1.2
低危

17ce1efb149783d0d7217426f7494573ba83e74f032c7b4c961dbac129108142

17ce1efb149783d0d7217426f7494573ba83e74f032c7b4c961dbac129108142.exe

分析耗时

192s

最近分析

382天前

文件大小

206.4KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN BACKDOOR URELAS
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.82
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Kryptik-NJO [Trj] 20200610 18.4.3895.0
Baidu Win32.Trojan.Urelas.a 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200610 2013.8.14.323
McAfee GenericRXGX-ON!195AB3236EF1 20200610 6.0.6.653
Tencent Malware.Win32.Gencirc.10b0c5a8 20200610 1.0.0.1
行为判定
动态指标
在 PE 资源中识别到外语 (2 个事件)
name RT_DIALOG language LANG_KOREAN filetype None sublanguage SUBLANG_KOREAN offset 0x00024bc0 size 0x00000168
name RT_VERSION language LANG_KOREAN filetype None sublanguage SUBLANG_KOREAN offset 0x00034c70 size 0x000002c8
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 57 个反病毒引擎识别为恶意 (50 out of 57 个事件)
ALYac Gen:Variant.Zusy.298375
APEX Malicious
AVG Win32:Kryptik-NJO [Trj]
Acronis suspicious
Ad-Aware Gen:Variant.Zusy.298375
AhnLab-V3 Malware/Win32.Generic.C2791258
Antiy-AVL Trojan[Backdoor]/Win32.Plite
Arcabit Trojan.Zusy.D48D87
Avast Win32:Kryptik-NJO [Trj]
Avira HEUR/AGEN.1115210
Baidu Win32.Trojan.Urelas.a
BitDefender Gen:Variant.Zusy.298375
BitDefenderTheta Gen:NN.ZexaF.34128.mq1@aq4aMEdO
CAT-QuickHeal Trojan.Beaugrit.17908
ClamAV Win.Malware.Urelas-6717394-0
Comodo TrojWare.Win32.Urelas.SH@5674sp
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.36ef1b
Cylance Unsafe
Cynet Malicious (score: 100)
Cyren W32/S-be2a1965!Eldorado
DrWeb Trojan.DownLoader11.31199
ESET-NOD32 a variant of Win32/Urelas.U
Emsisoft Gen:Variant.Zusy.298375 (B)
Endgame malicious (high confidence)
F-Prot W32/S-be2a1965!Eldorado
F-Secure Heuristic.HEUR/AGEN.1115210
FireEye Generic.mg.195ab3236ef1b7b0
Fortinet W32/Urelas.U!tr
GData Gen:Variant.Zusy.298375
Ikarus Trojan.Win32.Urelas
Invincea heuristic
Jiangmin Backdoor.Plite.pv
K7AntiVirus Backdoor ( 0053e8561 )
K7GW Backdoor ( 0053e8561 )
Kaspersky Backdoor.Win32.Plite.bhtm
MAX malware (ai score=85)
Malwarebytes Trojan.Urelas
McAfee GenericRXGX-ON!195AB3236EF1
McAfee-GW-Edition BehavesLike.Win32.Fujacks.dt
MicroWorld-eScan Gen:Variant.Zusy.298375
Microsoft Trojan:Win32/Urelas.AA
NANO-Antivirus Trojan.Win32.Urelas.denlvn
Panda Trj/Genetic.gen
Rising Trojan.Urelas!1.BB69 (RDMK:cmRtazpl7VblJwFCSVBzrASw7bpF)
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos Troj/Urelas-Q
Symantec ML.Attribute.HighConfidence
Tencent Malware.Win32.Gencirc.10b0c5a8
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2014-09-07 19:17:05

PE Imphash

5f1929a8ca007a58d8921624c4dd5b88

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.MPRESS1 0x00001000 0x00027000 0x00024400 4.0950634734460065
.MPRESS2 0x00028000 0x00001000 0x00000e00 5.748660389439606
.rsrc 0x00029000 0x0000d000 0x0000c200 4.319076419078424
.imports 0x00036000 0x00001000 0x00000800 4.4167791778432015

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x000345e8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x000345e8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x000345e8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x000345e8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x000345e8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x000345e8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x000345e8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x000345e8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x000345e8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x000345e8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x000345e8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x000345e8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x000345e8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x000345e8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x000345e8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x000345e8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_DIALOG 0x00024bc0 0x00000168 LANG_KOREAN SUBLANG_KOREAN None
RT_STRING 0x00024d28 0x0000004e LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_GROUP_ICON 0x00034bb8 0x00000076 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_GROUP_ICON 0x00034bb8 0x00000076 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_VERSION 0x00034c70 0x000002c8 LANG_KOREAN SUBLANG_KOREAN None
RT_MANIFEST 0x00034f78 0x0000015a LANG_ENGLISH SUBLANG_ENGLISH_US None

Imports

Library KERNEL32.dll:
0x411020 GetSystemDirectoryW
0x411024 DeleteFileW
0x411028 GetModuleFileNameW
0x41102c GetTickCount
0x411030 GetVersionExW
0x411034 ReadFile
0x411038 CreateFileW
0x41103c DeviceIoControl
0x411040 GetTempPathA
0x411044 GetModuleFileNameA
0x411048 HeapAlloc
0x41104c GetProcessHeap
0x411050 HeapFree
0x411054 MultiByteToWideChar
0x411058 HeapReAlloc
0x41105c LCMapStringW
0x411060 HeapSize
0x411064 CreateFileA
0x411068 GetFileAttributesW
0x41106c LoadLibraryW
0x411070 WriteConsoleW
0x411074 FlushFileBuffers
0x41107c SetStdHandle
0x411080 CreateThread
0x411084 CreateEventW
0x411088 CloseHandle
0x41108c OpenEventW
0x411090 GetTempPathW
0x411094 GetStringTypeW
0x411098 IsValidCodePage
0x41109c GetOEMCP
0x4110a0 GetACP
0x4110a4 GetCPInfo
0x4110a8 RaiseException
0x4110ac SetFilePointer
0x4110b4 GetCurrentProcessId
0x4110bc HeapCreate
0x4110c4 GetCurrentThreadId
0x4110c8 ExitProcess
0x4110cc Sleep
0x4110d0 GetCommandLineW
0x4110d4 HeapSetInformation
0x4110d8 GetStartupInfoW
0x4110dc GetLastError
0x4110e0 TerminateProcess
0x4110e4 GetCurrentProcess
0x4110f0 IsDebuggerPresent
0x4110f4 EncodePointer
0x4110f8 DecodePointer
0x411108 RtlUnwind
0x41110c WriteFile
0x411110 WideCharToMultiByte
0x411114 GetConsoleCP
0x411118 GetConsoleMode
0x41111c GetProcAddress
0x411120 GetModuleHandleW
0x411124 GetStdHandle
0x411130 SetHandleCount
0x411134 GetFileType
0x41113c TlsAlloc
0x411140 TlsGetValue
0x411144 TlsSetValue
0x411148 TlsFree
0x411150 SetLastError
0x411154 SetEndOfFile
Library USER32.dll:
0x411168 LoadIconW
0x41116c RegisterClassExW
0x411170 CreateWindowExW
0x411174 DefWindowProcW
0x411178 BeginPaint
0x41117c LoadAcceleratorsW
0x411180 LoadStringW
0x411184 LoadCursorW
0x411188 wsprintfW
0x41118c PostQuitMessage
0x411190 EndPaint
Library ADVAPI32.dll:
0x411000 RegQueryValueExW
0x411004 RegSetValueExW
0x411008 RegCloseKey
0x41100c RegOpenKeyExW
Library SHELL32.dll:
0x41115c ShellExecuteA
0x411160 ShellExecuteW
Library WS2_32.dll:
0x411198 WSAStartup
0x41119c htonl
0x4111a0 gethostbyaddr
0x4111a4 socket
0x4111a8 gethostbyname
0x4111ac inet_addr
0x4111b0 htons
0x4111b4 connect
0x4111b8 closesocket
0x4111bc send
0x4111c0 recv
0x4111c4 WSAGetLastError
Library IPHLPAPI.DLL:

L!Win32 .EXE.
.MPRESS1
.MPRESS2
.imports
jgVjdh
t$f=LwA
EEjlPE
^]ULHPA
^L$H35
^L$H35
3^L$H35
L$L^33d5
ESW3j>PMQfEn
3_[M34
j@h&yA
ESVW3h
EEEEEEfE
uSQURPj
M_^33[
ESVW3h
EEEEEEfEfPwA
ESVW3h
tfHtCHt
MSMPu$
M_33^+
MSMPu$
M_33^)
ESVW3h
_^[M3'
MSMPfl3
trhptA
fu+t,h
ESVW3h
PrQfpO]
RjPfh1]
3_^[M3
]3j>PMQfEC\
3j>RzPfx(\
fuff0f
fuf4f:f
M_^3[y
VRhd2A
EEEEEEfEE3j
EEPMMQh
_GBPuD
f;u+t#}
_^[]3EEUREEEPh
f;u+uSj'
_^3[]U
E3VWfME
EEEEfEE
]U@HPA
fMMMMMfM^xZj
]U$HPA
EEEEEEfE
@uVW+OO
MQRE_&
|_[^]U
^3[]Wh`3A
tVMQVj
3Eou2}
_^[]_^[]
3hUQSWj
~PFJWP
u VVjRVV
GWVjRj
MMMMfMM
3VWp3A
EEEEfEEx
u-;u)NwA
3M_^3[
M_^3[S
u+u'S~
E^[]U
M_^3[.
VW(,4t
0_^[M3
M_^3[;
U SW3j
3Y}]9]
;tV;|BMx
YYt"Mx
39]fD~
;t3f9>
}f9;u
jEPhHPA
;Ew[PuV4
E+)E$V,
}O;]rOt
u+WuV1
M+;rP})E
YYt)EF
YY]jXh <A
fu3_[]
f_^]UW}
CB;r]}
]8u S
jEPhHPA
YYuf-u
[u-VgX
RPjjEUHZ
M]EUVW
Yu)jAXf;w
E;ErDE9Eu
3;Er0w
QuuuWY
u>9ur9w
`p33_^[
U]/UVu
USV3;u
;r3_^[]
U SW3j
3Y}]9]
;t5;|"Mx
ffffffE
YM_3[>
3PPPPP
t4+t$+t
ItQht@lt
3F tBP
itnnt$o
PWP5D]A
PW5P]A
PW5L]A
|j0XfQfW
t-RPWSG
j0O,Yt
j OWYt
`pM_^3[
1 B0RA
;r" TA
;r= TA
at0rt#wt
f9>tf>=uu
f> t3f9>t
Y]3u;5A
+SVWHPA
1E3PeuEEEEd
Y__^[]Q
:E_^[]E
9csmu)=
URPQQhx@
t;T$4t
;v.4v\
UVWS33333[_^]
33333USVWj
_^[]Ul$
Yt$WV!
jXEU;u
Ht%CT1
\3_[^j
W>+~,WPVYPU
Y/V|Yt
Y}3u;5A
tVPV%YY3BU
4V.YYE
W34809}
;u;8!
4 3,9E
P4UM`8
DQP C@
,PVEP$
3+4H;M
(PVHP$
(PVHP$
r3VVhU
QH++PPVh
(P+P5P$
\,+48;E
0?DY1$
8+0[M_3^
DDDDDDDDDDDDDD
8csmu*x
YYuTVWh
3]j h=A
3PPPPPpVBO
@Y<v*V5O
^SSSSSyj
;tFtA3
S^`N`H
j$Y~\d9
QY^`[_^]
3Y[_^5bA
3PPPPP
UQV3W}
ft;uf t
Bf8\tf8"u8
ft$9Uu
UQQSVWh
V33SfjA
[]YY?sJM
_[^SVW
j@j ^VC,
H3H/5~A
;rSWf9M
YYt:V5UA
P YF,t
YYt0V5UA
E3E3;u
<at,<rt"<wt
F> t>=unF> tj
WPWPWv
whu;5YA
8]tEMap<u
TM_^3[j
M`}_hu
PCY^hS=L
Y%u UA
3W;to=^A
t4V0;t(W8jYt
Fpt"~l
lVYYYEE
f;rJvf;
f;rJvf;
f;rJvf;
Jvf;rgQ
Pf;rSPf;
t4+t$HHt
ItUhtDlt
HHt$HHt
itxnt*o
PSP5D]A
PS5P]A
PS5L]A
t-RPWS0
0@@If8
u69t.EPs
`pM_^3[
EU_^j
VUY@UA
t.VDYt"V8
Yt.VYt"V
]39}~0N
D=VPYYtG;}|fE
YYM_^3[
VW3,]A
YYu,9E
tAt2t$
E`p;39]
VW38kA
F$|3@_^
Z3G}39
tCHt(Ht M
Y+t7+t*+t
3t(;t$;t
t$;t)k
^0_^[E
uEPuuu
uEuPuuu
$ MeHMu
tWWW6#
JWWW6o
[+PD=P6>
EUSSSSSj
9}t(9}t
tDft?f;t8EP
Vuy39E
B(;r3_^[]
Ujh(?A
SVWHPA
1E3PEd
Y_^[]USVWUj
P(RP$R
UPjh @
t:|$,t
;t$,v-4v
UQPXY]Y[
S3VW;|[;
t6<0t0=
u}uyG,j@j EYYEta
FGIuX^_]
Y+t"+t
+tY+uC(}
Uw\]Yp
u>OdMGd
uwdSUY
t?P5lA
3M_^3[3e
ft'Ou"+
jPfDJXdf
tCHt(Ht }
Y+t7+t*+t
3t(;t$;t
^0|_^[E
uEPuuu
uEuPuuu
$ MeHMu~
tWWW6#
JWWW6!
[+PD=P6
EVSSSSSvj
9}t(9}t
M$m39]
MfMf;u!f;t
E`p3^_[
H8]tMapUj
E`p3^[_
S3VW;~E
@;u+H;}
39](SSu
]9]tWuu
};~Bj3X
3;t?uWuuu
t"SS9] u
EYe_^[M38U
Mifu(Eu$u u
UQQHPA
ES3VW]9]
39] SSu
ESEYe_^[M3
M<eu$Eu
a_6Z_v R_v$J_v(B_v,:_v02_v4*_v
_vD^vH^vL^vP^vT^vX^v\^v`^vd^vh^vl^vp^vt^vx^v|^@
P[YF0;
P[Yv4;5^A
PX[YF ;
PF[YF$;
P4[YF8;
P"[YF<;
PZYFD;
PZYFH;
PZYvL;5^A
VZY^]UV3PPPPPPPPU
rustnM
tR:QuMPt<:Qu7Pt&:Qu!Pt
@FA;r3^[
+UV3PPPPPPPPU
^0egVu
f;v6;t
Map_^[;t&;w Kgj"^0f8]tE`py
<E`p0M
YUY]Vu
UY3MW0u
L1$!_^[u
Map^[3PPj
E`p]Ex
tAMap8+
;t+3_^[
EPQEPEj
RQMQVp
Map^[UWVSM
WVS3D$
KERNEL32.dll
GetSystemWindowsDirectoryW
GetSystemDirectoryW
DeleteFileW
GetModuleFileNameW
GetTickCount
GetVersionExW
ReadFile
CreateFileW
DeviceIoControl
GetTempPathA
GetModuleFileNameA
HeapAlloc
GetProcessHeap
HeapFree
MultiByteToWideChar
HeapReAlloc
LCMapStringW
HeapSize
CreateFileA
GetFileAttributesW
LoadLibraryW
WriteConsoleW
FlushFileBuffers
IsProcessorFeaturePresent
SetStdHandle
CreateThread
CreateEventW
CloseHandle
OpenEventW
GetTempPathW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RaiseException
SetFilePointer
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
HeapCreate
InterlockedDecrement
GetCurrentThreadId
ExitProcess
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetLastError
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetProcAddress
GetModuleHandleW
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
SetEndOfFile
USER32.dll
LoadIconW
RegisterClassExW
CreateWindowExW
DefWindowProcW
BeginPaint
LoadAcceleratorsW
LoadStringW
LoadCursorW
wsprintfW
PostQuitMessage
EndPaint
lADVAPI32.dll
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
SHELL32.dll
ShellExecuteA
ShellExecuteW
WS2_32.dll
LIPHLPAPI.DLL
GetAdaptersAddresses
8Muex<
KERNEL32
VirtualProtect
G(XPTPjxWXt=
bad allocation
CorExitProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
UTF-16LE
UNICODE
Unknown exception
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
(null)
`h````
xpxxxx
`h`hhh
xppwpp
GetProcessWindowStation
GetUserObjectInformationW
GetLastActivePopup
GetActiveWindow
MessageBoxW
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__eabi
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
sanfdr.bat
:Repeat
if exist "
" goto Repeat
rmdir "
%d.%d.%d.%d
112.175.88.208
112.175.88.209
112.175.88.209
112.175.88.209
112.175.88.209
.?AVbad_alloc@std@@
.?AVexception@std@@
.?AVtype_info@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
218.54.31.226
PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADD
GetModuleHandleA
GetProcAddress
KERNEL32.DLL
USER32.dll
EndPaint
ADVAPI32.dll
RegCloseKey
SHELL32.dll
ShellExecuteA
WS2_32.dll
IPHLPAPI.DLL
GetAdaptersAddresses
lQ+QQQf
UWVS|$
t$dD$\
T$L3;\$L
t$t#t$lD$`T$x
D$t#D$hl$x
D$t+D$\$
D$@d$@L$@
;s#D$H
t".)D$H+r
)D$H+r
L$H+t$`+
T$8L$PL$xf
D$\l$TD$X3|$`
D$`L$D
;s`)L$4|$4
t$4D$H|$t
D$`D$t+D$\
l$8f++
D$T&++f
T$TD$PT$PL$XL$Tl$\D$\l$X3|$`
;s/D$H
;s;D$H
)D$H+f
t$(Nt$(uL$0
T$,|$`
)D$H+f
l$$Ml$$uP
)D$H+f
$L$ d$
p4$Ft$\tZL$
9l$\w`$
BD$tIt
wwwwwwwwwwwwwwwpxpx
pxwwwwwwwwwwwwwxpxpxDDDDDDDDD@
pxDDDDDDDDDH
pxDDDDDDDDDH
pxDDDDDDDDDDDDDDpxpwwwwwwwwwwwwwwwp
wwwwwwwpxpxpxpxpxpxpxpxwwwwwwpxDDDpxDDDDDDpxpwwwwwwww
%%$$"#"#"#*+()''&&??<=9;7A63[4]5mm]5\]m]mm5\mm5555555\\\5\\\5m\55\\5ed:cOXY/P.Z0.0.QR00/ZPP0000000/0PPZR.BI@/DE0,
CWkV21TSav^8{
}>qooggggggg1`_fhsnHK{JLp
Gl-FjNw~ytMMMMMMUbbrrrrrxxxxxxxxrriUMMMMMMMMMUuzt
.#%-0%:?%9>%8=%7;
EG@DF@MO@LN2Kh2\g2]f2[I3')+*+)))*))()*+++,6J!54 CBAjYPQTVTSkllZTTXRTUiHceWda/
iu`_<bmt^}zy|yx~
{|yvrrwsqpon
PPPPPPPPPPPPPPPPPKMNNNNNNNNNNOLO
JHHGGGGGGGGHI
JEEEEEEEEEEFC
JEEEEEEEEEEFC
JEEEEEEEEEEFD
JEFEEEEEEEEEB
O%JEEEEEEEEEFFB
JJIIIIJIIIIJJ
O(@>=77A779?<8;$O'
)O6530./21+*-,4#4PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP
Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'H#P'Q'Q'Q'Q'
R&R&R'R&R&R&R&R&Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'R'
e)qjiPt
{rFpcq
S^EDIID:BI638?@=>>=======8,00-.(',0-0178
S(O$N!N!N!N!N"M"M"M"M"M"M"M"M"M"M"M"M"M"M"M"M"N"M"M"O$S)O"
QDf>.j~ro
*V=;?73?//87566-&*'!+3$357_
OO&F#C!C!C!C!C!C!C!C!C!C!
A E$R(
x(s o7|WRzW
wwwwwwwwwwwwwwwpxpx
pxwwwwwwwwwwwwwxpxpxDDDDDDDDD@
pxDDDDDDDDDH
pxDDDDDDDDDH
pxDDDDDDDDDDDDDDpxpwwwwwwwwwwwwwwwp
wwwwwwwpxpxpxpxpxpxpxpxwwwwwwpxDDDpxDDDDDDpxpwwwwwwww
%%$$"#"#"#*+()''&&??<=9;7A63[4]5mm]5\]m]mm5\mm5555555\\\5\\\5m\55\\5ed:cOXY/P.Z0.0.QR00/ZPP0000000/0PPZR.BI@/DE0,
CWkV21TSav^8{
}>qooggggggg1`_fhsnHK{JLp
Gl-FjNw~ytMMMMMMUbbrrrrrxxxxxxxxrriUMMMMMMMMMUuzt
.#%-0%:?%9>%8=%7;
EG@DF@MO@LN2Kh2\g2]f2[I3')+*+)))*))()*+++,6J!54 CBAjYPQTVTSkllZTTXRTUiHceWda/
iu`_<bmt^}zy|yx~
{|yvrrwsqpon
PPPPPPPPPPPPPPPPPKMNNNNNNNNNNOLO
JHHGGGGGGGGHI
JEEEEEEEEEEFC
JEEEEEEEEEEFC
JEEEEEEEEEEFD
JEFEEEEEEEEEB
O%JEEEEEEEEEFFB
JJIIIIJIIIIJJ
O(@>=77A779?<8;$O'
)O6530./21+*-,4#4PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP
Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'H#P'Q'Q'Q'Q'
R&R&R'R&R&R&R&R&Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'Q'R'
e)qjiPt
{rFpcq
S^EDIID:BI638?@=>>=======8,00-.(',0-0178
S(O$N!N!N!N!N"M"M"M"M"M"M"M"M"M"M"M"M"M"M"M"M"N"M"M"O$S)O"
QDf>.j~ro
*V=;?73?//87566-&*'!+3$357_
OO&F#C!C!C!C!C!C!C!C!C!C!
A E$R(
x(s o7|WRzW
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
KERNEL32.dll
GetSystemWindowsDirectoryW
GetSystemDirectoryW
DeleteFileW
GetModuleFileNameW
GetTickCount
GetVersionExW
ReadFile
CreateFileW
DeviceIoControl
GetTempPathA
GetModuleFileNameA
HeapAlloc
GetProcessHeap
HeapFree
MultiByteToWideChar
HeapReAlloc
LCMapStringW
HeapSize
CreateFileA
GetFileAttributesW
LoadLibraryW
WriteConsoleW
FlushFileBuffers
IsProcessorFeaturePresent
SetStdHandle
CreateThread
CreateEventW
CloseHandle
OpenEventW
GetTempPathW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RaiseException
SetFilePointer
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
HeapCreate
InterlockedDecrement
GetCurrentThreadId
ExitProcess
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetLastError
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetProcAddress
GetModuleHandleW
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
SetEndOfFile
USER32.dll
LoadIconW
RegisterClassExW
CreateWindowExW
DefWindowProcW
BeginPaint
LoadAcceleratorsW
LoadStringW
LoadCursorW
wsprintfW
PostQuitMessage
EndPaint
ADVAPI32.dll
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
SHELL32.dll
ShellExecuteA
ShellExecuteW
WS2_32.dll
IPHLPAPI.DLL
GetAdaptersAddresses
UTF-16LE
UNICODE
mscoree.dll
runtime error
TLOSS error
SING error
DOMAIN error
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
- abort() has been called
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
AMicrosoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
KERNEL32.DLL
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
(null)
WUSER32.DLL
((((( H
h(((( H
H
CONOUT$
%s%s.exe
\\.\%s
\\.\PHYSICALDRIVE
%d.%d.%d.%d
golfinfo.ini
golfset.ini
golfinfo.ini
HGDraw.dll
112.175.88.208
112.175.88.207
112.175.88.208
112.175.88.208
Software\Microsoft\Windows NT\CurrentVersion\Windows
112.175.88.208
golfset.ini
fiotre.exe
hoidyet
112.175.88.207
112.175.88.208
112.175.88.208
Software\Microsoft\Windows NT\CurrentVersion\Windows
TrayKey
ahnlab
%s.exe
ahnlab
%s.exe
Software\Microsoft\Windows NT\CurrentVersion\Windows
TrayKey
\Hangame\KOREAN\HanUninstall.exe
\NEOWIZ\PMang\common\PMLauncher.exe
\Netmarble\Common\NetMarbleEndWeb.exe
\Program Files\AhnLab\V3Lite30\V3Lite.exe
\Program Files\ESTsoft\ALYac\AYLaunch.exe
\Program Files\naver\NaverAgent\NaverAgent.exe
WinSeven
WinVista
UnKnown
Dialog
MS Shell Dlg
Check1
MfcLink
MfcLink1
Split1
msctls_progress32
hokdisu
NIKHHUSTDHDGHSFS
'(,,--.000013
167888:=>=@?BDEIIIS^
;@Qbcbbo
!&'*+-
*//33565778;=?
x$&*++,--/046I
ssssss
sssssssss
YLFCEDECCCDCCECCDEEECIS@JIB
fkmknnnm
nnmmlnooi
'(,,--.000013
167888:=>=@?BDEIIIS^
;@Qbcbbo
!&'*+-
*//33565778;=?
x$&*++,--/046I
ssssss
sssssssss
YLFCEDECCCDCCECCDEEECIS@JIB
fkmknnnm
nnmmlnooi
VS_VERSION_INFO
StringFileInfo
041204b0
CompanyName
TODO: <
FileDescription
TODO: <
FileVersion
1.0.0.1
InternalName
AppleDown.exe
LegalCopyright
Copyright (C) 2014
OriginalFilename
AppleDown.exe
ProductName
TODO: <
ProductVersion
1.0.0.1
VarFileInfo
Translation

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.