1.4
低危

1b04dfb98e0582262ef5b017e18dab2d9754dd1ca437c31606da1d21418f4db5

1b04dfb98e0582262ef5b017e18dab2d9754dd1ca437c31606da1d21418f4db5.exe

分析耗时

194s

最近分析

367天前

文件大小

52.7KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER UPATRE
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.74
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Malware-gen 20191026 18.4.3895.0
Baidu Win32.Trojan.Kryptik.jr 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20191026 2013.8.14.323
McAfee GenericRXIK-MI!1D1390ECF048 20191026 6.0.6.653
Tencent None 20191026 1.0.0.1
行为判定
动态指标
该二进制文件可能包含加密或压缩数据,表明使用了打包工具 (1 个事件)
section {'name': 'UPX1', 'virtual_address': '0x0000b000', 'virtual_size': '0x00003000', 'size_of_data': '0x00002200', 'entropy': 7.4677168355624035} entropy 7.4677168355624035 description 发现高熵的节
可执行文件使用UPX压缩 (2 个事件)
section UPX0 description 节名称指示UPX
section UPX1 description 节名称指示UPX
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 55 个反病毒引擎识别为恶意 (50 out of 55 个事件)
ALYac Trojan.Downloader.JRZA
APEX Malicious
AVG Win32:Malware-gen
Acronis suspicious
Ad-Aware Trojan.Downloader.JRZA
AhnLab-V3 Trojan/Win32.Upatre.R288149
Antiy-AVL Trojan[Downloader]/Win32.Upatre
Arcabit Trojan.Downloader.JRZA
Avast Win32:Malware-gen
Avira TR/Spy.Zbot.sbboqv
Baidu Win32.Trojan.Kryptik.jr
BitDefender Trojan.Downloader.JRZA
ClamAV Win.Downloader.Upatre-5744092-0
Comodo TrojWare.Win32.TrojanDownloader.Upatre.DOM@5st38w
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.cf0485
Cylance Unsafe
Cyren W32/Upatre.KP.gen!Eldorado
DrWeb Trojan.Upatre.5278
ESET-NOD32 a variant of Win32/Kryptik.GVBD
Emsisoft Trojan.Downloader.JRZA (B)
Endgame malicious (high confidence)
F-Prot W32/Upatre.KP.gen!Eldorado
F-Secure Trojan.TR/Spy.Zbot.sbboqv
FireEye Generic.mg.1d1390ecf048521c
Fortinet W32/Kryptik.DQAA!tr
GData Win32.Trojan.Kryptik.CA
Ikarus Trojan.Win32.Crypt
Invincea heuristic
Jiangmin TrojanDownloader.Upatre.rqi
K7AntiVirus Trojan ( 00554e8d1 )
K7GW Trojan ( 00554e8d1 )
Kaspersky Trojan-Spy.Win32.Zbot.zrzb
MAX malware (ai score=89)
MaxSecure Trojan.Upatre.Gen
McAfee GenericRXIK-MI!1D1390ECF048
McAfee-GW-Edition BehavesLike.Win32.Pluto.qm
MicroWorld-eScan Trojan.Downloader.JRZA
Microsoft TrojanDownloader:Win32/Upatre!rfn
NANO-Antivirus Trojan.Win32.Kryptik.dtrwge
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM02.0.CEB5.Malware.Gen
Rising Trojan.Waski!1.A489 (CLASSIC)
SUPERAntiSpyware Trojan.Agent/Gen-Upatre
SentinelOne DFI - Malicious PE
Sophos Troj/Kryptik-JN
Symantec Downloader.Upatre
Trapmine malicious.high.ml.score
TrendMicro TROJ_UPATRE.TOMB00000005
TrendMicro-HouseCall TROJ_UPATRE.TOMB00000005
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2014-07-30 14:18:20

PE Imphash

1d4a1b4cd524c16b61e652ff6a68afd1

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
UPX0 0x00001000 0x0000a000 0x00003a00 5.470575566862463
UPX1 0x0000b000 0x00003000 0x00002200 7.4677168355624035
.rsrc 0x0000e000 0x00005000 0x00004c00 5.238907526822473
.imports 0x00013000 0x00001000 0x00000400 4.547025274747384

Resources

Name Offset Size Language Sub-language File type
RT_CURSOR 0x0000e23c 0x00000134 LANG_POLISH SUBLANG_DEFAULT None
RT_BITMAP 0x0000e458 0x000000e8 LANG_POLISH SUBLANG_DEFAULT None
RT_BITMAP 0x0000e458 0x000000e8 LANG_POLISH SUBLANG_DEFAULT None
RT_ICON 0x0000e544 0x00004228 LANG_POLISH SUBLANG_DEFAULT None
RT_DIALOG 0x00012770 0x00000062 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_GROUP_CURSOR 0x000127d8 0x00000014 LANG_POLISH SUBLANG_DEFAULT None
RT_GROUP_ICON 0x000127f0 0x00000014 LANG_POLISH SUBLANG_DEFAULT None
RT_MANIFEST 0x00012808 0x0000020f LANG_POLISH SUBLANG_DEFAULT None

Imports

Library KERNEL32.DLL:
0x404010 FindFirstFileW
0x404014 GetLastError
0x404018 lstrcpynA
0x40401c lstrlenA
0x404020 GetModuleHandleA
0x404024 LoadLibraryA
0x404028 FindClose
0x40402c GetStartupInfoA
0x404030 CreateDirectoryW
0x404034 Sleep
0x404038 FindNextFileW
0x40403c GlobalAlloc
0x404040 WaitForSingleObject
0x404044 CreateThread
0x404048 TerminateThread
0x40404c CreateMutexW
0x404050 ReleaseMutex
0x404054 GlobalSize
Library COMCTL32.dll:
0x404000 None
Library GDI32.dll:
0x404008 TextOutA
Library MSVCRT.dll:
0x40405c _controlfp
0x404060 _except_handler3
0x404064 __set_app_type
0x404068 __p__fmode
0x40406c __p__commode
0x404070 _adjust_fdiv
0x404074 __setusermatherr
0x404078 _initterm
0x40407c __getmainargs
0x404080 __p__acmdln
0x404084 exit
0x404088 _XcptFilter
0x40408c _exit
0x404090 ??2@YAPAXI@Z
0x404094 ??3@YAXPAX@Z
Library USER32.dll:
0x40409c GetMessageA
0x4040a0 TranslateMessage
0x4040a4 RegisterClassExA
0x4040a8 LoadAcceleratorsA
0x4040ac LoadCursorA
0x4040b0 LoadIconA
0x4040b4 LoadStringA
0x4040b8 CreateWindowExA
0x4040bc PostQuitMessage
0x4040c0 EndPaint
0x4040c4 BeginPaint
0x4040c8 DefWindowProcA
0x4040cc DialogBoxParamA
0x4040d0 DestroyWindow
0x4040d4 PostMessageA
0x4040d8 SendMessageA
0x4040dc SetWindowTextA
0x4040e0 EndDialog
0x4040e8 DispatchMessageA

L!This program cannot be run in DOS mode.
7"aich
.imports
qi57vvG=
si57uuh.
vGuv57iu~
vGtih.
uqu57vvG=
vGtih.
vGqih.
rv57vqh.
qi57iuw
GG0vd8^,O|<
HH6e@6md
X?0BDgHC,w
)JRk7oZmHk
6{G{N.Z,C[K
sbW0ED}s0tei
7teD/.K
.20,_G([
3DZGpG0
q./n1PFr Z
e25{.CC
G8^Kn:0d1[Sd(1d1w.k6!
wViSiI^
DuakHDdm
S._ZWe
F{,cD< Dee
!@C18bM:[W
FM@{0
!F>Z2zG
JVH!De2N
mF{2H2e
25{GJCe2m<S
DWEZse
D[F{{GeZ{zJZteJz#0,'#
DSF{c.>Z3C
0.>Z2v
0@{G2Z!
DO<B2Hse
gZJZEw0
z{E.C.{
[[7tfh
HZld02
0CG.ERa
0d#.8bBDG2!
*gZHv#Z
GhZG>0h
rDL{-D
Ij.30H:
?De-<U
Hu3!Eu
JFFRXu
UU3H_@
_^]PuVF8%
L3]AUM
Mu^FF#
NMIIII
GHuGHHGH
Au^H9Et:YEP6e
VWW_^]
Ujh(F@
QUREPMQ
<"u>"u
fFu%@@
UWQ%_C@
jdh`F@
t,EPMQUR
TTEhlE@
Rjjdh
Pjjdh
EjdhE@
hRdPMQ
MX9OOQ
GVT1G%V6
Kilimanmen
Horapplist
Bisanoled Maxek
button
richedit
3+3:')
RICHED32.DLL
Hokeuj
think probably it was quite an attractive
ardly thought of it since then - that he had a charm
ardly thought of it since then - that he had a charm
FindFirstFileW
GetLastError
lstrcpynA
lstrlenA
GetModuleHandleA
LoadLibraryA
FindClose
GetStartupInfoA
CreateDirectoryW
FindNextFileW
GlobalAlloc
WaitForSingleObject
CreateThread
TerminateThread
CreateMutexW
ReleaseMutex
GlobalSize
TextOutA
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p__acmdln
_XcptFilter
??2@YAPAXI@Z
??3@YAXPAX@Z
GetMessageA
TranslateMessage
RegisterClassExA
LoadAcceleratorsA
LoadCursorA
LoadIconA
LoadStringA
CreateWindowExA
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
DialogBoxParamA
DestroyWindow
PostMessageA
SendMessageA
SetWindowTextA
EndDialog
TranslateAcceleratorA
DispatchMessageA
`.data
@.reloc
.t5%4uC5E
5,tb544r
sWZ'M#Ym4T3
JHIM7/CN
/o>0vd8^,O
_HH6e@6md
h6zRoo|IB
-<ePG"
Xm?0BDgHC,w
1>~[c0R
W0ED}s0tei
1K_X_Zk~
Z#@'/ve
.2~_XN_G([+e2Ip6?1Gpm0
1R'0j>Z3
qD/n'PFr Z
pk5jIi"*v
GKY:0d[Sd(1d
k6;p;;
k"oaDuakH;
wwkcD DeJ>
!@C18bM
2|VZCbWw|
1Vq.[c"pDm2nlIr
mv[[O{
;n{JS1c.
hx+5T.gvUG}
0@{GK2GL
z{E.C.{
\[[7tfh
hwd#BDm
Iw:Fn!
.;|,GM
Ij.3H:
DI[yfJ
?Hn,ui!u
A[uHIE
JFFRTX'E
6{AP^
Gj~jhjC
398@{[:
&P "F8%
8]tdM&N
;ug} %o4
7-86fN
hVk+q+G
N.Omc4
^H9t:Y@6Me
&W^v1q
!h|&E@
;3{P>
FnYj.+d[Pd%x
5GdXG
hx6-tX
fp/%1'[>WV
5lBUWQ;_
Vd8QEGh
`\lAh
j'[CdhF
/86l|QM|lE
<KC'e,
oej h,Mj<
hlf&$p
{!1x@Sm
z0P|C;
2eX8eX1
<.Kb\_
7Gh8d}t(
M}O+$[
v4M4fTD&6t]S/
BP\j|ii
MX9OOQ
GVT1G%V6
o(@'Z/
?KilimanmenHorapp
oled Maxek
utto#rich
P@0TDD4ML(8
,.!ma+
3+3:')
RICHED32.DIkeu
think probably q
was qu
ctive7ard"}o1ough'of-s>ce
adPvkl9 40m
Findrst
Error{ml
rcpynA
"ZModu
Load;gLibraryARClose*St
tupInfo
CreateDpect`gnypSAep4Nexm-?balAl
0m-S"g
Obj;I`[Th
sm&\Nz
ct_hPur3
_fm%na
rgsG=acmrn
s??2@YAPAXI@Z
essagTrsl-
.AgisTC
owHPoXQuku&E
Def4Psc6/41ogBoxm
'.}vM4t!
0 `.d3a
Vc.3TJP
2eML4'@eFp
GPGWHU
XPTPSWXaD$j
ffffff
aGGDDV
tttDP`
twGD``awwGtu
PawwwGE
PffffffWP
GtwwwP
33333333
7Ajx+*
5CNT14
chyfmyju{jp}knhijkjlkp}jtxiuwju|io~jmhjknkp~lq~kp}mq~lr
lqmrlq
lqltmrnklk
[Z~z/.
}{{xvvwvvvttvtt~z{
zwvpnnkiikikjhhiggyxy
qoofceeccwuu
{{wv//
#!)' )''
$215'.
mu* ("-!.(''('' ''
# * *!* * )
!) +!, * * + * * + *
#'!+ * , *"* )
"-!* * *!, *!+ + * )!*
"!!'$-!*!*"*!*
!,!*!*"*!*"*!*!*$.)
%"#*%.!)")!)!)!&$.
!Ze]g[[ZT+*
&!(GM]g]_]_22 & , '
]g_gah`edeBG
#!)!)#)!)!)")!)!)#,!+
'%%*&/#*#)")")$+'1")'%'1#*&0"-'1%-(0#+#)!+&",$1(2#+(3"+"+#.%.&0%.$*")#*")")"*")")#,!)
'#&+&0#*")"("(%/%.$) %,9-:%0(2%-!&!)'1.;,:*6)5%-!!(%,'0.=(0)2'2$,'-$*$*%*$*$*&+$*%+%,$,
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.2.8"
processorArchitecture="X86"
name="AMDInstaller"
type="win32"/>
<description>AMDInstaller</description>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges>
<requestedExecutionLevel
level="asInvoker"
uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
COMCTL32.dll
GDI32.dll
KERNEL32.DLL
MSVCRT.dll
USER32.dll
TextOutA
ExitProcess
GetProcAddress
LoadLibraryA
VirtualProtect
EndPaint
KERNEL32.DLL
FindFirstFileW
GetLastError
lstrcpynA
lstrlenA
GetModuleHandleA
LoadLibraryA
FindClose
GetStartupInfoA
CreateDirectoryW
FindNextFileW
GlobalAlloc
WaitForSingleObject
CreateThread
TerminateThread
CreateMutexW
ReleaseMutex
GlobalSize
COMCTL32.dll
GDI32.dll
TextOutA
MSVCRT.dll
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p__acmdln
_XcptFilter
??2@YAPAXI@Z
??3@YAXPAX@Z
USER32.dll
GetMessageA
TranslateMessage
RegisterClassExA
LoadAcceleratorsA
LoadCursorA
LoadIconA
LoadStringA
CreateWindowExA
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
DialogBoxParamA
DestroyWindow
PostMessageA
SendMessageA
SetWindowTextA
EndDialog
TranslateAcceleratorA
DispatchMessageA
Zimbanda
MS Sans Serif
C:\Users\helenb\AppData\Local\Temp\Rar$DIa0.810\invoice-ITK709408.scr
c:\c0c533d59275c873a93ca73f8c23f9dd.exe
C:\6a18d59a7888c50aefffbfaf31b671864ded052cfa9da28b06c660bfa8d98bbe
C:\a814ba026ac41432d12be77935c036c918f14f7028cf88320b0afa359bf25fcd
C:\a64218aad6b14e7dbf450788147f4999355a278de31eb887ceb9455ecd5a1b73
C:\f6fd82d7ba6a51bcffd88d7c8204a61a3c9e7c2aba527ff029c86035a4dffa3a
C:\61QRF6wr.exe
C:\RCaMCNfa.exe
C:\wx45xxuX.exe
C:\KjnFHdfS.exe
C:\bZA3wgfR.exe
C:\v3_1tFwo.exe
C:\GfsMw5d6.exe
C:\tnzidkb5.exe
C:\7Jl_4WPy.exe
C:\FEwYsGbB.exe
C:\5CuxPLhu.exe
C:\d1YwoOgO.exe
C:\TGXWOHsl.exe
C:\FdNSgKL8.exe
C:\qVy_jfFw.exe
C:\wCUqgTjp.exe
C:\5FSBE2CG.exe
C:\9d293ca1f3dd644668bae2e84712f0cd07a44e7bb7bcded93cbef08a22fbb340
C:\uFkVO8NE.exe
C:\6zcChwR3.exe
C:\Sm4qvAmt.exe
C:\2SK4YZmd.exe
C:\i7S3CiKk.exe
C:\kYkuqOLL.exe
C:\sLjtT5_C.exe
C:\2eb308d7e6a14c0ab41c68f7f4c712528f31cfb6b5cd91315dfe00a7baa54e0b
C:\82465681b9bd69985a9b39b82ac2f102a1e99cb574403e87b0fefd990ab5ab81
C:\Users\Virtual\AppData\Local\Temp\9d1eca1bd924f48145b898d55f4ec2ecaf8bbf62ef85acfd0c581b45f08bd4ee.exe
C:\TZfsoyWj.exe
C:\fd784b295498b3fd0be69e5fc77e15243456c7407f5534f898c1b2f89eebc27d
C:\e215da520ecd61483e3e37182ba4c07f3e9425511151baa051597e968bfb214d
C:\Users\admin\Downloads\sample.exe
C:\fc1de3434c42cdaadb1540ba8c7ef3446f26b9aa00c09caf68b0e1e8adbed5b2
C:\5b1721d865096230ea8f72e7964cd72393104eaff77a684074b36adce878b19b
C:\b2621a60b2eda3dcb2639fdc0b49619533de700859eea4373d84b8d7958e6f65
C:\b4e9258f2d6d7e6b776da7f92ede1450b21c968d3656af5d5aefbfeb9d2b5e17
C:\Users\Petra\AppData\Local\Temp\zonicex.pe32
C:\Users\Lisa\Desktop\Ri8d7gdm.exe
C:\04eaa2cffb3075c217940addb8405121676d6045a2af4e7e7e24b460e2a088cb
C:\Users\admin\Downloads\sample.exe
C:\87d7016762aaa8b9ea0bf2f7a5d84a6400f02b1f53281eef7a6694d620c9d6c7
C:\5ef6da4edf1b71378c42611fc9421497bc391f81d0370d1fe09ab38fd8b9a167
C:\Users\admin\Downloads\important_document.exe
C:\1404952a6b6a309855a348ad9cf465adffb48c8d9b869692398e692710b779ce
C:\c023c151867abf315701aef78805d3e7589fb463359d729cb2b3f1249f5879af
C:\Documents and Settings\Administrator\Desktop\TtilhyU4.exe
C:\Users\Petra\AppData\Local\Temp\.pe32.exe
C:\Users\admin\Downloads\factura.exe
C:\6fddf9c29c87cbfa29b5f598403823f037633dc291aaee861c1712958771a43d
C:\1019d848ce94b1eee6ca30d03ca40a4b6b3c0ee8f761620b023403caaf21c06f
C:\b7eb155764bda4cd56e225fedbf356cddf7d88b8f1c5f58aef175eb4a3db9650
C:\25d0911a551345e4347e6b15382407e8999f662ba01af87c104499a801a159ec
C:\Users\Petra\AppData\Local\Temp\zonicex.pe32
C:\Users\admin\Downloads\sample.exe
C:\Documents and Settings\luser\Desktop\FRTT6R2y.exe
C:\Users\admin\Downloads\important_document.exe
C:\d0aee66d8a4525ebd29f41498423201c85135c1d58deda672ba8bb9c4283843a
C:\Users\Lisa\Desktop\sAZY8hsC.exe
C:\Users\admin\Downloads\sample.exe
C:\46b197612b171fa623534e95409dd0755feafe385d3cd0bc015b59a24931b040
C:\9cb91eb0f94276c53a1124b5f87437323331d7f9b100588411bc19e76735d034
C:\cd94050530b9e31b4f3f412b466fa6dec126eb6fa3218ea77397a8b4eeded15f
C:\bd15fa63279caaba41af286e5b09848703bdd198435c7370082618a08be5db01
C:\Documents and Settings\Administrator\Desktop\xCz8iufc.exe
C:\fc0ae2997665b6a32d8704b44b6af0ab124aef3f5bfb796da7c9119c0ea8f2ce
C:\Users\Lisa\Desktop\2F787qgp.exe
C:\10f10c6d41d7ba6b3c7291707617c846c4021ac04f16bc2d28bb47317cd692c4
C:\Users\admin\Downloads\factura.exe
C:\dadbcffe18a3ff45e51dd82a1a1a1b430046d869ef3b2c2b2cdf6e93f7b13c03
C:\Users\admin\Downloads\factura.exe
C:\Users\Joe Cage\Desktop\FhtkeOHR0v.exe
C:\Users\admin\Downloads\factura.exe
C:\476da90c9ea2f5285c667bb3d5691f24cc7ce815cd9ce5ab9cb20971fa9100ab
C:\Users\admin\Downloads\zonicex.exe
C:\Documents and Settings\Administrator\Desktop\IvRmbrEY.exe
C:\Users\admin\Downloads\ee126a1cb01dd0300781f298a7dd904b84f8c725e98e9c9e6362f938f3a2ac44.exe
C:\1d9bee77b65db6ec306f70fad53f2e248044ec2b242fad227ca1134bb4b62f89
C:\c4232d6fa1e2f45f8331f1df143469321914e3b35ff6e91632b014899afe3531
C:\Users\Virtual\AppData\Local\Temp\29bc73aff7b23faa8323af1b694891f21a98dab0e7df00402a75286407b9c224.exe
C:\Users\admin\Downloads\zonicex.exe
C:\be0521eef1c987523198fb1657e9a67da2f4478cef787e2c75c15c1336330cf2
C:\4e40c29c8bcd7afc1c63102a239f54c9f9b23c6e082c68947fa0bc75e4ab31b6
C:\Users\admin\Downloads\zonicex.exe
C:\Documents and Settings\Administrator\Desktop\C7asQ8zr.exe
C:\150e75b83ab91b51fcaca9744a7f0cbe0ef9a1f2220ea47bdebdc23a878bc27c
C:\6408a4ce6550b380129771dcd04c8cefba24f9c5b36ab4bdbdb548f660ab0b30
C:\dc81417d243a884a34f37335387ed9d4395025545b26e68686aad6b6b50be808

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.