2.4
中危

036b6b8cfd6788f7fe113577777fa72a97d3572d21cb9e843f93c6f92652d899

036b6b8cfd6788f7fe113577777fa72a97d3572d21cb9e843f93c6f92652d899.exe

分析耗时

73s

最近分析

386天前

文件大小

199.6KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN WORM ULISE
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.81
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Dropper-GHV [Drp] 20200505 18.4.3895.0
Baidu Win32.Trojan.Agent.dc 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200505 2013.8.14.323
McAfee W32/Autorun.worm.aacd 20200505 6.0.6.653
Tencent Trojan.Win32.FakeFolder.uu 20200505 1.0.0.1
静态指标
可执行文件包含未知的 PE 段名称,可能指示打包器(可能是误报) (7 个事件)
section vpqndga
section boqzxbs
section ghqtslv
section rpysmiz
section atitzvk
section gxoqkfp
section euspkdf
行为判定
动态指标
检查是否有任何人类活动正在进行,通过不断检查前景窗口是否发生变化
在 PE 资源中识别到外语 (3 个事件)
name RT_ICON language LANG_TURKISH filetype None sublanguage SUBLANG_DEFAULT offset 0x0003b568 size 0x00001ca8
name RT_GROUP_ICON language LANG_TURKISH filetype None sublanguage SUBLANG_DEFAULT offset 0x0003d210 size 0x00000014
name RT_VERSION language LANG_TURKISH filetype None sublanguage SUBLANG_DEFAULT offset 0x0003b220 size 0x00000348
在文件系统上创建可执行文件 (1 个事件)
file C:\Program Files (x86)\e8fdc9ff\jusched.exe
投放一个二进制文件并执行它 (1 个事件)
file C:\Program Files (x86)\e8fdc9ff\jusched.exe
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
在 Windows 启动时自我安装以实现自动运行 (1 个事件)
file C:\Windows\Tasks\Update23.job
操作本地防火墙的策略和设置 (1 个事件)
registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
文件已被 VirusTotal 上 62 个反病毒引擎识别为恶意 (50 out of 62 个事件)
ALYac Gen:Variant.Ulise.94483
APEX Malicious
AVG Win32:Dropper-GHV [Drp]
Acronis suspicious
AhnLab-V3 Trojan/Win32.Npkon.R18258
Antiy-AVL Worm/Win32.Juched.pfk
Arcabit Trojan.Ulise.D17113
Avast Win32:Dropper-GHV [Drp]
Avira TR/Buzy.416012
Baidu Win32.Trojan.Agent.dc
BitDefender Gen:Variant.Ulise.94483
BitDefenderTheta Gen:NN.ZexaF.34108.m02@amms!qdG
Bkav W32.GenericGanelp.Trojan
CAT-QuickHeal Worm.Ganelp.A6
CMC Worm.Win32.Juched!O
ClamAV Win.Trojan.BankerSpy-1
Comodo Worm.Win32.Jushed.KA@4cysvx
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.18b7f0
Cylance Unsafe
Cyren W32/S-17b5bb38!Eldorado
DrWeb Trojan.Siggen3.30837
ESET-NOD32 a variant of Win32/Agent.TNE
Emsisoft Gen:Variant.Ulise.94483 (B)
Endgame malicious (high confidence)
F-Secure Trojan.TR/Buzy.416012
FireEye Generic.mg.0ea2ace18b7f09b7
Fortinet W32/Agent.SRG!tr
GData Gen:Variant.Ulise.94483
Ikarus Trojan.Win32.Webprefix
Invincea heuristic
Jiangmin Worm/Generic.lml
K7AntiVirus EmailWorm ( 005191521 )
K7GW EmailWorm ( 005191521 )
Kaspersky HEUR:Worm.Win32.Generic
MAX malware (ai score=82)
Malwarebytes Backdoor.IRCBot
MaxSecure Trojan.Malware.121218.susgen
McAfee W32/Autorun.worm.aacd
MicroWorld-eScan Gen:Variant.Ulise.94483
Microsoft Worm:Win32/Ganelp.E
NANO-Antivirus Trojan.Win32.Graftor.fiiwfc
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM18.1.03FE.Malware.Gen
Rising Trojan.Agent!1.C135 (CLASSIC)
SUPERAntiSpyware Trojan.Agent/Gen-Ganel
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos W32/Autorun-BRF
Symantec W32.Griptolo
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2004-02-20 16:12:20

PE Imphash

faea664dccb12d653cbea3ef51eb7d97

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00024000 0x00024000 3.700018352274897
.rdata 0x00025000 0x00002000 0x00002000 4.381105202572365
.data 0x00027000 0x00013000 0x00002000 0.783453003635459
.idata 0x0003a000 0x00001000 0x00001000 2.822041652632708
.rsrc 0x0003b000 0x00003000 0x00003000 2.3787886881901397
.reloc 0x0003e000 0x00009000 0x00002000 3.8201921754262673
vpqndga 0x00047000 0x0001b000 0x00000000 0.0
boqzxbs 0x00062000 0x0001a000 0x00000000 0.0
ghqtslv 0x0007c000 0x0001b000 0x00000000 0.0
rpysmiz 0x00097000 0x00008000 0x00000000 0.0
atitzvk 0x0009f000 0x0001b000 0x00000000 0.0
gxoqkfp 0x000ba000 0x00008000 0x00000000 0.0
euspkdf 0x000c2000 0x00001000 0x0000102d 1.095785595908079

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0003b568 0x00001ca8 LANG_TURKISH SUBLANG_DEFAULT None
RT_GROUP_ICON 0x0003d210 0x00000014 LANG_TURKISH SUBLANG_DEFAULT None
RT_VERSION 0x0003b220 0x00000348 LANG_TURKISH SUBLANG_DEFAULT None

Imports

Library KERNEL32.dll:
0x43a260 GetLastError
0x43a264 GetSystemTime
0x43a268 MultiByteToWideChar
0x43a26c GetLocaleInfoA
0x43a270 GetModuleHandleA
0x43a274 FindNextFileA
0x43a278 FindFirstFileA
0x43a27c FlushFileBuffers
0x43a280 SetStdHandle
0x43a284 FindClose
0x43a288 Sleep
0x43a28c SetFilePointer
0x43a290 LCMapStringW
0x43a294 LCMapStringA
0x43a298 GetStringTypeW
0x43a29c ExitProcess
0x43a2a0 TerminateProcess
0x43a2a4 GetCurrentProcess
0x43a2a8 GetStartupInfoA
0x43a2ac GetCommandLineA
0x43a2b0 GetVersion
0x43a2b4 DebugBreak
0x43a2b8 GetStdHandle
0x43a2bc WriteFile
0x43a2c4 OutputDebugStringA
0x43a2c8 GetProcAddress
0x43a2cc LoadLibraryA
0x43a2d4 GetModuleFileNameA
0x43a2d8 IsBadWritePtr
0x43a2dc IsBadReadPtr
0x43a2e0 HeapValidate
0x43a2f0 WideCharToMultiByte
0x43a2fc SetHandleCount
0x43a300 GetFileType
0x43a304 HeapDestroy
0x43a308 HeapCreate
0x43a30c HeapFree
0x43a310 VirtualFree
0x43a314 RtlUnwind
0x43a31c HeapAlloc
0x43a320 HeapReAlloc
0x43a324 VirtualAlloc
0x43a328 GetCPInfo
0x43a32c GetACP
0x43a330 GetOEMCP
0x43a334 GetStringTypeA
0x43a338 CloseHandle
Library USER32.dll:
0x43a394 MessageBoxA
Library ADVAPI32.dll:
0x43a230 GetUserNameW
Library ole32.dll:
0x43a3c4 CoUninitialize
0x43a3c8 CoCreateInstance
0x43a3cc CoInitialize

L!This program cannot be run in DOS mode.
:!~@~@~@
_w@~@B@
@Rich~@
`.rdata
@.data
.idata
@.reloc
vpqndga
boqzxbs
ghqtslv
rpysmiz
atitzvk
gxoqkfp
euspkdf
UDSVW}
E_^[]UPSVW}
_^[P;Q
]UTSVW}
_^[]ULSVW}
MU;U}gE
E}^}7M
_^[L;BN
]U@SVW}
_^[@;wM
]UDSVW}
_^[]UPSVW}
_^[]UDSVW}
_^[]UlSVW}
u,U;Uu
t\U;Uu
E_^[l;E
]UpSVW}
EMMU3f
Q<UE8PE
MQxUEH|MU
M;M}-U
_^[p;C
]U`SVW}
EMMU3f
Q<UE8PE
3_MQxUEH|MU
ME_^[]UH
]U@SVW}
_^[@;(7
]U|SVW}
_^[|;^,
]UHSVW}
_^[H;"
]UHSVW}
E_^[H;u!
]UHSVW}
9Us)E3
_^[H;
3EEEfE
jdTQhDzB
MQh`PB
URh@PB
MQPp;e
fUfUfEfEfMfMfE
-oje`[VQLG_^[
TPP`QC
;}}PRcP
wuWhUB
E}tEEP
tAt2t$
PRSVWh
_^[ZX]
r)$hf@
DDDDDDDDDDDDDD
GIt%t)
Gt/KuD$
GKu[^D$
[^_U=C
]UjhWB
EMQUR&
eEPJMd
_^[]U=C
@v)URc
RPQRPQRPQREPM
t&hDZB
E _^[]Uj
3u&h`\B
t&hDZB
;t!h[B
$REP'6
M;Mt!hT[B
;Et!h8[B
E_^[]Uj
]UQSVWzB
uCE PMQ
uCE PMQ
;Mt!h\B
;Mt!h\B
_^[]Uj
EE_^[]UQzB
E]UQSVWE
_^[]UQ |B
E]UQSVWE
E_^[]U
3uNh^B
u:U REH
QURhx]B
u:E PMQ
REPhL]B
u/M Qhp^B
QURhP^B
RE PMQh$^B
E_^[] @
E]UQzB
REP/,
%URh`_B
H0_^[]U
A,+B,M
J0+H0U
E_^[]U
PM QhH`B
PM Qh `B
PM Qh_B
u_^[]U\SVWE
UB E=4~B
EPMQh`B
u_^[]U4SVWEP
3_^[]UQSVW}
Q0Rh`B
3u_^[]U
]UQEzB
UjmhLaB
=tGjyhLaB
EMMUREPj
UREPMU
PMQUR#
jdhdaB
EPMQUREPj
3%MQUREP?
MU;U}eE8tXM
E}tXMQ
E}@}2M<`C
]USVWUj
t.;t$$t(4v
VC20XC00U
]_^[]UL$
_^[]UQE
]U0SVWEE
j]hTdB
j^hTdB
E_^[]U,SVWEE
jZhpdB
j[hpdB
E_^[]Q=
EE]U]U$|B
UE;Es%MU
]U8VDC
MU;Us$EM#
MU;UuIHC
U#TDU}
^]UQDC
E}?} MU
UE;Ew]MA
UUE+EE
]UQ=@C
M;tU;u
tn} }2
,3]U0SVWEE
j]hTdB
j^hTdB
E_^[]U
MQUREPj
Ek0H~B
s{Uk0EX~B
Mk0UEfAL~B
Ar;Zw2!C
Qar;zw2!C
ddIdd.wld3
``C``5
fEfMQR!
U tHE@t
RPRPu0RPQR9~
ERM+MM
fZfZPxQ
QtRxP)
_^[]P@
fA]UWVu
DDDDDDDDDDDDDD
^_UjheB
3CMQURE
PMQURE
_^[]UjheB
SVWe=,C
REPMQU
EPMQUREPM
EPMQh
QUREPh
QU+RQU
E+]UQSVW}
Uj;heB
_^[]UE
@]UQ=C
M}-s#UE
|jyheB
<uh=zB
<tc=zB
~VUREH
;Eu!MQ
E_^[]UQE
EE]UQVE
3^]USVW}
_^[]%C
Oe !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_abcdefghijklmnopqrstuvwxyz{|}~
n2ltcr#MlnAabyrireltuAeDcyedFNAtimVaAplGiwro#Vmfanr3leodstuaeoirFLaSitbsreerGoeeeevntieoi#WoitAtunmoeldGrdsedHlLLa#er#FAieCtro#MllmGnonrlCFAtdDcyelIri#ke.#PAeGoed#drAebytert#aitAtuia#Ereab#yeenserGoeotA
dslFNFAnoRvro#ei#DeeeglvrsrelpnhGunosPe2srsN#sn#ai#tleiGiiGalGaenri#dteil#oitAlFAtvpGoaitgCtolSs#Cers#c3rPe2toaeeFAiiRF#FS#bl#briiFAnxlFCemDcyeeeeiy#LcrSn#aoe2pttrPedosi#c3xlHlreerF#deteeoAcoF#FFteiei#dseeerDtlGrTAtiDeiAeTh3aoertcIrsFtoseCedCtlWeealelzllolle
i.#etnnnocFelIrCedntlteeIrCe#Gi#etsn#ielnnp#etnApFAteoaewndIrOAtentttennlHl
i.#etnnnocFulIrCedntlteeIrCe#Pi#etsn#ielnnp#etnApFAteoaewndIrOAtentttennlHl
leeexthEuSlcA
l.e2lh3lsld
$*$%u}-sEBB5>Ds?>DB?<$5D-$5BF935C-$81B54q335CC-!1B1=5D5BC-v9B5G1<<!?<93I-$D1>41B4!B?69<5-qED8?B9J54q@@<931D9?>C-|9CD
bd:ael*nE::
CegsyeoeRlK
SaEgVeetuARelx
OKxgnEeeyRpeA
a2lv3ldidap.
DtlgeaAelVeReeu
CtygaeAeeKxRreE
\Java\jre-
gFsomeralPri
$?6DG1B5]aaaaaaaaaaaaaaaaa]sEBB5>D'5BC9?>]#E>
e.gteeixrde
/Downs/HelpVer.hlp
/Downs/Help.hlp
Help.hlp
/Private/
Pfile.hlp
gdaheb123
?>D85<9>EH
6D@]DB9@?4]3?=
cy~&|q)
7B9@D?<?:9
6D@]g8?CD]3?=
gdaheb
2f0ibfacab
6D@]2I5D8?CDf]3?=
jusched.
!B?7B1=v9<5C
Fi386\chkesp.c
The value of ESP was not properly saved across a function call. This is usually a result of calling a function declared with one calling convention with a function pointer declared with a different calling convention.
Assertion Failed
Warning
%s(%d) : %s
Assertion failed!
Assertion failed:
_CrtDbgReport: String too long or IO Error
Second Chance Assertion Failed: File %s, Line %d
wsprintfA
user32.dll
Microsoft Visual C++ Debug Library
Debug %s!
Program: %s%s%s%s%s%s%s%s%s%s%s
(Press Retry to debug the application)
Module:
File:
Line:
Expression:
For information on how your program can cause an assertion
failure, see the Visual C++ documentation on asserts.
<program name unknown>
dbgrpt.c
szUserMessage != NULL
Client
Ignore
Normal
Error: memory allocation: bad memory block type.
Invalid allocation size: %u bytes.
Client hook allocation failure.
Client hook allocation failure at file %hs line %d.
dbgheap.c
_CrtCheckMemory()
_pFirstBlock == pOldBlock
_pLastBlock == pOldBlock
fRealloc || (!fRealloc && pNewBlock == pOldBlock)
_BLOCK_TYPE(pOldBlock->nBlockUse)==_BLOCK_TYPE(nBlockUse)
pOldBlock->nLine == IGNORE_LINE && pOldBlock->lRequest == IGNORE_REQ
_CrtIsValidHeapPointer(pUserData)
Allocation too large or negative: %u bytes.
Client hook re-allocation failure.
Client hook re-allocation failure at file %hs line %d.
_pFirstBlock == pHead
_pLastBlock == pHead
pHead->nBlockUse == nBlockUse
pHead->nLine == IGNORE_LINE && pHead->lRequest == IGNORE_REQ
DAMAGE: after %hs block (#%d) at 0x%08X.
DAMAGE: before %hs block (#%d) at 0x%08X.
_BLOCK_TYPE_IS_VALID(pHead->nBlockUse)
Client hook free failure.
memory check error at 0x%08X = 0x%02X, should be 0x%02X.
%hs located at 0x%08X is %u bytes long.
%hs allocated at file %hs(%d).
DAMAGE: on top of Free block at 0x%08X.
DAMAGED
_heapchk fails with unknown return value!
_heapchk fails with _HEAPBADPTR.
_heapchk fails with _HEAPBADEND.
_heapchk fails with _HEAPBADNODE.
_heapchk fails with _HEAPBADBEGIN.
Bad memory block found at 0x%08X.
_CrtMemCheckPoint: NULL state pointer.
_CrtMemDifference: NULL state pointer.
Object dump complete.
crt block at 0x%08X, subtype %x, %u bytes long.
normal block at 0x%08X, %u bytes long.
client block at 0x%08X, subtype %x, %u bytes long.
{%ld}
%hs(%d) :
#File Error#(%d) :
Dumping objects ->
Data: <%s> %s
Detected memory leaks!
Total allocations: %ld bytes.
Largest number used: %ld bytes.
%ld bytes in %ld %hs Blocks.
stdenvp.c
stdargv.c
a_env.c
ioinit.c
runtime error
TLOSS error
SING error
DOMAIN error
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
abnormal program termination
- not enough space for environment
- not enough space for arguments
- floating point not loaded
Microsoft Visual C++ Runtime Library
Runtime Error!
Program:
format != NULL
sprintf.c
string != NULL
vsprintf.c
GetLastActivePopup
GetActiveWindow
MessageBoxA
("inconsistent IOB fields", stream->_ptr - stream->_base >= 0)
_flsbuf.c
str != NULL
`h````
ppxxxx
(null)
output.c
ch != _T('\0')
_getbuf.c
_file.c
osfinfo.c
fclose.c
_freebuf.c
stream != NULL
aa3vd2apeJUt
a3d2peUt
htdocs
GetModuleHandleA
GetLastError
GetSystemTime
MultiByteToWideChar
GetLocaleInfoA
FindClose
FindNextFileA
FindFirstFileA
KERNEL32.dll
MessageBoxA
USER32.dll
GetUserNameW
ADVAPI32.dll
CoUninitialize
CoCreateInstance
CoInitialize
ole32.dll
ExitProcess
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
GetVersion
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
GetProcAddress
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
IsBadWritePtr
IsBadReadPtr
HeapValidate
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
RtlUnwind
SetConsoleCtrlHandler
HeapAlloc
HeapReAlloc
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetFilePointer
SetStdHandle
FlushFileBuffers
CloseHandle
)y)y)y)y)y
)y)y)y)y
y)y)y)y
kkcccccJ)
})y)y)y
kkkkkkkkkkcJ)
)y)y)y)y
sssssssssssssskR1
)y)y)y)y
sssssssssssssssss{{Z9!
)y)y)y)y
!ssssssssssssss{{{{{{{{{ICONMD5.d41b8753
!{{{{{{{{{{{{{{{{{{{{{{{{{{kZ)y
!{{{{{{{{{{{{{{{{{{{{{{{{{{J)y
))sc))y
11kcZ1
RRkck!)y
Zck1)y
9kc!)y
)9{9)y
6666666i777
8(8<8L8^8k8|888888
9)909=9D9Q9X9b9l9v999999999~::::::::
;";,;6;=;J;Q;[;e;r;y;;;;;;;;;;;;<<c=
>2>V>]>n>>>>>>>
0Q2222
3H3O3[3333333
4L4S4_4444444
5"5P5W5c5555657<7H7v7}7777777
898@8L8z8888888
9=9D9P9~999999
:A:H:T:::::::
;E;L;X;;;;
=.====U>>>
?.?E?p????
1G1S1y1111111
2+2l222222223;4W4444444
5%5A5n555555
6-6)7A7]7n7777
88888!9-949Y9e9l999999%:V::::;;
<"<G<S<Z<
<<<<<<<<
= =-=?=c=n=====>>8??
1*161<1L1k11111111222222
33333333
4!4*4A4w4
44444555
6L6t6}6666;77
88W::::::::A;r;~;;;;
=(=M==
,0\0>1J1`111111
2,212@2I2X2m2u22222222
3)3X44444455
6 6,6@6}6666 7J7g7s777777
8F8888
9#979K9_9s999999
:=:I:]:q::!;Q;q;};;;F<Z<f<z<< =&=2=F=Z=====
>5>:>U>\>u>>>P?o?x??????
0=0D0T0[0033333333333333444X5p5w5
55555555
6b6h6l6p6t666
717[77777777777
;;;;;;;;;
<<$<2<L<c<q<<<<<<<<
=(=R=W=a===
>4>E>d>u>>>>
? ?*?:?D?S?e?q?
0#070D0I0O0g0t000000071C1W1111111
2#2P2W2a2u2
3$303^3g33
4$404O4i4u44444444
5$575C55555*6P6
7&727N7Z7{77777
8k8p888
9#9+91979?9E9K9S9d9m99999G;\;h;;;;;;;'<q<v<<<
=h=t=====
>">+>1>7>>>C>h>>>>,?6?B?c??????????
000000)15111111
2$2`2f2222
3)3G3O3U3~3333333
4Q444444H5T55555S6_666
7Q77777777!8&8I8N8v8888
9D9v999
:K:::::::::D;\;;;;<<<
><>H>>>5????
/0g000
111H1z11
3-3333
4,4V4~44
5'5:5N5T5e5p5555555
6,6N6g6
6666667777
8Q888888888
;<H===
>)><>O>>>>
?2?@?S????
060<0Q0
1,121;1P111/2q222
323A3T333333333
4 4'484@4G4M4T4h44
5,55556>6G6]6f666666
7/787?7e7n7777
8%8e8x88;;;;<<<<==
>B>I>O>[>b>n>v>>>>>>
?"?&?*?_?w????
0#0000000000+1:1D1H1L1P1T1X111111111
2 2,262;2@2J2O2U2^2m2z222222
3333!4m4t4455
6#66666666
747K7R7W7]7j7p7v777777<<<<
= =)=9=G=S=d=o=x==============
>%>8>A>>>>
???K?l??
83C3K3u3{333333333333
434:4`4h4)5f<r<{<<<<<<<<<<
= =(=4=;=@=I=Q=\=f=u=~=======
3333446
7"7z777
8m8s8|8888888
9.999?99999999
:/:B:e:u:
:::::::
; ;d;m;w;;;;;<<<<<
=h=w======>>M>b>>>>>>>>
0)0$1-1s1
22#3L3a333X4_4z55
8?9a99>>>>>>>>>>>>>>>
?@?D?H?L?P?T?X?\?`?d?h?l?p?t?x?
h111111111
2 2$2(2r2x2|22222
3 3$3A3k3333333333
4v4{4444444444
5'5:5a55
666;6X6f6s6}6666666
77777'888
999999
::U:o::::::*;
<9<i<s<<<<<<
=>=G=c=l=y=
>!>6>?>K>T>b>k>y>
>>>>>>>>
?6?H?k??????
0(0M0Y0_0u00000
181X1}11111
272E2S2f2v222222
3/3@3J3h3}3333
4_4i44444
505E56666%7;777i8~8888888
9/9A9K9999
:::::::::::::::::
; ;&;,;2;8;>;D;J;P;V;\;b;h;n;t;z;;;;;;;;;;
555555
3 6:::::::::;;;;;;;;;;;;;;
< <(<,<@?D?P?X?
111111
4d74:k?@1l?<BsGHDtGDJ{OPL|OLRWXTWTZ_`\_\bghdgd9f6:8;;kAn>B@CCsIvFJHKK{Q~NRPSSYVZX[[a^b`ccifjhkkqa5ddi<?:i=llqDGBqEttyLOJyM||TWRU\_Z]dgbelojmtwru|
z}d977i<8>lA??qD@FtIGGyLHN|QOOTPVYWW\X^a__d`figglhnqootpvyww|x~
77:ej89m??Bmr@AuGGJuzHI}OOR}PQWWZXY__b`aggjhi32ge:7;<;:omB?CDCBwuJGKLKJ
}ROSTSRZW[\[Zb_cdcbfbh64=:mnjp><EBuvrxFDMJ}~zNLURVT]Z^\ebfdmjnlurvt}z~|
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffiknbe8d7h<kjm@l?pDsruHtGxL{z}P|OTXW\`_dhglpotxw|
e22496g<m::<A>oDuBBDIFwL}JJLQN
TRRTYV\ZZ\a^dbbdifljjlqntrrtyv|zz|~
123:5<>m9:;B=DFuABCJELN}IJKRMTVQRSZU\^YZ[b]dfa48dg=fkk<@loEnssDHtwMv{{LP|
U~TX]\`edhc46h7ki;k<>p?sqCsDFxG{yK{LNOSTVW[\^_cdfgklnostvw{|~
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn423fi;j@<:;nqCrHDBCvyKzPLJK~SXTRS[`\Z[chdbc97895h<>A?@A=pDFIGHIExLNQOPQMTVYWXYU\^a_`a]dfighielnqc7h44fhkk?p<<npssGxDDvx{{OLL~WTT_\\gddollwtt
a:;687i8iBC>@?q@qJKFHGyHyRSNPOPZ[VXWXbc^`_`jkfhghrsnpopz{vxwx~
31;8ek>>;9C@msFFCAKHu{NNKISP}VVSQ[X^^[Yc`ffcake:gijg8mmBoqro@uuJwyzwH}}R
PZXb`jhrpzx
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn4fg649l:<no><AtBDvwFDI|JL~
NLQRTVTYZ\^\abdf1g64<9;i9o><DACqAwFDLIKyI
NLTQSQVT\Y[Y^\daca33;f9fj:;;CnAnrBCCKvIvzJKKS~Q~RSS[YZ[[cabcck9cf45i?:Akn<=qGBIsvDEyOJQ{~LMWRYTU_Za\]gbideojq2647ijjk:><?qrrsBFDGyzz{JNLORVTWZ^\_bf88hieij@@@pqmqrHHHxyuyzPPP}XXX```hhhp192:=h>:9A:BEpFBAIBJMxNJIQJRUVRQYRZ]^ZYaZbefba6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffiknf5d<ef::n=lDmnBBvEtLuvJJ~M|T}~RRU\ZZ]dbbeljjmtrru|zz}
64;f8<h>><Cn@DpFFDKvHLxNNLS~PTVVT[X\^^\c`dffdkhl594i;9=
=A<qCAE
EIDyKIM
MQLSQUUYT[Y]']a\cae/eidk6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn2444:;>8:<<<BCF@BDDDJKNHJLLLRSVPRTTTZ[^XZ\\\bcf`bdf:8e66?inB@m>>GqvJHuFFOy~RP}NNWZXVV_b`^^gjhfforpnnwzxvv
f2e4;76<n:m<C?>DvBuDKGFL~J}LSONTRT[WV\Z\c_^dbdkgfljlsontrt{wv|z|
8549;;9i@=<ACCAqHEDIKKIyPMLQSSQXUTY[[Y`]\accahedikkic6;<678@k>CD>?@HsFKLFGHP{NSTNOPXV[\VWX`^cd^_`hfklfghpnstnopxv{|vwx~~
a235e>9mi:;=mFAuqBCEuNI}yJKM}VQRSU^YZ[]fabcenijkmvqrsu~yz{}6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikncgc7;h<<kok?CpDDswsGKxLL{
{OSTTW[\\_cddgkllosttw{||
6gc<=5l8>okDE=t@FwsLME|HN
{TUMPV\]UX^de]`flmefefgf7l:nmnon?tBvuvwvG|J~}~
~ORWZ_bgjorwz
924<jg::A:<DroBBIBDLzwJJQJLT
RRYRT\ZZaZ\dbbibdljjqbfhi4k6kjnpq<s>srvxyD{F{z~LNTV\^dflntv|~
2b54<>:@:j=<DFBHBrEDLNJPJzMLTVRXRUT\^Z`Z]\dfbhb6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikna7g;5jk8i?oC=rs@qGwKEz{HyO
SMPW[UX_c]`gkehosmpw{ux
6dd955>:>llA==FBFttIEENJN||QMMVRVYUU^Z^a]]fbfiee856fh6gi@=>np>oqHEFvxFwyPMN~N
XUVV`]^^heff762hi<g@?>:pqDoHGFBxyLwPONJT
XWVR\`_^Zdhgfbl6c58:k9<>k=@BsADFsEHJ{ILN{MPRQTVUXZY\^]`badfehj6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffiknbede556>jmlm==>FrutuEEFNz}|}MMNVUUV^]]^feefnmmnvuuv~}}~a69d869<i>Al@>ADqFItHFILyNQ|PNQTVYXVY\^a`^adfihfilnqpnqtvyxvy|~~a1c5=;iii9k=ECqqqAsEMKyyyI{MUSQU][Y]ecaemkimusqu}{y}e43<7k=8m<;D?sE@uDCLG{MH}LKTOUPTS\W]X\[d_e`dclgmhlktoupts|w}x|{
be65:>=8jm>=BFE@ruFEJNMHz}NMRVUPVUZ^]X^]bfe`fejnmhnmrvupvuz~}x~}6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn184;i>hl9@<CqFptAHDKyNx|IPLSVQXT[^Y`\cfadb;dikg:ljClqsoBtrKty{wJ|zS|
R[Zcbkjsr{z
e3;:9>78m;CBAF?@uCKJINGH}KSRQVOPS[ZY^WX[cbaf_`ckjinghksrqvops{zy~wx{
b75iei?>j?=qmqGFrGEyuyONzOM}WVWU_^_]gfgeonomwvwu
8d8f4:l8@l@n<Bt@HtHvDJ|HP|P~LRPXXTZX``\b`hhdjh6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn2b;e4h<m:jCm<pDuBrKuDxL}JzS}LTR[T\Zc\dbf9c;h9<inAkCpADqvIsKxILy~Q{SQTY[Y\acadikilqsqty{y|
b18e9ik@j9@mAqsHrAHuIy{PzIP}QXQXY`Y`ahahipipqxqxyy
4bh4;78m<jp<C?@uDrxDKGH}LzLSOPTT[WX\\c_`dd3gf<7<<k;onD?DDsCwvLGLL{K
~TOTTS\W\\[d_ddc72;9=>=@?:CAEFEHGBKIMNMPOJSQUVUXWR[Y]^]`_Zcaefehgbkimnm6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm5:7:j<;
=B?BrDC
EJGJzLK
MRORTSUZWZ\[']b_bdc/ejgj3176f5ki;9?>n=sqCAGFvE{yKION~MSQWVU[Y_^]cag6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn61e96jl
>9mA>rt
FAuIFz|
NI}QNVQYV'^Ya^/faife795f7l
m?A=n?t
uGIEvG|
}OQM~OWYUW'_a]_/gieg7oqmo?wyuwG
c9:e;=g:kABmCEoBsIJuKMwJ{QR}SU
RYZ[]Zabcebijkmjqrsuryz{}z
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn39e6;h;<;Am>CpCDCIuFKxKLKQ}NSSTSYV[[\[a^ccdcieg8:4==:mo@B<EEBuwHJDMMJ}
PRLUURXZT]]Z`b\eebhjdmmjprluurxzt}}z|
5743ikh@=?<;qspHEGDCy{xPMOLKXUWTS`]_\[hegdc1:eegg9<9BmmooADAJuuwwILIR}}
QTQZY\Ybada49f8hk>><An@psFFDIvHx{NNLQ~PVVTYX^^\a`ffdih72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemmd37f9k:il;?nAsBqtCGvI{Jy|KO~QRSWYZ[_abcgijkoqrswyz{
72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn1f466f>:9n<>>nFBAvDFFvNJI~LNN~VRQTVV^ZY\^^fba6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffiknd53e<<;:l=;mDDCBtECuLLKJ|MK}TTSRUS\\[Z][ddcbecllkjmkttsrus||{z}{
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffiknd53e<<;:l=;mDDCBtECuLLKJ|MK}TTSRUS\\[Z][ddcbecllkjmkttsrus||{z}{
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffiknd53e<<;:l=;mDDCBtECuLLKJ|MK}TTSRUS\\[Z][ddcbecllkjmkttsrus||{z}{
72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffiknd53e<<;:l=;mDDCBtECuLLKJ|MK}TTSRUS\\[Z][ddcbecllkjmkttsrus||{z}{
72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffiknd53e<<;:l=;mDDCBtECuLLKJ|MK}TTSRUS\\[Z][ddcbecllkjmkttsrus||{z}{
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemmd53e<<;:l=;mDDCBtECuLLKJ|MK}TTSRUS\\[Z][ddcbecllkjmkttsrus||{z}{
f698i99>n>A@qAAFvFIHyIIN~NQPQQVVYXYY^^a`aaffihiinnqpqqvvyxyy~~
d53e<<;:l=;mDDCBtECuLLKJ|MK}TTSRUS\\[Z][ddcbecllkjmkttsrus||{z}{
d53e<<;:l=;mDDCBtECuLLKJ|MK}TTSRUS\\[Z][ddcbecllkjmkttsrus||{z}{
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikna58;9j:>i=@CArBFqEHKIzJNyMPSQRVUX[YZ^]`cabfehkijnmpsqrvux{yz~}
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffiknd53e<<;:l=;mDDCBtECuLLKJ|MK}TTSRUS\\[Z][ddcbecllkjmkttsrus||{z}{
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffiknd53e<<;:l=;mDDCBtECuLLKJ|MK}TTSRUS\\[Z][ddcbecllkjmkttsrus||{z}{
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn3d6h459>;l>p<=AFCtFxDEINK|NLMQVSVTUY^[^\]afcf6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffiknd53e<<;:l=;mDDCBtECuLLKJ|MK}TTSRUS\\[Z][ddcbecllkjmkttsrus||{z}{
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikna58;9j:>i=@CArBFqEHKIzJNyMPSQRVUX[YZ^]`cabfehkijnmpsqrvux{yz~}
72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemma58;9j:>i=@CArBFqEHKIzJNyMPSQRVUX[YZ^]`cabfehkijnmpsqrvux{yz~}
72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffiknd53e<<;:l=;mDDCBtECuLLKJ|MK}TTSRUS\\[Z][ddcbecllkjmkttsrus||{z}{
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn49e34==m<Am;<EEuDIuCDMM}LQ}KLUUTYST]]\a[\eedicd53e<<;:l=;mDDCBtECuLLKJ|MK}TTSRUS\\[Z][ddcbecllkjmkttsrus||{z}{
@I@@@@@@@
(null)
((((( H
VS_VERSION_INFO
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
FileVersion
6.0.150.3
InternalName
jusched
LegalCopyright
Copyright
LegalTrademarks
OriginalFilename
jusched
PrivateBuild
Sun Microsystems, Inc.
ProductName
Java(TM) Platform SE 6 U15
ProductVersion
6.0.150.3
SpecialBuild
VarFileInfo
Translation

Process Tree


036b6b8cfd6788f7fe113577777fa72a97d3572d21cb9e843f93c6f92652d899.exe, PID: 2236, Parent PID: 1808

default registry file network process services synchronisation iexplore office pdf

explorer.exe, PID: 1412, Parent PID: 1304

default registry file network process services synchronisation iexplore office pdf

jusched.exe, PID: 2656, Parent PID: 2236

default registry file network process services synchronisation iexplore office pdf

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138
192.168.56.101 58485 114.114.114.114 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name 542c50e8f751a5b6_update23.job
Filepath C:\Windows\Tasks\Update23.job
Size 258.0B
Processes 2236 (036b6b8cfd6788f7fe113577777fa72a97d3572d21cb9e843f93c6f92652d899.exe)
Type VAX-order 68k Blit mpx/mux executable
MD5 bac139297d6ace82a220a0a7a694452c
SHA1 273fb41c4ccb0b83e812f73a40e84f1bb55b432c
SHA256 542c50e8f751a5b6968e0bc328021311b72d94c605216886b83505a68ccca184
CRC32 62FBB24A
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 2f227133033fef36_jusched.exe
Filepath C:\Program Files (x86)\e8fdc9ff\jusched.exe
Size 199.7KB
Processes 2236 (036b6b8cfd6788f7fe113577777fa72a97d3572d21cb9e843f93c6f92652d899.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 07787c8fcbbd233683a41363cecda324
SHA1 750aa4e5e40a0afe034afdec8887ae4bf811018d
SHA256 2f227133033fef36afe89ebece42940b038b251dd260e7fb819e8117ad16cffa
CRC32 3F50D52D
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name c38eaf396f17d9e3_e8fdc9ff
Filepath C:\Program Files (x86)\e8fdc9ff\e8fdc9ff
Size 30.0B
Processes 2236 (036b6b8cfd6788f7fe113577777fa72a97d3572d21cb9e843f93c6f92652d899.exe)
Type ASCII text, with CRLF line terminators
MD5 06249e17b9f12cc7d1b77be31b0d15f7
SHA1 14ed57e3993a74fad062dcbaeb448a2ac3cf14ec
SHA256 c38eaf396f17d9e3d2eb6e263f34626dc9505be5e76991fd651ce7c00e7e0dd0
CRC32 67217F19
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.