Windows
Analysis Report
SecuriteInfo.com.Program.Unwanted.5412.32763.32020.exe
Overview
General Information
Detection
PureLog Stealer, zgRAT
Score: | 42 |
Range: | 0 - 100 |
Confidence: | 100% |
Compliance
Score: | 48 |
Range: | 0 - 100 |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
Yara detected zgRAT
Queries Google from non browser process on port 80
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to detect virtual machines (SLDT)
Contains long sleeps (>= 3 min)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Stores files to the Windows start menu directory
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Yara signature match
Classification
- System is w10x64
SecuriteInfo.com.Program.Unwanted.5412.32763.32020.exe (PID: 5956 cmdline:
"C:\Users\ user\Deskt op\Securit eInfo.com. Program.Un wanted.541 2.32763.32 020.exe" MD5: EECACEBD341B235004BA873B857286C6) SecuriteInfo.com.Program.Unwanted.5412.32763.32020.tmp (PID: 4040 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-0C4 DK.tmp\Sec uriteInfo. com.Progra m.Unwanted .5412.3276 3.32020.tm p" /SL5="$ 20464,1392 1249,10030 08,C:\User s\user\Des ktop\Secur iteInfo.co m.Program. Unwanted.5 412.32763. 32020.exe" MD5: D53C5E2C4C2BFBFF94E45CC949138DEF) taskkill.exe (PID: 1396 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "Duplica tePhotosFi xerPro.exe " MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 2312 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 5304 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "Duplica tePhotosFi xerPro.exe " MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 1220 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 352 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "Duplica tePhotosFi xerPro.exe " MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 5332 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 1732 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "DPFNoti fier.exe" MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 1740 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 1516 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "Duplica tePhotosFi xerPro.exe " MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 2132 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 1196 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "DPFNoti fier.exe" MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 2664 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 1852 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "Duplica tePhotosFi xerPro.exe " MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 3264 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 4336 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "DPFNoti fier.exe" MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 2412 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 6072 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "Duplica tePhotosFi xerPro.exe " MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 5660 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 4956 cmdline:
"C:\Window s\System32 \schtasks. exe" /dele te /tn "No tifierDupl icate Phot os Fixer P ro" /f MD5: 48C2FE20575769DE916F48EF0676A965) conhost.exe (PID: 5088 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 2504 cmdline:
"C:\Window s\System32 \schtasks. exe" /dele te /tn "No tifierDupl icate Phot os Fixer P ro_startup " /f MD5: 48C2FE20575769DE916F48EF0676A965) conhost.exe (PID: 2208 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 2664 cmdline:
"C:\Window s\System32 \schtasks. exe" /dele te /tn "dp f_ro" /f MD5: 48C2FE20575769DE916F48EF0676A965) conhost.exe (PID: 2016 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 3400 cmdline:
"C:\Window s\System32 \schtasks. exe" /dele te /tn "Du plicate Ph otos Fixer ProNotifi er" /f MD5: 48C2FE20575769DE916F48EF0676A965) conhost.exe (PID: 2724 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 1784 cmdline:
"C:\Window s\System32 \schtasks. exe" /dele te /tn "Du plicate Ph otos Fixer ProNotifi er_startup " /f MD5: 48C2FE20575769DE916F48EF0676A965) conhost.exe (PID: 1988 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 1464 cmdline:
"C:\Window s\System32 \schtasks. exe" /dele te /tn "Du plicate Ph otos Fixer ProNotifi er_trigger " /f MD5: 48C2FE20575769DE916F48EF0676A965) conhost.exe (PID: 2112 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 3168 cmdline:
"C:\Window s\System32 \schtasks. exe" /dele te /tn "No tifierDupl icate Phot os Fixer P ro_WD" /f MD5: 48C2FE20575769DE916F48EF0676A965) conhost.exe (PID: 4996 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) DuplicatePhotosFixerPro.exe (PID: 4192 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \Duplicate PhotosFixe rPro.exe" macid MD5: E0FD3719B7C17B8E780EFE91FCE3596C) DPFHelper.exe (PID: 5284 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \DPFHelper .exe" /exe path"C:\Pr ogram File s (x86)\Du plicate Ph otos Fixer Pro\Dupli catePhotos FixerPro.e xe" /creat eautoupdat e MD5: 383A3B125AF2D8B4DD08C0817DE98E4A) conhost.exe (PID: 3332 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 3520 cmdline:
"C:\Window s\System32 \cmd.exe" /C schtask s.exe /cre ate /tn "D uplicate P hotos Fixe r Pro_upda tes" /XML "C:\Users\ user\AppDa ta\Roaming \Systweak\ Duplicate Photos Fix er Pro\Cre ateCheckUp date.xml" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 1820 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 1464 cmdline:
schtasks.e xe /create /tn "Dupl icate Phot os Fixer P ro_updates " /XML "C: \Users\use r\AppData\ Roaming\Sy stweak\Dup licate Pho tos Fixer Pro\Create CheckUpdat e.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2) DuplicatePhotosFixerPro.exe (PID: 732 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \Duplicate PhotosFixe rPro.exe" firstinsta ll MD5: E0FD3719B7C17B8E780EFE91FCE3596C) DPFNotifier.exe (PID: 5548 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \DPFNotifi er.exe" cr eateschedu le MD5: B7D39E8D4904059FC534C356FF7B52B4) DuplicatePhotosFixerPro.exe (PID: 2412 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \Duplicate PhotosFixe rPro.exe" macid MD5: E0FD3719B7C17B8E780EFE91FCE3596C) DPFHelper.exe (PID: 5688 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \DPFHelper .exe" /exe path"C:\Pr ogram File s (x86)\Du plicate Ph otos Fixer Pro\Dupli catePhotos FixerPro.e xe" /creat eautoupdat e MD5: 383A3B125AF2D8B4DD08C0817DE98E4A) conhost.exe (PID: 3176 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 5552 cmdline:
"C:\Window s\System32 \cmd.exe" /C schtask s.exe /cre ate /tn "D uplicate P hotos Fixe r Pro_upda tes" /XML "C:\Users\ user\AppDa ta\Roaming \Systweak\ Duplicate Photos Fix er Pro\Cre ateCheckUp date.xml" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 3352 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 4340 cmdline:
schtasks.e xe /create /tn "Dupl icate Phot os Fixer P ro_updates " /XML "C: \Users\use r\AppData\ Roaming\Sy stweak\Dup licate Pho tos Fixer Pro\Create CheckUpdat e.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
DuplicatePhotosFixerPro.exe (PID: 3616 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \Duplicate PhotosFixe rPro.exe" updatechec k MD5: E0FD3719B7C17B8E780EFE91FCE3596C)
DPFNotifier.exe (PID: 3744 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \DPFNotifi er.exe" ne weventtrig ger MD5: B7D39E8D4904059FC534C356FF7B52B4)
DPFNotifier.exe (PID: 5956 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \DPFNotifi er.exe" st artup MD5: B7D39E8D4904059FC534C356FF7B52B4)
DPFNotifier.exe (PID: 340 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \DPFNotifi er.exe" st artup newe venttrigge r MD5: B7D39E8D4904059FC534C356FF7B52B4) DuplicatePhotosFixerPro.exe (PID: 1276 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \Duplicate PhotosFixe rPro.exe" macid MD5: E0FD3719B7C17B8E780EFE91FCE3596C) DPFHelper.exe (PID: 2144 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \DPFHelper .exe" /exe path"C:\Pr ogram File s (x86)\Du plicate Ph otos Fixer Pro\Dupli catePhotos FixerPro.e xe" /creat eautoupdat e MD5: 383A3B125AF2D8B4DD08C0817DE98E4A) conhost.exe (PID: 3664 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 6484 cmdline:
"C:\Window s\System32 \cmd.exe" /C schtask s.exe /cre ate /tn "D uplicate P hotos Fixe r Pro_upda tes" /XML "C:\Users\ user\AppDa ta\Roaming \Systweak\ Duplicate Photos Fix er Pro\Cre ateCheckUp date.xml" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 2944 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 1216 cmdline:
schtasks.e xe /create /tn "Dupl icate Phot os Fixer P ro_updates " /XML "C: \Users\use r\AppData\ Roaming\Sy stweak\Dup licate Pho tos Fixer Pro\Create CheckUpdat e.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2) DuplicatePhotosFixerPro.exe (PID: 2916 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \Duplicate PhotosFixe rPro.exe" macid MD5: E0FD3719B7C17B8E780EFE91FCE3596C) DPFHelper.exe (PID: 2896 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \DPFHelper .exe" /exe path"C:\Pr ogram File s (x86)\Du plicate Ph otos Fixer Pro\Dupli catePhotos FixerPro.e xe" /creat eautoupdat e MD5: 383A3B125AF2D8B4DD08C0817DE98E4A) conhost.exe (PID: 5580 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 6396 cmdline:
"C:\Window s\System32 \cmd.exe" /C schtask s.exe /cre ate /tn "D uplicate P hotos Fixe r Pro_upda tes" /XML "C:\Users\ user\AppDa ta\Roaming \Systweak\ Duplicate Photos Fix er Pro\Cre ateCheckUp date.xml" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 6420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 6540 cmdline:
schtasks.e xe /create /tn "Dupl icate Phot os Fixer P ro_updates " /XML "C: \Users\use r\AppData\ Roaming\Sy stweak\Dup licate Pho tos Fixer Pro\Create CheckUpdat e.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
zgRAT | zgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_zgRAT_1 | Yara detected zgRAT | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_zgRAT_1 | Yara detected zgRAT | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
Click to see the 1 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-14T20:45:08.439862+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49752 | 142.250.185.132 | 80 | TCP |
2025-02-14T20:45:08.748243+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49752 | 142.250.185.132 | 80 | TCP |
2025-02-14T20:45:14.204134+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49783 | 52.222.214.43 | 80 | TCP |
2025-02-14T20:45:15.898101+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49795 | 52.222.214.43 | 80 | TCP |
2025-02-14T20:45:16.305751+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49795 | 52.222.214.43 | 80 | TCP |
2025-02-14T20:45:16.599850+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49795 | 52.222.214.43 | 80 | TCP |
2025-02-14T20:45:16.929479+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49795 | 52.222.214.43 | 80 | TCP |
2025-02-14T20:45:17.216659+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49795 | 52.222.214.43 | 80 | TCP |
2025-02-14T20:45:18.032690+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49811 | 52.222.214.43 | 80 | TCP |
2025-02-14T20:45:19.440839+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49817 | 52.222.214.43 | 80 | TCP |
2025-02-14T20:45:20.394580+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49823 | 142.250.185.132 | 80 | TCP |
2025-02-14T20:45:21.696297+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49841 | 52.222.214.43 | 80 | TCP |
2025-02-14T20:45:23.285578+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49855 | 52.222.214.43 | 80 | TCP |
2025-02-14T20:45:24.433040+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49861 | 52.222.214.43 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link |
Compliance |
---|
Source: | Static PE information: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 44_2_00007FFD9BD7A868 |
Networking |
---|
Source: | HTTP traffic: | ||
Source: | HTTP traffic: | ||
Source: | HTTP traffic: | ||
Source: | HTTP traffic: | ||
Source: | HTTP traffic: | ||
Source: | HTTP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |