0.9
低危

276a97b1415aa6e7c4f316e9578652736ec30eec51b2de05448b7e0e31c0828f

276a97b1415aa6e7c4f316e9578652736ec30eec51b2de05448b7e0e31c0828f.exe

分析耗时

195s

最近分析

364天前

文件大小

161.3KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN RANSOM PONYSTEALER
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.63
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Regrun-II [Trj] 20200531 18.4.3895.0
Baidu Win32.Worm.Pronny.d 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200531 2013.8.14.323
McAfee VBObfus.df 20200531 6.0.6.653
Tencent Malware.Win32.Gencirc.10b8cf67 20200531 1.0.0.1
静态指标
行为判定
动态指标
网络通信
与未执行 DNS 查询的主机进行通信 (2 个事件)
host 114.114.114.114
host 8.8.8.8
文件已被 VirusTotal 上 47 个反病毒引擎识别为恶意 (47 个事件)
APEX Malicious
AVG Win32:Regrun-II [Trj]
Acronis suspicious
Ad-Aware Gen:Heur.PonyStealer.MLT.1
AhnLab-V3 Trojan/Win32.Jorik.C81311
Antiy-AVL Trojan/Win32.VBKrypt
Arcabit Trojan.PonyStealer.MLT.1
Avast Win32:Regrun-II [Trj]
Avira TR/Spy.Agent.135173
Baidu Win32.Worm.Pronny.d
BitDefender Gen:Heur.PonyStealer.MLT.1
BitDefenderTheta Gen:NN.ZevbaF.34122.kmY@aCrWQW
CMC Trojan.Win32.VBKrypt!O
ClamAV Win.Trojan.Vbcrypt-5743559-0
Comodo Worm.Win32.Vobfus.~s@4m2ayb
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.85b7db
Cylance Unsafe
Emsisoft Gen:Heur.PonyStealer.MLT.1 (B)
Endgame malicious (high confidence)
F-Secure Trojan.TR/Spy.Agent.135173
FireEye Generic.mg.0d1b19285b7db7d4
Fortinet W32/WBNA.BHS!worm
GData Win32.Trojan.VB.ABD
Ikarus Worm.Win32.VBNA
Invincea heuristic
K7AntiVirus NetWorm ( 700000151 )
K7GW NetWorm ( 700000151 )
Kaspersky Trojan.Win32.VBKrypt.hzgk
MAX malware (ai score=81)
McAfee VBObfus.df
McAfee-GW-Edition BehavesLike.Win32.Generic.ct
MicroWorld-eScan Gen:Heur.PonyStealer.MLT.1
Microsoft Trojan:Win32/Wacatac.C!ml
NANO-Antivirus Trojan.Win32.VBKrypt.hbkwhf
Qihoo-360 Win32/Trojan.d5b
Rising Trojan.VBKrypt!8.5C0 (C64:YzY0OnvQtDAN3ZeM)
Sangfor Malware
SentinelOne DFI - Malicious PE
Symantec ML.Attribute.HighConfidence
Tencent Malware.Win32.Gencirc.10b8cf67
Trapmine malicious.high.ml.score
TrendMicro TROJ_GEN.R007C0PEV20
TrendMicro-HouseCall TROJ_GEN.R007C0PEV20
Yandex Trojan.VBGent.Gen.570
ZoneAlarm Trojan.Win32.VBKrypt.hzgk
eGambit Unsafe.AI_Score_99%
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2011-08-25 11:15:04

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00019000 0x00019000 4.837957022590502
.data 0x0001a000 0x00000630 0x00001000 0.0
.rsrc 0x0001b000 0x0001c000 0x00006000 4.94218190218852

L!This program cannot be run in DOS mode.
0Rich1
MSVBVM60.DLL
OswRsOsD
PsjRsMOsBsrRsnPsXOs1hRsOsNshPs
PsOoPsbrRsNs>UPs
QswUPsnPssPs
QsEtPshPs)uPsNsPOsjPsOs
Qs@9RsJOsBsGPsF
QsOs]QsPs]Qs
pPsuRs.Qs&nPsIOs
QsnRs*aQssoPs?Os}Ps\Os
Ps"UPsOsUPsE
PsBs4uRsOs6
Qs\PsVOs
Ps2vRs`vRs$FPs
|QsxNs
Qsj|Ps
uRsz]Qs-PsOs
PsgPsUPsOsfLPsOs
PsDROskQsNs];Os~BsOs:RswRsz
QsjPs/OsEjPsdRsOsZ]Os
PsPs5BstLPs%OswRsBsmRsOspuRskPskRs
QstjPshNslPs
Ps-PsQsHOsePsXLPsQPsfzPs0jPsmLPsOs
BvlRAgdCVn
VB5!6&*
ViRGCBzQ
aaaaaaaaa
BvlRAgdCVn
frtevkFuWjVSCnf1
BvlRAgdCVn
+3q"=h
VBA6.DLL
__vbaRecDestruct
__vbaUI1Var
__vbaVar2Vec
__vbaVarAnd
__vbaVarNot
__vbaPutOwner3
__vbaVarIndexLoad
__vbaGetOwner4
__vbaVarMul
__vbaVarAdd
__vbaI2Var
__vbaFpCmpCy
__vbaFpR8
__vbaVarCopy
__vbaPut4
__vbaPut3
__vbaFileClose
__vbaGet3
__vbaFileOpen
__vbaFpUI1
__vbaUI1I4
__vbaFPInt
__vbaLsetFixstr
__vbaStrFixstr
__vbaStrVarVal
__vbaStrVarCopy
__vbaAryMove
__vbaEnd
__vbaFreeObj
__vbaHresultCheckObj
__vbaNew2
__vbaLenBstrB
__vbaInStr
__vbaFixstrConstruct
__vbaVarInt
__vbaVarSub
__vbaI4Var
__vbaVarDup
__vbaAryVar
__vbaAryCopy
__vbaVarCat
__vbaStrVarMove
__vbaRedimPreserve
__vbaStrCmp
__vbaI2I4
__vbaPowerR8
__vbaFpI4
__vbaMidStmtBstr
__vbaFreeVarList
__vbaErase
__vbaVarMove
__vbaVarZero
__vbaStrI2
__vbaVarVargNofree
__vbaI4ErrVar
MSVBVM60.DLL
__vbaUbound
__vbaAryConstruct2
__vbaErrorOverflow
__vbaFreeVar
__vbaUI1I2
__vbaLenBstr
__vbaRedim
__vbaStrCopy
__vbaSetSystemError
__vbaAryDestruct
__vbaGenerateBoundsError
__vbaAryUnlock
__vbaAryLock
__vbaDerefAry1
__vbaFreeStrList
__vbaStrI4
__vbaStrCat
__vbaStrMove
__vbaFreeStr
__vbaStrToUnicode
__vbaStrToAnsi
__vbaOnError
j0XSVWeE8
EPEPEPEP8EPEPEPEPj
#MTEPEPEPEPj
DEP5xA
j`XSVWeE(
fEfEf;E
EE]EQQ
fEfEf;E
MP[ME-
MPbME>
M:PM2EK
EPEPEPEPj
$j4u0V
EPEP[EPEPj
PTPDPP4P$PP
P$P4PDPTPdPtPPPPPPPPP
P$P4PDPTPdPtPEPEPEPj
jvTPji4P
PqjoPcjaPUjlPGjlP9
jg4PEPPEPPEPtP
PPlPPPXPPPDPPP0PPtP
PPTPPPDPP4P$P
$P4PDPTPdPtPPPPPPPPP
P$P4PDPTPdPtPEPEPEPj
j.P#jnP
PEPEPPEPtP
PPdPPTPDP
PP\PPPHPPP4PPP PPP
PPtPPdPTPPPDP
DPTPdPtPPPPPPPPP
P$P4PDPTPdPtPEPEPEPj
EPEPEP_PEP[
jtX SVWeE
EPEPEP'
UMEPEPEPEPj
EPEPEPEPEPj
jTXSVWeEP
hPxPPXP
XPhPxPPj
XPhPxPPj
SVWeEH
PPPPhPPPPj
X(SVWeE
EPEPEPEP-EPEPEPEPj
@EPEPEPEPj
EPEPEPEPj
~EP5HA
+~EP5A
EPEP{|hQ@
}EP}EPEPj
zSVWeEP
P{jeP{jFP{
jmPP'{
PEPEPzPPEPzPpP`PzPPPPzP@P0PzPP PzP
P|zPPPhzPPPTzPPP@zPPP,zPPP
<rEP5\A
&EPEPEPEPj
MrMrfE
$oSVWeE
PdP7odP=o
MMpdoE
j@PdPmPh
.mdP|P'mP'm
Mn|PPj
jk4P]mjp
joP-mjcPmj
uPdPTP
mPPDPlP4P$PlPP
PlPPPlPPPmlPxPkPk
fdtPxP|PPj
P$P4PDPTPdPj
PajsPa
jFPNajidP@a
P`jzP`jeP`
EPEPEP`PEPEP`PtPdP`PPTP`PDP4Pw`PP$Pc`PpP
PP;`PPP'`P`PP
`PPP_PPPP_PPtP_PdPTP_P@PDP_P4P$P_P0P
PPs_PPP__PPPK_P PP7_P7_
P$P4PDPTPdPtPPPPPPPPP
P$P4PDPTPdPtPEPEPEPEPEPPPPPPj#^
PPPPPP
P$P4PDPTPdPtPPPPPPPPP
P$P4PDPTPdPtPEPEPEPEPEPj#\
j@XYSVWeE
MF\P[M>\E
UM*[hh@
jpXdXSVWeE @
SPEPWz
MREPEPEPEPEPEPj
MRP_RMRE
MTRPEPy
M@RP4R
M0RPEP
RPEPIy
MQEPEPEPEPEPEPEPEPj
$3P]h@
MlQEPEPEPEPEPEPEPEPj
j|XMSVWeE@
EPEP-OEPEPj
NEP5hA
LSVWeE
EPEPMEPM
LEP5HA
KEP5HA
EPKKEE
KEP5HA
HSVWeE @
EPEPEPEP-BEPEPEPEPj
XPEPEP1APHPEP AP8PEP
AP(PxP@P
PhP@P@
MAhPxPEPEPEPEPj
MAP@MAE
MXAPLA
MHAMFAE
M@EPEP
EPEPEPN?PXPEP=?P=?
MM@MK@EPEPEPEPj
M?P>M?E
XPEPEP=PHPEP=P8PEP=P=
M>EPEPEPEPj
M|>Pp>
Ml>Mj>E
XPEPEP<PHPEP<P<
M=EPEPEPj
M<Ph=@
M<EPEPEPEPj
Mt<Ph<
Md<Mb<E
M2<hI@
M7<EPEPEPEPj
hPxPEPEPEPEPj
8SVWeE!@
EPEPEPEPl:EPEPEPE
j@PP@P1@P1
M2@PPPj
PPPd1PPj1
j@PP@P
M1@PPPj
PPP 0PP&0
l31P0E
j@PP@P2/@P8/
hE0@PPPj
PPP.PP.
M/Px/E#
PP@P-@PPPj
`.Ph A
`.Ph$A
0P@PPP P
- P0P@PPPj
M,PEPj
M,P|+E0
0P@PPP PZ, P0P@PPPj
0M+Pjh
PP@PK+@PPPj
+@PPPj
M^*PPA
v!EP58A
j:LEPj
< EP5HA
~ PEP MZ E
lEP?EE
S7LEPj
EPDgM:
fEfEf;E
SVWeEh%@
EPEPEPEPEPj
EPEPfEfE
EPEPf|u
EPEPEPEPEPj
EPEPfEfE
EPEPf|u
EPEPEPEPEPj
EPEPfEfE
EPEPf|EPE
EPEPEPEPj
EPEP*fEfE
EPEPEPEPEPj
EPEPf|u
EPEPEPEPEPj
EPEPBfEfE
EPEP%f|u
EPEPEPEPEPj
EPEPkfEfE
EPEPNf|u
EPEPEPEPEPj
EPEPEPEPEPj
SVWeE&@
EPEPEPj
qEPEPEPEPj
M\P50A
0uu/0@
M<PREE
0uuN0_
M[PqEE
TEP5xA
3SVWeE(@
MPMPjh
UM]EP\
MmPEPj
EPEPEPEPIEPEPEPEPj
MMPMHPjh
EPEPEPj
EPEPEPEPj
FEPEPEPj
pPEPEPEPEPj
xSVWeE)@
P:|EP|EE
upP|EPO|EE
uPSxEPxEE
M^EP%EP
jLXSVWeE0*@
MqPMiE
$EPuEHH
$|Pau|P
E|PEPj
j@hPEPEP
$EP;sEPEME
$EPrEPbE
$EPpEP}@@
0EPquulp
XPhP|P
EP-|PuE
-EP|PEPj
j\X\SVWeE
$EP5HA
EPEP!EPEPj
MGP5\A
MPEPEPx
EPEPEPEPj
M>PBM6i
Q0ft^j
30Ht@j
EPEPEPj
A0Vt^j
#08t@j
EPEPEPj
MyP}Mq
PEP,EPEPj
PEPEPEPj
mEPEPEPEPj
P0P@PPP`PpPEPEPEPEPj
EPEPEPEP
EPEPEPEPj
-MgEPEPEPj
SVWeE.@
MSVBVM60.DLL
__vbaVarSub
__vbaStrI2
_CIcos
_adj_fptan
__vbaStrI4
__vbaVarMove
__vbaVarVargNofree
__vbaFreeVar
__vbaAryMove
__vbaLenBstr
__vbaStrVarMove
__vbaFreeVarList
__vbaEnd
__vbaPut3
_adj_fdiv_m64
__vbaPut4
_adj_fprem1
__vbaStrCat
__vbaLsetFixstr
__vbaSetSystemError
__vbaRecDestruct
__vbaLenBstrB
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaAryVar
__vbaAryDestruct
__vbaOnError
_adj_fdiv_m16i
_adj_fdivr_m16i
__vbaVarIndexLoad
__vbaStrFixstr
__vbaFpR8
_CIsin
__vbaErase
__vbaVarZero
__vbaChkstk
__vbaFileClose
__vbaGenerateBoundsError
__vbaStrCmp
__vbaGet3
__vbaAryConstruct2
__vbaPutOwner3
__vbaI2I4
DllFunctionCall
__vbaFpUI1
__vbaRedimPreserve
_adj_fpatan
__vbaFixstrConstruct
__vbaRedim
__vbaUI1I2
_CIsqrt
__vbaVarAnd
__vbaUI1I4
__vbaFpCmpCy
__vbaVarMul
__vbaExceptHandler
__vbaStrToUnicode
_adj_fprem
###################################
E;;;;E;;;;;;;;;;;;;;;;8888888888888#
fcceh;#
9<@cy;#
341=('&
:mqOOd&
>)77Mx
622uR-R
#)00BxC*-/C
>-0-R:
!!!!!!"
{xdd"##"#"5a
}ygi#&%%"!
ViRGCBzQMG
0icCqLc
m2s:}p
^ }cWi*r
K7x>jkw
Nsu-wz
k}:b}O?c
{Yl@G$n@D(6@
LYjC+Gj+,!
iM1Ou~+
^0u!/1
A]}~n-HK5mE
b4/LsqT&C
#GO$^"DM
x#6LtV
Z|*SV~/b /6
:Q hkSgv
hpqfw&
$5~,4{2
UWF/j2
}k3%R^qna
xR3r_K
\J*O{t8
!"[*~;=*;!LS1,!:
<m86-b^G_
*\;Y`w
SfRIGTY;'1;36aYN[:"Nb
e)Kdv:j1uR[CW
SZj@9-
"G91Fm7 :Mk
#*9H@84_B
<[?^8P
]ej&SEqVO=O#w\]KdVeogUF*r>d
8<mEY[X
st;1D3R"X9q
x dux1
PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGs
KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK
KKKKKKK
f|Nefg
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
sPbcrocS
./p,c4
NNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
N;<t`t
u4KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK???
lKKKKKKKKKKKKKKK
@@@@mA
Rk64D0Y13L
AC89nL3kG5S
Amnooze94Bk8L1uq
VB5!6&*
ViRGCBzQ
aaaaaaaaa
BvlRAgdCVn
frtevkFuWjVSCnf1
BvlRAgdCVn
po3402940234j345k34j5k4jn4456mnmn6mn5
Secret
Passwords
__vbaFreeObj
__vbaHresultCheckObj
__vbaNew2
__vbaLenBstrB
__vbaInStr
__vbaFixstrConstruct
__vbaVarInt
__vbaVarSub
__vbaI4Var
__vbaVarDup
__vbaAryVar
__vbaAryCopy
__vbaVarCat
__vbaStrVarMove
__vbaRedimPreserve
__vbaStrCmp
__vbaI2I4
__vbaPowerR8
__vbaFpI4
__vbaMidStmtBstr
__vbaFreeVarList
__vbaErase
__vbaVarMove
__vbaVarZero
__vbaStrI2
__vbaVarVargNofree
__vbaI4ErrVar
MSVBVM60.DLL
__vbaUbound
__vbaAryConstruct2
__vbaErrorOverflow
__vbaFreeVar
__vbaUI1I2
__vbaLenBstr
__vbaRedim
__vbaStrCopy
__vbaSetSystemError
__vbaAryDestruct
__vbaGenerateBoundsError
__vbaAryUnlock
__vbaAryLock
__vbaDerefAry1
__vbaFreeStrList
__vbaStrI4
__vbaStrCat
__vbaStrMove
__vbaFreeStr
__vbaStrToUnicode
__vbaStrToAnsi
__vbaOnError
@@@@@@@@
MSVBVM60.DLL
__vbaVarSub
__vbaStrI2
_CIcos
_adj_fptan
__vbaStrI4
__vbaVarMove
__vbaVarVargNofree
__vbaFreeVar
__vbaAryMove
__vbaLenBstr
__vbaStrVarMove
__vbaFreeVarList
__vbaEnd
__vbaPut3
_adj_fdiv_m64
__vbaPut4
_adj_fprem1
__vbaStrCat
__vbaLsetFixstr
__vbaSetSystemError
__vbaRecDestruct
__vbaLenBstrB
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaAryVar
__vbaAryDestruct
__vbaOnError
_adj_fdiv_m16i
_adj_fdivr_m16i
__vbaVarIndexLoad
__vbaStrFixstr
__vbaFpR8
_CIsin
__vbaErase
__vbaVarZero
__vbaChkstk
__vbaFileClose
__vbaGenerateBoundsError
__vbaStrCmp
__vbaGet3
__vbaAryConstruct2
__vbaPutOwner3
__vbaI2I4
DllFunctionCall
__vbaFpUI1
__vbaRedimPreserve
_adj_fpatan
__vbaFixstrConstruct
__vbaRedim
__vbaUI1I2
_CIsqrt
__vbaVarAnd
__vbaUI1I4
__vbaFpCmpCy
__vbaVarMul
__vbaExceptHandler
__vbaStrToUnicode
_adj_fprem
ICON4(
!*5:!(41
5910596!'"'!+):<1)49
/==45@EJBJRcAGDGLMKJFTBEUVQZT^ZZ_MRYXP][\]fbndnj{pr~bhht|zccabfej`cfkimnmwyz}w}}ptqvqtmq~vvzz}z}
7(95Y}tr
TAEIZX
{=ZZksydityyMKWBZHSchMVZjujzgpbx|gsx}
<rikuv{zlw
ZNT\EVP
~fypqw}y
s2F|ABln%
(;> #7(T:
1'+154Kf
###################################
E;;;;E;;;;;;;;;;;;;;;;8888888888888#
9<@cy
:mqOOd
>)77Mx
#)00Bx
/-P?pR
b4/Lsq
qqqqqq9op0s
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
040904B0
ProductName
YczezJyEfHWqj
FileVersion
ProductVersion
InternalName
ViRGCBzQ
OriginalFilename
ViRGCBzQ.exe
PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDING
KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK
KKKKKKK
lKKKKKKKKKKKKKKK

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 61714 8.8.8.8 53
192.168.56.101 56933 8.8.8.8 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.