Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exe

Overview

General Information

Sample name:17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exe
Analysis ID:1540039
MD5:b992d0f96d8bdd24dde3af6063153d5c
SHA1:1402dc34a53a0aeabc29114df26e7afc2618b045
SHA256:63629d920cce134d2db14888cd49f4c1ea88e5b2cdf2cd5a0473d62a1379bf70
Tags:base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
PE file contains section with special chars
Sample uses string decryption to hide its real strings
PE file contains an invalid checksum
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files

Classification

NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["negotationpxczp.shop", "lariatedzugspd.shop", "callosallsaospz.shop", "liernessfornicsa.shop", "unseaffarignsk.shop", "outpointsozp.shop", "upknittsoappz.shop", "indexterityszcoxp.shop", "shepherdlyopzc.shop"], "Build id": "RKiJ2s--mondeytraff"}
SourceRuleDescriptionAuthorStrings
17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    decrypted.binstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeAvira: detected
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeMalware Configuration Extractor: LummaC {"C2 url": ["negotationpxczp.shop", "lariatedzugspd.shop", "callosallsaospz.shop", "liernessfornicsa.shop", "unseaffarignsk.shop", "outpointsozp.shop", "upknittsoappz.shop", "indexterityszcoxp.shop", "shepherdlyopzc.shop"], "Build id": "RKiJ2s--mondeytraff"}
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeReversingLabs: Detection: 23%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.5% probability
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeJoe Sandbox ML: detected
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString decryptor: indexterityszcoxp.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString decryptor: lariatedzugspd.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString decryptor: callosallsaospz.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString decryptor: outpointsozp.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString decryptor: liernessfornicsa.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString decryptor: upknittsoappz.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString decryptor: shepherdlyopzc.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString decryptor: unseaffarignsk.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString decryptor: negotationpxczp.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString decryptor: lid=%s&j=%s&ver=4.0
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString decryptor: TeslaBrowser/5.5
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString decryptor: - Screen Resoluton:
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString decryptor: - Physical Installed Memory:
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString decryptor: Workgroup: -
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString decryptor: RKiJ2s--mondeytraff
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

      Networking

      barindex
      Source: Malware configuration extractorURLs: negotationpxczp.shop
      Source: Malware configuration extractorURLs: lariatedzugspd.shop
      Source: Malware configuration extractorURLs: callosallsaospz.shop
      Source: Malware configuration extractorURLs: liernessfornicsa.shop
      Source: Malware configuration extractorURLs: unseaffarignsk.shop
      Source: Malware configuration extractorURLs: outpointsozp.shop
      Source: Malware configuration extractorURLs: upknittsoappz.shop
      Source: Malware configuration extractorURLs: indexterityszcoxp.shop
      Source: Malware configuration extractorURLs: shepherdlyopzc.shop

      System Summary

      barindex
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeStatic PE information: section name: `.rdat
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeStatic PE information: section name: @.data
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeStatic PE information: No import functions for PE file found
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC size: 0xe8000500 address: 0x0
      Source: classification engineClassification label: mal100.troj.evad.winEXE@0/0@0/0
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeReversingLabs: Detection: 23%
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeStatic PE information: real checksum: 0x4 should be: 0x4ed88
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeStatic PE information: section name: `.rdat
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeStatic PE information: section name: .relo
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeStatic PE information: section name: @.data

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString found in binary or memory: indexterityszcoxp.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString found in binary or memory: lariatedzugspd.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString found in binary or memory: callosallsaospz.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString found in binary or memory: outpointsozp.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString found in binary or memory: liernessfornicsa.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString found in binary or memory: upknittsoappz.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString found in binary or memory: shepherdlyopzc.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString found in binary or memory: unseaffarignsk.shop
      Source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeString found in binary or memory: negotationpxczp.shop

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
      Source: Yara matchFile source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exe, type: SAMPLE

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
      Source: Yara matchFile source: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exe, type: SAMPLE
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      PowerShell
      Path InterceptionPath Interception1
      Deobfuscate/Decode Files or Information
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
      Application Layer Protocol
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exe24%ReversingLabsWin32.PUA.Lumma
      17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exe100%AviraTR/Crypt.XPACK.Gen
      17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      s-part-0017.t-0009.fb-t-msedge.net
      13.107.253.45
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        unseaffarignsk.shoptrue
          unknown
          shepherdlyopzc.shoptrue
            unknown
            outpointsozp.shoptrue
              unknown
              lariatedzugspd.shoptrue
                unknown
                liernessfornicsa.shoptrue
                  unknown
                  upknittsoappz.shoptrue
                    unknown
                    negotationpxczp.shoptrue
                      unknown
                      callosallsaospz.shoptrue
                        unknown
                        No contacted IP infos
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1540039
                        Start date and time:2024-10-23 11:25:12 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 1m 41s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:1
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exe
                        Detection:MAL
                        Classification:mal100.troj.evad.winEXE@0/0@0/0
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Unable to launch sample, stop analysis
                        • No process behavior to analyse as no analysis process or sample was found
                        • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.
                        • Exclude process from analysis (whitelisted): dllhost.exe
                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, azurefd-t-fb-prod.trafficmanager.net, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net
                        • VT rate limit hit for: 17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exe
                        No simulations
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        s-part-0017.t-0009.fb-t-msedge.netgBYV3uACcC.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                        • 13.107.253.45
                        file.exeGet hashmaliciousCredential FlusherBrowse
                        • 13.107.253.45
                        https://netorg11230081-my.sharepoint.com/:f:/g/personal/info_onafastpacecontracting_com/Eoa77Lo8BXlOut3qDNQUDAQBBgmgCvIALxhAXrlqjk9Asw?e=2UKAY6Get hashmaliciousUnknownBrowse
                        • 13.107.253.45
                        17296647675a227633e026f1e0b73c1235d63ba2c9f78fec358d3847a30422d034356fce77674.dat-decoded.exeGet hashmaliciousLummaCBrowse
                        • 13.107.253.45
                        https://www.google.com/amp/s/jlxzy.app.link/zJOXskDTTNbGet hashmaliciousUnknownBrowse
                        • 13.107.253.45
                        17296650086d5bc5a71bced605238e8f4e5d5fe29da4cb1d156104fe729d3b01cece68c417301.dat-decoded.exeGet hashmaliciousRemcosBrowse
                        • 13.107.253.45
                        17296647820433a543d4d7bfc485f5c0f1d9cd4af39460f3ad96b5fb6e7336548c30e29566449.dat-decoded.exeGet hashmaliciousUnknownBrowse
                        • 13.107.253.45
                        172966476821ab587c9b4efa390798195c780a8f2dda2b80c8f6c1d32c5ca7f5da55887992606.dat-decoded.exeGet hashmaliciousVidarBrowse
                        • 13.107.253.45
                        1729664769153946c3b2973ce41f32169c95ae8bd62c120bfb49d9dc10da2a504e867713f4855.dat-decoded.exeGet hashmaliciousRedLineBrowse
                        • 13.107.253.45
                        email3.zipGet hashmaliciousHTMLPhisherBrowse
                        • 13.107.253.45
                        No context
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32 executable Intel 80386, for MS Windows
                        Entropy (8bit):6.637779655689216
                        TrID:
                        • Generic Win/DOS Executable (2004/3) 49.94%
                        • DOS Executable Generic (2002/1) 49.89%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.17%
                        File name:17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exe
                        File size:317'367 bytes
                        MD5:b992d0f96d8bdd24dde3af6063153d5c
                        SHA1:1402dc34a53a0aeabc29114df26e7afc2618b045
                        SHA256:63629d920cce134d2db14888cd49f4c1ea88e5b2cdf2cd5a0473d62a1379bf70
                        SHA512:a7a89e00da37951b25eafa741bda6d4851687ea5415c97ed33886bf9f5189d2324018358c676ad334366348942b695727524175b38b05d29fabd27bb4ccd779b
                        SSDEEP:6144:F4JNOM2m2dTBjc8EVxKTP9hYD6iSHIrbyhcayyD86liA+6RYjVNtUhu1MazH2:uJrJ2fcB0/iNrusnI+6
                        TLSH:AD646B02D73750A1EC8B0A7630AB723BA6372B0743284DCBDF5CDBB47563AA16476D46
                        File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...r..f...................:.........................@..........................P............@.....................................
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x90000000
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x0
                        Subsystem:unknown
                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:NO_ISOLATION
                        Time Stamp:0x669A8072 [Fri Jul 19 15:04:18 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:2
                        OS Version Minor:1536
                        File Version Major:2
                        File Version Minor:1536
                        Subsystem Version Major:2
                        Subsystem Version Minor:1536
                        Import Hash:
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xf20000000x780003f6
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00xe8000500
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x490x0`.rdat
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x80000000x9c0003f8`.rdat
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        `.rdat0x2a0xdb0000610x3d0b106cd9de68ea354160f0e5d93577bacunknownunknownunknownunknownIMAGE_SCN_MEM_READ
                        .relo0x490xe80000630x500e0130d5ad16430a3c0a586b4dd9e6ce2unknownunknownunknownunknownIMAGE_SCN_MEM_READ
                        @.data0xf70x940000000x400f286e046efd49393ef630472ce838b71unknownunknownunknownunknownIMAGE_SCN_MEM_READ
                        .text0x3bc0xb20000000x104ae71336e44bf9bf79d2752e234818a5unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Oct 23, 2024 11:26:16.256427050 CEST1.1.1.1192.168.2.60xa92dNo error (0)shed.dual-low.s-part-0023.t-0009.t-msedge.netazurefd-t-fb-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                        Oct 23, 2024 11:26:16.256427050 CEST1.1.1.1192.168.2.60xa92dNo error (0)dual.s-part-0017.t-0009.fb-t-msedge.nets-part-0017.t-0009.fb-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                        Oct 23, 2024 11:26:16.256427050 CEST1.1.1.1192.168.2.60xa92dNo error (0)s-part-0017.t-0009.fb-t-msedge.net13.107.253.45A (IP address)IN (0x0001)false
                        No statistics
                        No system behavior
                        No disassembly