Windows
Analysis Report
H3Ze9Uj.exe
Overview
General Information
Detection
XWorm
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected XWorm
.NET source code contains potential unpacker
.NET source code contains very large strings
Drops PE files to the startup folder
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found strings related to Crypto-Mining
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the installation date of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Use Short Name Path in Command Line
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Yara signature match
Classification
- System is w10x64
H3Ze9Uj.exe (PID: 7448 cmdline:
"C:\Users\ user\Deskt op\H3Ze9Uj .exe" MD5: 0252E4B7D794B447F2625A8EDD396FA3) H3Ze9Uj.exe (PID: 7512 cmdline:
"C:\Window s\Temp\{33 45D0B7-B6E F-4E6B-BC6 8-F20FEDB8 2AB9}\.cr\ H3Ze9Uj.ex e" -burn.c lean.room= "C:\Users\ user\Deskt op\H3Ze9Uj .exe" -bur n.filehand le.attache d=516 -bur n.filehand le.self=52 4 MD5: BF6008785C06CBEA998555A713DC191D) TiVoServer.exe (PID: 7536 cmdline:
C:\Windows \Temp\{849 76FE6-0933 -4035-BB6F -13D2EA264 1B4}\.ba\T iVoServer. exe MD5: 1600D4E66F814372153668378D38AB1E) TiVoServer.exe (PID: 7588 cmdline:
C:\Users\u ser\AppDat a\Roaming\ Servicewri ter\TiVoSe rver.exe MD5: 1600D4E66F814372153668378D38AB1E) cmd.exe (PID: 7604 cmdline:
C:\Windows \SysWOW64\ cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 7612 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) Toolpatch_dbg.exe (PID: 8028 cmdline:
C:\Users\u ser~1\AppD ata\Local\ Temp\Toolp atch_dbg.e xe MD5: 967F4470627F823F4D7981E511C9824F) msiexec.exe (PID: 3804 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Users\use r~1\AppDat a\Local\Te mp\lfUvtji mgsGKBWR49 nUj0fLf3ZU .msi" MD5: E5DA170027542E25EDE42FC54C929077) msedge.exe (PID: 7076 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --profi le-directo ry="Defaul t" MD5: 69222B8101B0601CC6663F8381E7E00F) msedge.exe (PID: 7484 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=21 68 --field -trial-han dle=2136,i ,465112364 6714982259 ,148219072 9748128071 6,262144 / prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
TiVoServer.exe (PID: 8048 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Servicewr iter\TiVoS erver.exe" MD5: 1600D4E66F814372153668378D38AB1E) cmd.exe (PID: 8068 cmdline:
C:\Windows \SysWOW64\ cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 8080 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) Toolpatch_dbg.exe (PID: 7468 cmdline:
C:\Users\u ser~1\AppD ata\Local\ Temp\Toolp atch_dbg.e xe MD5: 967F4470627F823F4D7981E511C9824F) msiexec.exe (PID: 2644 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Users\use r~1\AppDat a\Local\Te mp\lfUvtji mgsGKBWR49 nUj0fLf3ZU .msi" MD5: E5DA170027542E25EDE42FC54C929077)
msiexec.exe (PID: 7164 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) TiVoServer.exe (PID: 6424 cmdline:
"C:\Users\ user\AppDa ta\Local\S prit\TiVoS erver.exe" MD5: 1600D4E66F814372153668378D38AB1E) TiVoServer.exe (PID: 7196 cmdline:
C:\Users\u ser\AppDat a\Roaming\ Patchsyste mv3\TiVoSe rver.exe MD5: 1600D4E66F814372153668378D38AB1E) cmd.exe (PID: 6516 cmdline:
C:\Windows \SysWOW64\ cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 4308 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) MSBuild.exe (PID: 1580 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\MSBu ild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) schtasks.exe (PID: 6048 cmdline:
"C:\Window s\System32 \schtasks. exe" /crea te /f /sc minute /mo 1 /tn "MS Build" /tr "C:\Users \user\AppD ata\Roamin g\MSBuild. exe" MD5: 48C2FE20575769DE916F48EF0676A965) conhost.exe (PID: 7124 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) TiVoServer.exe (PID: 7480 cmdline:
"C:\Users\ user\AppDa ta\Local\S prit\TiVoS erver.exe" MD5: 1600D4E66F814372153668378D38AB1E) TiVoServer.exe (PID: 6172 cmdline:
C:\Users\u ser\AppDat a\Roaming\ Patchsyste mv3\TiVoSe rver.exe MD5: 1600D4E66F814372153668378D38AB1E) cmd.exe (PID: 5872 cmdline:
C:\Windows \SysWOW64\ cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 4644 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) MSBuild.exe (PID: 1472 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\MSBu ild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
msedge.exe (PID: 1056 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --profi le-directo ry=Default --flag-sw itches-beg in --flag- switches-e nd --disab le-nacl -- do-not-de- elevate MD5: 69222B8101B0601CC6663F8381E7E00F) msedge.exe (PID: 3132 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=25 20 --field -trial-han dle=2496,i ,452193190 3728861667 ,768872446 4100039987 ,262144 /p refetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) msedge.exe (PID: 7068 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ass et_store.m ojom.Asset StoreServi ce --lang= en-GB --se rvice-sand box-type=a sset_store _service - -mojo-plat form-chann el-handle= 6960 --fie ld-trial-h andle=2496 ,i,4521931 9037288616 67,7688724 4641000399 87,262144 /prefetch: 8 MD5: 69222B8101B0601CC6663F8381E7E00F) msedge.exe (PID: 6044 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ent ity_extrac tion_servi ce.mojom.E xtractor - -lang=en-G B --servic e-sandbox- type=entit y_extracti on --onnx- enabled-fo r-ee --moj o-platform -channel-h andle=6984 --field-t rial-handl e=2496,i,4 5219319037 28861667,7 6887244641 00039987,2 62144 /pre fetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) msedge.exe (PID: 2884 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_search_i ndexer.moj om.SearchI ndexerInte rfaceBroke r --lang=e n-GB --ser vice-sandb ox-type=se arch_index er --messa ge-loop-ty pe-ui --mo jo-platfor m-channel- handle=225 6 --field- trial-hand le=2496,i, 4521931903 728861667, 7688724464 100039987, 262144 /pr efetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
MSBuild.exe (PID: 2676 cmdline:
C:\Users\u ser\AppDat a\Roaming\ MSBuild.ex e MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) conhost.exe (PID: 4656 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
MSBuild.exe (PID: 2852 cmdline:
"C:\Users\ user\AppDa ta\Roaming \MSBuild.e xe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) conhost.exe (PID: 5432 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
MSBuild.exe (PID: 7620 cmdline:
C:\Users\u ser\AppDat a\Roaming\ MSBuild.ex e MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) conhost.exe (PID: 744 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
MSBuild.exe (PID: 7476 cmdline:
"C:\Users\ user\AppDa ta\Roaming \MSBuild.e xe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) conhost.exe (PID: 1876 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
MSBuild.exe (PID: 6832 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\S tart Menu\ Programs\S tartup\MSB uild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) conhost.exe (PID: 420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
rat_win_xworm_v2 | Finds XWorm v2 samples based on characteristic strings | Sekoia.io |
| |
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
rat_win_xworm_v2 | Finds XWorm v2 samples based on characteristic strings | Sekoia.io |
| |
Click to see the 3 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
rat_win_xworm_v2 | Finds XWorm v2 samples based on characteristic strings | Sekoia.io |
| |
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
rat_win_xworm_v2 | Finds XWorm v2 samples based on characteristic strings | Sekoia.io |
| |
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
Click to see the 6 entries |
System Summary |
---|
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: frack113, Nasreddine Bencherchali: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-15T17:39:14.213932+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49962 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:39:15.404295+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49969 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:39:16.242344+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49976 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:39:16.243670+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49977 | 104.21.1.182 | 443 | TCP |
2025-02-15T17:39:42.891727+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50081 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:39:44.146021+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50083 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:39:45.055998+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50084 | 104.21.1.182 | 443 | TCP |
2025-02-15T17:40:00.317220+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50094 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:40:01.707296+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50095 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:40:02.631560+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50096 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:40:03.655135+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50097 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:40:04.956797+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50098 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:40:06.476250+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50099 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:40:07.957781+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50100 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:40:20.648893+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50101 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:40:22.626703+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50102 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:40:23.509498+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50103 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:40:24.453914+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50104 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:40:25.942643+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50105 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:40:27.479579+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50107 | 104.21.64.1 | 443 | TCP |
2025-02-15T17:40:28.451486+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 50108 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-15T17:40:02.312198+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.95.159.238 | 7000 | 192.168.2.7 | 50093 | TCP |
2025-02-15T17:40:32.297013+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.95.159.238 | 7000 | 192.168.2.7 | 50093 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-15T17:40:09.326632+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 50093 | 185.95.159.238 | 7000 | TCP |
2025-02-15T17:40:20.752637+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 50093 | 185.95.159.238 | 7000 | TCP |
2025-02-15T17:40:32.170347+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 50093 | 185.95.159.238 | 7000 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-15T17:40:02.312198+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 185.95.159.238 | 7000 | 192.168.2.7 | 50093 | TCP |
2025-02-15T17:40:32.297013+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 185.95.159.238 | 7000 | 192.168.2.7 | 50093 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-15T17:40:09.326632+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 50093 | 185.95.159.238 | 7000 | TCP |
2025-02-15T17:40:20.752637+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 50093 | 185.95.159.238 | 7000 | TCP |
2025-02-15T17:40:32.170347+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 50093 | 185.95.159.238 | 7000 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Integrated Neural Analysis Model: |
Source: | Code function: | 0_2_00D3A0BB | |
Source: | Code function: | 0_2_00D5FA62 | |
Source: | Code function: | 0_2_00D39E9E | |
Source: | Code function: | 2_2_00D5A0BB | |
Source: | Code function: | 2_2_00D7FA62 | |
Source: | Code function: | 2_2_00D59E9E | |
Source: | Code function: | 3_2_00AD83E0 | |
Source: | Code function: | 3_2_00AD9300 | |
Source: | Code function: | 3_2_00AD34B0 | |
Source: | Code function: | 3_2_00AD8440 | |
Source: | Code function: | 3_2_00AD3990 | |
Source: | Code function: | 3_2_00AD5AE0 | |
Source: | Code function: | 3_2_00AD9AF0 | |
Source: | Code function: | 3_2_00AD5DB0 | |
Source: | Code function: | 3_2_00AD8F60 | |
Source: | Code function: | 3_2_00AD3F50 |
Bitcoin Miner |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |