# Page Not Found

The URL `files/VemX6UO1Z4m48o7ZfE4f` does not exist. This page may have been moved, renamed, or deleted.

## Suggested Pages

You may be looking for one of the following:
- [ClickFix Campaign – Russian Threat Actor Evolves to Custom InfoStealer](https://xto9ot.gitbook.io/malware-analysis/clickfix-campaign-russian-threat-actor-evolves-to-custom-infostealer.md)
- [From IRS Files to XWorm: Dissecting a Multi‑Stage LNK‑Based Malware Chain](https://xto9ot.gitbook.io/malware-analysis/from-irs-files-to-xworm-dissecting-a-multi-stage-lnk-based-malware-chain.md)
- [SilverFox APT Campaign Targeting Chinese-Speaking Users via Trojanized WPS Office Installer](https://xto9ot.gitbook.io/malware-analysis/silverfox-apt-campaign-targeting-chinese-speaking-users-via-trojanized-wps-office-installer.md)
- [Abuse of WinRAR CVE-2025-8088 to Deploy Quasar RAT](https://xto9ot.gitbook.io/malware-analysis/abuse-of-winrar-cve-2025-8088-to-deploy-quasar-rat.md)
- [Operation FalseOffer - Fake Job Offer Campaign Targeting European Applicants](https://xto9ot.gitbook.io/malware-analysis/operation-falseoffer-fake-job-offer-campaign-targeting-european-applicants.md)

## How to find the correct page

If the exact page cannot be found, you can still retrieve the information using the documentation query interface.

### Option 1 — Ask a question (recommended)

Perform an HTTP GET request on the documentation index with the `ask` parameter:

```
GET https://xto9ot.gitbook.io/malware-analysis/clickfix-campaign-russian-threat-actor-evolves-to-custom-infostealer.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

### Option 2 — Browse the documentation index

Full index: https://xto9ot.gitbook.io/malware-analysis/sitemap.md

Use this to discover valid page paths or navigate the documentation structure.

### Option 3 — Retrieve the full documentation corpus

Full export: https://xto9ot.gitbook.io/malware-analysis/llms-full.txt

Use this to access all content at once and perform your own parsing or retrieval. It will be more expensive.

## Tips for requesting documentation

Prefer `.md` URLs for structured content, append `.md` to URLs (e.g., `/malware-analysis/clickfix-campaign-russian-threat-actor-evolves-to-custom-infostealer.md`).

You may also use `Accept: text/markdown` header for content negotiation.
