1.2
低危

075ec7d149e38967665b712026e0bd4245fba11a009708f8ffd43dcd3ab19d19

075ec7d149e38967665b712026e0bd4245fba11a009708f8ffd43dcd3ab19d19.exe

分析耗时

151s

最近分析

385天前

文件大小

12.4MB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN WORM GENERICKD
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.59
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba Worm:Win32/Agent.aa697598 20190527 0.3.0.5
Avast Win32:SillyP2P-X [Wrm] 20200428 18.4.3895.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200429 2013.8.14.323
McAfee GenericRXIJ-LO!3A61D537F369 20200429 6.0.6.653
Tencent Trojan.Win32.Small.p 20200429 1.0.0.1
静态指标
可执行文件包含未知的 PE 段名称,可能指示打包器(可能是误报) (9 个事件)
section .text\x00eb
section .data\x00eb
section .rsrc\x00eb
section .z\x00\x00\\x00U
section .jbfhr
section .VHuG
section .iZaM\x00eb
section .tjnoy\x00b
section .FCX\x00Feb
行为判定
动态指标
该二进制文件可能包含加密或压缩数据,表明使用了打包工具 (2 个事件)
section {'name': '.text\\x00eb', 'virtual_address': '0x00001000', 'virtual_size': '0x00005b50', 'size_of_data': '0x00006000', 'entropy': 7.848091401438236} entropy 7.848091401438236 description 发现高熵的节
entropy 0.375 description 此PE文件的整体熵值较高
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 58 个反病毒引擎识别为恶意 (50 out of 58 个事件)
ALYac Trojan.GenericKD.41683017
APEX Malicious
AVG Win32:SillyP2P-X [Wrm]
Acronis suspicious
Ad-Aware Trojan.GenericKD.41683017
AhnLab-V3 Worm/Win32.SillyP2P.R3740
Alibaba Worm:Win32/Agent.aa697598
Antiy-AVL Trojan[Packed]/Multi.MultiPacked
Arcabit Trojan.Generic.D27C0849
Avast Win32:SillyP2P-X [Wrm]
Avira TR/Dropper.Gen
BitDefender Trojan.GenericKD.41683017
BitDefenderTheta Gen:NN.ZexaF.34108.@R3@ae54qSU
Bkav W32.AIDetectVM.malware
ClamAV Win.Worm.Sillyp2p-7194313-0
Comodo Worm.Win32.Agent.NIQ@8hjo1v
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.7f3695
Cylance Unsafe
Cyren W32/Xiquitir.A.gen!Eldorado
DrWeb Win32.HLLW.Xiquit
ESET-NOD32 Win32/Agent.NIQ
Emsisoft Trojan.GenericKD.41683017 (B)
Endgame malicious (high confidence)
F-Prot W32/Xiquitir.A.gen!Eldorado
F-Secure Trojan.TR/Dropper.Gen
FireEye Generic.mg.3a61d537f3695249
Fortinet W32/Parite.C
GData Trojan.GenericKD.41683017
Ikarus Trojan.Dropper
Invincea heuristic
Jiangmin TrojanDropper.Daws.iei
K7AntiVirus Trojan ( 005568151 )
K7GW Trojan ( 0000da801 )
Kaspersky HEUR:Trojan.Win32.Generic
MAX malware (ai score=80)
Malwarebytes Trojan.Agent
MaxSecure Trojan.Malware.121218.susgen
McAfee GenericRXIJ-LO!3A61D537F369
McAfee-GW-Edition GenericRXIJ-LO!3A61D537F369
MicroWorld-eScan Trojan.GenericKD.41683017
Microsoft Worm:Win32/Agent
NANO-Antivirus Trojan.Win32.Xiquit.fywzrc
Qihoo-360 HEUR/QVM19.1.E1F6.Malware.Gen
Rising Worm.Agent!1.9D8A (RDMK:cmRtazpa+7EEm9+mQhXJy08ubuWP)
SUPERAntiSpyware Trojan.Agent/Gen-MSFake[All]
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos W32/VB-FFH
TACHYON Worm/W32.SillyP2P.Zen.D
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2004-05-07 07:02:15

PE Imphash

27f21db1a40f044cb2ea9aa7f88716f6

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text\x00eb 0x00001000 0x00005b50 0x00006000 7.848091401438236
.rdata 0x00007000 0x000009ac 0x00001000 3.7370867281067
.data\x00eb 0x00008000 0x00003478 0x00002000 3.4292108023403616
.rsrc\x00eb 0x0000c000 0x00000958 0x00001000 2.492413503122149
.z\x00\x00\\x00U 0x0000d000 0x00000da4 0x00001000 0.6034496551498164
.jbfhr 0x0000e000 0x00000400 0x00001000 2.061127104708464
.VHuG 0x0000f000 0x00000bcb 0x00001000 0.8311497314370737
.iZaM\x00eb 0x00010000 0x00000d85 0x00001000 0.6222843134491175
.tjnoy\x00b 0x00011000 0x00000400 0x00001000 2.1404370624438807
.FCX\x00Feb 0x00012000 0x000007da 0x00001000 0.999751642800421

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0000c408 0x00000128 LANG_SPANISH SUBLANG_SPANISH_MODERN None
RT_ICON 0x0000c408 0x00000128 LANG_SPANISH SUBLANG_SPANISH_MODERN None
RT_GROUP_ICON 0x0000c530 0x00000022 LANG_SPANISH SUBLANG_SPANISH_MODERN None
RT_VERSION 0x0000c558 0x000003fc LANG_SPANISH SUBLANG_SPANISH_MODERN None

Imports

Library KERNEL32.dll:
0x407010 FindClose
0x407014 FindNextFileA
0x407018 GetModuleHandleA
0x40701c GetStringTypeW
0x407020 GetStringTypeA
0x407024 GetModuleFileNameA
0x40702c FindFirstFileA
0x407030 Sleep
0x407034 HeapFree
0x407038 HeapAlloc
0x40703c GetStartupInfoA
0x407040 GetCommandLineA
0x407044 GetVersion
0x407048 ExitProcess
0x40704c HeapDestroy
0x407050 HeapCreate
0x407054 VirtualFree
0x407058 VirtualAlloc
0x40705c HeapReAlloc
0x407060 GetLastError
0x407064 CloseHandle
0x407068 WriteFile
0x40706c ReadFile
0x407070 TerminateProcess
0x407074 GetCurrentProcess
0x407084 WideCharToMultiByte
0x407090 SetHandleCount
0x407094 GetStdHandle
0x407098 GetFileType
0x40709c RtlUnwind
0x4070a0 SetStdHandle
0x4070a4 FlushFileBuffers
0x4070a8 CreateFileA
0x4070ac SetFilePointer
0x4070b0 GetCPInfo
0x4070b4 GetACP
0x4070b8 GetOEMCP
0x4070bc GetProcAddress
0x4070c0 LoadLibraryA
0x4070c4 SetEndOfFile
0x4070c8 MultiByteToWideChar
0x4070cc LCMapStringA
0x4070d0 LCMapStringW
0x4070d4 CreateDirectoryA
Library USER32.dll:
0x4070dc MessageBoxA
Library ADVAPI32.dll:
0x407000 RegSetValueExA
0x407004 RegCloseKey
0x407008 RegOpenKeyA

L!This program cannot be run in DOS mode.
/<kRkRkR
^iRYjR\gRXWR
AlRkS\RDiRTjRRichkR
.rdata
@.data
@.jbfhr
`.VHuG
@.iZaM
@.tjnoy
^-YODO
c\]9eyX5
yy3K/J
WZ#aNU.
'?\/h[5
`b64tf
*-r]B6xGz
MAFf8@>M%!O+6l(
|7=<,7
)fdARJ
-R?OMhV3D86
{/mn/hI;p
6)7G7~lug[
TZg9gHL
ue+Nrdfu
GQACdWa
u3>UP
#w>J-ZF
6s3=e%
t'A[y] &2
[5zCC@iN:m
Opz%bzLD
=Q},6w
,.6s|a
oSW*82K
`e>R42G
W4f.;jvn2Ww:7/s
X?mL\&6
I?'?GL
?Ob#4m{
0EU&E*@
> d8i?l
xh[&K
>RTWHyf
pNQJ_ )
MlOLOa
z1oT-Y
;e9S<eRKYs
T>bDG7?q
96g7:.W
!eP.Lc
0ww+rT
1m'li{
9jRi"+}g
Os8.`^-
Hg}}rv=gO8.
c(p~~P#?8WR_)
Ti!jROfg
X\lM43]
.MCO%:
\`l#E>Ja^Py^
wr8LD9
=#8?(>jA
$ja kkZXs
*XpT B8N
>$-YO,
n;/S77k2 z
-(nIPN
'?m)%>{
3Fu-cPG
04N_-oS&u
fpJ@+ GW275
s^I,6T9f
1/9i`g
~;'z:_z
#81\+5
HZG[gj
'@,4'}teN
@{C#B\
Dn1[TF<
nh/=f~LD
u+$NrKt
{bCg*}
QT[{ rIdZYL+
~>J8Q?l
#q\&y
E^ab'D^$G.
TU: Bf"^L+
rh.0T0pWOr
muA=O{
[_3P}Z3E
k$'A3dy
YSFGn
'kTJLPm
$vEn7m:T1Hf0%=?
yqGd[c
^gBB7h(
oV^pTZo
)8)lgz
A9rz^pT.w~
G;Ia^-,
TQnWcdg
T@2C4$Ai\D
J{f-S
%D"iCfuG8Gnf
3n0Dk~
(BxFRRo'~;*'6B]
_[]"3o1
s"KPUXw
:yN">=
{4[R'u
y731]"nN{
>J+9?j
TYJ8B%0
4j,dB{
\w<I&1
404."LA'oKWH+D@
vNL3M/*T
P8Ddb6
Xw~7F=
..^Y'jZF+=
8CZ*C@Ea(
6EZ.m~B
r7SDo[k&EQ
lqfpu
R'1WI/~Ca:
$xA 6)
xPz1<{(b
'?4GdZ`GI
1#Ntnd{3fjElP7
ZqSW;)8Ev
S'e y}
2(+dD-l
EA^#2w
mtNdnd{qZ
pJ_)s`(x
D9_O@`Pq,V
:dc4rR$Xb
7#<}P&{l
!P4f.8
+8{3eaJKvNTP)
--AZ&Q=8
2Y@OEYgq+}{dO
s3S=G Um*EaxyyY8N
#NC1V=l
lK>(tYb876SBd
!Sy,Pd{1_fTh&#
!F9=e8<
t>L{B#
P20g?iPjE
v:WF!zI
!?C,fcQB
`pH>CRYn s?Q~9
h`Yc!Gb^!^
%`$n^fi*){
dDBJpv
<5Ms2cdYE8E!k
4/}N}\
T' 6/S?
L~ifki8<n
P4'1mEP
|E8=y`
l9oSW="
DR~a~zy
R!9\JV6r
3}O-/"0~
}7o8|Klwb
og`W8K'
`rtvun0
w%Ea:n'(>-o`C
hO\4'd\7#
-cVp}[pDZp'lz
82qFd,YOF
VkV5oXU!q'
"1>L$A
+9cD'0D/hA
:{pT7gl^*
[L&naiH+
6u7Z}
G9^Pt1
4j8u{NQwROLW
zNt%K`FY
6X~!_w38XNa+
TDPRM56
2bK)(t?Z
w~=[2j
g8>caQA(^
sC,/9W
\kl#p5!_-/2
aG=>s:
RTl;c4n.Rd9
EtzC<3."
Gd0FO&
N|:$7b'
^ZcgY@
ll;+}1
TMRwW"ge
~aA%(I7J
0w?`i/@5>x
^pTy1lJ>JacQk
$|YP~7
a bc88
<Gj`WGJ|
&<wM\i(l423VNNB&GSzR~mM9MY*OZq*v
Bm~C"
d6KwAB
8DMD>q}X
Y05p>m
nk w{t
JR@$EO8g
I'v&#E]
0NI/6Wd(B8l*L
m#E9[@
{s_LMzI
7&R64
7HgkJ,4~V
{oZWl{}!e
ckTX=?*U
J+Uk81
iW:wzLDQ(Lw
"oD&d{9X,
_W[F$FNztd\
)MXlG[3
0OLc:r<'d{
wYnQM68l.H
Rm@G#1au
$i^g;w
$IGoGVF!
<(k(o?0E`
Wns$7p
b#aG\[
nc1E^X
Z/S3,#
w~7G!-s
jahd:<@{
WP/aTM
EuHOkGL`
E^pTV_V9*/
Xka^tJLoG
<H>L}iWu@O
{C#a%Z=i/
.>ps]j
6qw.m9T-x
E\,d?W
>J]SYR+M"
WevS='v
]P6k[L
p/!3|&0ai=7[
+=K/#VS
Z4'nF<F~A I
xfih{8
f#Bp!Mkym@QPX
w~;0WY)7J&*
KHP'0,_+4
1*4'|8l
EOa<,+V
_O,&l!@qM
cZYhey
fRY- Sh{`}`w{7
3Ei+][
"T?a/T
g +{aZs
e0a#F.,
THi7o7
roqTZ"j
fP-b5^
('?m)/
z?2d1c#14
`?,4&C
3?9E8,V
2X?>$},
W%^ac
uv7`L
Rab1%Q
tE=#0)zY
fv);e'6QpUq
<H06aPp
ropTZg
l\ym#E
Ja^ed%YS
I1eqj#
8%?m,j!
_W^`rk^zk}o
#t_$usKh
WW:jm6
gh[}";
\,4'A|
@(,FSHK:KB
vdXZ-B
O8),`EfFL*TY;1/?
|w~7Ko6=
?qUM*.hs
}gx1j}T
k cgOWD4
e%UB9'1Hu)a(
3n*vC\knj
sdm1 A!<+
E2lCaL)
oK_s'u
&$yk f(0.T2Us6<;
$3b8r1c
2<EdkC5Hcg4xGB;>4
EjCo+}:k
_9j{:xNSfr
a0c^Oh
'`b+X${
wB!"8/
g}pW94'LNa
8&}h"TXZv3wC9Q,#
c#<jN:
r7vd^[V$`Y
v'WId,6J
U9OsoEPc
^!v*[ c
C+!ZTzFoR
7`BA3tM
&>7S?@
m^43&m]s0
V-"@_7
%i&:e^-Y
#95euW2#dw:h}8S
UP9].1&M1
07Bfn^
1[Mi;}=<c
Xr:en:R
n32bVzZ!
'?mI'5/;p"7AYZV;5^83
K8CC3
GS YIUx4
#;;?A*$
&L nqhu
^U+(y-
e_zD TA@
B&EM;@80
^f0]TWHOf
>7iUH>
s]%hxh]sHQ
4};'r7y+
q,L{bo`o8
|ccE3M$lT
oYOeo?
Wo@!SI|
LM46+ >S7
"nNKwtL9mE
oS?k;~iq.
WoSx(:D2>)Zj
+dZG-?i
^0Tct'BC
_L$NK
98<7EP)8
:}oVN.
?4#c1J>Ja^Ij,
q54&h#Y
?36}`JI~^
a#?+Q(Hf0
/{'?m%VlN
s`&{;[+55
&W:xGr
GWNj]I
z*O}=F
:,H6i#A
}sX|LD?
-n-Ig+Qd'?mO3[3#z&1
&Nr,&F*E
^J&tc?$
@H$N!k~RA
ZQWlzpE_-Yy
AowCVLEV
Hu\E1'Z
j1~6bFk
'@BSzpR
Ul4S[`
_@nSrE
#xNa,L
TH7'6fkN
vNL*<a?V
t`@W`\'E5CUN
5M!V!jejg
R7u6#UMd{
P&n% 2W
m!8%8_lh;+{m
Y%D96JN
8)cCZu6q
hE^'[8C=[GU6d"
4h+4r,fU b
EPl;=a
8}9VH=%
4[Nbk]3T
m!8%8_lh;+}hE[
@"1s%4MpA]
,&4`ZG
8G:Ik'T1c"v
[LGB7`
;9|x3]
0DL.^k|[U
lhLN&yJi
[dG8|8q
iBtJ;xG6lC
3]LU)Q2R
P`T2*E
ut.]6mY
td{i[Ydjo2
xG{fvCWS
S[EI`pQ
K3Ij4F+HI
+%ZLzF
Mq/P3LTe
"Jj$<V-wZ
9s2ioB\,*T
lWkt>J
lX8&;1<LC0Oj
Oe\c2sP`L
UC_7Bv
"Sc/X3
OEhVG_pTa,Z'yW
^/YOX6\
7Pz\PF<ajID*O$
EgR~p'?
^Pq*Ea`6
k3y5\3$S[\_K
A<U[R2FK<h
#dUMQg-ekAT
~x`WG8
T[,4S,
sJ)%]O:5D
ADy }8
6#FIN
_wV9+}
2+}zH>
oh.!{II
I9lCWOQOMw
_hr3g7T'g
nh4gr}Wo2
w[Xh#M2ni}KFJi
z[Mzp*cp
3 FH>
<XN8J*8
0kILE8
=#<(c*j
3n>_b~Lt
&5\<ju
&>JaYO,9
QNAk\9*(+
[L!.GB1TD
3B^0G7cA>S)
pOT/SHm,6
>y-XO,YC
eAa~$_|k
he&NrbNNz*E&
6bw?[~x|gz
9.o;(k3}b
nxCWz`
1;}qi`mY_
m)) zLH8{"
MgeC~z3[K
5F5xS;Hp,>=
1^c~)<
T1}c0C
PYizQab
{W2a51T{co6
z:O0N/
N(*|Zez
}O_,GG{
<xiv^p"mLD[
'l.z5rC9|
wMH}^abUv[MD]>Sw
dhg'<P
SLSBclO
_O^s?+
.-F7?70Uz90S
N+.)f\
Iqh[2oS
#RhH)w2
h"}gpduFO.HzCf
&lj/]<h/Pn0]*EN$5
@1g43D
=3lnPA(_
@j(EE2
${#:TU{iBR!
Y)*C}90
3?;EP
ZzFfH%F
;KelOD!]5v
N#Rl_(Xa7<&
K.l/]<N
OEg7'G
{QZ3P oq
jynrlp^,O
LBwm6Pex
w )m9X&
E&tg?2gN*
<cl`P8.]U-D&@
lBI2AiJPw
zEoF_uH'?m7
T/Uo8r67
1%ps|
~JZYIY
&EaY\[D
:t*!0`%+
`zzk@$
Y^0TZG8s
+P:aBH
PiZff.4'BC
L(+%k#)
#VO}w
`h````
ppxxxx
(null)
runtime error
TLOSS error
SING error
DOMAIN error
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
abnormal program termination
- not enough space for environment
- not enough space for arguments
- floating point not loaded
Microsoft Visual C++ Runtime Library
Runtime Error!
Program:
<program name unknown>
GetLastActivePopup
GetActiveWindow
MessageBoxA
user32.dll
GetWindowsDirectoryA
GetModuleFileNameA
GetModuleHandleA
FindClose
FindNextFileA
FindFirstFileA
KERNEL32.dll
MessageBoxA
USER32.dll
RegCloseKey
RegSetValueExA
RegOpenKeyA
ADVAPI32.dll
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetLastError
CloseHandle
WriteFile
ReadFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
SetStdHandle
FlushFileBuffers
CreateFileA
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetEndOfFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateDirectoryA
Winamp 5.0 (full version).exe
Winamp 3 (full version).exe
Winamp 3.5 (full version).exe
Update Photoshop 7.0 to Photoshop 9.16 (Its Work!).exe
Update Photoshop 8.0 to Photoshop 9.5 (Its Work!).exe
WinAce 3.85 (with Serial).exe
Download Accelerator Plus (DAP) (full version with serial).exe
RealOne Player (Full version).exe
BsPlayer v3.exe
WinRar v6.11 (with crack).exe
WinRar 4 (with crack).exe
ContaWin 2000 (full version).exe
WinZip 9.exe
DivX 7.2 freeware.exe
3D Studio R8 (It's Work!!).exe
VirtualDub 2.1.4.exe
MSN messenger 6.3.exe
Hacha Profesional Edition.exe
Simpsons pack guiones (Temporada 2004).exe
Mazinkaiser pack fondos de escritorio.exe
Mazinkaiser comics pack.exe
Juegos JAVA para NOKIA.exe
Capitulos ineditos de DragonBall Z jamas emitidos.exe
Pack Tonos y Logos para Nokia.exe
Nero 7.5.1.0 (cracked!).exe
Pack Photoshop CS 8 plugins.exe
3D Movie Maker.exe
Silent Hill.exe
PSEmu.exe
RM2GBA.exe
WAV2MP3.exe
GBAEmu.exe
GameCube Emulator.exe
Pack 50 Juegos PS2.exe
Pack 25 Juegos GameCube.exe
Resident Evil for GameCube.exe
Visual Basic 6.exe
Visual C.exe
Visual Studio (full).exe
mugen (full).exe
Fuck my fat ass.avi.exe
German extreme violation.mpg.exe
Sexo con una menor.exe
Pedofilia pack 37 pics.exe
Follada brutal coo roto.exe
Lolita Pack 20 Pics.exe
Puta come mierda.exe
Solo para Maricas.exe
No lo Descargues.exe
Dont Download.exe
humor.exe
Dont Touch.exe
Hentai.exe
Matrix Wallpapers.exe
Terminator 3 Wallpapers.exe
Hentai Evangelion Poker.exe
Shinchan screen saver.scr
Hentai Shizuka clit.exe
a pelo.exe
Chenoa en cueros.exe
WinAmp skings and plugins.exe
FlashGet Max acceleration (Experimental).exe
VMIntel386.exe
C:\Gusanillo QueBonito@Compartir.es
Hola tio! soy el gusanillo
como va eso?
Error in zip file
El archivo tiene un formato desconocido o est daado
Zip message
El archivo zip no ha podido ser abierto
probablemente este daado
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
256mb 32bit
VMIntel386
/Intelx386
/VMIntel386.exe
Pack sex very hot nude young girl porn erotic private pussy rape clitoris suck chicas fotos culos tetas coos mamadas corridas sister hermana amigas friends lesbianas mujeres desnudas putas guarras hentai.exe
EMULE.EXE
config/shareddir.dat
012345: :
SOFTWARE\Kazaa\LocalContent
012345:%s
DisableSharing
SOFTWARE\Kazaa\UserDetails
QueBonito@Compartir.es
012345: :
SOFTWARE\IMesh\Client\LocalContent
012345:%s
DisableSharing
SOFTWARE\IMesh\Client\UserDetails
QueBonito@Compartir.es
33333330
{{{{{{{3
{{{{{{{33
{{{{{{{330
{{{{{{{330
{{{{{{{330
3333333
33?030
33333333
wwwwwwwwwww
DDDDDD@
DDDDDDGpw
DDDDDDGpw
DDDDDDDDDDD
wwwwwwwwwww
DDDpp@
PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP
;M/[[V[3@#swJ
e[6UE{[
+\Y2@/I
zK<PBByh/[3)
?[R0dc:kC@
6/.!m=[
S8ytMV3
;ItE_3
_Zoy#[3m}*@*
o[LS]e/[*DL
Eyt [3m*
&0[2mZY
KJIOk@
KIhR'@
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU[@3[/
33333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333
|b})$O
^-YODO
c\]9eyX5
yy3K/J
WZ#aNU.
'?\/h[5
`b64tf
*-r]B6xGz
MAFf8@>M%!O+6l(
|7=<,7
)fdARJ
-R?OMhV3D86
KJIOk@
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
(null)
((((( H
VS_VERSION_INFO
StringFileInfo
0c0a04b0
Comments
Microsoft
CompanyName
Microsoft
FileDescription
Microsoft
FileVersion
1, 0, 0, 1
InternalName
Microsoft
LegalCopyright
Copyright
LegalTrademarks
Debido a que es un Gusano, no creo oportuno rellenar este cuadro. jejeje
OriginalFilename
Microsoft
PrivateBuild
Microsoft
ProductName
Microsoft
ProductVersion
1, 0, 0, 1
SpecialBuild
Microsoft
VarFileInfo
Translation

Process Tree


DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name 202dbba9b62b5976_resident evil for gamecube.exe
Filepath C:\Windows\Intelx386\Resident Evil for GameCube.exe
Size 12.5MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 e6ce4db10a1c78d541b71ae014d1068f
SHA1 14002ac2ffbf5544558a2e0058b358fbc9542fa8
SHA256 202dbba9b62b5976dc5566c059025ee99b506a8bbd23f8d370f66487d6f388af
CRC32 66205792
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 0e2fea2098387c58_mazinkaiser comics pack.exe
Filepath C:\Windows\Intelx386\Mazinkaiser comics pack.exe
Size 12.7MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 5af86af564a93e63b27db064b3889d6a
SHA1 e9948b6a111cd661669234e5862d37b407097ea8
SHA256 0e2fea2098387c5836d734d3440236e84b3c2206e3b0f7dfa05c6edd69622a61
CRC32 86B2C766
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name f93ad2784e5f3269_visual c.exe
Filepath C:\Windows\Intelx386\Visual C.exe
Size 4.9MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 b5c5a23e9d3ec05698663893ccef5d49
SHA1 7cf9e1210d2e1c77e2cc256c8bf8c3613fe2ffc1
SHA256 04eb49b98749463b4cd34cd30363f7a68654857f4df4a22331f2f22db5223d95
CRC32 01BD030F
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name e817841621c183a9_visual studio (full).exe
Filepath C:\Windows\Intelx386\Visual Studio (full).exe
Size 7.3MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 a1bf9a96c4c2c28951f7c496e285b35a
SHA1 5553fcf9006c5ba072c0471463d21ee95d187af5
SHA256 4b7377ced453d2ed043e060ed743c0928557715dc987ccb7ef1823085528048b
CRC32 921F9C89
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 596b9a017bc27a09_3d movie maker.exe
Filepath C:\Windows\Intelx386\3D Movie Maker.exe
Size 12.5MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ec3486dec005fc10c1a162fd34c58f63
SHA1 2998911f89a745b262333c90d276bf4155969ce1
SHA256 596b9a017bc27a09ff9c15f7a5bcd224cf41f614df72c0fb44d5291235b0ac6f
CRC32 9B8244DB
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 74be0ca672fb85e1_nero 7.5.1.0 (cracked!).exe
Filepath C:\Windows\Intelx386\Nero 7.5.1.0 (cracked!).exe
Size 18.5MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 b305c783fe9bdc0188ba4fc4fc0bfd68
SHA1 35003ac0f7809cd536b6e9416c874c7dcdf9b309
SHA256 74be0ca672fb85e1862711d8d8c7f21f116201f305d005cdfbb762067af05fe5
CRC32 584EE991
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 57bbac7b28b3a9a1_wav2mp3.exe
Filepath C:\Windows\Intelx386\WAV2MP3.exe
Size 12.4MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 361f04b076cbfd1c1165badac87d00ff
SHA1 da82261903c56f63c7eaf41970d3eeb90c3fc394
SHA256 57bbac7b28b3a9a1ac29d8d826eeff6eb61aebd21bf62664569668abd40e8602
CRC32 CF1D32D1
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name d8ee309f458e93ba_winamp 3 (full version).exe
Filepath C:\Windows\Intelx386\Winamp 3 (full version).exe
Size 14.4MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 1881bb74a5d1f500a155f51844954776
SHA1 dd4e865208b5ee38cc0adc89ad57471081a2eae0
SHA256 d8ee309f458e93ba047cd2bea9487c7f24c2085deb24716251a8ddcdb67552db
CRC32 F8C6C3DB
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 793197c41d50a9dd_visual c.exe
Filepath C:\Windows\Intelx386\Visual C.exe
Size 8.1MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 6fd1ccc33a713b5e62d2f93416ac5f68
SHA1 d99da3b4706198d138785f28954a5930c8ef4408
SHA256 185d46bfbccc3d37e871c54ae75a8e0aebd742c091f367901ee4fd94e0812797
CRC32 7F19DEEF
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name b3ef7b7788673483_visual c.exe
Filepath C:\Windows\Intelx386\Visual C.exe
Size 11.8MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 2ccf035615497e769e41e8201e006226
SHA1 be4c206f1e6d2b45c5a0195dc229a3baff89e3eb
SHA256 4537013f84fd46918de46351f19d0483803c006cf5036ad337db4cca3fc5d011
CRC32 0DAC0099
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 548c676be511a963_capitulos ineditos de dragonball z jamas emitidos.exe
Filepath C:\Windows\Intelx386\Capitulos ineditos de DragonBall Z jamas emitidos.exe
Size 17.3MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 23304628fb745bbf2a85844cb8e8170a
SHA1 a1c58531f7b258b492a2d42264acd3f6a4a3b976
SHA256 548c676be511a96317f37ae8f7415449a4e99135fab3d67fee37a82adb85ffc4
CRC32 202367A5
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name e9632459ed98df8d_psemu.exe
Filepath C:\Windows\Intelx386\PSEmu.exe
Size 12.5MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 57589015d9420e6a00e1fd1cfdf923ac
SHA1 199399fba48b96a1b0cf98fa678aa4970c343e25
SHA256 e9632459ed98df8d38f9f66c47492d6b4a65178e5d1bf9ae5d26895e828102e7
CRC32 F2F2005B
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 02be34c126f70c8d_winrar 4 (with crack).exe
Filepath C:\Windows\Intelx386\WinRar 4 (with crack).exe
Size 14.6MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c89da99a695d588b2bd0124646202b3a
SHA1 96f62305516af1f00024618b7f46f785805a7c2d
SHA256 02be34c126f70c8d3b8538b8d9c94d84afff96d440b70626ad1923a5dbb89c4a
CRC32 F6E15A7B
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 71b6694a3a5165f2_pack photoshop cs 8 plugins.exe
Filepath C:\Windows\Intelx386\Pack Photoshop CS 8 plugins.exe
Size 16.0MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 45a6631e4bd442b5c842bcc3f3302910
SHA1 f6aaa36505454a0ab53c765b8a8eaed7949196bb
SHA256 71b6694a3a5165f2adb16edbf31edcb302a5f6c479c945f4802e82acf15ca845
CRC32 EE5FA7D8
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name ce2fbd504d5c1ade_pack tonos y logos para nokia.exe
Filepath C:\Windows\Intelx386\Pack Tonos y Logos para Nokia.exe
Size 14.0MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 e7cc858cfecb23caedf53c3b70bcedd1
SHA1 f9c0901cd68685cc7cc15bfeab74f3491fb2c804
SHA256 ce2fbd504d5c1ade91487b86e1fa62116c777135cc70afa43d2df20cad73914a
CRC32 7CEE4CD5
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 958005eda16817f2_winace 3.85 (with serial).exe
Filepath C:\Windows\Intelx386\WinAce 3.85 (with Serial).exe
Size 16.1MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 969460519c52513ad237e996fb013351
SHA1 bffc95e16bdf9250ce2e0751a2e8189656b4b23f
SHA256 958005eda16817f2609e09b03eeabaca1c6a3ccbf40d49b08b8a1ec8e4265fb2
CRC32 15EC2F6D
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 3cc5410db198f05d_contawin 2000 (full version).exe
Filepath C:\Windows\Intelx386\ContaWin 2000 (full version).exe
Size 13.4MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 0e1884eefb2ccb76972804dbfdeceb64
SHA1 e222f0e586a11d359188f3a887b5bef80b83d2a6
SHA256 3cc5410db198f05d0ac7c297d9b1ac621d76fb3141ea4e0e375d162faa08f46a
CRC32 3E7CE1AB
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name ff0a87ee8e647b44_winamp 5.0 (full version).exe
Filepath C:\Windows\Intelx386\Winamp 5.0 (full version).exe
Size 15.7MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 7e96e978d54dd408d68427ed29b1185a
SHA1 16ae899c1cb02baaf9e78beaa762bed834829cdd
SHA256 ff0a87ee8e647b4406425f843e6f275cbfaf064b5eb399186682474c6640af16
CRC32 2CC7B0DD
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 4611cf02cad6ea81_update photoshop 8.0 to photoshop 9.5 (it磗 work!).exe
Filepath C:\Windows\Intelx386\Update Photoshop 8.0 to Photoshop 9.5 (It磗 Work!).exe
Size 14.2MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 b75f5f6b8f11952833907e8b2ddd4628
SHA1 40b864e33fbc63c8b689bb28f505449d1432bb69
SHA256 4611cf02cad6ea8192dd42b4922e8ead89ae9d6ab5f7707bf340039d163d83a9
CRC32 DE910EE8
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 41fd293479b63a16_winrar v6.11 (with crack).exe
Filepath C:\Windows\Intelx386\WinRar v6.11 (with crack).exe
Size 14.7MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 8df38ae7cfdcb91fb9c92d62fcba47d0
SHA1 57d40606ebb5401043344f6578e36e1381fbd308
SHA256 41fd293479b63a16146b35d99eec990ca22fb4228fb3760b661393a27019a92f
CRC32 EDF4D5A9
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name c5481df2e375e000_visual c.exe
Filepath C:\Windows\Intelx386\Visual C.exe
Size 10.0MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 a58183c9cc0d608e63ee7f6a436516be
SHA1 b1abd139c3abaf374b35ba4bcce284012914bbe2
SHA256 ecbb9aad407800eddac18333315e18f6bdeffa520e202ad2a465d346927d3912
CRC32 E5696018
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name de4f02856af40e82_winamp 3.5 (full version).exe
Filepath C:\Windows\Intelx386\Winamp 3.5 (full version).exe
Size 14.8MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 9a149ebd1727ac47d74bda9df3c96b0c
SHA1 62226c7d1384a4108b5a2af3fc2582aabf15beba
SHA256 de4f02856af40e82389a99998092427ff0aea6b3a1a20d15c91a744f231d49f3
CRC32 F62CA0A0
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 773ac55e815f24fd_resident evil for gamecube.exe
Filepath C:\Windows\Intelx386\Resident Evil for GameCube.exe
Size 11.0MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 70f69cdfaa5374678ce9b05ef54089b7
SHA1 c4bd3a7b6b7a0c67133e599e4eed8dd016ceba3d
SHA256 68f9b2bddf37bbc1ae6871123f83b5c56526a203042516ec40b9365ac55d82cf
CRC32 FF8DD44F
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name f2be3df99ebd6745_visual c.exe
Filepath C:\Windows\Intelx386\Visual C.exe
Size 12.4MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ddcf9e3d8801608223361a0d40a07555
SHA1 8fffbbbc2f1d19c0ec5698b5921bec81b2b68ba9
SHA256 f2be3df99ebd67458a925608d52a03f08fda889f17fbeaf0a47a8723fe947a09
CRC32 5680FF7D
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 200976583da44c9a_pack 50 juegos ps2.exe
Filepath C:\Windows\Intelx386\Pack 50 Juegos PS2.exe
Size 12.5MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 9c076d71cd0c09544588fde5e1d5a145
SHA1 33fac808a86a1fbfc5ce315a0f1c79bc0fd4241a
SHA256 200976583da44c9a8ce1ab484f1c8912c4a27e6d9f7c16d11841b4a1392e0c79
CRC32 E33E0DCE
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name ecfa08d67397a775_visual c.exe
Filepath C:\Windows\Intelx386\Visual C.exe
Size 6.5MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 70e688247c33952df4dca9517acf3006
SHA1 3c1cf1af7b5d53b4a2a3908fb43b8bd31b817586
SHA256 342df660e2b6f9d1bfd597a83dc4cf51c99e584a0c7474eb3ce2587fc8fd1b32
CRC32 1AFF9042
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name b6df92aec0d0f446_simpsons pack guiones (temporada 2004).exe
Filepath C:\Windows\Intelx386\Simpsons pack guiones (Temporada 2004).exe
Size 12.9MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 2335c1e378b5fdccb304c4f27682b82a
SHA1 6f90c2ab7a5117362fef0e93e2a48288cd9a00a0
SHA256 b6df92aec0d0f446b1195ce94fbbbb6f35509258936bc9f392d8f328e7f74156
CRC32 CBD0955D
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name c6609d797f33bd04_rm2gba.exe
Filepath C:\Windows\Intelx386\RM2GBA.exe
Size 12.4MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 fa9a0e0556e2dfb4f623236c9440fe3f
SHA1 3f86645cb600e6928fe89d1c662508ba119b627b
SHA256 c6609d797f33bd0416f0d962003b16025db1caf9e19c750c79bcd8235564674c
CRC32 A40ACD56
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 34bd5681b02efd51_mazinkaiser pack fondos de escritorio.exe
Filepath C:\Windows\Intelx386\Mazinkaiser pack fondos de escritorio.exe
Size 12.8MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 6005ebc32f455ff59cc4688365bca3e5
SHA1 bb5b72cac7ddad853e9ef0c2703182d19068ecb8
SHA256 34bd5681b02efd51dcc5d8384796c18349a97edb00aa0a4f656d58fb9066fb16
CRC32 69C2DC01
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 0e9130208020608f_visual c.exe
Filepath C:\Windows\Intelx386\Visual C.exe
Size 904.0KB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c7a9a155530f789a0cf0f3fa8b58ed26
SHA1 b7047f15db6fbe756945b4b04a06409aede159e7
SHA256 7e36c8eea9b659847eb6e36bc001b4d2fcac100b625ad275143977219aba2ed7
CRC32 A53CD171
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name e156f54b4546890d_realone player (full version).exe
Filepath C:\Windows\Intelx386\RealOne Player (Full version).exe
Size 13.6MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 eaef307aa3af6ea57af0478861e0f735
SHA1 8d08daa9f74f8cc5aa58ae5d1432ccaef513b402
SHA256 e156f54b4546890ddcf450d78fadf2a755c02aa054c66581ec836f26e0050b31
CRC32 61543215
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 0c0771634a035829_gamecube emulator.exe
Filepath C:\Windows\Intelx386\GameCube Emulator.exe
Size 12.4MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 e47766f9fa522ca2a1719700d663f932
SHA1 b928cdb69ddaa0ac745411e37def3e6e55b164d5
SHA256 0c0771634a035829aa487023e7f2e91c0a86df599f8e2e0fce59423b4d87042f
CRC32 6AAB9E9D
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name aeeb138cbc82d323_bsplayer v3.exe
Filepath C:\Windows\Intelx386\BsPlayer v3.exe
Size 14.6MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c01d5200480a0660f98f801a886d842c
SHA1 2dd7ac411198334d79e666ddef30345e3e4478b3
SHA256 aeeb138cbc82d323475a2f304330daa24b06334c08e5848e9b8e9c2bf3b6684f
CRC32 4B929C54
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 445ce9a67880e5ef_download accelerator plus (dap) (full version with serial).exe
Filepath C:\Windows\Intelx386\Download Accelerator Plus (DAP) (full version with serial).exe
Size 13.5MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 997fb05144b2e31c1a3cbdf0592fedd8
SHA1 19fc881ce3b2c878ddf370f733d648d3e30469ea
SHA256 445ce9a67880e5ef3f08807337942ca482c9c12124dd9b2371a8ba694ad82750
CRC32 A49E3C0F
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 8ba50aeb34b9d777_winzip 9.exe
Filepath C:\Windows\Intelx386\WinZip 9.exe
Size 14.3MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 5c1467ef041476f7d0b6d23b47406a3e
SHA1 0a2fd1e232a20bad632e6e6478900a58cf2b5a04
SHA256 8ba50aeb34b9d777ee626d2a364a2a015a0334419592a761726c5618033d3594
CRC32 490499C2
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name f97f269518bd9193_visual basic 6.exe
Filepath C:\Windows\Intelx386\Visual Basic 6.exe
Size 12.4MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c2cdb112d66430f0dbdf4a75ea2ed4cc
SHA1 c4ebafe7eaace1ff5d760aa0a3ee0c04eb2bae20
SHA256 f97f269518bd9193084cede76136cbb20171dd839f65d1dfce26b2e90debad88
CRC32 73B64CDF
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 0700736f02b84ffe_visual c.exe
Filepath C:\Windows\Intelx386\Visual C.exe
Size 2.0MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 e9a62c04a95eeb17192205136a53c5a6
SHA1 010e6c9e2567a0d37886c27eb791733cf1f20cdd
SHA256 5cc221dca44a01a10f3ae862d912174566e011ae2f7bc19fe5b7c8a3acc74717
CRC32 1A19CC5B
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name f7b907c1a4bc63c0_silent hill.exe
Filepath C:\Windows\Intelx386\Silent Hill.exe
Size 12.5MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 544a754b532e1300a65a1fb97098b81e
SHA1 1e929d276be98817081c329e9b5f84c97062901b
SHA256 f7b907c1a4bc63c063a366b2fee21f0e39964a57141e1d4045d8c41bdbde8d4f
CRC32 D04969D8
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 8b71b8d3c356578b_gbaemu.exe
Filepath C:\Windows\Intelx386\GBAEmu.exe
Size 12.5MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 564aed203fd31c957527849d1b3239d6
SHA1 069424deb9abe76868f651ec32166460275df71d
SHA256 8b71b8d3c356578bf61891e5edac1cfcb521b4b1ec6f8157649a1f72db7be5bb
CRC32 6794D536
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 586714d259458bd3_3d studio r8 (it's work!!).exe
Filepath C:\Windows\Intelx386\3D Studio R8 (It's Work!!).exe
Size 21.1MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 65f51bd0c430b95ad08766d5bc212d67
SHA1 a757f62cb062cda6da81f2c837cf8ac103029116
SHA256 586714d259458bd3f0a4bd8f3338de5e1eb2b270319cfe0a483e8866aa73ffb2
CRC32 B0E31318
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name fa8b67e310aed9ff_juegos java para nokia.exe
Filepath C:\Windows\Intelx386\Juegos JAVA para NOKIA.exe
Size 13.0MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 0c46007d196e5672feba50eed5926a0a
SHA1 2a96c91e7fdabedcfaff1f3946f18108b577f15f
SHA256 fa8b67e310aed9ff03d2d3aca4b570eb9517de522a28d996a6cb089a37ea0a96
CRC32 4D85B2E8
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 5a419880f8f53874_pack 25 juegos gamecube.exe
Filepath C:\Windows\Intelx386\Pack 25 Juegos GameCube.exe
Size 12.5MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 36936d37fce697408e60130caadb89f9
SHA1 a27b377a7959b8652d1cddf3fa4f415969f44ab0
SHA256 5a419880f8f538748f9ee71730a0750f466ed4851cadba9ead0bf66f087fb82b
CRC32 A03B8E95
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name ec3c15cdf8a4f62e_msn messenger 6.3.exe
Filepath C:\Windows\Intelx386\MSN messenger 6.3.exe
Size 14.3MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 773af8baf1330985852735befd5bd96e
SHA1 56eb7e2ffca974ddc6b60f33b19e37256c5acf0c
SHA256 ec3c15cdf8a4f62e4b3c2329d342a06c6c9079d67b194093ba41da9d82cf4c06
CRC32 ABB7D0D9
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 7224fb41957f13bf_visual c.exe
Filepath C:\Windows\Intelx386\Visual C.exe
Size 3.3MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 2b1acaa480e71af4deff9d0c0599ec55
SHA1 17ee631304138d1c821be70c4c513b7456635c53
SHA256 c06d9fd375a86ff2c4cc2e7c47e47504c36f7db8ddb7a78238c2905c01f69ad4
CRC32 314ADA65
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 97bc72af940a134b_virtualdub 2.1.4.exe
Filepath C:\Windows\Intelx386\VirtualDub 2.1.4.exe
Size 14.6MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 0882b78bd798a8284273300d051e0fe3
SHA1 ebed0193d8fb8fba24b007098bc027243a27e5c2
SHA256 97bc72af940a134bcf5fdf385e4ffb39061c95f658ff58c0e2d4ad7f2ed3163d
CRC32 28C37B36
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 619d88e3bf7d1649_update photoshop 7.0 to photoshop 9.16 (it磗 work!).exe
Filepath C:\Windows\Intelx386\Update Photoshop 7.0 to Photoshop 9.16 (It磗 Work!).exe
Size 14.0MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 2ffc22962f2318d2d89b8f130b53f24f
SHA1 def7270f2be3a3f9080f89554708108cbfc0c745
SHA256 619d88e3bf7d16492354b382b1e3ecdf157b5b7881f965a77fb9d8aab57d8033
CRC32 28BF13FD
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 99ac234cda1e66a1_hacha profesional edition.exe
Filepath C:\Windows\Intelx386\Hacha Profesional Edition.exe
Size 12.9MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 e33cc1621d064688c77cd6a5f9e0fb1d
SHA1 a22c1b2003e00e211153491ae526dbd453ef8c0b
SHA256 99ac234cda1e66a1a877421798b0386f6ff663fc6a1301f81158508f7684d7cc
CRC32 338CD55C
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 60d92838ac052fac_divx 7.2 freeware.exe
Filepath C:\Windows\Intelx386\DivX 7.2 freeware.exe
Size 13.3MB
Processes 2660 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 53859b8adc786e8e08770c89fe3a692f
SHA1 588a1c601895105728d2c9c07fb35ca4a3215bf1
SHA256 60d92838ac052fac3a577b7676a926cc7e3fe6a8bb158d2258529fd23cbd78d2
CRC32 AB80F245
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.