Windows
Analysis Report
SecuriteInfo.com.Program.Unwanted.5412.32763.32020.exe
Overview
General Information
Detection
PureLog Stealer, zgRAT
Score: | 42 |
Range: | 0 - 100 |
Confidence: | 100% |
Compliance
Score: | 48 |
Range: | 0 - 100 |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
Yara detected zgRAT
Queries Google from non browser process on port 80
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to detect virtual machines (SLDT)
Contains long sleeps (>= 3 min)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Stores files to the Windows start menu directory
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Yara signature match
Classification
- System is w10x64
SecuriteInfo.com.Program.Unwanted.5412.32763.32020.exe (PID: 6628 cmdline:
"C:\Users\ user\Deskt op\Securit eInfo.com. Program.Un wanted.541 2.32763.32 020.exe" MD5: EECACEBD341B235004BA873B857286C6) SecuriteInfo.com.Program.Unwanted.5412.32763.32020.tmp (PID: 4688 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-FP2 80.tmp\Sec uriteInfo. com.Progra m.Unwanted .5412.3276 3.32020.tm p" /SL5="$ 1041C,1392 1249,10030 08,C:\User s\user\Des ktop\Secur iteInfo.co m.Program. Unwanted.5 412.32763. 32020.exe" MD5: D53C5E2C4C2BFBFF94E45CC949138DEF) taskkill.exe (PID: 6128 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "Duplica tePhotosFi xerPro.exe " MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 3228 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 6756 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "Duplica tePhotosFi xerPro.exe " MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 6716 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 1012 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "Duplica tePhotosFi xerPro.exe " MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 5668 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 6300 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "DPFNoti fier.exe" MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 1124 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 2300 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "Duplica tePhotosFi xerPro.exe " MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 7084 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 3228 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "DPFNoti fier.exe" MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 5628 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 2848 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "Duplica tePhotosFi xerPro.exe " MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 5896 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 4416 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "DPFNoti fier.exe" MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 5420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) taskkill.exe (PID: 3056 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m "Duplica tePhotosFi xerPro.exe " MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) conhost.exe (PID: 6504 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 2128 cmdline:
"C:\Window s\System32 \schtasks. exe" /dele te /tn "No tifierDupl icate Phot os Fixer P ro" /f MD5: 48C2FE20575769DE916F48EF0676A965) conhost.exe (PID: 1812 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 3628 cmdline:
"C:\Window s\System32 \schtasks. exe" /dele te /tn "No tifierDupl icate Phot os Fixer P ro_startup " /f MD5: 48C2FE20575769DE916F48EF0676A965) conhost.exe (PID: 6404 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 5228 cmdline:
"C:\Window s\System32 \schtasks. exe" /dele te /tn "dp f_ro" /f MD5: 48C2FE20575769DE916F48EF0676A965) conhost.exe (PID: 5136 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 4256 cmdline:
"C:\Window s\System32 \schtasks. exe" /dele te /tn "Du plicate Ph otos Fixer ProNotifi er" /f MD5: 48C2FE20575769DE916F48EF0676A965) conhost.exe (PID: 1632 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 3208 cmdline:
"C:\Window s\System32 \schtasks. exe" /dele te /tn "Du plicate Ph otos Fixer ProNotifi er_startup " /f MD5: 48C2FE20575769DE916F48EF0676A965) conhost.exe (PID: 5912 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 7060 cmdline:
"C:\Window s\System32 \schtasks. exe" /dele te /tn "Du plicate Ph otos Fixer ProNotifi er_trigger " /f MD5: 48C2FE20575769DE916F48EF0676A965) conhost.exe (PID: 2220 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 2408 cmdline:
"C:\Window s\System32 \schtasks. exe" /dele te /tn "No tifierDupl icate Phot os Fixer P ro_WD" /f MD5: 48C2FE20575769DE916F48EF0676A965) conhost.exe (PID: 6324 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) DuplicatePhotosFixerPro.exe (PID: 1016 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \Duplicate PhotosFixe rPro.exe" macid MD5: E0FD3719B7C17B8E780EFE91FCE3596C) DPFHelper.exe (PID: 728 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \DPFHelper .exe" /exe path"C:\Pr ogram File s (x86)\Du plicate Ph otos Fixer Pro\Dupli catePhotos FixerPro.e xe" /creat eautoupdat e MD5: 383A3B125AF2D8B4DD08C0817DE98E4A) conhost.exe (PID: 2140 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) Conhost.exe (PID: 5780 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 6676 cmdline:
"C:\Window s\System32 \cmd.exe" /C schtask s.exe /cre ate /tn "D uplicate P hotos Fixe r Pro_upda tes" /XML "C:\Users\ user\AppDa ta\Roaming \Systweak\ Duplicate Photos Fix er Pro\Cre ateCheckUp date.xml" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 356 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 5168 cmdline:
schtasks.e xe /create /tn "Dupl icate Phot os Fixer P ro_updates " /XML "C: \Users\use r\AppData\ Roaming\Sy stweak\Dup licate Pho tos Fixer Pro\Create CheckUpdat e.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2) DuplicatePhotosFixerPro.exe (PID: 180 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \Duplicate PhotosFixe rPro.exe" firstinsta ll MD5: E0FD3719B7C17B8E780EFE91FCE3596C) DPFNotifier.exe (PID: 1308 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \DPFNotifi er.exe" cr eateschedu le MD5: B7D39E8D4904059FC534C356FF7B52B4) DuplicatePhotosFixerPro.exe (PID: 2796 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \Duplicate PhotosFixe rPro.exe" macid MD5: E0FD3719B7C17B8E780EFE91FCE3596C) DPFHelper.exe (PID: 6764 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \DPFHelper .exe" /exe path"C:\Pr ogram File s (x86)\Du plicate Ph otos Fixer Pro\Dupli catePhotos FixerPro.e xe" /creat eautoupdat e MD5: 383A3B125AF2D8B4DD08C0817DE98E4A) conhost.exe (PID: 2408 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 1372 cmdline:
"C:\Window s\System32 \cmd.exe" /C schtask s.exe /cre ate /tn "D uplicate P hotos Fixe r Pro_upda tes" /XML "C:\Users\ user\AppDa ta\Roaming \Systweak\ Duplicate Photos Fix er Pro\Cre ateCheckUp date.xml" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 7096 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 2104 cmdline:
schtasks.e xe /create /tn "Dupl icate Phot os Fixer P ro_updates " /XML "C: \Users\use r\AppData\ Roaming\Sy stweak\Dup licate Pho tos Fixer Pro\Create CheckUpdat e.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
DuplicatePhotosFixerPro.exe (PID: 3364 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \Duplicate PhotosFixe rPro.exe" updatechec k MD5: E0FD3719B7C17B8E780EFE91FCE3596C) schtasks.exe (PID: 5764 cmdline:
"schtasks. exe" /quer y /TN "Dup licate Pho tos Fixer Pro_startu p" MD5: 76CD6626DD8834BD4A42E6A565104DC2) conhost.exe (PID: 6128 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
DPFNotifier.exe (PID: 6756 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \DPFNotifi er.exe" ne weventtrig ger MD5: B7D39E8D4904059FC534C356FF7B52B4) DuplicatePhotosFixerPro.exe (PID: 356 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \Duplicate PhotosFixe rPro.exe" macid MD5: E0FD3719B7C17B8E780EFE91FCE3596C) DPFHelper.exe (PID: 1020 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \DPFHelper .exe" /exe path"C:\Pr ogram File s (x86)\Du plicate Ph otos Fixer Pro\Dupli catePhotos FixerPro.e xe" /creat eautoupdat e MD5: 383A3B125AF2D8B4DD08C0817DE98E4A) conhost.exe (PID: 1048 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 2704 cmdline:
"C:\Window s\System32 \cmd.exe" /C schtask s.exe /cre ate /tn "D uplicate P hotos Fixe r Pro_upda tes" /XML "C:\Users\ user\AppDa ta\Roaming \Systweak\ Duplicate Photos Fix er Pro\Cre ateCheckUp date.xml" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 2132 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 3720 cmdline:
schtasks.e xe /create /tn "Dupl icate Phot os Fixer P ro_updates " /XML "C: \Users\use r\AppData\ Roaming\Sy stweak\Dup licate Pho tos Fixer Pro\Create CheckUpdat e.xml" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
DPFNotifier.exe (PID: 5264 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \DPFNotifi er.exe" st artup MD5: B7D39E8D4904059FC534C356FF7B52B4)
DPFNotifier.exe (PID: 3160 cmdline:
"C:\Progra m Files (x 86)\Duplic ate Photos Fixer Pro \DPFNotifi er.exe" st artup newe venttrigge r MD5: B7D39E8D4904059FC534C356FF7B52B4)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
zgRAT | zgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_zgRAT_1 | Yara detected zgRAT | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_zgRAT_1 | Yara detected zgRAT | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
Click to see the 1 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-14T20:59:25.038316+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49940 | 142.250.185.228 | 80 | TCP |
2025-02-14T20:59:25.391238+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49940 | 142.250.185.228 | 80 | TCP |
2025-02-14T20:59:29.073646+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:29.927154+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:30.320936+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:30.552119+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:30.897578+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:31.205284+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:31.498744+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:31.765567+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:32.050014+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:32.396400+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:32.591764+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:32.848786+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:33.139170+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:33.442763+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:33.643084+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:33.891938+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:34.178498+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 18.161.97.76 | 80 | TCP |
2025-02-14T20:59:35.995499+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49940 | 142.250.185.228 | 80 | TCP |
2025-02-14T20:59:37.529561+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 50000 | 142.250.185.228 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link |
Compliance |
---|
Source: | Static PE information: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 45_2_00007FF84945E8A8 |
Networking |
---|
Source: | HTTP traffic: | ||
Source: | HTTP traffic: | ||
Source: | HTTP traffic: | ||
Source: | HTTP traffic: | ||
Source: | HTTP traffic: | ||
Source: | HTTP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |