File name:

FindWalletv3.2-Crack.exe.zip

Full analysis: https://app.any.run/tasks/9d307ee3-fb4f-4de9-846c-c1877ba7fd86
Verdict: Malicious activity
Analysis date: March 24, 2025, 15:26:35
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
neshta
evasion
telegram
Indicators:
MIME: application/zip
File info: Zip archive data, at least v5.1 to extract, compression method=AES Encrypted
MD5:

397C1C17EE808EEB19E564545D0ADA4A

SHA1:

650C522B0F1AE2DBF57D7D66E74CB69632A241FC

SHA256:

22DA0F2C3557BA3B96FBAEAC2700F8B892D69CEADEA54896649318761F145E48

SSDEEP:

49152:wsqB9c/XVhVBNwjs7DEhZ2B8OsS6YyeGakfsWoZwg5Smwmd3ArwqXu3uWvRHiGfR:wsqB9IXB+0WS8cG5E1Bbd3A/XsvRCGSE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • NESHTA mutex has been found

      • FindWalletv3.2-Crack.exe (PID: 6744)
      • FindWalletv3.2-Crack.exe (PID: 5116)
  • SUSPICIOUS

    • Mutex name with non-standard characters

      • FindWalletv3.2-Crack.exe (PID: 5116)
      • FindWalletv3.2-Crack.exe (PID: 6744)
    • Executable content was dropped or overwritten

      • FindWalletv3.2-Crack.exe (PID: 516)
      • FindWalletv3.2-Crack.exe (PID: 5116)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • Client.exe (PID: 5512)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • Client.exe (PID: 5512)
  • INFO

    • Manual execution by a user

      • FindWalletv3.2-Crack.exe (PID: 5116)
      • FindWalletv3.2-Crack.exe (PID: 6744)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7372)
    • Checks supported languages

      • FindWalletv3.2-Crack.exe (PID: 6272)
      • dw20.exe (PID: 1052)
    • Creates files in the program directory

      • dw20.exe (PID: 1052)
    • Reads Environment values

      • dw20.exe (PID: 1052)
    • Creates files or folders in the user directory

      • Client.exe (PID: 5512)
    • Process checks computer location settings

      • dw20.exe (PID: 1052)
    • Checks proxy server information

      • dw20.exe (PID: 1052)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 51
ZipBitFlag: 0x0009
ZipCompression: Unknown (99)
ZipModifyDate: 2025:03:24 15:01:38
ZipCRC: 0xf3d22a7a
ZipCompressedSize: 1578798
ZipUncompressedSize: 3742208
ZipFileName: FindWalletv3.2-Crack.exe.bin
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
18
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs backgroundtransferhost.exe no specs openwith.exe no specs openwith.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs #NESHTA findwalletv3.2-crack.exe findwalletv3.2-crack.exe #NESHTA findwalletv3.2-crack.exe no specs findwalletv3.2-crack.exe dw20.exe client.exe find wallet v3.2-crack.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
516"C:\Users\admin\AppData\Local\Temp\3582-490\FindWalletv3.2-Crack.exe" C:\Users\admin\AppData\Local\Temp\3582-490\FindWalletv3.2-Crack.exe
FindWalletv3.2-Crack.exe
User:
admin
Company:
bitter
Integrity Level:
MEDIUM
Description:
sissyaccomplice
Exit code:
0
Version:
4.6.11.32
Modules
Images
c:\users\admin\appdata\local\temp\3582-490\findwalletv3.2-crack.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1052dw20.exe -x -s 804C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
FindWalletv3.2-Crack.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Error Reporting Shim
Exit code:
0
Version:
2.0.50727.9149 (WinRelRS6.050727-9100)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\dw20.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
1196"C:\Users\admin\AppData\Roaming\Find Wallet v3.2-Crack.exe" C:\Users\admin\AppData\Roaming\Find Wallet v3.2-Crack.exeFindWalletv3.2-Crack.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Find-Wallet
Version:
3.2
Modules
Images
c:\users\admin\appdata\roaming\find wallet v3.2-crack.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5116"C:\Users\admin\Desktop\FindWalletv3.2-Crack.exe" C:\Users\admin\Desktop\FindWalletv3.2-Crack.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\findwalletv3.2-crack.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5256"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
5512C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5512"C:\Users\admin\AppData\Roaming\Client.exe" C:\Users\admin\AppData\Roaming\Client.exe
FindWalletv3.2-Crack.exe
User:
admin
Integrity Level:
MEDIUM
Description:
RL
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\client.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5528"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
6272C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
11 991
Read events
11 950
Write events
41
Delete events
0

Modification events

(PID) Process:(7372) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7372) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7372) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7372) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\FindWalletv3.2-Crack.exe.zip
(PID) Process:(7372) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7372) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7372) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7372) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7372) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(7036) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
Executable files
11
Suspicious files
24
Text files
39
Unknown types
0

Dropped files

PID
Process
Filename
Type
5256BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\94fef172-4a40-427c-990c-8e22385c6c5c.down_data
MD5:
SHA256:
5512Client.exeC:\Users\admin\AppData\Local\Temp\places.raw
MD5:
SHA256:
5116FindWalletv3.2-Crack.exeC:\Users\admin\AppData\Local\Temp\3582-490\FindWalletv3.2-Crack.exeexecutable
MD5:68F929DC1286BF7AF65BF056845F9B42
SHA256:0D20648267D3004BA95B04F9EF01F3F6E40644B46773990807C2741ADBDD3D82
5256BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\e02b42ba-b630-4586-8417-901b195f1ce1.1d2d7be9-4978-4167-aa2d-351c2d448ae3.down_metabinary
MD5:E639B2575A216C0986AE37A942B3D4D5
SHA256:2E6104FC71E6729D20DD59AB981177778F29E6616208EB1C1C60D058C50B5A56
5256BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10Dbinary
MD5:7438F6BB722962DDFAF1697281BF3B45
SHA256:29BC569562B070CF7C1467602A9BB06467A8BE04BCF5F926DAD447558A4AB44F
5256BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\94fef172-4a40-427c-990c-8e22385c6c5c.1d2d7be9-4978-4167-aa2d-351c2d448ae3.down_metabinary
MD5:E639B2575A216C0986AE37A942B3D4D5
SHA256:2E6104FC71E6729D20DD59AB981177778F29E6616208EB1C1C60D058C50B5A56
5256BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\e02b42ba-b630-4586-8417-901b195f1ce1.up_meta_securebinary
MD5:40FC911F1481E8F8B3F9F9F57B056CBA
SHA256:FBD60C15C03159B763D8E3F0B884E90A4149BF365844BE6B8F1EF52A7CA494C1
7372WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb7372.32150\FindWalletv3.2-Crack.exe.binexecutable
MD5:A5AAD19F2467992040DCE284A1D34016
SHA256:6131F59ADE95F5AAF4F78C1CBD31F033AE508BAE3418D30AD9B7E35E3F96BEB6
5512Client.exeC:\Users\admin\AppData\Roaming\DESKTOP-JGLLJLD\InstalledSoftware.txttext
MD5:9FE3E9FBA5C9F39C7C244BD808A9777F
SHA256:6FD5F361A1FEAA428050DA60111432F85E03ED3D7571D5B86CEC3C77296C9D10
5512Client.exeC:\Users\admin\AppData\Roaming\DESKTOP-JGLLJLD\FileGrabber\Desktop\kitchenspanish.rtftext
MD5:D2BCA478E3C81A87D43C77D127C51C23
SHA256:C2A300966B42D639F9360D3CD5F5E2967EDEEF179FB58948162FC1F0E8088370
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
43
DNS requests
24
Threats
28

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5512
Client.exe
GET
200
208.95.112.1:80
http://ip-api.com/xml
unknown
whitelisted
5512
Client.exe
GET
200
208.95.112.1:80
http://ip-api.com/xml
unknown
whitelisted
6544
svchost.exe
GET
200
23.63.118.230:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7692
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5256
BackgroundTransferHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6044
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1052
dw20.exe
GET
200
23.48.23.157:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5512
Client.exe
GET
200
208.95.112.1:80
http://ip-api.com/xml
unknown
whitelisted
1052
dw20.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2104
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3216
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
40.126.31.69:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
23.63.118.230:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
6544
svchost.exe
20.190.160.22:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
  • 23.48.23.157
  • 23.48.23.146
  • 23.48.23.149
  • 23.48.23.144
  • 23.48.23.147
  • 23.48.23.140
  • 23.48.23.153
  • 23.48.23.138
  • 23.48.23.145
whitelisted
google.com
  • 142.250.185.110
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
login.live.com
  • 40.126.31.69
  • 20.190.159.4
  • 40.126.31.130
  • 40.126.31.129
  • 40.126.31.131
  • 20.190.159.131
  • 20.190.159.23
  • 20.190.159.71
  • 20.190.160.22
  • 40.126.32.138
  • 40.126.32.68
  • 20.190.160.4
  • 20.190.160.14
  • 20.190.160.131
  • 40.126.32.72
  • 40.126.32.133
whitelisted
ocsp.digicert.com
  • 23.63.118.230
  • 2.23.77.188
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
www.bing.com
  • 23.15.178.208
  • 23.15.178.234
  • 23.15.178.200
  • 23.15.178.226
  • 23.15.178.136
  • 23.15.178.147
  • 23.15.178.179
  • 23.15.178.184
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 2.16.253.202
whitelisted

Threats

PID
Process
Class
Message
5512
Client.exe
Misc activity
ET INFO DropBox User Content Domain (dl .dropboxusercontent .com in TLS SNI)
2196
svchost.exe
Potentially Bad Traffic
ET INFO External IP Lookup Domain Domain in DNS Lookup (ipbase .com)
5512
Client.exe
Potentially Bad Traffic
ET INFO Observed External IP Lookup Domain (ipbase .com in TLS SNI)
2196
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Checker Domain (freegeoip .app)
5512
Client.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] SNI External IP Domain Lookup (freegeoip .app)
5512
Client.exe
Misc activity
ET INFO DropBox User Content Domain (dl .dropboxusercontent .com in TLS SNI)
5512
Client.exe
Misc activity
ET INFO DropBox User Content Domain (dl .dropboxusercontent .com in TLS SNI)
5512
Client.exe
Misc activity
ET INFO DropBox User Content Domain (dl .dropboxusercontent .com in TLS SNI)
5512
Client.exe
Misc activity
ET INFO DropBox User Content Domain (dl .dropboxusercontent .com in TLS SNI)
5512
Client.exe
Misc activity
ET INFO DropBox User Content Domain (dl .dropboxusercontent .com in TLS SNI)
No debug info