Europe connect

I’d come running back to EU again: TA416 resumes European government espionage campaigns

Share with your network!

Key findings

  • From mid-2025 onwards, the China-aligned threat actor TA416 resumed observed targeting of European government and diplomatic organizations following a period of reduced EU-focused activity in our telemetry.
  • This TA416 activity included multiple waves of web bug and malware delivery campaigns against diplomatic missions to the European Union and NATO across a range of European countries.
  • In March 2026, Proofpoint also observed TA416 expand targeting to include diplomatic and government entities in the Middle East in the weeks following the outbreak of conflict in Iran.
  • Throughout this period, TA416 regularly altered its infection chain, including abusing Cloudflare Turnstile challenge pages, abusing OAuth redirects, and using C# project files, as well as frequently updating its custom PlugX payload.
  • TA416 most directly overlaps with public reporting on RedDelta, Red Lich, Vertigo Panda, SmugX, and DarkPeony.

Overview

In 2022, Proofpoint reported on high-volume TA416 activity targeting European governments, which increased sharply as Russian troops began amassing on the border of Ukraine. This high operational tempo of TA416 campaigns against European government targets continued until mid-2023, when the group shifted targeting away from Europe. From mid-2023 until mid-2025, Proofpoint observed minimal TA416 targeting within Europe, with the group mostly active across Southeast Asia, Taiwan, and Mongolia during this period.

Since mid-2025, TA416 resumed regular targeting of European government and diplomatic entities. This renewed focus most heavily targeted individuals or mailboxes associated with diplomatic missions and delegations to NATO and the EU. TA416’s return to European government targeting occurred during heightened EU–China tensions over trade, the Russia–Ukraine war, and rare earths exports, and commenced immediately following the 25th EU–China summit.

In March 2026, following the outbreak of the Iran war, TA416 conducted multiple campaigns targeting a wide range of diplomatic and government entities in the Middle East, a region not traditionally regularly targeted by this threat actor. This aligns with a trend observed by Proofpoint of some state-aligned threat actors shifting targeting toward Middle Eastern government and diplomatic entities in the aftermath of the war. This likely reflects an effort to gather regional intelligence on the status, trajectory, and broader geopolitical implications of the conflict.

From mid-2025 to early 2026, TA416 conducted both broad web bug and malware delivery campaigns. The TA416 web bug campaigns used freemail sender accounts and a range of thematic lures, such as Europe sending troops to Greenland, to perform delivery and engagement reconnaissance. A web bug (or tracking pixel) is a tiny invisible object embedded in an email that triggers an HTTP request to a remote server when opened, revealing the recipient's IP address, user agent, and time of access, allowing the threat actor to assess whether the email was opened by the intended target. Malware delivery campaigns used both attacker-controlled freemail accounts and compromised government and diplomatic mailboxes to send links to malicious archives hosted on Microsoft Azure Blob Storage, actor-controlled domains, Google Drive, and compromised SharePoint instances.

During this period, TA416 repeatedly altered its initial infection chains while maintaining a consistent goal of loading the group's customized PlugX backdoor via DLL sideloading triads. Initial access techniques evolved from using fake Cloudflare Turnstile challenge pages that gated access to ZIP archives, to abuse of Microsoft Entra ID third‑party applications that redirected users to attacker-controlled malware delivery domains, and finally to archives containing a renamed Microsoft MSBuild executable and malicious C# project files. In each case, TA416 relied on either ZIP smuggling using Microsoft shortcut (LNK) files or CSPROJ-based downloaders to deliver a signed executable, malicious DLL, and encrypted payload triad that ultimately loaded PlugX into memory.

Delivery: widespread web bug campaigns targeting EU diplomatic entities

Figure 1

Figure 1: TA416 “humanitarian concerns” web bug phishing email from July 2025.

TA416’s renewed targeting of European government entities commenced one day after the 25th EU–China summit with a series of web bug campaigns targeting diplomatic missions to the EU across many European countries. In late July and early August 2025, TA416 sent over 100 phishing emails containing web bugs from the following Gmail email addresses:

  • emmeline.voss@gmail[.]com
  • kordula.wehrli@gmail[.]com
  • kayden.beaufort@gmail[.]com

The group used multiple lure topics such as urgent humanitarian concerns, requests for interviews, and proposals for collaboration. These web bug campaigns were likely conducted for reconnaissance purposes to track delivery and engagement to inform follow-on malware delivery attempts. Proofpoint observed the following URL formats used in these campaigns, with each email including a unique image filename:

  • hxxps://welnetsanda[.]org/images/upload/logo.png/{UniqueID}.png
  • hxxps://phpthemes[.]net/images/upload/eu.png/{UniqueID}.png
  • hxxps://phpthemes[.]net/images/upload/{UniqueID}.png

In January 2026, Proofpoint observed TA416 send another widespread wave of web bug phishing emails to European government entities, this time using an article taken from the London School of Economics website titled ‘It is time for Europe to send “tripwire” troops to Greenland.’ These emails also contained unique URLs that redirected to this news article if clicked. This was likely included as an additional method of reconnaissance, given many modern email clients and applications disable external image download by default, diminishing the efficacy of web bugs. Both the web bug and link included in the email used the infrastructure associated with TA416 domain speedifynews[.]com.

Figure 2

Figure 2: TA416 Greenland-themed web bug phishing email campaign from January 2026.

Delivery: malware campaigns targeting EU diplomatic entities

In late September 2025, Proofpoint observed TA416 conduct multiple malware delivery campaigns targeting European ministries of defense and ministries of foreign affairs. This targeting predominantly focused on individuals assigned to NATO missions and delegations. In one instance, TA416 used a likely compromised account belonging to a European armed forces organization to send the phishing emails. In another, the group used a compromised email address from a Southeast Asian diplomatic entity. Proofpoint has observed TA416 abusing compromised accounts from this same Southeast Asian entity to conduct phishing campaigns on multiple occasions throughout 2025 and 2026. The infection chains observed in these campaigns have been covered extensively in public reporting by StrikeReady and Arctic Wolf.

Figure 3

Figure 3: TA416 February 2026 spearphishing email spoofing Icelandic Ministry of Foreign Affairs.

In January and February 2026, TA416 again conducted a series of malware delivery campaigns targeting numerous European government organizations, with later campaigns focusing on targeting individuals or mailboxes associated with diplomatic missions to the EU and Taiwan. Most of these phishing emails were sent via the Gmail accounts office2000005@gmail[.]com and hsuhalingaye26@gmail[.]com and spoofed various diplomatic entities. A smaller subset was sent via likely compromised accounts associated with the interior ministry of a European country and a Southeast Asian ministry of foreign affairs.

Delivery: post-conflict expansion to Middle East targeting

In mid-March 2026, Proofpoint observed TA416 conduct multiple campaigns targeting government and diplomatic entities within the Middle East. Historically, this region has not been regularly targeted by TA416, and this expansion in targeting was very likely driven by the outbreak of the war in Iran. One campaign conducted on 16 March 2026 used a compromised Syrian Ministry of Foreign Affairs and Expatriates account to send a phishing email concerning energy infrastructure in Iran, which was sent to a wide range of embassies located across multiple Middle Eastern countries.

Figure 4

Figure 4: TA416 March 2026 spearphishing email using Iranian energy infrastructure lure.

Shifting infection chains: all roads lead to PlugX

The following section examines how TA416's infection chains have evolved over recent months while maintaining core elements of the group's longstanding tradecraft.

Figure 5

Figure 5: Evolving TA416 infection chain from September 2025 to March 2026.

Some components of TA416’s Tactics, Techniques, and Procedures (TTPs) remain consistent after many years. This includes the continued use of compromised diplomatic email accounts, web bug reconnaissance campaigns, and DLL sideloading triads to deploy a custom PlugX variant, all of which align with previous Proofpoint reporting on this threat actor in 2022. Despite this, TA416 continues to regularly evolve and innovate. The group regularly adapts the early stages of its infection chains and integrates new defense evasion and anti-analysis features into a custom PlugX variant. Between September 2025 and March 2026, Proofpoint observed TA416 employing multiple different initial infection chains that all ultimately lead to this customized PlugX variant.

September 2025 – January 2026: Fake Cloudflare Turnstile challenge pages

Beginning in September 2025, TA416 began employing fake Cloudflare Turnstile challenge pages impersonating login.microsoftonline[.]com hosted on Microsoft Azure Blob Storage sites. Early variations used a real Turnstile widget, which is used to redirect the target to a ZIP archive hosted on the same Microsoft Azure Blob Storage site when the checkbox is clicked and a Turnstile token is returned, though this token is not validated at any point. The user is redirected to a payload URL that is obfuscated within the page source code using character code arrays, as noted in StrikeReady reporting.

Figure 6

Figure 6: Fake Cloudflare Turnstile challenge landing page used by TA416.

Later variations instead redirected the user from the fake Cloudflare Turnstile challenge page to an attacker-controlled domain, with the returned Turnstile token appended as a URL parameter. This allows the threat actor to validate the Turnstile token server-side to impede automated analysis, before redirecting to a direct download of a ZIP archive, again hosted using Microsoft Azure Blob Storage.

Figure 7

Figure 7: Redirection logic employed in later variations of fake Cloudflare Turnstile challenge landing page used by TA416.

The downloaded archives in these infection chains all use a ZIP smuggling technique to hide the next stage file within the ZIP structure. The ZIP files contain a single Microsoft shortcut (LNK) file that runs an embedded PowerShell command to search for the parent ZIP, then carve an MSI or TAR file from the ZIP using either a byte marker or hardcoded offset, and execute either the MSI or a DLL sideloading executable contained within the TAR. In all cases, this leads to a DLL sideloading triad loading PlugX.

While Proofpoint has not observed the use of these fake Cloudflare Turnstile pages in our telemetry since November 2025, submissions to third-party malware repositories in January 2026 suggest the group is continuing to use this technique selectively.

December 2025 – January 2026: Microsoft OAuth redirect abuse

In December 2025, TA416 began abusing third-party Microsoft Entra ID cloud applications to trigger redirects leading to direct downloads of malicious archives. In this infection chain, the group registers a third-party application in Entra ID and configures its redirect URI to point to an attacker-controlled domain hosting the malicious payload. TA416 phishing emails using this technique contain a link to Microsoft's legitimate OAuth authorization endpoint, crafted with parameters that suppress user interaction and force an authorization failure. When clicked, the user is redirected to the application's registered redirect URI, resulting in a direct download of the malicious archive with no user interaction. Proofpoint has previously reported on similar techniques used to perform redirection, which allow threat actors to bypass URL reputation checks and email security filters by ensuring the initial link points to a trusted Microsoft domain. The inclusion of a trusted Microsoft URL is also more likely to appear legitimate to targeted users.

Figure 8

Figure 8: Example of Microsoft OAuth redirect technique employed by TA416.

An example of a URL observed in a TA416 phishing email is shown above. In this case, the client_id refers to the attacker-controlled third-party application, the scope is set to a nonexistent value (scope=invalid) to deliberately trigger an authorization failure, and prompt=none is set to suppress user interaction. As the URL does not include a redirect_uri value, it defaults to the redirect URI configured on the application registration. This deliberately triggers an interaction_required error, and the user is redirected to a predetermined URL where TA416 has staged a direct download of a malicious ZIP archive. Proofpoint observed TA416 using a different state value for each target, likely to allow the use of unique URLs within each email and to easily correlate payload downloads with targets. The downloaded ZIP archives delivered through these infection chains use the same previously described ZIP smuggling technique to load PlugX. Microsoft published a report in March 2026 on the use of this redirection technique by TA416 and other threat actors.

February 2026: use of MSBuild and C# project files

Beginning in February 2026, Proofpoint observed TA416 adapt its initial infection chain once again in campaigns linking to archives hosted on Google Drive or a compromised SharePoint instance. In this case, the downloaded archives contained a legitimate Microsoft MSBuild executable renamed as a lure filename, alongside a malicious C# project (CSPROJ) file.

Figure 9

Figure 9: Archive containing renamed MSBuild executable and malicious C# project file.

When the MSBuild executable is run, it searches the current directory for a project file and automatically builds it. In the observed TA416 activity, the CSPROJ file acts as a downloader, decoding three Base64-encoded URLs to fetch a DLL sideloading triad from a TA416-controlled domain, saving them to the user's temp directory, and executing a legitimate executable to load PlugX via the group's typical DLL sideloading chain.

The CSPROJ samples observed by Proofpoint were highly similar, with only the Base64-encoded URLs swapped out. The presence of slightly modified comments before these encoded URL variables within each sample, such as Base64-encoded URLs with separate endpoints and Base64-encoded URLs with new endpoints, suggests that these CSPROJ files may have been created or altered with the assistance of an LLM.

Figure 10

Figure 10: Excerpt of C# project file showing example of comments preceding Base64-encoded URL variables.

TA416 tweaks PlugX sideloading chain

While the overall DLL sideloading triad delivery mechanism has remained consistent for several years, TA416 regularly changes the PlugX payload loading chain, in particular the DLL loader, payload obfuscation, and sideloading executable used. Between September 2025 and March 2026, Proofpoint observed the following signed executables being abused by TA416 to load PlugX.

Filename

SHA256

cnmpaui.exe

4ed76fa68ef9e1a7705a849d47b3d9dcdf969e332bd5bcb68138579c288a16d3

steam_monitor.exe

8c0051a83b3611ff2b669b670aa005633f3d9e844454a112b31d2a4bc944a234

ABRemove.exe

6b363e0f16fc5a612bd98631e7cdc4f68a95329e92c21ef0495c9117b8b8f360

Avk.exe

8421e7995778faf1f2a902fb2c51d85ae39481f443b7b3186068d5c33c472d99

ErsChk.exe

bc8b022c10bcab39da302446b0a50988de94607c7e724f2051578e8ed2f8bbe7

CNMNSST2.exe

53086e3b557a1d21cf7f4ffc73d92c39b08872334a8cdb09dda0a06bd060cfe9

Figure 11: Signed executables vulnerable to DLL sideloading abused by TA416 between September 2025 – March 2026.

In the latest observed variants in March 2026, TA416 used a signed Canon executable CNMNSST.exe to sideload a malicious loader DLL named CNCLID.dll. The loader DLL uses DJB2 API hashing to dynamically resolve Windows API functions and execute a payload file Canon.dat as shellcode, which decodes the PlugX payload. The loader and payload code and data are obfuscated using techniques such as API hashing, junk code, and control-flow flattening. For persistence, the DLL sideloading triad is copied to the directory C:\Users\Public\Canon and a Run registry key Canon is created to run CNMNSST.exe upon startup.

Overview and updates in C&C protocol

The PlugX payload establishes C&C communications over HTTP using an RC4-encrypted binary protocol. Prior to initiating network activity, the malware performs several initialization steps to generate host identifiers and applies anti-analysis checks.

The client initiates communication to the C&C server by sending an HTTP GET request. The server responds with application/octet-stream data that serves as the RC4 encryption key for the subsequent exchange. The client creates a SYSINFO structure containing information on the infected host; RC4 encrypts it using the key received in the previous step; and sends it to the server inside an HTTP POST request body. The SYSINFO structure is as follows:

Field

Description

is64bit

Whether the host runs a 64-bit OS

dwMajorVersion

OS major version

dwMinorVersion

OS minor version

dwBuildNumber

OS build number

wServicePackMajor

Service pack major version

wServicePackMinor

Service pack minor version

wSuiteMask

OS suite mask

user_name

Current username

computer_name

Computer name

id

Campaign/victim identifier

ip_address

Host IP address

Figure 12: PlugX SYSINFO system reconnaissance structure.

The server then replies with RC4 encrypted data that contains the command and its parameters. Currently, the following list of commands are available:

Command

Description

0x00000002

Outgoing system information beacon (SYSINFO structure)

0x00001005

Uninstall — deletes autorun registry keys and drops a self-delete batch file

0x00001007

Adjusts reconnect_interval and connection_timeout parameters

0x00003004

Downloads a new payload set (EXE, DLL, DAT) and executes the sideloading binary

0x00007002

Opens a reverse command shell

Figure 13: List of available PlugX commands.

In older variations seen prior to December 2025, the C&C HTTP requests include four custom headers that mimic the Fetch metadata specification:

Sec-Fetch-Dest: <random_string>

If-None-Match: <system_token>

Sec-Fetch-Site: none

Sec-Fetch-Mode: cors

The If-None-Match header carries a host-generated hex token, while the Sec-Fetch-Dest value is randomized per request. In this older C&C protocol, the HTTP URI used the following predictable pattern:

  • A base endpoint selected randomly from a fixed set:
  • /upload
  • /download
  • /developer
  • /help/?
  • /api/v1/resource
  • /user/profile
  • /settings
  • /i/bookmark
  • A timestamp parameter appended: ?t=<unix_timestamp>
  • A variable number of randomly generated key-value pairs

This led to URI values such as /api/v1/resource?t=1760970011&1Tr=askZVyeahfE00bt4&d9=e8cAQ4T&vE8=uUlMYYuJ&S=zMLY3z.

Figure 14

Figure 14: Older PlugX variant HTTP C&C traffic.

In the updated variants first seen in December 2025, the group updated this C&C protocol, likely to evade network-based detections. In the new variation, the Sec-Fetch-Dest, If-None-Match, Sec-Fetch-Site, and Sec-Fetch-Mode custom headers are no longer sent. Instead, a 16-character host token is embedded within a Cookie header, surrounded by randomly generated cookie key-value pairs. Additionally, the use of hardcoded base URI endpoints is removed, with the full URI path now randomly generated.

Figure 15

Figure 15: Newer PlugX variant HTTP C&C traffic.

Updates in config encryption

The PlugX payload C&C parameters (C&C domains or IP addresses, campaign identifiers, mutex names, install paths, and decoy document metadata) are stored in an embedded configuration blob that is RC4-encrypted. The encryption scheme and internal structure of this configuration have evolved in more recent variations such as those seen in February 2026, with the newer variant introducing additional hardening to the configuration encryption and now employing two layers of obfuscation. After RC4 decryption of the outer blob, individual string fields such as C&C domains, mutex names, and campaign identifiers are then independently decoded using a rolling XOR.

Variable

Value

RC4 key

anMgFtsFCvA

Decoy Size

41671

Decoy Filename

Meeting invitation.pdf

Mutex Name

dGcEuQhKT

Campaign ID

msbuild

Install Directory

%public%\GData

Decoy Directory

%temp%

C&C

ombut[.]com:443, ombut[.]com:443, ombut[.]com:443

Figure 16: Example of decrypted PlugX configuration from February 2026 campaign.

Infrastructure analysis

In recent years, TA416 has shifted its infrastructure procurement TTPs and now almost exclusively uses a steady supply of re-registered, formerly legitimate domains for C&C, malware delivery, and web bugs, often first using domains within days after re-registering them. This tactic of purchasing previously legitimately used domains is likely an effort to evade domain reputation-based heuristics. The group typically also uses the Cloudflare Content Delivery Network (CDN) to obscure backend hosting IP addresses used for malware delivery and C&C.

Figure 17

Figure 17: Timeline of TA416 C&C domain first sightings (July 2025-March 2026).

TA416 has heavily favored use of the virtual private server (VPS) providers Evoxt Enterprise (AS149440), XNNET LLC (AS6134), and Kaopu Cloud HK Limited (AS138915) throughout 2025 and 2026. The group also typically deploys minimal fake websites on its C&C domains, likely to hinder signaturing and tracking efforts and to make these domains appear legitimate.

Figure 18

Figure 18: Example of fake websites hosted on TA416 C&C domains (example shown is ombut[.]com).

Attribution – what even is Mustang Panda anyway?

In recent years, the Mustang Panda moniker within public threat intelligence reporting has become increasingly opaque and difficult to disentangle. Generally, Proofpoint tracks what is commonly publicly referred to as Mustang Panda under two primary clusters: TA416 (covered within this report) and a second group tracked under the temporary designator UNK_SteadySplit.

Within Proofpoint’s visibility, UNK_SteadySplit has been active since at least 2022, with related open-source activity dating back to at least 2019. UNK_SteadySplit is a user of the custom TONESHELL and PUBLOAD malware families, alongside multiple other first-stage malware families delivered in phishing campaigns. Since the beginning of 2025, Proofpoint has predominantly observed UNK_SteadySplit targeting government, hospitality, and technology organizations in South and Southeast Asia, with a particular focus on Myanmar and Thailand. Within Proofpoint's telemetry, the group exclusively uses freemail senders and typically employs much more simplistic infection chains than TA416, most often delivering an archive containing a DLL sideloading pair downloaded from a cloud storage service. The table below highlights some of the key similarities and differences between the two clusters, as observed within Proofpoint’s visibility.

 

TA416

UNK_SteadySplit

Targeting

  • European government and diplomatic entities
  • Southeast Asian and Mongolian government and healthcare organizations
  • Five Poisons targeting
  • Government, insurance, hospitality, technology, and energy organizations in South and Southeast Asia

Capabilities

  • Customized PlugX variant
  • Heavy obfuscation and use of control flow flattening
  • PUBLOAD
  • TONESHELL
  • Various custom first stage loaders
  • Minimal obfuscation
  • Regular inclusion of Easter egg strings and recurring PDB path patterns
  • Recurring use of FakeTLS C&C protocols

Infection Chain

  • Use of both freemail and compromised government sender email addresses
  • Varied infection chains, including use of:
  • MSC files
  • HTA files
  • LNK files with Zip Smuggling
  • Fake Cloudflare Turnstile challenge pages
  • CSPROJ files
  • Microsoft OAuth redirection abuse
  • DLL sideloading triads
  • Updates DLL sideloading executable every 1-2 months
  • Exclusive use of freemail sender email addresses
  • Archive download from cloud hosting site (e.g. Google Drive)
  • Archive typically contains a DLL sideloading pair with lure filename
  • More frequent rotation of DLL sideloading executable than TA416, with minimal overlap in sideloading executables

Infrastructure

  • Mostly uses domains for C&C
  • Heavy usage of Cloudflare CDN
  • Re-registers former legitimate domains
  • Favors Evoxt Enterprise (AS149440), XNNET LLC (AS6134), and Kaopu Cloud HK Limited (AS138915)
  • Mostly uses raw IP addresses for C&C
  • Varied hosting providers, no overlaps in providers favored by TA416

Lure themes

  • Geopolitical events and diplomatic communications
  • Meeting invitations
  • Conference invitations
  • Geopolitical events and diplomatic communications
  • Fake job promotions
  • Hotel room bookings
  • Hotel association and lifestyle benefits offers
  • Meeting minutes and notes

Figure 19: Similarities and differences between TA416 and UNK_SteadySplit clusters.

As noted in previous reporting by Trend Micro in 2022, there are historical technical overlaps between TA416 and UNK_SteadySplit activity, most directly via the presence of a UNK_SteadySplit TONESHELL C&C IP address within a filepath seen in two LNK files used in TA416 campaigns. It is therefore likely that some form of organizational, personnel, or hierarchical link exists or existed between TA416 and UNK_SteadySplit. However, currently Proofpoint is unable to assess the nature of this relationship, and we have not observed similar overlaps in recent years. From Proofpoint’s perspective, both clusters appear operationally distinct and use different tooling, TTPs, and infrastructure to conduct different targeting.

Based on an analysis of public research and discussions with industry partners, Proofpoint believes the following most accurately reflects the clustering overlaps between TA416, UNK_SteadySplit, and related groups tracked by other vendors:

TA416

UNK_SteadySplit

TA416 and UNK_SteadySplit combined

Vertigo Panda

RedDelta

Red Lich

UNC6384

SmugX

DarkPeony

Mustang Panda (CrowdStrike)

CerenaKeeper

Red Ishtar

Twill Typhoon

Temp.HEX

Earth Preta

Stately Taurus

HoneyMyte

Hive0154

Figure 20: Overlaps between TA416, UNK_SteadySplit, and related groups tracked by other vendors.

Conclusion

TA416's shift back to European government targeting in mid-2025, following two years of focus on Southeast Asia and Mongolia, is consistent with a renewed intelligence-collection focus against EU and NATO-affiliated diplomacy entities. In addition, TA416's expansion to Middle Eastern government targeting in March 2026 further highlights how the group’s tasking prioritization is likely influenced by geopolitical flashpoints and escalations. Throughout this period, the group has shown a willingness to iterate on infection chains, cycling through using fake Cloudflare Turnstile pages, OAuth redirect abuse, and MSBuild-based delivery, while continuing to update its customized PlugX backdoor.

These TA416 operations suggest the group will likely continue to prioritize targeting European diplomatic networks and, as the conflict continues, Middle Eastern diplomatic entities, while maintaining parallel activity across Southeast Asia. Organizations in scope for this targeting should expect continued experimentation with initial access vectors delivered via spearphishing campaigns alongside continually updated PlugX payloads.

 

ET rules

2068412 - ET MALWARE TA416 PlugX CnC Activity (GET)
2068413 - ET MALWARE TA416 PlugX CnC Activity (GET)
2068414 - ET MALWARE TA416 PlugX CnC Activity (POST)

Indicators

Note: indicators encompass a range of TA416 activity observed since July 2025, not just campaigns targeting European government.

Indicator

Type

Description

First Seen

cnrelojes[.]com

Domain

C&C domain

Jun-25

hnk-capljina[.]com

Domain

C&C domain

Jun-25

harrietmwelch[.]com

Domain

C&C domain

Jun-25

theprmummy[.]com

Domain

C&C domain

Jun-25

ecolnomy[.]com

Domain

C&C domain

Jun-25

mettayoga[.]org

Domain

C&C domain

Jun-25

it-evenement[.]nl

Domain

C&C domain

Jun-25

welnetsanda[.]org

Domain

Web bug domain

Jun-25

thecamco[.]net

Domain

C&C domain

Jun-25

paquimetro[.]net

Domain

C&C domain

Jun-25

fuyuju[.]com

Domain

C&C domain

Jul-25

nvofficespace[.]com

Domain

C&C domain

Jul-25

premegalithic[.]com

Domain

C&C domain

Jul-25

phpthemes[.]net

Domain

Web bug domain

Jul-25

supplementsoftheyear[.]com

Domain

C&C domain

Jul-25

colorflee[.]org

Domain

C&C domain

Aug-25

atravelingwitch[.]com

Domain

C&C domain

Sept-25

napasbdc[.]org

Domain

C&C domain

Sept-25

buzzurro[.]net

Domain

C&C domain

Sept-25

racineupci[.]org

Domain

C&C domain

Sept-25

cubukluescort[.]com

Domain

C&C domain

Sept-25

cseconline[.]org

Domain

C&C domain

Sept-25

ecomputers[.]org

Domain

C&C domain

Oct-25

designehair[.]com

Domain

C&C domain

Oct-25

loumuenz[.]com

Domain

C&C domain

Oct-25

ronnybush[.]net

Domain

C&C domain

Oct-25

hayabusamt[.]com

Domain

C&C domain

Oct-25

rondabusco[.]com

Domain

C&C domain

Nov-25

doorforum[.]com

Domain

C&C domain

Nov-25

portabalbufe[.]com

Domain

C&C domain

Nov-25

papermoonweddings[.]com

Domain

C&C domain

Nov-25

hoplitellc[.]com

Domain

C&C domain

Nov-25

mongolianews[.]info

Domain

C&C domain

Nov-25

devredin[.]com

Domain

C&C domain

Dec-25

famisu[.]com

Domain

C&C domain

Dec-25

espacebus[.]com

Domain

C&C domain

Dec-25

dnzapping[.]com

Domain

C&C domain

Dec-25

buddhismnewsdaily[.]org

Domain

C&C domain

Dec-25

buywownow[.]com

Domain

C&C domain

Dec-25

goodmedsx[.]com

Domain

C&C domain

Dec-25

anbusivam[.]com

Domain

C&C domain

Dec-25

phbusiness[.]net

Domain

C&C domain

Dec-25

bobbush[.]org

Domain

C&C domain

Dec-25

majicbus[.]org

Domain

C&C domain

Dec-25

busopps[.]org

Domain

C&C domain

Dec-25

turileco[.]net

Domain

C&C domain

Dec-25

basecampbox[.]com

Domain

C&C domain

Jan-26

adimagemarketing[.]com

Domain

C&C domain

Jan-26

ecoafrique[.]net

Domain

C&C domain

Jan-26

speedifynews[.]com

Domain

Web bug domain

Jan-26

creatday[.]com

Domain

C&C domain

Jan-26

fruitbrat[.]com

Domain

C&C domain

Jan-26

dalerocks[.]com

Domain

C&C domain

Jan-26

aaitile[.]com

Domain

C&C domain

Jan-26

ombut[.]com

Domain

C&C domain

Jan-26

gestationsdiabetes[.]com

Domain

C&C domain

Jan-26

gynecocuk[.]net

Domain

C&C domain

Feb-26

decoraat[.]net

Domain

C&C domain

Feb-26

embwishes[.]com

Domain

C&C domain

Feb-26

carhirechicago[.]com

Domain

C&C domain

Feb-26

ytsonline[.]net

Domain

C&C domain

Mar-26

coastallasercompany[.]com

Domain

C&C domain

Mar-26

shalomrav[.]org

Domain

C&C domain

Mar-26

rhonline[.]net

Domain

C&C domain

Mar-26

winesnmore[.]net

Domain

C&C domain

Mar-26

alpinemfg[.]net

Domain

C&C domain

Mar-26

amblecote[.]net

Domain

C&C domain

Mar-26

stuypa[.]org

Domain

C&C domain

Mar-26

buscacnpj[.]org

Domain

Delivery domain

Feb-26

subusiness[.]org

Domain

Delivery domain

Dec-25

florarevival[.]com

Domain

Delivery domain

Jan-26

bushidomma[.]net

Domain

Delivery domain

Jan-26

devlyrics[.]com

Domain

Delivery domain

Feb-26

softhunts[.]com

Domain

Delivery domain

Feb-26

gesecole[.]net

Domain

Delivery domain

Feb-26

meritsoftwebportals[.]com

Domain

Delivery domain

Feb-26

foxmediagency[.]com

Domain

Delivery domain

Mar-26

ghonline[.]net

Domain

Delivery domain

Mar-26

hxxps://mydownload.z29.web.core.windows[.]net/nv2199_update_on_situation_of_cambodia-thailand_border.html

URL

Fake Cloudflare Turnstile challenge page

Sept-25

hxxps://mydownload.z29.web.core.windows[.]net/nv2230_update_of_situation_on_cambodia-thailand_border.html

URL

Fake Cloudflare Turnstile challenge page

Sept-25

hxxps://mydownload.z29.web.core.windows[.]net/naju_plan_obuka_oktobar_2025.html

URL

Fake Cloudflare Turnstile challenge page

Sept-25

hxxps://mydownload.z29.web.core.windows[.]net/epc_invitation_letter_copenhagen_1-2_october_2025.html

URL

Fake Cloudflare Turnstile challenge page

Sept-25

hxxps://mydownloadfile.z7.web.core.windows[.]net/jatec_workshop_on_wartime_defence_procurement_(9-11_september).html

URL

Fake Cloudflare Turnstile challenge page

Sept-25

hxxps://mydownfile.z11.web.core.windows[.]net/agenda_meeting_26_sep_brussels.html

URL

Fake Cloudflare Turnstile challenge page

Sept-25

hxxps://filesdownld.z13.web.core.windows[.]net/a9t3zb7l1qx5.html

URL

Fake Cloudflare Turnstile challenge page

Oct-25

hxxps://filestoretome.z23.web.core.windows[.]net/filelocate.html

URL

Fake Cloudflare Turnstile challenge page

Nov-25

hxxps://attd.z23.web.core.windows[.]net/attd.html

URL

Fake Cloudflare Turnstile challenge page

Nov-25

hxxps://gooledives.z48.web.core.windows[.]net/election_2026.html

URL

Fake Cloudflare Turnstile challenge page

Jan-26

hxxps://gooledives.z48.web.core.windows[.]net/%e0%a6%a8%e0%a6%bf%e0%a6%b0%e0%a7%8d%e0%a6%ac%e0%a6%be%e0%a6%9a%e0%a6%a8_%e0%a7%a8%e0%a7%a6%e0%a7%a8%e0%a7%ac.html

URL

Fake Cloudflare Turnstile challenge page

Jan-26

mydownload.z29.web.core.windows[.]net

Hostname

Microsoft Azure Blob Storage site used for delivering malware

Sept-25

mydownloadfile.z7.web.core.windows[.]net

Hostname

Microsoft Azure Blob Storage site used for delivering malware

Sept-25

mydownfile.z11.web.core.windows[.]net

Hostname

Microsoft Azure Blob Storage site used for delivering malware

Sept-25

filesdownld.z13.web.core.windows[.]net

Hostname

Microsoft Azure Blob Storage site used for delivering malware

Oct-25

attd.z23.web.core.windows[.]net

Hostname

Microsoft Azure Blob Storage site used for delivering malware

Nov-25

filestoretome.z23.web.core.windows[.]net

Hostname

Microsoft Azure Blob Storage site used for delivering malware

Nov-25

gooledives.z48.web.core.windows[.]net

Hostname

Microsoft Azure Blob Storage site used for delivering malware

Jan-26

reloadsite.z13.web.core.windows[.]net

Hostname

Microsoft Azure Blob Storage site used for delivering malware

Mar-26

hxxps://login.microsoftonline[.]com/common/oauth2/v2.0/authorize?client_id=607bb911-0f5a-4186-9d48-ecff8e094280&response_type=code&scope=invalid&prompt=none&state=2

URL

Microsoft Entra ID OAuth 2.0 third-party application authorization URL used to trigger a silent redirect

Dec-25

hxxps://login.microsoftonline[.]com/common/oauth2/v2.0/authorize?client_id=5e6b7cf5-69b7-4f85-87d1-8b4cb6df8aa2&response_type=code&scope=invalid&prompt=none&state=3

URL

Microsoft Entra ID OAuth 2.0 third-party application authorization URL used to trigger a silent redirect

Dec-25

hxxps://login.microsoftonline[.]com/common/oauth2/v2.0/authorize?client_id=8d015a9c-f912-445d-8b3c-4f3b3201ded1&response_type=code&scope=invalid&prompt=none&state=47

URL

Microsoft Entra ID OAuth 2.0 third-party application authorization URL used to trigger a silent redirect

Dec-25

hxxps://login.microsoftonline[.]com/common/oauth2/v2.0/authorize?client_id=684d7892-c993-41d7-b6c1-07613c43cd61&response_type=code&scope=invalid&prompt=none&state=17

URL

Microsoft Entra ID OAuth 2.0 third-party application authorization URL used to trigger a silent redirect

Dec-25

hxxps://login.microsoftonline[.]com/common/oauth2/v2.0/authorize?client_id=a9785a2d-445e-4ffa-a770-bec734911841&response_type=code&scope=invalid&prompt=none&state=1

URL

Microsoft Entra ID OAuth 2.0 third-party application authorization URL used to trigger a silent redirect

Dec-25

hxxps://login.microsoftonline[.]com/common/oauth2/v2.0/authorize?state=149&x_client_ver=1.0.0&response_type=code&client_id=b004ab26-f57b-439d-ae54-c39b958e5743&nonce=ab93f2c1&prompt=none&scope=invalid&ui_locales=en-us

URL

Microsoft Entra ID OAuth 2.0 third-party application authorization URL used to trigger a silent redirect

Jan-26

hxxps://login.microsoftonline[.]com/common/oauth2/v2.0/authorize?state=6&x_client_ver=1.0.0&response_type=code&client_id=3c7bf1a4-927f-40a1-97b0-7a7aa08f4bb2&nonce=ab93f2c1&prompt=none&scope=invalid&ui_locales=en-us

URL

Microsoft Entra ID OAuth 2.0 third-party application authorization URL used to trigger a silent redirect

Jan-26

hxxps://login.windows[.]net/common/oauth2/v2.0/authorize?client_id=7d980c52-31e5-4554-9e20-b89c4617102f&response_type=code&scope=invalid&prompt=none&state=1

URL

Microsoft Entra ID OAuth 2.0 third-party application authorization URL used to trigger a silent redirect

Mar-26

hxxps://login.microsoftonline[.]com/common/oauth2/v2.0/authorize?utm_source=portal&utm_medium=web&client_id=c47683e4-16a3-4b8a-a3d3-c1fe4c86f073&response_type=code&scope=invalid&prompt=none&utm_campaign=login&state=o1&ref=dashboard

URL

Microsoft Entra ID OAuth 2.0 third-party application authorization URL used to trigger a silent redirect

Mar-26

hxxps://web.florarevival[.]com:443/download/a6d6u9ff13?error=interaction_required&error_description=session+information+is+not+sufficient+for+single-sign-on.&state=6

URL

Example redirect URL delivering malicious archive

Jan-26

hxxps://www.bushidomma[.]net/download/l7o9afe?error=interaction_required&error_description=session+information+is+not+sufficient+for+single-sign-on.&state=2

URL

Example redirect URL delivering malicious archive

Dec-25

hxxps://www.buscacnpj[.]org/download/we7823bn?error=interaction_required&error_description=session+information+is+not+sufficient+for+single-sign-on.&state=3

URL

Example redirect URL delivering malicious archive

Dec-25

hxxps://www.subusiness[.]org/download/aetce17ge?error=interaction_required&error_description=session+information+is+not+sufficient+for+single-sign-on.&state=47

URL

Example redirect URL delivering malicious archive

Dec-25

hxxps://www.foxmediagency[.]com/download/qqa36sa0d6fq066?error=interaction_required&error_description=Session+information+is+not+sufficient+for+single-sign-on.&state=o1

URL

Example redirect URL, redirects again to direct download of malicious archive

Mar-26

hxxps://dash.ghonline[.]net:443/download/jyebbtg?error=interaction_required&error_description=Session+information+is+not+sufficient+for+single-sign-on.&state=o1

URL

Example redirect URL, redirects again to direct download of malicious archive

Mar-26

607bb911-0f5a-4186-9d48-ecff8e094280

GUID

Microsoft Entra Third Party Application Client ID

Dec-25

5e6b7cf5-69b7-4f85-87d1-8b4cb6df8aa2

GUID

Microsoft Entra Third Party Application Client ID

Dec-25

8d015a9c-f912-445d-8b3c-4f3b3201ded1

GUID

Microsoft Entra Third Party Application Client ID

Dec-25

684d7892-c993-41d7-b6c1-07613c43cd61

GUID

Microsoft Entra Third Party Application Client ID

Dec-25

a9785a2d-445e-4ffa-a770-bec734911841

GUID

Microsoft Entra Third Party Application Client ID

Dec-25

3c7bf1a4-927f-40a1-97b0-7a7aa08f4bb2

GUID

Microsoft Entra Third Party Application Client ID

Jan-26

b004ab26-f57b-439d-ae54-c39b958e5743

GUID

Microsoft Entra Third Party Application Client ID

Jan-26

7d980c52-31e5-4554-9e20-b89c4617102f

GUID

Microsoft Entra Third Party Application Client ID

Mar-26

c47683e4-16a3-4b8a-a3d3-c1fe4c86f073

GUID

Microsoft Entra Third Party Application Client ID

Mar-26

262a1003a2cd04993b29e687686eba573d6202fea8611c437ecbd6312802677a

SHA256

JATEC workshop on wartime defence procurement (9-11 September).zip

Sept-25

7c96d08f5ce46d1a857184490a7e68ca2b02e9cbe9d188742f184f21bc9c62d9

SHA256

JATEC workshop on wartime defence procurement (9-11 September).lnk

Sept-25

ae8d2cef8eac099f892e37cc50825d329459baa9625b71fb6f4b7e8f33c6ccce

SHA256

cnmpaui.dll

Sept-25

36e516182b4c8aa48ea3e50b7dc353f32d3412f59fb0cb1c7b3590aa4d821c57

SHA256

cnmplog.dat

Sept-25

30475ff5b32776e554433ff00e7c18590253521024662c267abaefd24f1b9bbe

SHA256

EPC invitation letter Copenhagen 1-2 October 2025.zip

Sept-25

28a8bdaee803d9cf9186ff4756e15b0fb491fd3b65bde002361615f27e5ca92d

SHA256

EPC invitation letter Copenhagen 1-2 October 2025.lnk

Sept-25

c96338533d0ab4de8201ce1f793e9ea18d30c6179daf1e312e0f01aff8f50415

SHA256

cnmpaui.dll

Sept-25

56f0247049be8b9dc1da7c55957d2fb4f7177965ba62789c512f3e2b4c0c5c26

SHA256

cnmplog.dat

Sept-25

e036e2ba402d808adbb7982ec8d7a207849ff40456633b2b372bc7916d9dc22f

SHA256

ATTD-ASIA-2025.zip

Nov-25

e1e597852d684bd6d0395d5094e58831f13635f668e7cf66ba71b8b66be0ce6c

SHA256

ATTD-ASIA-2025.lnk

Nov-25

795ad4789a185c3abc35b3ad82117db6b60a7b8ab857e41080873f070d4a06f0

SHA256

crashhandler.dll

Nov-25

79e0ab17e761a00ad12b9848f1f07b507f57db532fa2df8c722693e14feb17c3

SHA256

crashlog.dat

Nov-25

784a914bd1878ad68a6cf3f693da5ddcc2f04b794204333098ad749b7e372fd4

SHA256

Concept_Note_2nd_Global_Buddhist_Summit_2026.zip

Dec-25

e31eafb49dbcad079ff177703b5a033f3e0365991cf28492339eccfe0fdf812c

SHA256

Concept_Note_2nd_Global_Buddhist_Summit_2026.lnk

Dec-25

2c3708a103b257fa75fcb34948c817fd564d4479f1e267b33c5b08f0d4c7634f

SHA256

crashhandler.dll

Dec-25

e9d8f28fd0aef3bc3f5b28a41b3f342165b371db9aefd7d03f2aba4292009d3e

SHA256

crashlog.dat

Dec-25

50746ddd81a5dbc5cec793209ab552125fff9c7184aa5bcfe22d6c3b267f67f1

SHA256

Meeting_Outcome_Briefing_10_January_2026.zip

Jan-26

d0576b39bb6c05ea0a24d3a3d5d7cb234454fefc65860f21a97757582adc7650

SHA256

Meeting_Outcome_Briefing_10_January_2026.lnk

Jan-26

84d6a8b47edadf5725d9937d8928a90d190e0c98b5b4d1a4c58e97cddcd36768

SHA256

comn.dll

Jan-26

f988d58e4a32b908ff7a557d740c6860c59807832c7626774330dcaed65ead14

SHA256

backupper.dat

Jan-26

31f3606433e95bfbb047d31c885e56a70111e130f3d2da0580644c01323b46d1

SHA256

Meeting invitation-2026.rar

Feb-26

29cd44aa2a51a200d82cca578d97dc13241bc906ea6a33b132c6ca567dc8f3ad

SHA256

Invitation_Letter_No.02_2026.zip

Feb-26

7d2b6c48cbd6cef05ea2bdae7dfc001504cccda99dd89eb7fe6646e96c1d5515

SHA256

Meeting invitation 2026.rar

Feb-26

3e7478d3854eaeed487230ba9299c87d5a5d70e4fbeac841555327c76b7b405e

SHA256

Meeting invitation 2026.csproj

Feb-26

c8a6302adf92353556c600a0afa9146fbc04663fffe8be90808df2bf04ec5703

SHA256

Meeting invitation 2026.csproj

Feb-26

de8ddc2451fb1305d76ab20661725d11c77625aeeaa1447faf3fbf56706c87f1

SHA256

Invitation_Letter_No.02_2026.csproj

Feb-26

f333bc5238e39790fb7560de067a852e9a99df2bb783cf08738d8a0d424b9658

SHA256

Avk.dll

Feb-26

06a70c54c580ec4c362bfbc94147a0f1ac9020c421933ccf494a8d553b114260

SHA256

Avk.dll

Feb-26

46314092c8d00ab93cbbdc824b9fc39dec9303169163b9625bae3b1717d70ebc

SHA256

Avk.dll

Feb-26

e7ed0cd4115f3ff35c38d36cc50c6a13eba2d845554439a36108789cd1e05b17

SHA256

AVKTray.dat

Feb-26

a3f9e20315663e4e8feb13e77563e3cb0f2f4844734987e51e14bd172b9a04fd

SHA256

AVKTray.dat

Feb-26

5c3208c5217933e16c5119e7baf78f85fd409e8822d1cd7a8ef2d52a5bd511c1

SHA256

AVKTray.dat

Feb-26

42c3b9cad6c8383699eba4f82d51908c0d61e9ea454bc40447cf20475ce20ff0

SHA256

Information_Note_Elections_Republic_of_Kosovo_28_December_2025.zip

Dec-25

64bae6a215ad9e956d1028603438228003d832bdd5e586ad4988f5c7ad1c54f0

SHA256

Information_Note_Elections_Republic_of_Kosovo_28_December_2025.lnk

Dec-25

843b22df66f87a587be77145da163f9615fe8164a5ea17f9e33562ff43894fbf

SHA256

crashhandler.dll

Dec-25

eb10443a2f0b9a25d01a84426a6a8532b0e7c9157abda55b94c98a1fd2d45562

SHA256

crashlog.dat

Dec-25

b1606ca49aa15eadb039f33d438697973b203693d0003e467e1f33b36d10a530

SHA256

Post-Meeting_Report_US-Adriatic_Charter_Partnership_Commission.zip

Dec-25

87929c8f53341a5e413950d33c7946c64e1d4b2eba6d1a8b2d08ef56f7065052

SHA256

Post-Meeting_Report_US-Adriatic_Charter_Partnership_Commission.lnk

Dec-25

6788365386ccd34d1db681c61ef07ef4d2faea5672571b77a76dc48f327afaa9

SHA256

crashlog.dat

Dec-25

2712f4ac5ad422bcf749699389cb1a0111a1b11e298efb0cffebc2e2f0becb5f

SHA256

election_2026.zip

Jan-26

4d528842c7fe73681dfe569d38a39f8d38ca5548dbc8b6ac02df096713a92efd

SHA256

election_2026.lnk

Jan-26

45d8d4f04eb44dc5d10290038825194b0ffc38048a786b4a8b81bb796afc58a3

SHA256

Avk.dll

Jan-26

a82c8845587a87010eab52ef8c35d45eaea8eb8102aae77ec96e222197b7db66

SHA256

AVKTray.dat

Jan-26

16e258b7b712b747a6037d56ee8d2cc99f8f8139da4a3a59c24af0887531ace0

SHA256

নির্বাচন_২০২৬.zip

Jan-26

29a70241660ff3234f1c5e8c01878ee01adb4a289262bd37403e1a323129ea86

SHA256

নির্বাচন_২০২৬.lnk

Jan-26

c73050860c8aaa0f79c03781519cdcee133832805e2e3e778fef3cb0e917efb1

SHA256

Avk.dll

Jan-26

9d61c4e21bbbddde5bb780ea0c5238a3538a84b9afe98d62d08845b47fb5caa9

SHA256

AVKTray.dat

Jan-26

b394e7a3b350b2104b73e29a04e48e5ede5078b9a811abae58d842ce3442c6b3

SHA256

Browser Updater.zip

Feb-26

0b916d2b4a02d01b42c2b04e281d786a05cc7974d2c4a272b01e8060fa713403

SHA256

Browser Updater.csproj

Feb-26

965894996e2cb9be1e0ccc509e079e7eca072cbc4e68945beb00ff5979dda19c

SHA256

Avk.dll

Feb-26

69b685fadce4f34bc4964b3d78d43694a428ae1ee4d2fe0ce4ed26fad07847fa

SHA256

AVKTray.dat

Feb-26

30c71d644bc72e0d55d46bed753ab3f72dc77b7f1be0e34693c957939a779507

SHA256

BRICS Report.zip

Feb-26

e79d19d68d307c12413f8549aafa4a56776002dd04601e36e0125b2e6d56ff94

SHA256

BRICS Report.lnk

Feb-26

44cfba85aa27265779b01f6eb8b69718462b1ca8078b21066061e8d1622dff7a

SHA256

crashhandler.dll

Feb-26

774841a2bfb07b61a8be3de8ae31e9847f987de652eef179761dc3d1b34c42ff

SHA256

crashlog.dat

Feb-26

3c065947461df428b0d29e401e2a28a0d2560943e96d3ac8b9ed71858fbcec38

SHA256

EID_AL-FITR_MESSAGES_2026(Kuwait).zip

Mar-26

7be77e6166aae9a89b16b64b593f35afc7424926047635f2230a4e364c6a46d8

SHA256

EID_AL-FITR_MESSAGES_2026(Kuwait).lnk

Mar-26

b6d866054dedf7a882dd1fa405a066de1278e35acf639b3a0e850a637d27c4bc

SHA256

CNCLID.dll

Mar-26

9e67f72bfbc8772ce10633430e1277fd8374e99877ddedb598b4f6717c799eeb

SHA256

Canon.dat

Mar-26

de13e4b4368fbe8030622f747aed107d5f6c5fec6e11c31060821a12ed2d6ccd

SHA256

Energy_Infrastructure_Situation_Note _Tehran_Province_2026.zip

Mar-26

a95e3857e2f32c2a9c23accadebc1ad6aabf73fed9d63c792d69122d9ec6726d

SHA256

Energy_Infrastructure_Situation_Note _Tehran_Province_2026.lnk

Mar-26

3021f4d365a641722748c5e60d983a080db17bef8f0a1dbe624ffe63cd544cc1

SHA256

Eraser.dll

Mar-26

c5267fefaac1764eba5f42681eb216f146b7d18fcbf546275d33e70cb36fdfba

SHA256

Eraser.dat

Mar-26

bcd30f2116f5ba6731c628483d597b2ba3620ed464c63875855906306beb102a

SHA256

OECD_Update_on_implications_for_energy_markets_of_events_in_the_Middle_East.zip

Mar-26

1df74ce45aa9320c48858eddce3f46f5687fbfdcfd497d92a1e17476e7a2951e

SHA256

OECD_Update_on_implications_for_energy_markets_of_events_in_the_Middle_East.lnk

Mar-26

93e9402af72b355554f9ba93c64871b1bae5be498e3b8a10e61ebdd10ab0d050

SHA256

Eraser.dll

Mar-26

2261c7640fe2f3c2385de61c546b5020ec8a486ad5bad64c31bc9268f6b36a2c

SHA256

Eraser.dat

Mar-26

kordula.wehrli@gmail[.]com

Email Address

TA416-controlled email address

Jul-25

kayden.beaufort@gmail[.]com

Email Address

TA416-controlled email address

Jul-25

emmeline.voss@gmail[.]com

Email Address

TA416-controlled email address

Aug-25

epc.copenhagen2025.dm@gmail[.]com

Email Address

TA416-controlled email address

Sept-25

galinaburl76@gmail[.]com

Email Address

TA416-controlled email address

Nov-25

office2000005@gmail[.]com

Email Address

TA416-controlled email address

Feb-26

hsuhalingaye26@gmail[.]com

Email Address

TA416-controlled email address

Feb-26