101.2 Active Moloch
172.67.162.195 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49174 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49167 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49170 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49166 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49175 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49183 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49171 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49180 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49212 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49184 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49162 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49163 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49176 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.103:49225 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.103:49189 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.103:49185 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.103:49164 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.103:49172 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49244 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49204 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49179 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49187 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49245 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.103:49181 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49207 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49188 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49213 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49252 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49195 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49191 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49199 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49257 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49227 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49197 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49192 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49209 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.103:49229 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49260 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49193 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49200 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49216 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49236 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49220 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49203 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49219 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49237 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49228 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49205 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49232 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49247 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49233 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.103:49168 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49208 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49255 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49259 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49267 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49215 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49196 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49239 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49263 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49217 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49271 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49201 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49272 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49269 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49275 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49211 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49277 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49280 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49276 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49231 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49281 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49287 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49285 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49235 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49289 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49283 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49301 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49240 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49221 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49296 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49303 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49265 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49311 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49241 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.103:49305 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.103:49313 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49268 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49248 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49299 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49317 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49279 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49249 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49304 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49284 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49223 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49251 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49312 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49321 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49288 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49256 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49291 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49261 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49292 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49224 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49273 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49300 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49295 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49309 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 172.67.162.195:443 -> 192.168.56.103:49297 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49243 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49319 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49307 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49315 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49253 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49316 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49320 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49264 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.162.195:443 -> 192.168.56.103:49293 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49308 -> 172.67.162.195:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0
Lionic Trojan.Script.Generic.4!c
VIPRE Trojan.GenericKD.73736397
ESET-NOD32 JS/Kryptik.CRZ
Kaspersky HEUR:Trojan.Script.Generic
BitDefender Trojan.Generic.36632478
NANO-Antivirus Trojan.Script.Agent.jsggck
MicroWorld-eScan Trojan.Generic.36632478
Rising Trojan.Kryptik/JS!8.10DBE (TOPIS:E0:HtiyJ0HQfSP)
Emsisoft Trojan.Generic.36632478 (B)
FireEye Trojan.Generic.36632478
Ikarus Trojan.JS.Crypt
Google Detected
MAX malware (ai score=83)
Kingsoft Script.Trojan.Generic.a
Microsoft Trojan:Script/Wacatac.B!ml
ZoneAlarm HEUR:Trojan.Script.Generic
GData Script.Trojan.Agent.HBPPU0
Tencent Script.Trojan.Generic.Ddhl
alibabacloud Trojan:Javascript/Generic.Gen
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: lhf§IkGX4àCüZ?ޒ(¢©f ÕàS6›ŠÄti/5 ÀÀÀ À 28'ÿ pastie.io  
socket: 948
sent: 113
1 113 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: lhf§Il’.hK;–4Ñ|v Ê\áV°qì%i¸Õ$$SÓt/5 ÀÀÀ À 28'ÿ pastie.io  
socket: 948
sent: 113
1 113 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: 51f§IlÓ{â%M½F}Ã%›¹ ÞËû¥“»Pš¦{ÈP/Ì  ÿ
socket: 948
sent: 58
1 58 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: !
socket: 804
sent: 1
1 1 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: lhf§Ini{ò#Zèì*ئÖ©Dw01¦‡ë­†ä»5î/5 ÀÀÀ À 28'ÿ pastie.io  
socket: 1076
sent: 113
1 113 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: lhf§Inˆ2âmìã½ß»r é¼¢›r¨9ÎÀµ]/5 ÀÀÀ À 28'ÿ pastie.io  
socket: 1076
sent: 113
1 113 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: 51f§Iow=(Џ®Ú„®yߪámú˜¤ÓÔ|(¹2º  ÿ
socket: 1076
sent: 58
1 58 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: !
socket: 804
sent: 1
1 1 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: lhf§IqCÏ(‡ìDO?…}ÞŽ´0õ«ÖÉah=x\n©/5 ÀÀÀ À 28'ÿ pastie.io  
socket: 1076
sent: 113
1 113 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: lhf§IqҌ¡ù·^t± ’æÊ'Ó|rcwäéÜxÍ/5 ÀÀÀ À 28'ÿ pastie.io  
socket: 1080
sent: 113
1 113 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: 51f§Ir5§Sùà.^ÓL¨ÃžÀßöÅz3&Šñ½r[Á  ÿ
socket: 1076
sent: 58
1 58 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: !
socket: 804
sent: 1
1 1 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: lhf§ItAƒZžIà0 ž4~¼Š/4î] @ɘ//5 ÀÀÀ À 28'ÿ pastie.io  
socket: 1076
sent: 113
1 113 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: lhf§ItÉm†K $ŸÞÍø FÛiˆ:(ßòâ†Ø2Š/5 ÀÀÀ À 28'ÿ pastie.io  
socket: 1076
sent: 113
1 113 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: 51f§IuC@!¨Éˆˆæ¾Êã¼*ᇛy͘k2cJb#  ÿ
socket: 1076
sent: 58
1 58 0

send

buffer: !
socket: 804
sent: 1
1 1 0

send

buffer: !
socket: 804
sent: 1
1 1 0

InternetCrackUrlW

url: https://pastie.io/raw/yjuddx
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /raw/yjuddx
1 13369356 0