Skip to content

inter0hm/fxpgunz-unpacked

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

88 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

#More information's regarding the creation of this repo: https://pastebin.com/raw/Q94UpcYM #Metamorphism

#FXPGUNZ.COM.

https://privatebin.net/?c12b6b071f9f1331#79xXkkXWuaGrRsHfX6nEwu4V3ZHrt7rDoYskuXZKPFYY https://pastebin.com/raw/mCSYtEf9 https://cryptpad.fr/code/#/2/code/edit/lSDw0zraux1vyMRDIR2v4Tqn/

  • INTELLIGENCE DATA REGARDING FXPGUNZ METAMORPHIC MALWARE / Abuse OF exploitable softwares/libraries

  • if you contribute , please be patient as I counter verify

  • this repo will be used to host unpacked executable of fxp gunz malware , will contain information's regarding the registery read/write, deletions , deprecated softwares like .net 4.x left on purpose on the launcher using old ie.

  • The executable uses selfpolymorphism and metamorphism technique that uses system and features in an original softwares without changing it initial behavior.

    • i removed vmprotect from various executable for investigation , i started noticing changes my finds removed after public disclosure , comparing the changes would be interesting
    • The unpacked client are inside the archive like this 1D905A0814A9E397.zip and other similar looking .zip archive. I will eventually organize it and clean it.
  • Archive password :> infected

  • Main domain: fxpgunz.com

  • old host provider before migration toward NL datacenter which i'm the one that recommended it after helping him dealing with a scam situation he did fall for.

  • sharp did google for "ddos protected host" clicked a random one. He had several issue setting the server up considering he barely know stuff about system administration and only what he was taught to write/program at idf, can buy or get his hands on from his friends he wasn't able to get the required information's from events viewer, netstat.

  • the first thing i did was try to ensure the routing was properly done and from the arp -a command i notice hes been arp spoofed and still didn't know how to proceed , panicking. He could have done few research about the provider and a virustotal scan he would have quickly noticed lots of detections and redflag coming from search engine result.

  • i made him move to good provider which i regret but this is not a problem since his favicon resolve his back end and that he ran his server on a windows server without reducing the attack surface, sysloging , no siem .

  • You killed your own domain reputation with the fake sql table and greatly reduced visibility of the darknet one that occured few days afters https://www.unpac.me/results/155511f4-60ef-4640-8487-561a93a79f05

  • for crowdsourced collab do not mix launcher ioc with gunz.exe one.

  • https://www.virustotal.com/gui/collection/de71546cf3df1fac8b0ee2fe4b3fc7e5a2f1906c33f73f55bd52c292c21ffb7b/community

  • hybrid analysis collections of older unpacked exe sent to me while i was dev @ fxp but never had access to the source or server. https://hybrid-analysis.com/file-collection/65c5615a63ecc83d55034d63 https://hybrid-analysis.com/file-collection/65c5613b4e7008f4fe06e0f3

Deprecared version of dotnet that open door to multiple RCE and exploits outdated zlib vulnerable to toctou

Zlib exploit :L

    if ((s.st_mode & S_IFMT) != S_IFREG) return NULL;
    size = (unsigned long)(s.st_size);
    if (size == 0 || (off_t)size != s.st_size) return NULL;
    in = fopen(name, "r");
    if (in == NULL) return NULL;
    buf = malloc(size);
    if (buf != NULL && fread(buf, 1, size, in) != size) {```

-- https://app.any.run/tasks/afb0baa9-a586-4c68-9e92-fccad57ac856 https://hybrid-analysis.com/sample/729a08c5fb401931220bb6715aae8510f4ac452a1f8683215791ccde5ad5fae5

  • ( The collections contains fxp related executable or dll )

#The associations of executable was easier due to the fact sharp"ohad" used his real name on his computer and left the pdb. ###The pdb was used to match older executable that were previously detected

= specific files from fxpgunz folder

https://www.virustotal.com/gui/file/cb2faf786fe5fd22dde9894fc0e16b32006e495dbba92e5e6612fbea475c290e/relations C:\Users\Ohad\Downloads\Servers\Gunz\Super Repack\Extracted\SourceCode\ZLauncher\ZLauncher\obj\Release\ZLauncher.pdb ##"The invocation of the constructor on type "ZLauncher.MainWindow" that matches the specified binding constraints threw an exception.\n\n at System.Windows.Markup.XamlReader.RewrapException(Exception e, IXamlLineInfo lineInfo, Uri baseUri)\r\n at System.Windows" "fxpgunz.com" "update.exe"

#UTF-8 MANIPULATIONS OR OTHERR OBFUSCATIONS METRHOD THAT NEED TO BE INVESTIGATED #NEED TO COMPARE WITH THOSE I POSTED IN FG AND UPDATES THIS / SHARE THE JSON

"发行者:"
"发送者:"
"取消"
"名称:"
"应用程序, 358 KB"
"您想运行或保存此文件吗?"
"打开此类文件之前总是询问(&W)"
"文件下载 - 安全警告"
"来自 Internet 的文件可能对您有所帮助,但此文件类型可能危害您的计算机。如果您不信任其来源,请不要运行或保存该软件。<A>有何风险?</A>"
"确定"
"类型:"
"运行(&R)"```
And second one which occured before those above and is a child of
** FxpGunz Launcher.exe** kernel32.dll!RegSetValueExW#registry(#2092) Arguments:

{"hKey":"Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{AD0B33D9-60E1-4D16-BB2D-F9BA7D6EAA58}","lpData":"峴欘뻅ǗD","cbData":"0x8","dwType":"3","lpValueName":"WpadDecisionTime"}
Returned value:
0x0
6100 - "C:\Users\user\Desktop\executable.exe"
doesn't read gunz.exe for me
996E.exe is this gunz.exe ? they said i had mental issue maybe i cannot read ???



"Application Halted!" then the following Processes created inside p:
"C:\Users<USER>\AppData\Local\Temp\software.exe" %SAMPLEPATH%\3c67b3fc77d4807aa3af755118f748aef373f878e602e1e49884ce96db128c77.exe "C:\Users\user\Desktop\executable.exe"


**Shell commands Executed from parent process named software.exe**
"%SAMPLEPATH%\3c67b3fc77d4807aa3af755118f748aef373f878e602e1e49884ce96db128c77.exe"

from-memory from: executable.exe, 00000000.00000002.2207810213.0000000005B2F000.00000004.00000020.00020000.00000000.sdmp
http://ns.adobD_2

**Same pattern found in memory from the unknown executable that was found -**

# Memory Pattern Domains

**ns.adobD_**

**from-memory reputation:** low from: executable.exe, 00000000.00000002.2181318057.0000000005494000.00000004.00000020.00020000.00000000.sdmp
kernel32.dll!RegCreateKeyExW#registry(#2092) **FxpGunz Launcher.exe
Arguments:**
Filename: Gunz.exe CRYPTPAD URL: https://cryptpad.fr/code/#/3/code/edit/6537f862c52823f3fec20a4d9bd31237/ SHA1: a66898b36c94c53766e66c1a7aaeb149447ec083 SHA256: ce7127c38e30e92a021ed2bd09287713c6a923db9ffdb43f126e8965d777fbf0 SSdeep: 6:B8FQtuc4svmo9qvyDPdrKFjKek+q2Q8EevWR0NNEXW0YDBOTieUWFLzR/YNe9zoG:BMQt6o9qvyLYF2ek+q2Q8Eepfd6ieUWx https://www.filescan.io/uploads/67a3f5654293ba5ea47d3225/reports/6514842a-1116-4fc0-afed-593597c567f8/overview https://cryptpad.fr/code/#/2/code/view/npRTxf79kdK1VNLy7aQRv6l4Gs2SnyopR5tAFUgIGOE/

LRPC / RDP / MSBIOS / LSASS / M
Remote_Desktop_Protocol: \x03\x00\x00\x13\x0E\xD0\x00\x00\x124\x00\x02\x1F\x08\x00\x02\x00\x00\x00
Target_Name: HFZ0005 NetBIOS_Domain_Name: HFZ0005 NetBIOS_Computer_Name: HFZ0005 DNS_Domain_Name: HFZ0005 DNS_Computer_Name: HFZ0005 Product_Version: 10.0.17763
93.158.238.148:6379 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows Hostname: protected.hyperfilter.com Organization: FNXTEC ASN: AS60503 2024-07-06 11:28
BannerHash Show All $1964
\??\pipe\PIPE_EVENTROOT\CIMV2PROVIDERSUBSYSTEM
\??\WMIDataDevice
\??\PIPE\lsarpc
\??\PIPE\srvsvc
{"samDesired":"0x20019","hKey":"Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{AD0B33D9-60E1-4D16-BB2D-F9BA7D6EAA58}","dwOptions":"0x0","phkResult":"","lpClass":"0x0","lpSubKey":"52-54-00-b2-3b-fe"}
Returned value:
0x0
Please refer to my post inside fgunz discord mentioning china stuff on my computer that were infecting my pc - this is all connected pay attention To the exact registry key I showed

峴欘뻅ǗD 
--UNORGANIZE --- TO ORGANIZE COLLECTION: 11 FILES https://www.hybrid-analysis.com/file-collection/65c5613b4e7008f4fe06e0f3 Number of files:12 
https://www.hybrid-analysis.com/file-collection/65c5615a63ecc83d55034d63 
https://en.fofa.info/hosts/93.158.237.59\

https://www.hybrid-analysis.com/sample/729a08c5fb401931220bb6715aae8510f4ac452a1f8683215791ccde5ad5fae5/65c56180b905f6fff303de29

https://en.fofa.info/result?qbase64=ZG9tYWluPSJmeHBndW56LmNvbSI%3D
https://www.hybrid-analysis.com/sample/ad8164040eaf7739571beaa7372e1c42f20b1e1324fffd9c21f341a356c873f6/67a3f82c16445b07bc05fd73

https://www.hybrid-analysis.com/sample/729a08c5fb401931220bb6715aae8510f4ac452a1f8683215791ccde5ad5fae5/65c56180b905f6fff303de29

https://www.hybrid-analysis.com/sample/729a08c5fb401931220bb6715aae8510f4ac452a1f8683215791ccde5ad5fae5

https://www.hybrid-analysis.com/sample/869acdb8281279b9c58cf1c0bc8fc4a3b13d26c81bfa7e8970ea1991f77d32b3/65c562384dbf29710b0ee2e5

https://www.hybrid-analysis.com/sample/869acdb8281279b9c58cf1c0bc8fc4a3b13d26c81bfa7e8970ea1991f77d32b3/6677ba08a41465690c0c6ae8

https://www.hybrid-analysis.com/sample/9390f8cb614d6c13b412315975947f58ff3b121e66605d555bb2d0c9f4e09157/65c82dfcd3089ff45f0c40c7

https://www.hybrid-analysis.com/sample/9390f8cb614d6c13b412315975947f58ff3b121e66605d555bb2d0c9f4e09157

Modified Registry Keys

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe\JScriptSetScriptStateStarted

DebuggerHiddenAttribute

93.158.238.148:443 93.158.238.148:3389 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows 10/Windows Server 2019 Hostname: HFZ0005 Organization: FNXTEC ASN: AS60503 IDC 2024-10-03 17:12

BannerSSLHash Show All

Remote_Desktop_Protocol: \x03\x00\x00\x13\x0E\xD0\x00\x00\x124\x00\x02\x1F\x08\x00\x02\x00\x00\x00

NetBIOS_Domain_Name: HFZ0005 
NetBIOS_Computer_Name: HFZ0005 
DNS_Domain_Name: HFZ0005 
NS_Computer_Name: HFZ0005 
Product_Version: 10.0.17763

93.158.238.148:6379 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: 
Windows Hostname: protected.hyperfilter.com 
Organization: FNXTEC ASN: AS60503 2024-07-06 11:28

BannerHash Show All $1964

Server
redis_version:3.0.504 redis_git_sha1:00000000 redis_git_dirty:0 redis_build_id:a4f7a6e86f2d60b3 redis_mode:standalone os:Windows
arch_bits:64 multiplexing_api:WinSock_IOCP

93.158.237.59:135 135 TCP/DCERPC \x05\x00 \x03\x10\x00\x00\x00\x18\x00\x00\x00\x01\x00\x00\x00\x04\x00\x01\x05\x00\x00\x00\x00

ServerAlive2: IP1: HFZ0005 IP2: 93.158.238.148 IP3: 93.158.236.21 IP4: 93.158.237.59 IP5: 25.10.26.220 IP6: 2620:9b::190a:1adc

NTLMSSP: Target_Name: HFZ0005 Product_Version: 10.0.17763 Ntlm 15 OS: Windows Server 2019, Version 1809/Windows 10, Version 1809 
NetBIOS_Domain_Name: HFZ0005 
NetBIOS_Computer_Name: HFZ0005 
DNS_Domain_Name: HFZ0005 
DNS_Computer_Name: HFZ0005 
System_Time: 2024-07-28 12:41:33 +0000 UTC 906b0ce0-c70b-1067-b317-00dd010662da ([MS-CMPO]: MSDTC Connection Manager:):

93.158.238.148:5357 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: 
Windows Hyperfilter protected.hyperfilter.com 
Organization: FNXTEC ASN: AS60503 Title: Service Unavailable 2024-07-01 18:55

HeaderBodyHash Show All HTTP/1.1 503 Service Unavailable Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 93.158.238.148:5985

fxp panel 93.158.238.148:3000 InvokeMember
set_UseShellExecute ZLauncher_ProcessedByFody ]^]o 0usWruC$ [ -#J4 swto%&$ deviceName


0\x00\x00 8.0.28\x00e,\x00\x00N: {\x07\x12/\x1a\x00\xff\xff\xff\x02\x00\xff\xdf\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x005}t\x15C\x04`cP2)p\x00mysql_native_password\x00 93.158.238.148:443 93.158.238.148:3389 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows 10/Windows Server 2019 Hostname: HFZ0005 Organization: FNXTEC ASN: AS60503 IDC 2024-10-

BannerSSLHash Show All

Remote_Desktop_Protocol: \x03\x00\x00\x13\x0E\xD0\x00\x00\x124\x00\x02\x1F\x08\x00\x02\x00\x00\x00

Target_Name: HFZ0005 NetBIOS_Domain_Name: HFZ0005 
NetBIOS_Computer_Name: HFZ0005 
DNS_Domain_Name: HFZ0005 
DNS_Computer_Name: HFZ0005 Product_Version: 10.0.17763

93.158.238.148:6379 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: 
Windows Hostname: protected.hyperfilter.com Organization: FNXTEC ASN: AS60503 2024-07-06 11:28

BannerHash Show All $1964

Server
redis_version:3.0.504 redis_git_sha1:00000000 redis_git_dirty:0 redis_build_id:a4f7a6e86f2d60b3 redis_mode:standalone os:Windows
arch_bits:64 multiplexing_api:WinSock_IOCP

93.158.238.148:5357 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows Hostname: protected.hyperfilter.com Organization: FNXTEC ASN: AS60503 Title: Service Unavailable 2024-07-01 18:55

HeaderBodyHash Show All HTTP/1.1 503 Service Unavailable Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0

93.158.238.148:5985

fxp panel

93.158.238.148:3000

93.158.238.148:3000

93.158.238.148:443

ServerAlive2: IP1: HFZ0005 IP2: 93.158.238.148 IP3: 93.158.236.21 IP4: 93.158.237.59 IP5: 25.10.26.220 IP6: 2620:9b::190a:1adc CRYPTPAD URL FOR NetBIOS_Computer_Name: HFZ0005 93.158.237.59:135 135 TCP/DCERPC

\x05\x00 \x03\x10\x00\x00\x00\x18\x00\x00\x00\x01\x00\x00\x00\x04\x00\x01\x05\x00\x00\x00\x00

93.158.238.148:443 93.158.238.148:3389 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows 10/Windows Server 2019 Hostname: HFZ0005 Organization: FNXTEC ASN: AS60503 IDC 2024-10-03 17:12

BannerSSLHash Show All

Remote_Desktop_Protocol:

    \x03\x00\x00\x13\x0E\xD0\x00\x00\x124\x00\x02\x1F\x08\x00\x02\x00\x00\x00

  Target_Name: HFZ0005
  NetBIOS_Domain_Name: HFZ0005
  NetBIOS_Computer_Name: HFZ0005
  DNS_Domain_Name: HFZ0005
  DNS_Computer_Name: HFZ0005
  Product_Version: 10.0.17763
93.158.238.148:6379 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows Hostname: protected.hyperfilter.com Organization: FNXTEC ASN: AS60503 2024-07-06 11:28

BannerHash Show All $1964

Server
redis_version:3.0.504
redis_git_sha1:00000000
redis_git_dirty:0
redis_build_id:a4f7a6e86f2d60b3
redis_mode:standalone
os:Windows  
arch_bits:64
multiplexing_api:WinSock_IOCP
93.158.238.148:5357 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows Hostname: protected.hyperfilter.com Organization: FNXTEC ASN: AS60503 Title: Service Unavailable 2024-07-01 18:55

HeaderBodyHash Show All HTTP/1.1 503 Service Unavailable Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0

93.158.238.148:5985

fxp panel

93.158.238.148:3000

93.158.238.148:3000

Activity from loading https://fxpgunz.com/client https://any.run/report/5e4c00f5a274dd021355a1aea5ffd90ece56602b5ee98471768c2bdad6d20ab8/e4bf9419-9681-43f6-b267-795d475a1171 https://www.filescan.io/uploads/67a41d886c9b889537f84cd5/reports/ad65a728-73e4-43d0-b1ca-1964366d2bef/files

93.158.238.148:443

Main object - https://fxpgunz.com url https://fxpgunz.com Dropped file

sha256 C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\3389e449-0f57-43b3-b507-27e703fe7f0b.tmp cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8 sha256 C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Last Browser 9c70f766d3b84fc2bb298efa37cc9191f28bec336329cc11468cfadbc3b137f4 sha256 C:\Users\admin\AppData\Local\Temp\chrome_Unpacker_BeginUnzipping2996_799593754\offscreendocument_main.js f6cc11d4a3a43b11d9408e9d2366d6388bf8733d68188ccd2969f7492d14b857 sha256 C:\Users\admin\AppData\Local\Temp\chrome_Unpacker_BeginUnzipping2996_799593754\service_worker_bin_prod.js be65fdd71cd523b7e759d918e04aa2dd7cbe5f907570bb5bc367456796aa888a sha256 C:\Users\admin\AppData\Local\Temp\chrome_Unpacker_BeginUnzipping2996_799593754\page_embed_script.js 73e3888ccbc8e0425c3d2f8d1e6a7211f7910800eede7b1e23ad43d3b21173f7 sha256 C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\157e0e8c0fa444f9_0 698ed8bd8fc2e03e1f7e474aeacf97dc08dd39728318266643862ebf5c51bb01 sha256 C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\aa0218d416d6222c_0 68f10dbb72ec712ea5a0fe0783d274da58a8a1d9401a7628073c3c34a5818939``` DNS requests domain fxpgunz.com domain www.fxpgunz.com #Connections

 ip 104.26.13.77
 ip 224.0.0.251
 ip 104.18.94.41
 ip 104.26.12.77
https://paste.sh/HKO3nMr7#bl2V3yf_fdV81jeqGHqqFc25
https://pastebin.com/raw/mCSYtEf9
https://www.youtube.com/watch?v=-36nEK6wuug 
Still have bunch of clients to upload https://github.com/inter0hm/fxpgunz-unpacked
Close Your server, otherwise 
could your job creds will leaks ?
Could fingerprint associations reveal something even worse ?


                          ▄▄▄██████████████████▄▄▄
      ░                ▄▄█████▓▓▒░░            ░▓████▄▄                ░
      ▒            ▄▄████▓▒░                        ░▓███▄▄            ▒
      ▒▒         ▄██▓▒░                                 ░▓██▄         ▒▒
      ░▒▒     ▄███▒░                                      ░▓███▄     ▒▒░
    ░▒ ▒▒░   ██▓░                                            ░▓██▄  ░▒▒
   ▒▒   ▒▒ ▄██▒                                                ░██▌ ▒▒
   ░▒  ▒▒ ███▓░                                            ░░░ ░▒██▌▒▒
    ▒▒▒░ ███▓░                                             ░░   ░▒██▌▒▒ ░
    ░▒▒▒▐█▓░         GOSU DID NOT HACK SHIT               ░░     ░██▌▒▒░
     ▒▒░██░                                                ░░      ▒██░▒
    ▒▒░▐█▓                                                      ░  ░▐█▌▒
    ▒░ ██▒     ░░          THE W0rlD W0rS3 h3kK3r DiD            ░░░  ▒█▌
    ░▒ █▓▒    ░▒░                                                ░░  ▒▓█▒
   ░ ▒▐█▒░  ░  ░░                                               ░░░  ░▒█▌  ░
  ▒  ▒██▒░  ░                                                   ░▒░  ░▒██▒  ▒
 ▒▒ ░▒██▓    ░░           Y0U PuSh3D tH3 LiN3 t00 F4R         ░ ░    ▓██▒░ ▒▒
 ▒░ ▒▒██▓    ░▒▒░             S3NT YOUR  E-G00N T0 TH3 B00G3Y   ░    ▓██▒▒ ░▒
 ▒░ ▒▒██▓░     ░░                      M4N                    ░     ░▓██▒▒ ░▒
 ▒▒░▒▒███░          ░░                                        ░▒     ░███▒▒░▒▒
 ░▒░▒▒▐██▓▓▒░       ░░░░  ░            ░░  GR33TZ QU33DSQUAD   ░   ░▒▓▓██▌▒▒░▒░
  ▒▒░▒ ▀█████▒         ░░░░▒░         ░▒░                         ▒█████▒▒░▒▒
  ▒▒ ░▒▒ ███░   ░        ░▒░          ░▓░         ░░             ░▓▓███▒▒░ ▒▒
  ▒▒░  ▒▐██▒    ▒▓▓░░░    ░▒         ░▒▒░    ░▒▒▒▒░         ░░    ▒▓██▒▒▒ ░▒▒
 ▒▒▒   ▒██▓    ░▓██████▓░  ▒▒░       ░▒▒░░  ▒▓▓░      ░▒▓████▓   ▒███▒▒▒   ▒▒▒
 ▒▒░  ▒▒██░ ░░▒██████████▒   ▒▒░     ░░░░▒▒▓▓░    ░▒▒▒████████▒░░▓██▌▒▒▒   ░▒▒
░▒▒▒░░▒▒██ ░▒▒█████████████▒░░░░▒▒░    ░   ▒   ░▒▓█████████████▒░▒██ ░▒▒▒░░▒▒▒░
 ▒▒▒▒▒▒▒██▒░░░▓████████████████▓▓▓▓▒▒▓▓▒░ ░░░░▓████████████████░░▓██  ▒▒▒▒▒▒▒▒
 ░▒▒▒▒▒▒▒██▒  ▓████████████████████████████████████████████████▒▒██    ▒▒▒▒▒▒░
  ░▒▒▒▒▒▐█▓▒  ▒███████████████████████▓▓██████████████████████▓ ░██   ░▒▒▒▒▒░
    ▒▒▒▒█▒▒   ░█████████████████████▓▒░ ▒█████████████████████▒ ░▓█  ░▒▒▒▒▒
  ░░ ▒▒▒█▒▒   ▓████████████████████▓░░   ░████████████████████▓  ░█▒▒▒▒▒▒▒ ░░
   ▒▒░░▒██▓▒░ ▒█████▓████████████▓░       ░██████████████▓████▒░░▓█▒▒▒▒▒▒░▒▒
    ▒░░▒▒▀██▓░    ░▒▒▓▓▒▓███▓██▓░░░░ ░█▓░  ▒▒▓███▓▓▒▓▓▒▒ ░▒░   ▒██▀▒▒▒▒▒░░▒
    ░▒ ▒▒▒▒██▒         ░░░▒░░▒░  ░▒▓█████▓░  ░░▒░░▒▒▒   ░░    ▒▓█▀▒▒▒▒▒▒ ▒░
     ▒░░▒▒▒▒██▓▒▒       ░░▒▒░    ░▓████████░   ▒▒▒▒░░       ▒▓▓█▌░░▒▒▒▒░░▒
     ▒░ ▒▒▒▒ ▀███▓▒▒▒▒▓▒░ ░░  ░░ ▒█████████▓  ░   ░░░▒▒░░░▒▓▓██▀▒▒ ▒▒▒▒ ░▒
    ▒▒  ▒▒▒ ░░▒█████████████▒  ░░▓█████████▓░░▒ ░▒▓▓█████████▒░░▒░░ ▒▒▒  ▒▒
   ░▒▒  ▒▒░ ▒▒▒█▓███▓▓██████▓░   ▒▓███▓▓██▓▒    ▒█████▓▓█████▒░▒░▒▒ ░▒▒  ▒▒░
  ▒▒▒  ░▒▒ ░▒░█▓▓████▓▓███▓░░     ▒▒░  ░░       ░▓▓██▓▓███████▒▒ ░▒░ ▒▒░  ▒▒▒
 ▒▒▒   ▒▒  ▒▒ █▓▒██▓█▓▓██▒░░░░░░          ░░  ░▒▒░▒██▓▓██▓██▓█▒   ▒▒  ▒▒   ▒▒▒
░▒▒░  ▒▒▒ ▒▒  █▓▒██▒░▒▓█▓▓▓██▓▓▓▒░░▒░  ░░░▒▒▒▓▓████▓▓▓▒▒░▒█▓▓█░    ▒▒ ▒▒▒  ░▒▒░
▒▒▒▒▒▒▒▒ ▒▒▒  █▓░▒▒░ ░▓██▓▓██▓▓██▓▓██▓▓▓█▓▓▓█▓▓█▓▓████▒░  ░░▓█▒    ▒▒▒ ▒▒▒▒▒▒▒▒
 ▒▒▒▒▒▒░ ░▒▒▒▒▐█▒    ░▓██▓████████▓▓█▓▓██▓▓███▓▓▓██▓██▒     ▓█▒▒▒▒▒▒▒░ ░▒▒▒▒▒▒
░░▒▒▒▒▒   ▒▒▒▒▒▀█▒    ░▓▒░░▓█▓▓██▓█████▓███▓▓▓▓▓█▓▒░▓▓░   ░▓█▀▒▒▒▒▒▒▒   ▒▒▒▒▒░░
 ░░░▒▒▒     ▒▒▒▒▀██▒   ░▓░░▒▓███▓▓▓█▓▓▓▓█▓▓▓▓███▓▒▒▒▒   ░██▀▒░ ▒▒▒▒     ▒▒▒░░░
  ░▒░▒▒▒    ▒▒▒░ ▀██▓    ░░░░▒▒▓██▓▓██▓▓████▓▓▒▒░ ░░   ▒█▀ ▒▒  ░▒▒▒    ▒▒▒░▒░
   ▒▒ ▒▒▒▒▒▒▒▒▒   ░▀██▒    ░░░░░░░░░░▒▒░▒▒░░░░       ░▓█▀ ▒▒░   ▒▒▒▒▒▒▒▒▒ ▒▒
   ░▒  ░▒▒▒▒▒▒░    ▒▒▀██░                           ▒█▀▒ ░▒▒    ░▒▒▒▒▒▒░  ▒░
   ▒▒   ▒▒▒▒▒▒▒░   ▒▒░ ██▒                     ░  ▒▓█▀░▒ ░▒▒   ░▒▒▒▒▒▒▒   ▒▒
  ▒▒░   ░▒▒▒▒▒▒▒▒▒▒▒▒ ▒░██▓▒▒                  ▒▒▓██▀▒░░▒ ▒▒▒▒▒▒▒▒▒▒▒▒░   ░▒▒
 ░▒░    ░▒▒▒▒▒▒▒▒▒▒▒░░▒ ▒▀███▓▒    ░░░░░░    ░▓███▀  ▒▒ ▒░░▒▒▒▒▒▒▒▒▒▒▒░    ░▒░
 ▒▒░   ░▒▒▒▒▒▒▒▒▒▒▒░ ▒░░▒  ▀████████████████████▀     ▒░░▒ ░▒▒▒▒▒▒▒▒▒▒▒░   ░▒▒
 ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒  ▒░░▒    ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀       ▒░░▒  ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
 ░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒   ▒▒░▒                             ▒░▒▒   ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒░
  ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒  ▒░░▒    ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀       ▒░░▒  ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
 ░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒   ▒▒░▒                             ▒░▒▒   ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒░
 ██████████████████▄▄░▒ ▒░                           ░▒░▒░    ▒▒▒▒▒▒▒▒▒▒▒▒▒▒
  ▐████░         ▀▀▀████▄░                           ▒▒░▒     ░▒▒▒▒▒▒▒▒▒▒▒░
 ▒ ▐████               ▀███▄                                   ░▒▒▒▒▒▒▒▒▒▒▒░
      ▓▓   ██                                                      ██   ▓▓
     ███   ██                      ████████                        ██   ███
   ▄█████ ▐██                      ██ ██ ██                        ██▌ █████▄
  ▐██████ ██▌                      ████████                        ▐██ ██████▌
 ▐███  ▀██▐█                         █ █ █                          █▌██▀  ███▌
 ████    ▓ ▓                                          ▐             ▓ ▓    ████
 ████▌   ▒ ▒                                      ▀▀▀██             ▒ ▒   ▐████
 ▐████   ░ ░          ▐             ▐          ▐ ▄▓  ██     ▐       ░ ░   ████▌
  ▐███▌           ▀▀▀██         ▀▀▀██         ██ ██ ▀▀▀ ▀▀▀██            ▐███▌
   ▀███▄   ░     ▄▓  ██      ▐ ▄▓  ██     █▓  ██ ██▀▀  ▄▓  ██       ░   ▄███▀
    ▀███▄       ▄██▄▄▄▄  ▀▀▀██ ██▄▄██     ███ ██ ██    ██  ██          ▄███▀
     ▀████       ██ ▀██ ▄▓  ██ ██         ██ ▀██ ▌     ▄▄  ██         ████▀
       ▀███▄     ██▄▄██ ██▄▄▀▀ ██         ██  ██       ██▄▄██       ▄███▀
       ░ ▀██▌    ▌     ▀██▀▀██ ▌          ▌            ▌           ▐██▀ ░
      ▒▒  ▐██           ██  ██▄                                    ██▌  ▒▒
     ▄██▓▀   ▄▀            |__|    \/                   \/       ▀▄   ▀▓██▄
    █▓▀     ▐▌         ░                                          ▐▌     ▀▓█
   █▓▌       ▓▄▄     ▄▄▓▀▀                            ▀▀▓▄▄     ▄▄▓       ▐▓█
  ▐▓██▄▄  ▄▄▄▄████▄▄▄ ▀▀▄▄█▀▀  FXPGUNZ-RAGEGUNZ    ▀▀█▄▄▀▀ ▄▄▄████▄▄▄▄  ▄▄██▓▌
 ▀▀████▓▀▀▀▀▀     ▀▀███▓▀▀  D0nWF4ll                  ▀▀▓███▀▀     ▀▀▀▀▀▓████▀▀
  ▄███▄██ ▀ ▄▄▄▄▄▄▄▄▄▄▄▄ ▀ ▄▄▄▄▄▄▄▄  ▓▀▓█▓█▓▒▄ ▄▄▄▄▄▄▄ ▀ ▄▄▄▄▄▄▄▄▄▄▄  ▀ ▀ ██▄███
 █▀▀█▀ ▀█▀ ▀█▀ ▀█▀ ▀█▀ ▀█▀ ▀█▀ ▀█▀▀ ▄ ▀██▀ ▄ ▀▀█▀ ▀█▀ ▀█▀ ▀█▀ ▀█▀ ▀█▀ ▀█▀ ▀█▀▓▓█
 █▓▄  ▀   ▀   ▀   ▀   ▀   ▀   ▀   ▀  ▄████▄  ▀   ▀   ▀   ▀   ▀   ▀   ▀   ▀   ▄██
 █▀ ▄                                 ▀██▀                                  ▄ ▀█
 ██▄ OSINT & intel METADATA          ▄████▄  SuperRepack                     ▄██
 █▀ ▄ Windows Detections & Vscode     ▀██▀    Purchased From Jorklenis      ▄ ▀█
 ██▄  ▄   ▄   ▄   ▄   ▄   ▄   ▄   ▄   ▀██▀    ▄   ▄   ▄   ▄   ▄   ▄   ▄   ▄  ▄██
 █▀▄▓▄ ▄▓▄ ▄█▄ ▄█▄ ▄█▄ ▄█▄ ▄█▄ ▄█▄ ▄█▄▀██▀ ▄█▄ ▄█▄ ▄█▄ ▄█▄ ▄█▄ ▄█▄ ▄█▄ ▄▓▄ ▄▓▄▀█
 █▀▀█▀ ▀█▀ ▀█▀ ▀█▀ ▀█▀ ▀█▀ ▀█▀ ▀█▀  ▄  ▀█▀  ▄  ▀█▀ ▀█▀ ▀█▀ ▀█▀ ▀█▀ ▀█▀ ▀█▀ ▀█▀▓█
 █▓▄  ▀   ▀   ▀   ▀   ▀   ▀   ▀   ▀   ▀  ▀   ▀   ▀   ▀   ▀   ▀   ▀   ▀   ▀   ▄██
 █▀ ▄  w1ll 7h3 0p53c f41lur35 0f 0h4d r3v34l u5 h15 m4l1c10u5 h4b175       ▄ ▀█
 █▀ ▄      WhY B4Tr4y!Ng Th3 P3rS0N Th4T S4V3d Y0Ur S3RV3R wHy n0 ac3sss    ▄ ▀█
 █▀ ▄    We N33d t0 Kn0w Th3ir n3W CYber C4p4b!l!t!3$ m3nY m3nY Ch!n4 !p's  ▄ ▀█
 █▀ ▄      BuT if iT ChiN4 0r !sr43l! Pull!nG 4n0Th3r Tr!cK             ▄▓█▄▄ ▀▄
 █▀ ▄ ˡⁱᵉˢ ¹ⁿ ᵗʰ³ ˢᵗ⁴ᶠᶠ ᶜʰ⁴ᵗ, ˡⁱᵉˢ ᵗ⁰ ᵗʰ³ ᵖˡ⁴ʸ³ʳˢ ,                   ▄▓██▀███ █▌
 █▀ ▄     ʷⁱˡˡ ʰᵉ ˡⁱᵉˢ ᵗᵒ ʰ¹ᵐˢ³ˡᶠ                                      ▓▓█▌░ ▀██▓
 █▀ ▄    0xA1 : From Ragegunz.com to https://fxpgunz.com              ▐▓█▌░ ▓█▀
 █▀ ▄           ᴺʳ ˢᵘᵖᵉʳᴿᵉᵖᵃᶜᵏ ᵖᵈᵇ ᴼʰᵃᵈ ᴮᴱᴵᴺᴳ ᴬ ᴮᴬᴰ ᴵᴺᴺᴬᴺᴱᵀ ᵁˢᴱᴿ      ▓██▄  ▀▀
 █▀ ▄       MR SK3LT4L WiLL N3v3R GiV3 YOU G00D B0N3 AND C4LCiUM    ▀▄   ▀▓██▄
 █▀ ▄         PR4Y 73h 5P4M 90d 4nd 45K ph0R pH0r91V3N332           ▐▌     ▀▓█
 █▀ ▄   U BLAME ,U BULLY BUT NEVER ADDRESS PROBLEM WHO SAVED YOU ▀▀▓▄▄     ▄▄▓      
 █▀ ▄   WHiLE BUYiNG 1ST H0ST DD0S PROTECTED Y0U S4W ▀▀█▄▄▀▀ ▄▄▄████▄▄▄▄  ▄▄██▓▌
 █▀ ▄   M3 B4MB00ZL3 0WN3R N0 KN0WL3DG3 0F 4RP          ▀▀▓███▀▀     ▀▀▀▀▀▓████▀▀
 █▀ ▄   M3 T3LL CL34R C4CH3S 4S4P !! 4ND 4RP -D -- HiM PL34S3 H3LP M3      ▄ ▀█
 █▀ ▄  m3H pH1x3D 8U7 M3h 533 Pr08L3m W17 pr0v1D3r 50 5h4RP M4k3 71cK37     ▄ ▀█
 █▀ ▄h3 80UGh7 Kn0Wn H0572 PH0R 831N' l1K3 7H12 0 V3r1F1c4710n2 84d 0H4D  !=▄ ▀█
 █▀ ▄                                                                         ▀█
 ██▄  ▄   ▄   ▄   ▄   ▄   ▄   ▄   ▄   ▄   ▄   ▄   ▄   ▄   ▄   ▄   ▄   ▄   ▄  ▄██
 █▀  #DG4L     beer.consistdev.co.il,RAGEGUNZ.COM,FXPGUNZ.COM                ▄▀█
 █         ▄▄▓▄ Your staff should have left me a1one                ▄▓▄▄       █
 ▄█▒▄  ▄▄███▀▒█▄       ▄ RIP DiDi feggit - PRAY THE SPAM GO▄       ▄█▒▀███▄▄  ▄▒█▄
 ▒█▀▀███▀▀▄▄██▀▒█▄▄███▀                 2025               ▀███▄▄█▒▀██▄▄▀▀███▀▀█▒
 ██▌▀█▀▄███▀▀    ▀▀▀▀▄▄▄▄           ▄  ▐███▌  ▄         ▄▄▄▄▀▀▀▀    ▀▀███▄▀█▀▐██
 ████▌   ▒ ▒             █▀▀▀▒                                      ▒ ▒   ▐████
 ▐████   ░ ░                                                        ░ ░   ████▌
  ▐███▌                       ▄▄▄▄▄▄                                     ▐███▌
   ▀███▄   ░                 █▓▒░░▒▓█                               ░   ▄███▀
    ▀███▄                   ▓▒    ░▒░█                                 ▄███▀
     ▀████                  █▓▒▒▒▒▓▌ █                                ████▀
       ▀███▄                █▓▒▒▒▒▓  █                              ▄███▀
       ░ ▀██▌              ▐█▀▀▀▀▀▀  █                             ▐██▀ ░
      ▒▒  ▐██              █░░▓▓▓▒   █                             ██▌  ▒▒
      ▓▓   ██              █░░▓▓░░   █                             ██   ▓▓
     ███   ██             ▐█        ██                             ██   ███
   ▄█████ ▐██             █▒       ▒█▌                             ██▌ █████▄
  ▐██████ ██▌            ▐█       ░██                              ▐██ ██████▌
 ▐███  ▀██▐█             █▒       ░██                               █▌██▀  ███▌
 ████    ▓ ▓             █        ░██                               ▓ ▓    ████
 ████▌   ▒ ▒            ▐█        ░██                               ▒ ▒   ▐████
 ▐████   ░ ░            █▓        ▒█▌                               ░ ░   ████▌
  ▐███▌                 █░        ██                                     ▐███▌
   ▀███▄   ░            █▒▒░  ▒█▓▓█▌                                ░   ▄███▀
    ▀███▄              ▐█▓░░░  ▒███                                    ▄███▀
     ▀████             █▒▓▒▓▓▓  ▓██  ▄▄▄▄▄▄▄                          ████▀
       ▀███▄          ▐█ ▒▒▒░ ░████ █▒▒▒ ░▒▒█▄                      ▄███▀
         ▀██▌         █▒       ▒████▓▒     ░▓█                     ▐██▀ ░
          ▐██      ████         ███▓░       ░██                    ██▌  ▒▒
           ██    ██▒ ▓█        ░███          ▓██                   ██   ▓▓
           ██   ██   █▓        ▓██           █░██                  ██   ███
          ▐█  ▄▄█▓  ░█▒        ██░          ██▓ ██                 ██▌ █████▄
          █  █▒██   ██        ▒██          ████ ▓█▌▄▄▄             ▐██ ██████▌
            █▒██░  ██▒        ██▓       ░▒▓████  ███░░█▄            █▌██▀  ███▌
           █▒▒█▓  ▒██        ▓██▓        █▓████▒ ██ ██▓██▄          ▓ ▓    ████
          ██░█▒   ██        ░███         ██████▓ ██     ▓██▄        ▒ ▒   ▐████
          █░█░   ██▓        ▓██▒         ███████░██▒     ░███▄      ░ ░   ████▌
         █▒█▒    ██░        ░▓█          ▓▓█████▒██▓        ░█           ▐███▌
         ███     ██▒         ░█        ░    █▓█▓▓███▓▒░      █      ░   ▄███▀
        ▐███     ░░░     ░▒   ▒░ ▒▒   ▒░     ▒▓▓▓████▓▒    ░██         ▄███▀
        ▐█▓ ▓▒▒▒    ░▒▓██▓░       ▒███▒       ███████▓▓▒░  ▒██        ████▀
        ▐█  ██▓      ░████░         ▒█░      ░█████▒█      ██▌      ▄███▀
        ▐██ ░██▒      ▓█████  ░     ░▓▒      ░░░███ ▒▒    ██▌      ▐██▀ ░
        ▐███ ▒█░       ██ ▓▓  █     ░▓▒         ░██▒     ░██       ██▌  ▒▒
         █▓█▒ ▒█░       █░    █▒   ░▓▒░          █▒█▒▒░  ░██       ██   ▓▓
         ▐█▓█░ ▒█▒      ▒█    █░   ░█            ▒░▓▒░██ ▓██       ██   ███
          █░▓█  ▒█▒      ▓▒   █░   ░█            ░░░▒  █████       ██▌ █████▄
          ██ █░  ░█▒      ▒   █▒   ▒█▒              ░   ███▌       ▐██ ██████▌
          ▐█▒ ░    █▒     █   █▓    █▓                  ▓██         █▌██▀  ███▌
           ██       █     ▒▓▒░▓█    ██░                 ▓█▌         ▓ ▓    ████
           ▐█▓ ▒ ▒   ▒   ░ ▓█▒ ▓    ▓█▒                ▒██          ▒ ▒   ▐████
            ▀█▓▓▓ █▒      ▒▒▓█ ▓▒    █▓               ▒██           ░ ░   ████▌
             ▐███  ██░     ░▓░ ░█    ▒▓              ▒██                 ▐███▌
              ███▓  ▒██▒    ▒█  ▓█░  ░▓            ░██▀             ░   ▄███▀
               ███░   ▒█▓    ░█▓  ▓   ▓▓          ▒██▀                 ▄███▀
                ███░    █▒     ▒▓▓░    ▒░        ▓██▀                 ████▀
                 ███▓   ▒█       ░█▓          ▒▓██▒██▄▄▄▄           ▄███▀
                  ████   ▓░        ▓█         ▒▓▓▒  ▓██████▄▄      ▐██▀
                   ▀███░    ▓       █▒                 ▒███████▄▄  ██▌
                     ███▒   ██▒        ░▓░                 ▒▓█████▄██
                      ████   ███▓░░    ▓█▓███▒░                ░▒████▄
                       ████   ▒████▓▓███░  ▓███▓█▓▒░    ░          ▓███▄
                        ▐███▓░  ▒█████▓▒░ ░ ░░░  ░▒▓██▓░░░          ░▓▓███▄
                         ▐████▒░  ░▒▓▒     ▒░▒██▓▓▓░  ▒▓███▒         ░  ░▒██▄
                          ▀████▒    ▒███▓░  ▒░    ▒▓█▓░   ███▓             ░█▄
                            ▀██████    ▒███▒  ▒      ▒▓██░  ░▓█▓░           ▓█
                              ▀█████░     ░██▒ ░         ░     ░▒░░░       ░█▌
                                ▀█████▓░    ░███▓             ░            ░▓▌
                                  ▀██████▒    █▓▒█░           ░█▓        ░▒██
                                    ▀██████▒  ▓█ ▒█▒            ▓▓       ▓██
                                      ▀█████▓  █░ ▒█▓            ▒▒░    ░▓ ░▓
                                        ▀█████░ ▒  ▒██                ▒███▓▒░
                                          ▀████▓░   ░██▓         ▓░   █▓▒▓███▓
                                            ▀█████▒   ░██▓       ████████▓██░ ▓
                                              ▀██████▒   ░▒░  ░  ▓██▓███████▒
                                                ▀███████▓░  ▒██████▓▒░ ░▓██▓▓█
                                                  ▀███████████▓▓▓██▓▒▒   ░▓██▓▓
                                                    ▀▀███████████████      ░▓█▌
                                                              ▒▓██▓▒██▓
                                                                    ▒██
                                                                     █▓
                                                                      ░
 
 C:\Users\Ohad\Downloads\Servers\Gunz\Super Repack\Extracted\SourceCode\ZLauncher\ZLauncher\obj\Release\ZLauncher.pdb                                                                      
                 ██████████                                                     
               ██          ██           ██████                                  
              █              ██     ████      ████                              
             █                ███████            ██                             
            █                  █                  █                             
            █                  █                  ██                            
            █                  █                  ██                            
            █                  █         █████     █   ████                     
             █                ██  █████    █ ███   ████    ██                   
              █              ██    █  █    ██ ██   ██       █                   
               ███        ███ █   ██   █    ████    █  ██  ██                   
                 █████████    █   █    █   ██  █      ██ ███                    
                  █   █       █   █    █████   ████████                         
                  █   █      █    █                                            
                 ██   █     █    █                                            
                ██     █  ██     █                                           
               █    ████  █     ██                                           
                ████      ██████
C:\Users\Ohad\Downloads\Servers\Gunz\Super Repack\Extracted\SourceCode\ZLauncher\ZLauncher\obj\Release\ZLauncher.pdb
```                                 ▀  ▀   ▀   ▀  ▀

https://www.malwation.com/blog/simplest-yet-most-common-and-effective-evasion-tactic-sleep [TOC]

** ANY.RUN**
Full analysis:

https://app.any.run/tasks/e4bf9419-9681-43f6-b267-795d475a1171

1. VIRUSTOTAL
https://www.virustotal.com/gui/collection/
https://www.virustotal.com/graph/50d2ef1b318f4be65f12337e4b73e62b0a6026e829d1a197a66b66cdf3e721b0 *_**GUNZ.EXE UNPACKED - **_
https://www.virustotal.com/gui/file/d9071790a18cd1c7db2a14824115efca7bb2b806dd799a378b34fdaef71bb0a9/detection
https://www.virustotal.com/gui/file/38fac220e12954428e4577107b691e64c6f10e0a9cc3f9b55ffc7ad7b15057cf/relations
FXP launcher and games used to talk to this domain before the hyperfilter migration beer.consistdev.co.il
Make sure to look at both relations and behaviour
https://www.virustotal.com/gui/file/3c67b3fc77d4807aa3af755118f748aef373f878e602e1e49884ce96db128c77/behavior
https://www.virustotal.com/gui/file/5db24f34d010fd728dbe788e96bd3aa11cd512a85a28642604945dd1b30d8e57/behavior
specific files from fxpgunz folder
0asc.scd
https://www.virustotal.com/gui/file/7dcf268fb73001c6d5a618702120329b4004ddea4ccbec9f6abcdedd10faf389/relations
D3DX9D.dll
https://www.virustotal.com/gui/file/0b28546be22c71834501f7d7185ede5d79742457331c7ee09efc14490dd64f5f/detection
couple gunz.exe from fxp
https://www.virustotal.com/gui/file/2a3b955a2ba3c4329a26b56d29d6ae7baa9053f2d184155632bcff9109b32e26/detection
https://www.virustotal.com/gui/file/d39828a33a07af259921811a52513f0f5824ccb3aa56151ff6bab3b51847a45f?nocache=1
https://www.virustotal.com/gui/file/d39828a33a07af259921811a52513f0f5824ccb3aa56151ff6bab3b51847a45f/relations
https://www.virustotal.com/gui/file/d9071790a18cd1c7db2a14824115efca7bb2b806dd799a378b34fdaef71bb0a9/behavior
*** sharp/ohad tested several exe b4 using them on fxp domain , often he bundled those inside a zip. *** https://www.virustotal.com/gui/file/250bba2b5f30bcc38cce29d985f80fc1f48a98ce33d38287466481866e264ab1?nocache=1
https://www.virustotal.com/gui/file/cb2faf786fe5fd22dde9894fc0e16b32006e495dbba92e5e6612fbea475c290e/relations Full analysis: https://app.any.run/tasks/e4bf9419-9681-43f6-b267-795d475a1171
FILESCAN.IO
_** https://www.filescan.io/uploads/67a3edb6b8e496eb3f938ae0/reports/85ab42b3-900e-4687-812b-c531ca5cc475/overview Filename: b2956db62ea485273b10f8551682f4d681ab5f7dc68e35dd4934960355129269.exe CRYPTPAD URL: https://cryptpad.fr/code/#/2/code/edit/zPQIHtuCbBVZkPJglhKSScB-/
GUNZ.EXE DUMP FILES , CHUNKS AND DROPPED EXE,ELF,FILES MD5: 67932d4b695e1d6b19dfc2e3610761ff

  C:\Users\Ohad\Downloads\Servers\Gunz\Super Repack\Extracted\SourceCode\ZLauncher\ZLauncher\obj\Release\ZLauncher.pdb                                972545898695:1152940689:Ohad:Itzhaki:male:'Ein Ayala  Hefa, Israel:'Ein Ayala, Hefa, Israel:Single:Israel Defense Forces:2013::12/26/1994                                        
                 ██████████                                                     
               ██          ██           ██████                                  
              █              ██     ████      ████                              
             █                ███████            ██                             
            █                  █                  █                             
            █                  █                  ██                            
            █                  █                  ██                            
            █                  █         █████     █   ████                     
             █                ██  █████    █ ███   ████    ██                   
              █              ██    █  █    ██ ██   ██       █                   
               ███        ███ █   ██   █    ████    █  ██  ██                   
                 █████████    █   █    █   ██  █      ██ ███                    
                  █   █       █   █    █████   ████████                         
                  █   █      █    █                                            
                 ██   █     █    █                                            
                ██     █  ██     █                                           
               █    ████  █     ██                                           
                ████      ██████
C:\Users\Ohad\Downloads\Servers\Gunz\Super Repack\Extracted\SourceCode\ZLauncher\ZLauncher\obj\Release\ZLauncher.pdb
"The invocation of the constructor on type "ZLauncher.MainWindow" that matches the specified binding constraints threw an exception.\n\n at System.Windows.Markup.XamlReader.RewrapException(Exception e, IXamlLineInfo lineInfo, Uri baseUri)\r\n at System.Windows" "fxpgunz.com" "update.exe"

UTF-8 MANIPULATIONS OR OTHERR OBFUSCATIONS METRHOD THAT NEED TO BE INVESTIGATED
NEED TO COMPARE WITH THOSE I POSTED IN FG AND UPDATES THIS / SHARE THE JSON
"保存(&S)"
"发行者:"
"发送者:"
"取消"
"名称:"
"应用程序, 358 KB"
"您想运行或保存此文件吗?"
"打开此类文件之前总是询问(&W)"
"文件下载 - 安全警告"
"来自 Internet 的文件可能对您有所帮助,但此文件类型可能危害您的计算机。如果您不信任其来源,请不要运行或保存该软件。<A>有何风险?</A>"
"确定"
"类型:"
"运行(&R)"
And second one which occured before those above and is a child of
** FxpGunz Launcher.exe** kernel32.dll!RegSetValueExW#registry(#2092) Arguments:

{"hKey":"Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{AD0B33D9-60E1-4D16-BB2D-F9BA7D6EAA58}","lpData":"峴欘뻅ǗD","cbData":"0x8","dwType":"3","lpValueName":"WpadDecisionTime"}
Returned value:
0x0
6100 - "C:\Users\user\Desktop\executable.exe"
doesn't read gunz.exe for me
996E.exe is this gunz.exe ? they said i had mental issue maybe i cannot read ???



"Application Halted!" then the following Processes created inside p:
"C:\Users<USER>\AppData\Local\Temp\software.exe" %SAMPLEPATH%\3c67b3fc77d4807aa3af755118f748aef373f878e602e1e49884ce96db128c77.exe "C:\Users\user\Desktop\executable.exe"


**Shell commands Executed from parent process named software.exe**
"%SAMPLEPATH%\3c67b3fc77d4807aa3af755118f748aef373f878e602e1e49884ce96db128c77.exe"

from-memory from: executable.exe, 00000000.00000002.2207810213.0000000005B2F000.00000004.00000020.00020000.00000000.sdmp
http://ns.adobD_2

**Same pattern found in memory from the unknown executable that was found -**

# Memory Pattern Domains

**ns.adobD_**

**from-memory reputation:** low from: executable.exe, 00000000.00000002.2181318057.0000000005494000.00000004.00000020.00020000.00000000.sdmp
kernel32.dll!RegCreateKeyExW#registry(#2092) **FxpGunz Launcher.exe
Arguments:**
Filename: Gunz.exe CRYPTPAD URL: https://cryptpad.fr/code/#/3/code/edit/6537f862c52823f3fec20a4d9bd31237/ SHA1: a66898b36c94c53766e66c1a7aaeb149447ec083 SHA256: ce7127c38e30e92a021ed2bd09287713c6a923db9ffdb43f126e8965d777fbf0 SSdeep: 6:B8FQtuc4svmo9qvyDPdrKFjKek+q2Q8EevWR0NNEXW0YDBOTieUWFLzR/YNe9zoG:BMQt6o9qvyLYF2ek+q2Q8Eepfd6ieUWx https://www.filescan.io/uploads/67a3f5654293ba5ea47d3225/reports/6514842a-1116-4fc0-afed-593597c567f8/overview https://cryptpad.fr/code/#/2/code/view/npRTxf79kdK1VNLy7aQRv6l4Gs2SnyopR5tAFUgIGOE/

LRPC / RDP / MSBIOS / LSASS / M
Remote_Desktop_Protocol: \x03\x00\x00\x13\x0E\xD0\x00\x00\x124\x00\x02\x1F\x08\x00\x02\x00\x00\x00
Target_Name: HFZ0005 NetBIOS_Domain_Name: HFZ0005 NetBIOS_Computer_Name: HFZ0005 DNS_Domain_Name: HFZ0005 DNS_Computer_Name: HFZ0005 Product_Version: 10.0.17763
93.158.238.148:6379 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows Hostname: protected.hyperfilter.com Organization: FNXTEC ASN: AS60503 2024-07-06 11:28
BannerHash Show All $1964
\??\pipe\PIPE_EVENTROOT\CIMV2PROVIDERSUBSYSTEM
\??\WMIDataDevice
\??\PIPE\lsarpc
\??\PIPE\srvsvc
{"samDesired":"0x20019","hKey":"Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{AD0B33D9-60E1-4D16-BB2D-F9BA7D6EAA58}","dwOptions":"0x0","phkResult":"","lpClass":"0x0","lpSubKey":"52-54-00-b2-3b-fe"}
Returned value:
0x0
Please refer to my post inside fgunz discord mentioning china stuff on my computer that were infecting my pc - this is all connected pay attention To the exact registry key I showed

峴欘뻅ǗD 
--UNORGANIZE --- TO ORGANIZE COLLECTION: 11 FILES https://www.hybrid-analysis.com/file-collection/65c5613b4e7008f4fe06e0f3 Number of files:12 https://www.hybrid-analysis.com/file-collection/65c5615a63ecc83d55034d63 https://en.fofa.info/hosts/93.158.237.59\

https://www.hybrid-analysis.com/sample/729a08c5fb401931220bb6715aae8510f4ac452a1f8683215791ccde5ad5fae5/65c56180b905f6fff303de29

https://en.fofa.info/result?qbase64=ZG9tYWluPSJmeHBndW56LmNvbSI%3D https://www.hybrid-analysis.com/sample/ad8164040eaf7739571beaa7372e1c42f20b1e1324fffd9c21f341a356c873f6/67a3f82c16445b07bc05fd73

https://www.hybrid-analysis.com/sample/729a08c5fb401931220bb6715aae8510f4ac452a1f8683215791ccde5ad5fae5/65c56180b905f6fff303de29

https://www.hybrid-analysis.com/sample/729a08c5fb401931220bb6715aae8510f4ac452a1f8683215791ccde5ad5fae5

https://www.hybrid-analysis.com/sample/869acdb8281279b9c58cf1c0bc8fc4a3b13d26c81bfa7e8970ea1991f77d32b3/65c562384dbf29710b0ee2e5

https://www.hybrid-analysis.com/sample/869acdb8281279b9c58cf1c0bc8fc4a3b13d26c81bfa7e8970ea1991f77d32b3/6677ba08a41465690c0c6ae8

https://www.hybrid-analysis.com/sample/9390f8cb614d6c13b412315975947f58ff3b121e66605d555bb2d0c9f4e09157/65c82dfcd3089ff45f0c40c7

https://www.hybrid-analysis.com/sample/9390f8cb614d6c13b412315975947f58ff3b121e66605d555bb2d0c9f4e09157 https://vtbehaviour.commondatastorage.googleapis.com/b2956db62ea485273b10f8551682f4d681ab5f7dc68e35dd4934960355129269_Yomi%20Hunter.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1738794037&Signature=vrFD0zziqdeW7xtLxDlLYY7tBIcP9VCbWXYzQQWUSf8FTrZhC%2BAYSo%2FLospIHWzO8aOT4%2FNP%2Fw%2BkoJtpRQfsBMcZdxbxUS09wnPMX25OJLZ1K%2BFt%2Bi2YDfD7Gr6r4UReU3eN0XUxv3f6mfNPpfnTwZtga0%2BBEo2rRluXfmLLhmwMRa2%2BLXUZgla9twCDoLZMsYLbu0Y9hniI9RV1BRyff4J%2B5AavgibpE79%2BWxN4A6tgObDMa3ZmT%2B5udXmwA6qQKbGA1uRBsBS0GmGLLhSQeJSzQvy3sm84BhqNnV%2BUdW6%2BFLEynA5%2F%2BMKhPxTL%2FpgNBfUTAVjNXri%2Bu4Enk%2FmUXQ%3D%3D&response-content-type=text%2Fhtml;

Modified Registry Keys

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe\JScriptSetScriptStateStarted

DebuggerHiddenAttribute

93.158.238.148:443 93.158.238.148:3389 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows 10/Windows Server 2019 Hostname: HFZ0005 Organization: FNXTEC ASN: AS60503 IDC 2024-10-03 17:12

BannerSSLHash Show All

Remote_Desktop_Protocol: \x03\x00\x00\x13\x0E\xD0\x00\x00\x124\x00\x02\x1F\x08\x00\x02\x00\x00\x00

https://www.twitch.tv/ NetBIOS_Domain_Name: HFZ0005 NetBIOS_Computer_Name: HFZ0005 DNS_Domain_Name: HFZ0005 DNS_Computer_Name: HFZ0005 Product_Version: 10.0.17763

93.158.238.148:6379 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows Hostname: protected.hyperfilter.com Organization: FNXTEC ASN: AS60503 2024-07-06 11:28

BannerHash Show All $1964

Server
redis_version:3.0.504 redis_git_sha1:00000000 redis_git_dirty:0 redis_build_id:a4f7a6e86f2d60b3 redis_mode:standalone os:Windows
arch_bits:64 multiplexing_api:WinSock_IOCP

93.158.237.59:135 135 TCP/DCERPC \x05\x00 \x03\x10\x00\x00\x00\x18\x00\x00\x00\x01\x00\x00\x00\x04\x00\x01\x05\x00\x00\x00\x00

ServerAlive2: IP1: HFZ0005 IP2: 93.158.238.148 IP3: 93.158.236.21 IP4: 93.158.237.59 IP5: 25.10.26.220 IP6: 2620:9b::190a:1adc

NTLMSSP: Target_Name: HFZ0005 Product_Version: 10.0.17763 Ntlm 15 OS: Windows Server 2019, Version 1809/Windows 10, Version 1809 NetBIOS_Domain_Name: HFZ0005 NetBIOS_Computer_Name: HFZ0005 DNS_Domain_Name: HFZ0005 DNS_Computer_Name: HFZ0005 System_Time: 2024-07-28 12:41:33 +0000 UTC 906b0ce0-c70b-1067-b317-00dd010662da ([MS-CMPO]: MSDTC Connection Manager:):

93.158.238.148:5357 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows Hyperfilter protected.hyperfilter.com Organization: FNXTEC ASN: AS60503 Title: Service Unavailable 2024-07-01 18:55

HeaderBodyHash Show All HTTP/1.1 503 Service Unavailable Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 93.158.238.148:5985

fxp panel 93.158.238.148:3000 InvokeMember
set_UseShellExecute ZLauncher_ProcessedByFody ]^]o 0usWruC$ [ -#J4 swto%&$ deviceName

_--- USAGE OF LEAKED SYMANTEC CERTS, CAN SOMEONE GET THE STUFF I PREVIOUSLY SHARED INSIDE FGUNZ + DANNYFAMILY About Chinese / china malware , Black Lotus Uefi Malware and how my traffic was re-routed to some of the backbone - so we can compare some of the IoC - _

0\x00\x00 8.0.28\x00e,\x00\x00N: {\x07\x12/\x1a\x00\xff\xff\xff\x02\x00\xff\xdf\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x005}t\x15C\x04`cP2)p\x00mysql_native_password\x00 93.158.238.148:443 93.158.238.148:3389 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows 10/Windows Server 2019 Hostname: HFZ0005 Organization: FNXTEC ASN: AS60503 IDC 2024-10-03 17:12

BannerSSLHash Show All

Remote_Desktop_Protocol: \x03\x00\x00\x13\x0E\xD0\x00\x00\x124\x00\x02\x1F\x08\x00\x02\x00\x00\x00

Target_Name: HFZ0005 NetBIOS_Domain_Name: HFZ0005 NetBIOS_Computer_Name: HFZ0005 DNS_Domain_Name: HFZ0005 DNS_Computer_Name: HFZ0005 Product_Version: 10.0.17763

93.158.238.148:6379 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows Hostname: protected.hyperfilter.com Organization: FNXTEC ASN: AS60503 2024-07-06 11:28

BannerHash Show All $1964

Server
redis_version:3.0.504 redis_git_sha1:00000000 redis_git_dirty:0 redis_build_id:a4f7a6e86f2d60b3 redis_mode:standalone os:Windows
arch_bits:64 multiplexing_api:WinSock_IOCP

93.158.238.148:5357 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows Hostname: protected.hyperfilter.com Organization: FNXTEC ASN: AS60503 Title: Service Unavailable 2024-07-01 18:55

HeaderBodyHash Show All HTTP/1.1 503 Service Unavailable Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0

93.158.238.148:5985

fxp panel

93.158.238.148:3000

93.158.238.148:3000

93.158.238.148:443

ServerAlive2: IP1: HFZ0005 IP2: 93.158.238.148 IP3: 93.158.236.21 IP4: 93.158.237.59 IP5: 25.10.26.220 IP6: 2620:9b::190a:1adc CRYPTPAD URL FOR NetBIOS_Computer_Name: HFZ0005 93.158.237.59:135 135 TCP/DCERPC

\x05\x00 \x03\x10\x00\x00\x00\x18\x00\x00\x00\x01\x00\x00\x00\x04\x00\x01\x05\x00\x00\x00\x00
https://cryptpad.fr/code/#/2/code/edit/lSDw0zraux1vyMRDIR2v4Tqn/

93.158.238.148:443 93.158.238.148:3389 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows 10/Windows Server 2019 Hostname: HFZ0005 Organization: FNXTEC ASN: AS60503 IDC 2024-10-03 17:12

BannerSSLHash Show All

Remote_Desktop_Protocol:

    \x03\x00\x00\x13\x0E\xD0\x00\x00\x124\x00\x02\x1F\x08\x00\x02\x00\x00\x00

  Target_Name: HFZ0005
  NetBIOS_Domain_Name: HFZ0005
  NetBIOS_Computer_Name: HFZ0005
  DNS_Domain_Name: HFZ0005
  DNS_Computer_Name: HFZ0005
  Product_Version: 10.0.17763
93.158.238.148:6379 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows Hostname: protected.hyperfilter.com Organization: FNXTEC ASN: AS60503 2024-07-06 11:28

BannerHash Show All $1964

Server
redis_version:3.0.504
redis_git_sha1:00000000
redis_git_dirty:0
redis_build_id:a4f7a6e86f2d60b3
redis_mode:standalone
os:Windows  
arch_bits:64
multiplexing_api:WinSock_IOCP
93.158.238.148:5357 93.158.238.148 The Netherlands, Noord-Holland, Amsterdam OS: Windows Hostname: protected.hyperfilter.com Organization: FNXTEC ASN: AS60503 Title: Service Unavailable 2024-07-01 18:55

HeaderBodyHash Show All HTTP/1.1 503 Service Unavailable Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0

93.158.238.148:5985

fxp panel

93.158.238.148:3000

93.158.238.148:3000

Activity from loading https://fxpgunz.com/client https://any.run/report/5e4c00f5a274dd021355a1aea5ffd90ece56602b5ee98471768c2bdad6d20ab8/e4bf9419-9681-43f6-b267-795d475a1171 https://www.filescan.io/uploads/67a41d886c9b889537f84cd5/reports/ad65a728-73e4-43d0-b1ca-1964366d2bef/files

93.158.238.148:443

Main object - https://fxpgunz.com url https://fxpgunz.com Dropped file

 sha256 C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\3389e449-0f57-43b3-b507-27e703fe7f0b.tmp cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
 sha256 C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Last Browser 9c70f766d3b84fc2bb298efa37cc9191f28bec336329cc11468cfadbc3b137f4
 sha256 C:\Users\admin\AppData\Local\Temp\chrome_Unpacker_BeginUnzipping2996_799593754\offscreendocument_main.js f6cc11d4a3a43b11d9408e9d2366d6388bf8733d68188ccd2969f7492d14b857
 sha256 C:\Users\admin\AppData\Local\Temp\chrome_Unpacker_BeginUnzipping2996_799593754\service_worker_bin_prod.js be65fdd71cd523b7e759d918e04aa2dd7cbe5f907570bb5bc367456796aa888a
 sha256 C:\Users\admin\AppData\Local\Temp\chrome_Unpacker_BeginUnzipping2996_799593754\page_embed_script.js 73e3888ccbc8e0425c3d2f8d1e6a7211f7910800eede7b1e23ad43d3b21173f7
 sha256 C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\157e0e8c0fa444f9_0 698ed8bd8fc2e03e1f7e474aeacf97dc08dd39728318266643862ebf5c51bb01
 sha256 C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\aa0218d416d6222c_0 68f10dbb72ec712ea5a0fe0783d274da58a8a1d9401a7628073c3c34a5818939
DNS requests
 domain fxpgunz.com
 domain www.fxpgunz.com
Connections
 ip 104.26.13.77
 ip 224.0.0.251
 ip 104.18.94.41
 ip 104.26.12.77
                                                                                
                                                                █▄             
                                                                 ███▄▄         
                                                                  ██▓▓▓█▄▄     
                                                                  ███▓▓▓▓██▄   
                                                                   ██████▓▓▓█▄ 
                                                                    ████████▀▀▀
                                                                    ██████▀    
                                                                   █████▀      
                                                                 ▄████▀        
                                                               ▄████▀          
                                                             ▄███▓▀            
 ▄                                                          ███▓▓              
  █▄                                                       ████▓               
   ██▄                  .  G R E E T Z  .                 ██████               
   █▓██                                                   ██████               
    █▓██                                                  ██████               
    █▓███                                                  ██████              
    █▓███                                                  ██████              
   █▓▓████                                                  ▓█████             
  █▓▓█████                                                  █▓█████            
 █▓███████                                                   █▓█████           
█████████                                                     █▓█████          
████████▓                                                      █▓█████         
████████▓█                                                     █▓██████        
█████████▓█                                                     ████████       
 █████████▓█                                                    ██████▓█       
 ██████████▓█                    ▄▄████▄▄▄                     ▄██████▓██      
  █▓████████▓▓█▄▄           ▄▄▄███████████████▄▄▄          ▄▄█████████▓▓█      
   █▓█████████████████▄▄▄▄████████████████████████████▄▄▄███████████▓▓▓█       
    █▓▓██████████████████████████████████████████████████████████▓▓▓▓██        
     █▓▓▓▓█████████████████████████████████▓▓▓▓▓███████████████▓▓▓██▀▀         
      ▀▀█▓▓▓▓▓▓█████████████████████▀▀    ▀▀███▓▓▓▓▓█████████▀▀▀▀              
          ▀▀▀█▓▓▓▓▓▓▓▓█████████▀▀▀             ▀▀▀▀▀▀▀▀▀▀  
Gunz Security Issue Interger Overflow https://cryptpad.fr/code/#/2/code/view/3zrq7T+zbOaFCgrwoq79RJxNawRKrzuT3W9-59YizTw/ GunZ Double free https://cryptpad.fr/code/#/2/code/view/i-si88sf6qrxWa3GT2AJMS9EZzPJCzdntJEVX-aPd8Y/

J\x00\x00\x00 8.0.28\x00e,\x00\x00N: {\x07\x12/\x1a\x00\xff\xff\xff\x02\x00\xff\xdf\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x005}t\x15C\x04`cP2)p\x00mysql_native_password\x00

J\x00\x00\x00 8.0.28\x00e,\x00\x00N: {\x07\x12/\x1a\x00\xff\xff\xff\x02\x00\xff\xdf\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x005}t\x15C\x04`cP2)p\x00mysql_native_password\x00
https://privatebin.net/?c12b6b071f9f1331#79xXkkXWuaGrRsHfX6nEwu4V3ZHrt7rDoYskuXZKPFYY
https://paste.sh/HKO3nMr7#bl2V3yf_fdV81jeqGHqqFc25
https://pastebin.com/raw/mCSYtEf9```