Edit tour
Windows
Analysis Report
r6cRyCpdfS.exe
Overview
General Information
Sample name: | r6cRyCpdfS.exerenamed because original name is a hash value |
Original sample name: | 6310493F1EAE60F8F1375EB05341A7D7.exe |
Analysis ID: | 1581086 |
MD5: | 6310493f1eae60f8f1375eb05341a7d7 |
SHA1: | 8b0d6e459d66346e8dba5a0d857b4b192871d437 |
SHA256: | 08e4f00e67200c00552466fc1179a23d17f4c7497afe89c4d5d4b6d8878216f4 |
Tags: | DCRatexeuser-abuse_ch |
Infos: | |
Detection
DCRat, PureLog Stealer, zgRAT
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Suricata IDS alerts for network traffic
Yara detected DCRat
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Creates processes via WMI
Drops executable to a common third party application directory
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: CurrentVersion NT Autorun Keys Modification
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- r6cRyCpdfS.exe (PID: 7268 cmdline:
"C:\Users\ user\Deskt op\r6cRyCp dfS.exe" MD5: 6310493F1EAE60F8F1375EB05341A7D7) - schtasks.exe (PID: 7420 cmdline:
schtasks.e xe /create /tn "smar tscreens" /sc MINUTE /mo 7 /tr "'C:\Prog ram Files (x86)\jdow nloader\sm artscreen. exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7444 cmdline:
schtasks.e xe /create /tn "smar tscreen" / sc ONLOGON /tr "'C:\ Program Fi les (x86)\ jdownloade r\smartscr een.exe'" /rl HIGHES T /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7468 cmdline:
schtasks.e xe /create /tn "smar tscreens" /sc MINUTE /mo 8 /tr "'C:\Prog ram Files (x86)\jdow nloader\sm artscreen. exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - csc.exe (PID: 7484 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\c sc.exe" /n oconfig /f ullpaths @ "C:\Users\ user\AppDa ta\Local\T emp\aqgogg ve\aqgoggv e.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66) - conhost.exe (PID: 7492 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cvtres.exe (PID: 7540 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\cv tres.exe / NOLOGO /RE ADONLY /MA CHINE:IX86 "/OUT:C:\ Users\user \AppData\L ocal\Temp\ RES8FF9.tm p" "c:\Win dows\Syste m32\CSC494 3203AAE5A4 E809030322 7122B2EDA. TMP" MD5: C877CBB966EA5939AA2A17B6A5160950) - schtasks.exe (PID: 7564 cmdline:
schtasks.e xe /create /tn "WmiP rvSEW" /sc MINUTE /m o 12 /tr " 'C:\Recove ry\WmiPrvS E.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7588 cmdline:
schtasks.e xe /create /tn "WmiP rvSE" /sc ONLOGON /t r "'C:\Rec overy\WmiP rvSE.exe'" /rl HIGHE ST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7612 cmdline:
schtasks.e xe /create /tn "WmiP rvSEW" /sc MINUTE /m o 7 /tr "' C:\Recover y\WmiPrvSE .exe'" /rl HIGHEST / f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7636 cmdline:
schtasks.e xe /create /tn "rCdg cwByUDmMcQ zYkDZywyWr r" /sc MIN UTE /mo 13 /tr "'C:\ Program Fi les\Window s Mail\rCd gcwByUDmMc QzYkDZywyW r.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7664 cmdline:
schtasks.e xe /create /tn "rCdg cwByUDmMcQ zYkDZywyWr " /sc ONLO GON /tr "' C:\Program Files\Win dows Mail\ rCdgcwByUD mMcQzYkDZy wyWr.exe'" /rl HIGHE ST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7688 cmdline:
schtasks.e xe /create /tn "rCdg cwByUDmMcQ zYkDZywyWr r" /sc MIN UTE /mo 13 /tr "'C:\ Program Fi les\Window s Mail\rCd gcwByUDmMc QzYkDZywyW r.exe'" /r l HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7712 cmdline:
schtasks.e xe /create /tn "rCdg cwByUDmMcQ zYkDZywyWr r" /sc MIN UTE /mo 13 /tr "'C:\ Program Fi les (x86)\ common fil es\Adobe\A RM\1.0\rCd gcwByUDmMc QzYkDZywyW r.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7736 cmdline:
schtasks.e xe /create /tn "rCdg cwByUDmMcQ zYkDZywyWr " /sc ONLO GON /tr "' C:\Program Files (x8 6)\common files\Adob e\ARM\1.0\ rCdgcwByUD mMcQzYkDZy wyWr.exe'" /rl HIGHE ST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7760 cmdline:
schtasks.e xe /create /tn "rCdg cwByUDmMcQ zYkDZywyWr r" /sc MIN UTE /mo 13 /tr "'C:\ Program Fi les (x86)\ common fil es\Adobe\A RM\1.0\rCd gcwByUDmMc QzYkDZywyW r.exe'" /r l HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7784 cmdline:
schtasks.e xe /create /tn "rCdg cwByUDmMcQ zYkDZywyWr r" /sc MIN UTE /mo 14 /tr "'C:\ Program Fi les (x86)\ microsoft\ EdgeWebVie w\Applicat ion\rCdgcw ByUDmMcQzY kDZywyWr.e xe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7808 cmdline:
schtasks.e xe /create /tn "rCdg cwByUDmMcQ zYkDZywyWr " /sc ONLO GON /tr "' C:\Program Files (x8 6)\microso ft\EdgeWeb View\Appli cation\rCd gcwByUDmMc QzYkDZywyW r.exe'" /r l HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7832 cmdline:
schtasks.e xe /create /tn "rCdg cwByUDmMcQ zYkDZywyWr r" /sc MIN UTE /mo 9 /tr "'C:\P rogram Fil es (x86)\m icrosoft\E dgeWebView \Applicati on\rCdgcwB yUDmMcQzYk DZywyWr.ex e'" /rl HI GHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7856 cmdline:
schtasks.e xe /create /tn "r6cR yCpdfSr" / sc MINUTE /mo 7 /tr "'C:\Users \user\Desk top\r6cRyC pdfS.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7880 cmdline:
schtasks.e xe /create /tn "r6cR yCpdfS" /s c ONLOGON /tr "'C:\U sers\user\ Desktop\r6 cRyCpdfS.e xe'" /rl H IGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - schtasks.exe (PID: 7904 cmdline:
schtasks.e xe /create /tn "r6cR yCpdfSr" / sc MINUTE /mo 5 /tr "'C:\Users \user\Desk top\r6cRyC pdfS.exe'" /rl HIGHE ST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 7932 cmdline:
"C:\Window s\System32 \cmd.exe" /C "C:\Use rs\user\Ap pData\Loca l\Temp\aD6 W5T5CI2.ba t" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7948 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - chcp.com (PID: 7996 cmdline:
chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32) - w32tm.exe (PID: 8048 cmdline:
w32tm /str ipchart /c omputer:lo calhost /p eriod:5 /d ataonly /s amples:2 MD5: 81A82132737224D324A3E8DA993E2FB5) - rCdgcwByUDmMcQzYkDZywyWr.exe (PID: 2188 cmdline:
"C:\Progra m Files (x 86)\micros oft\EdgeWe bView\Appl ication\rC dgcwByUDmM cQzYkDZywy Wr.exe" MD5: 6310493F1EAE60F8F1375EB05341A7D7)
- r6cRyCpdfS.exe (PID: 7940 cmdline:
C:\Users\u ser\Deskto p\r6cRyCpd fS.exe MD5: 6310493F1EAE60F8F1375EB05341A7D7)
- r6cRyCpdfS.exe (PID: 7988 cmdline:
C:\Users\u ser\Deskto p\r6cRyCpd fS.exe MD5: 6310493F1EAE60F8F1375EB05341A7D7)
- rCdgcwByUDmMcQzYkDZywyWr.exe (PID: 8020 cmdline:
"C:\Progra m Files (x 86)\micros oft\EdgeWe bView\Appl ication\rC dgcwByUDmM cQzYkDZywy Wr.exe" MD5: 6310493F1EAE60F8F1375EB05341A7D7)
- rCdgcwByUDmMcQzYkDZywyWr.exe (PID: 8040 cmdline:
"C:\Progra m Files (x 86)\micros oft\EdgeWe bView\Appl ication\rC dgcwByUDmM cQzYkDZywy Wr.exe" MD5: 6310493F1EAE60F8F1375EB05341A7D7)
- smartscreen.exe (PID: 8076 cmdline:
"C:\Progra m Files (x 86)\jdownl oader\smar tscreen.ex e" MD5: 6310493F1EAE60F8F1375EB05341A7D7)
- smartscreen.exe (PID: 8084 cmdline:
"C:\Progra m Files (x 86)\jdownl oader\smar tscreen.ex e" MD5: 6310493F1EAE60F8F1375EB05341A7D7)
- WmiPrvSE.exe (PID: 8100 cmdline:
C:\Recover y\WmiPrvSE .exe MD5: 6310493F1EAE60F8F1375EB05341A7D7)
- WmiPrvSE.exe (PID: 8108 cmdline:
C:\Recover y\WmiPrvSE .exe MD5: 6310493F1EAE60F8F1375EB05341A7D7)
- smartscreen.exe (PID: 7376 cmdline:
"C:\Progra m Files (x 86)\jdownl oader\smar tscreen.ex e" MD5: 6310493F1EAE60F8F1375EB05341A7D7)
- WmiPrvSE.exe (PID: 8008 cmdline:
"C:\Recove ry\WmiPrvS E.exe" MD5: 6310493F1EAE60F8F1375EB05341A7D7)
- rCdgcwByUDmMcQzYkDZywyWr.exe (PID: 7684 cmdline:
"C:\Progra m Files (x 86)\micros oft\EdgeWe bView\Appl ication\rC dgcwByUDmM cQzYkDZywy Wr.exe" MD5: 6310493F1EAE60F8F1375EB05341A7D7)
- r6cRyCpdfS.exe (PID: 5000 cmdline:
"C:\Users\ user\Deskt op\r6cRyCp dfS.exe" MD5: 6310493F1EAE60F8F1375EB05341A7D7)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
zgRAT | zgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on. | No Attribution |
{"C2 url": "http://321723cm.renyash.ru/AuthdbBasetraffic", "MUTEX": "DCR_MUTEX-z29Ai5otByR2YyFUw1eS", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "false", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_zgRAT_1 | Yara detected zgRAT | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_zgRAT_1 | Yara detected zgRAT | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_zgRAT_1 | Yara detected zgRAT | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
Click to see the 5 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
JoeSecurity_DCRat_1 | Yara detected DCRat | Joe Security | ||
Click to see the 3 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_zgRAT_1 | Yara detected zgRAT | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
System Summary |
---|
Source: | Author: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): |
Source: | Author: frack113: |
Data Obfuscation |
---|
Source: | Author: Joe Security: |
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-26T22:32:17.680237+0100 | 2048095 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 37.44.238.250 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: |
Spreading |
---|
Source: | System file written: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: |