Edit tour
Windows
Analysis Report
JHPvqMzKbz.exe
Overview
General Information
Detection
Vidar
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Attempt to bypass Chrome Application-Bound Encryption
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected Vidar
Yara detected Vidar stealer
Drops PE files with a suspicious file extension
Found strings related to Crypto-Mining
Maps a DLL or memory area into another process
Monitors registry run keys for changes
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes many files with high entropy
Wscript called in batch mode (surpress errors)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Connects to many different domains
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
OS version to string mapping found (often used in BOTs)
One or more processes crash
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Browser Started with Remote Debugging
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Suspicious Screensaver Binary File Creation
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64native
- JHPvqMzKbz.exe (PID: 1796 cmdline:
"C:\Users\ user\Deskt op\JHPvqMz Kbz.exe" MD5: 0F4AF03D2BA59B5C68066C95B41BFAD8) - cmd.exe (PID: 8 cmdline:
"C:\Window s\System32 \cmd.exe" /c copy Tr eat Treat. bat & Trea t.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1240 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - tasklist.exe (PID: 8208 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 8216 cmdline:
findstr /I "wrsa ops svc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 8276 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 8284 cmdline:
findstr -I "avastui avgui bdse rvicehost nswscsvc s ophoshealt h" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 8372 cmdline:
cmd /c md 646751 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - findstr.exe (PID: 8400 cmdline:
findstr /V "Affiliat eRobotsJoi nedNewslet ter" Purse MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 8416 cmdline:
cmd /c cop y /b ..\Su itable + . .\Johnson + ..\July + ..\Firmw are + ..\I nvalid + . .\Baby + . .\Bar + .. \Continent al + ..\Ru led + ..\G ay + ..\Ho p + ..\Cle arance + . .\Wisdom + ..\Januar y + ..\Den mark + ..\ Bull c MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Plates.pif (PID: 8460 cmdline:
Plates.pif c MD5: 18CE19B57F43CE0A5AF149C96AECC685) - cmd.exe (PID: 8516 cmdline:
cmd /c sch tasks.exe /create /t n "Enjoy" /tr "wscri pt //B 'C: \Users\use r\AppData\ Local\SkyS ync Techno logies\Sky Sync.js'" /sc minute /mo 5 /F MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 8524 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - schtasks.exe (PID: 8580 cmdline:
schtasks.e xe /create /tn "Enjo y" /tr "ws cript //B 'C:\Users\ user\AppDa ta\Local\S kySync Tec hnologies\ SkySync.js '" /sc min ute /mo 5 /F MD5: 478BEAEC1C3A9417272BC8964ADD1CEE) - cmd.exe (PID: 8600 cmdline:
cmd /k ech o [Interne tShortcut] > "C:\Use rs\user\Ap pData\Roam ing\Micros oft\Window s\Start Me nu\Program s\Startup\ SkySync.ur l" & echo URL="C:\Us ers\user\A ppData\Loc al\SkySync Technolog ies\SkySyn c.js" >> " C:\Users\u ser\AppDat a\Roaming\ Microsoft\ Windows\St art Menu\P rograms\St artup\SkyS ync.url" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 8608 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - chrome.exe (PID: 8480 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9223 --pro file-direc tory="Defa ult" MD5: BB7C48CDDDE076E7EB44022520F40F77) - msedge.exe (PID: 5548 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=922 3 --profil e-director y="Default " MD5: 40AAE14A5C86EA857FA6E5FED689C48E) - msedge.exe (PID: 6008 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --fi eld-trial- handle=259 2,14949538 3523539065 60,7092886 3319074703 17,131072 --lang=en- US --servi ce-sandbox -type=none --mojo-pl atform-cha nnel-handl e=2888 /pr efetch:3 MD5: 40AAE14A5C86EA857FA6E5FED689C48E) - WerFault.exe (PID: 1412 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 8 460 -s 231 6 MD5: 40A149513D721F096DDF50C04DA2F01F) - Conhost.exe (PID: 5548 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - choice.exe (PID: 8480 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4) - chrome.exe (PID: 4316 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-subpr oc-heap-pr ofiling -- field-tria l-handle=2 712,i,6102 2199148445 60487,8884 0768698004 75828,2621 44 --varia tions-seed -version=2 0240909-18 0142.41600 0 --mojo-p latform-ch annel-hand le=2720 /p refetch:3 MD5: BB7C48CDDDE076E7EB44022520F40F77)
- wscript.exe (PID: 8660 cmdline:
C:\Windows \system32\ wscript.EX E //B "C:\ Users\user \AppData\L ocal\SkySy nc Technol ogies\SkyS ync.js" MD5: 0639B0A6F69B3265C1E42227D650B7D1) - SkySync.scr (PID: 8704 cmdline:
"C:\Users\ user\AppDa ta\Local\S kySync Tec hnologies\ SkySync.sc r" "C:\Use rs\user\Ap pData\Loca l\SkySync Technologi es\e" MD5: 18CE19B57F43CE0A5AF149C96AECC685)
- wscript.exe (PID: 8852 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Loc al\SkySync Technolog ies\SkySyn c.js" MD5: 0639B0A6F69B3265C1E42227D650B7D1) - SkySync.scr (PID: 8896 cmdline:
"C:\Users\ user\AppDa ta\Local\S kySync Tec hnologies\ SkySync.sc r" "C:\Use rs\user\Ap pData\Loca l\SkySync Technologi es\e" MD5: 18CE19B57F43CE0A5AF149C96AECC685)
- msedge.exe (PID: 1316 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=922 3 --profil e-director y=Default --flag-swi tches-begi n --flag-s witches-en d --do-not -de-elevat e MD5: 40AAE14A5C86EA857FA6E5FED689C48E) - msedge.exe (PID: 6164 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --fi eld-trial- handle=205 2,75213593 2913955466 1,14603226 5092121120 48,131072 --lang=en- US --servi ce-sandbox -type=none --mojo-pl atform-cha nnel-handl e=2400 /pr efetch:3 MD5: 40AAE14A5C86EA857FA6E5FED689C48E)
- wscript.exe (PID: 5788 cmdline:
C:\Windows \system32\ wscript.EX E //B "C:\ Users\user \AppData\L ocal\SkySy nc Technol ogies\SkyS ync.js" MD5: 0639B0A6F69B3265C1E42227D650B7D1) - SkySync.scr (PID: 2896 cmdline:
"C:\Users\ user\AppDa ta\Local\S kySync Tec hnologies\ SkySync.sc r" "C:\Use rs\user\Ap pData\Loca l\SkySync Technologi es\e" MD5: 18CE19B57F43CE0A5AF149C96AECC685) - cmd.exe (PID: 4116 cmdline:
cmd /c sch tasks.exe /create /t n "Enjoy" /tr "wscri pt //B 'C: \Users\use r\AppData\ Local\SkyS ync Techno logies\Sky Sync.js'" /sc minute /mo 5 /F MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3660 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - schtasks.exe (PID: 7208 cmdline:
schtasks.e xe /create /tn "Enjo y" /tr "ws cript //B 'C:\Users\ user\AppDa ta\Local\S kySync Tec hnologies\ SkySync.js '" /sc min ute /mo 5 /F MD5: 478BEAEC1C3A9417272BC8964ADD1CEE) - chrome.exe (PID: 920 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9223 --pro file-direc tory="Defa ult" MD5: BB7C48CDDDE076E7EB44022520F40F77) - chrome.exe (PID: 5204 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-subpr oc-heap-pr ofiling -- field-tria l-handle=2 564,i,2928 3897668586 36215,3856 2557214508 26831,2621 44 --varia tions-seed -version=2 0240909-18 0142.41600 0 --mojo-p latform-ch annel-hand le=2656 /p refetch:3 MD5: BB7C48CDDDE076E7EB44022520F40F77) - msedge.exe (PID: 476 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=922 3 --profil e-director y="Default " MD5: 40AAE14A5C86EA857FA6E5FED689C48E) - msedge.exe (PID: 8896 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --fi eld-trial- handle=254 4,70938726 4237218455 4,16351144 7551151494 81,131072 --lang=en- US --servi ce-sandbox -type=none --mojo-pl atform-cha nnel-handl e=3036 /pr efetch:3 MD5: 40AAE14A5C86EA857FA6E5FED689C48E) - identity_helper.exe (PID: 3672 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \94.0.992. 31\identit y_helper.e xe" --type =utility - -utility-s ub-type=wi nrt_app_id .mojom.Win rtAppIdSer vice --fie ld-trial-h andle=2544 ,709387264 2372184554 ,163511447 5511514948 1,131072 - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =6932 /pre fetch:8 MD5: 688D7C201AD85A9C6EDAFDC457E53219)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Vidar | Vidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_Vidar_2 | Yara detected Vidar | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: pH-T (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Max Altgelt (Nextron Systems): |
Source: | Author: Christopher Peacock @securepeacock, SCYTHE @scythe_io: |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: frack113: |
Source: | Author: Michael Haag: |
Data Obfuscation |
---|
Source: | Author: Joe Security: |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-01T20:53:04.346658+0100 | 2044247 | 1 | Malware Command and Control Activity Detected | 188.245.203.37 | 443 | 192.168.11.20 | 49771 | TCP |
2024-11-01T20:57:47.110955+0100 | 2044247 | 1 | Malware Command and Control Activity Detected | 188.245.203.37 | 443 | 192.168.11.20 | 49803 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-01T20:53:05.477318+0100 | 2051831 | 1 | Malware Command and Control Activity Detected | 188.245.203.37 | 443 | 192.168.11.20 | 49772 | TCP |
2024-11-01T20:57:48.252472+0100 | 2051831 | 1 | Malware Command and Control Activity Detected | 188.245.203.37 | 443 | 192.168.11.20 | 49804 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-01T20:53:03.221238+0100 | 2049087 | 1 | A Network Trojan was detected | 192.168.11.20 | 49770 | 188.245.203.37 | 443 | TCP |
2024-11-01T20:58:38.334084+0100 | 2049087 | 1 | A Network Trojan was detected | 192.168.11.20 | 58993 | 188.245.203.37 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Bitcoin Miner |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B | |
Source: | Code function: | 19_2_00AF4005 | |
Source: | Code function: | 19_2_00AFC2FF | |
Source: | Code function: | 19_2_00AF494A | |
Source: | Code function: | 19_2_00AFCD9F | |
Source: | Code function: | 19_2_00AFCD14 | |
Source: | Code function: | 19_2_00AFF5D8 | |
Source: | Code function: | 19_2_00AFF735 | |
Source: | Code function: | 19_2_00AFFA36 | |
Source: | Code function: | 19_2_00AF3CE2 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Memory has grown: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Network traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | Code function: | 19_2_00B029BA |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |