9.0
极危

ac4d3acc896cc3fd6e4ba14547572dfc0447f47f2c29c28a170db4b0169c6e2f

40c901ab1669ea27f52ce3c0b8f07bdb.exe

分析耗时

85s

最近分析

文件大小

1.1MB
静态报毒 动态报毒
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
未检测 暂无反病毒引擎检测结果
静态指标
Command line console output was observed (16 个事件)
Time & API Arguments Status Return Repeated
1619390167.382626
WriteConsoleW
buffer: `.:+syhdmNNNNNmdyo/-`
console_handle: 0x00000007
success 1 0
1619390167.398626
WriteConsoleW
buffer: `./ydNMMMMMMMMMMMMNmdys+-.`
console_handle: 0x00000007
success 1 0
1619390167.398626
WriteConsoleW
buffer: .+hNMMMMMMMMMMMMNNMNmNMMMMMNdyo-
console_handle: 0x00000007
success 1 0
1619390167.398626
WriteConsoleW
buffer: -yNMMMMMMMMMMMMMMMMMNms::+ymMMMNh/
console_handle: 0x00000007
success 1 0
1619390167.398626
WriteConsoleW
buffer: -hMMMNNMMMMMMMMMNNNMMMMNNh. `dMy.
console_handle: 0x00000007
success 1 0
1619390167.413626
WriteConsoleW
buffer: .sNMNNmNMMMMMMMMMh/-:sNMMMNNo` .MM.
console_handle: 0x00000007
success 1 0
1619390167.413626
WriteConsoleW
buffer: :sdMd:ddNMNNNMMMMN+` :mMMMMmd` sMs
console_handle: 0x00000007
success 1 0
1619390167.413626
WriteConsoleW
buffer: -:yMh``hdNNmmmmNMMMmysymMMMMMmh`/Md`
console_handle: 0x00000007
success 1 0
1619390167.413626
WriteConsoleW
buffer: `oMy` /mmmmdhhhdmNNNNNNNNNMNN+/Nd.
console_handle: 0x00000007
success 1 0
1619390167.429626
WriteConsoleW
buffer: +Md` +mmmdhhyyyyyhhhdmmNmmsoNy`
console_handle: 0x00000007
success 1 0
1619390167.429626
WriteConsoleW
buffer: `yMN. :hmdddhhyyyhhddmmmhsdm/
console_handle: 0x00000007
success 1 0
1619390167.429626
WriteConsoleW
buffer: -:. `:shdmddddddmmdyshh+`
console_handle: 0x00000007
success 1 0
1619390167.429626
WriteConsoleW
buffer: `.:+ossyyysss+-`
console_handle: 0x00000007
success 1 0
1619390167.460626
WriteConsoleW
buffer: [1] Activate Tweaker
console_handle: 0x00000007
success 1 0
1619390167.460626
WriteConsoleW
buffer: [2] Deactivate
console_handle: 0x00000007
success 1 0
1619390167.460626
WriteConsoleW
buffer: SELECT:
console_handle: 0x00000007
success 1 0
The executable contains unknown PE section names indicative of a packer (could be a false positive) (3 个事件)
section CODE
section DATA
section BSS
The executable uses a known packer (1 个事件)
packer BobSoft Mini Delphi -> BoB / BobSoft
One or more processes crashed (2 个事件)
Time & API Arguments Status Return Repeated
1619390150.007126
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 50921280
registers.edi: 0
registers.eax: 0
registers.ebp: 50921352
registers.edx: 6
registers.ebx: 1983206444
registers.esi: 0
registers.ecx: 0
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 e9 9e 78 00 00 e9
exception.symbol: 40c901ab1669ea27f52ce3c0b8f07bdb+0x61e5e
exception.instruction: div eax
exception.module: 40c901ab1669ea27f52ce3c0b8f07bdb.exe
exception.exception_code: 0xc0000094
exception.offset: 400990
exception.address: 0x461e5e
success 0 0
1619390167.335001
__exception__
stacktrace:
RtlFlsAlloc+0x421 EtwNotificationRegister-0x6ae ntdll+0x3ee84 @ 0x77d6ee84
RtlRunOnceComplete+0x3a4 LdrLoadDll-0xb1 ntdll+0x3c389 @ 0x77d6c389
LdrLoadDll+0x7b _strcmpi-0x304 ntdll+0x3c4b5 @ 0x77d6c4b5
New_ntdll_LdrLoadDll@16+0x7b New_ntdll_LdrUnloadDll@4-0xb7 @ 0x7400d4cf
LoadLibraryExW+0x178 LoadLibraryExA-0x2a kernelbase+0x11d2a @ 0x778f1d2a
40c901ab1669ea27f52ce3c0b8f07bdb+0x8c3f8 @ 0x48c3f8
_CorValidateImage+0x83f _CorExeMain-0x2cc mscoree+0x4b0f @ 0x73df4b0f
_CorExeMain+0xf62 CreateConfigStream-0x209a mscoree+0x5d3d @ 0x73df5d3d
0x57005c

registers.esp: 1633872
registers.edi: 0
registers.eax: 0
registers.ebp: 1633912
registers.edx: 582600
registers.ebx: 0
registers.esi: 1634116
registers.ecx: 176
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfe0214ad
success 0 0
行为判定
动态指标
One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
Allocates read-write-execute memory (usually to unpack itself) (28 个事件)
Time & API Arguments Status Return Repeated
1619390149.944126
NtAllocateVirtualMemory
process_identifier: 2128
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00390000
success 0 0
1619390150.007126
NtProtectVirtualMemory
process_identifier: 2128
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 36864
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00461000
success 0 0
1619390150.007126
NtAllocateVirtualMemory
process_identifier: 2128
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x00900000
success 0 0
1619390159.476001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00400000
success 0 0
1619390160.398001
NtAllocateVirtualMemory
process_identifier: 912
region_size: 983040
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x01f60000
success 0 0
1619390160.398001
NtAllocateVirtualMemory
process_identifier: 912
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02010000
success 0 0
1619390160.413001
NtAllocateVirtualMemory
process_identifier: 912
region_size: 540672
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x01e80000
success 0 0
1619390160.413001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 512000
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01e82000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01d62000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01d62000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76353000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01d62000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76354000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01d62000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01d62000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77d4f000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01d62000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76353000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01d62000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01d62000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01d62000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76354000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01d62000
success 0 0
1619390167.319001
NtProtectVirtualMemory
process_identifier: 912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
Creates executable files on the filesystem (2 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\Mercury.bat
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.exe.vbs
Drops a binary and executes it (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\Mercury.bat
网络通信
Communicates with host for which no DNS query was performed (2 个事件)
host 113.108.239.196
host 172.217.24.14
Allocates execute permission to another process indicative of possible code injection (1 个事件)
Time & API Arguments Status Return Repeated
1619390158.476126
NtAllocateVirtualMemory
process_identifier: 3044
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0x00000118
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x000f0000
success 0 0
Installs itself for autorun at Windows startup (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.exe.vbs
Creates a thread using NtQueueApcThread in a remote process potentially indicative of process injection (2 个事件)
Process injection Process 2128 created a thread in remote process 3044
Time & API Arguments Status Return Repeated
1619390158.491126
NtQueueApcThread
thread_handle: 0x00000114
process_identifier: 3044
function_address: 0x000f05c0
parameter: 0x00100000
success 0 0
Potential code injection by writing to the memory of another process (2 个事件)
Time & API Arguments Status Return Repeated
1619390158.476126
WriteProcessMemory
process_identifier: 3044
buffer: Q¹0d‹‹@ ‹@ ‹‹‹@‰$‹$YÃVWR¾§ÆgNè„Yƒøv· ¿Zwf;Ït ¿Ntf;ÏuƒÂƒè…Àt‹ÎÁá‹þÁïϾ:Ï3ñBHué_‹Æ^ÃU‹ìQQ‹MSVW…Ét;¸MZf9u1‹A<Át*8PEu"‹@xƒeüÁ‹x‹X$‹p ‹@ùÙñ‰Eø…Àu 3À_^[ÉËM‹Eü‹†ÑèOÿÿÿ;E t ÿEü‹Eü;Eøràë׋Eü·C‹‡EëÊU‹ìQSW3ÿWWjWjh@ÿuÿV‹Øƒûÿu3Àë&WWWS‰}üÿV0W‹}EüPWÿu SÿV SÿV3À9}ü”À_[ÉÅÉtè•…Àt3Éf‰ÃU‹ììV‹ð…äüÿÿP3ÀPPjPÿVl…À…Žj\Xf‰Eü3Àj.f‰EþXjvf‰EðXf‰EòjbXf‰EôjsXf‰Eö3Àf‰EøUü…äüÿÿèÖ‹U è΍UðèÆÿu…ìþÿÿÿuPÿVxƒÄ …äüÿÿPÿV…ìþÿÿPèÂ@P…ìþÿÿP…äüÿÿPèîþÿÿƒÄ^ÉÃU‹ìì,j:XjZf‰EÜXjof‰EÞXjnf‰EàXjef‰EâXjIf‰EäXjdf‰EæXjef‰EèXjnf‰EêXjtf‰EìXjif‰EîXjff‰EðXjif‰EòXf‰EôjeXf‰EöjrXf‰Eø3Àf‰Eú…Ôýÿÿ謍UÜè÷EÿPÆEÿèPEÿP…ÔýÿÿPè?þÿÿƒÄÉÃU‹ìQƒeüV‹ðEüPÿuèþYY…Àtƒ}ütÿuüPÿu è þÿÿƒÄ …Àt3À@ë3À^ÉÃU‹ììSV‹ð‹Ï…øýÿÿè'‹Èè(þÿÿ3ÛS…øýÿÿPÿVWÿV8] uWÿu‹Æè~ÿÿÿYY‹Øë €} u5SWÿuÿWÿV(3ۃøÿ‹Ï•Ãèªþÿÿƒûu9]u WÿV(ƒÈPWÿV,3À@ë3À^[ÉÃU‹ìƒìSVWèsüÿÿ‹ø…ÿ„"h"¿ŠWèÌüÿÿ‹ØYY…Û„ jh0h„jÿӋð…ö„ñh¼Û«½W‰~`‰^@è•üÿÿhÒ¼‰W‰F$è‡üÿÿh|QgjW‰F(èyüÿÿhëI”W‰F,èküÿÿh•å©—W‰F0è]üÿÿh¥°(W‰F4èOüÿÿh)·W‰F8èAüÿÿh[uŠðW‰FDè3üÿÿƒÄ@‹Øhd†óuW‰^ è üÿÿh¢¦aëW‰F èüÿÿhÕOd"W‰Fèüÿÿhy.ÔW‰Fèöûÿÿh±÷W‰FèèûÿÿheóW÷W‰FèÚûÿÿh¯4P“W‰FèÌûÿÿh{=#W‰F<è¾ûÿÿƒÄ@hOû~ W‰Fè­ûÿÿhà=!6W‰FHèŸûÿÿhh‰#W‰è’ûÿÿ‰FLhÍeWè„ûÿÿhÓ1ÆVW‰FPèvûÿÿh7œ½W‰FTèhûÿÿh£-ãW‰FXèZûÿÿ‰F\ƒÄ8EðPÇEðshelÇEôl32ÿӋø…ÿt"hÀåz°W‰~dè,ûÿÿhêêºW‰FlèûÿÿƒÄ‰FpEøPÇEøuserfÇEü32ÆEþÿV ‹ø…ÿtAhqV°0W‰~hèìúÿÿhkV°0W‰FxèÞúÿÿh&cj—W‰FtèÐúÿÿh<cj—W‰F|èÂúÿÿƒÄ ‰†€‹Æë3À_^[ÉÃU‹ìƒì\V‹uW3ÿ;÷„îSè¤ýÿÿ‹Ø;ßu WÿDéՍ†‰EüPëj2ÿSPÿuüWWÿSL…ÀuïjdÿSPF‰Eø‰E9>tYÿ¶¶ŽQP¾ ‹Ãè¾üÿÿ‰}3ÿƒÄ 9>t1jDE¤WPèjEèWPèüƒÄEèPE¤PWWj WWWWÿuÿS$9¾(t†lP†,Pÿu‹Ãè½úÿÿƒÄ 9¾tëj2ÿSPÿuüWWÿSL…ÀuïjdÿSPÿuøÿSWÿSD[_3À^ÉÂU‹ìƒì SW3ÿWWjWjh€ÿu‰}øÿV‹Øƒûÿu3Àë>WSÿV‰Eô;Çt+jh0PWÿV@‰Eø;ÇtWMüQÿuô‰}üPSÿV‹Eü‹M ‰SÿV‹Eø_[É÷f‰f…ÒtV‹ð+ñƒÁ·f‰f…Òuñ^ÃU‹ìQQ‹E‰Eü‹EüE‰Eø‹Eü;Eøt‹EüŠM ˆ‹Eü@‰Eüëç‹EÉÃfƒ8V‹ðt ƒÆfƒ>u÷+ò· f‰ ƒÂf…Éuñ^ËD$Š@„Éuù+D$HÅÉu3ÀÃfƒ9‹Át ƒÀfƒ8u÷+ÁÑøÃ…Ét èÚÿÿÿ…ÀtDAþë fƒù\t ƒè·f…Éuï3ÀÃ
process_handle: 0x00000118
base_address: 0x000f0000
success 1 0
1619390158.476126
WriteProcessMemory
process_identifier: 3044
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\40c901ab1669ea27f52ce3c0b8f07bdb.exe"C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\40c901ab1669ea27f52ce3c0b8f07bdb.exe" chrome.exeset kUcqOoLy = cReaTEobjeCt("wsCript.shEll") KuCqooLY.rUn """%ls""", 0, False
process_handle: 0x00000118
base_address: 0x00100000
success 1 0
Used NtSetContextThread to modify a thread in a remote process indicative of process injection (2 个事件)
Process injection Process 2128 called NtSetContextThread to modify thread in remote process 912
Time & API Arguments Status Return Repeated
1619390159.179126
NtSetContextThread
thread_handle: 0x00000250
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5324240
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 912
success 0 0
Resumed a suspended thread in a remote process potentially indicative of process injection (2 个事件)
Process injection Process 2128 resumed a thread in remote process 912
Time & API Arguments Status Return Repeated
1619390159.335126
NtResumeThread
thread_handle: 0x00000250
suspend_count: 1
process_identifier: 912
success 0 0
Executed a process and injected code into it, probably while unpacking (13 个事件)
Time & API Arguments Status Return Repeated
1619390158.476126
CreateProcessInternalW
thread_identifier: 1068
thread_handle: 0x00000114
process_identifier: 3044
current_directory:
filepath: C:\Windows\System32\notepad.exe
track: 1
command_line:
filepath_r: C:\Windows\system32\notepad.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x00000118
inherit_handles: 0
success 1 0
1619390158.476126
NtAllocateVirtualMemory
process_identifier: 3044
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0x00000118
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x000f0000
success 0 0
1619390158.476126
NtAllocateVirtualMemory
process_identifier: 3044
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 4 (PAGE_READWRITE)
process_handle: 0x00000118
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x00100000
success 0 0
1619390158.476126
WriteProcessMemory
process_identifier: 3044
buffer: Q¹0d‹‹@ ‹@ ‹‹‹@‰$‹$YÃVWR¾§ÆgNè„Yƒøv· ¿Zwf;Ït ¿Ntf;ÏuƒÂƒè…Àt‹ÎÁá‹þÁïϾ:Ï3ñBHué_‹Æ^ÃU‹ìQQ‹MSVW…Ét;¸MZf9u1‹A<Át*8PEu"‹@xƒeüÁ‹x‹X$‹p ‹@ùÙñ‰Eø…Àu 3À_^[ÉËM‹Eü‹†ÑèOÿÿÿ;E t ÿEü‹Eü;Eøràë׋Eü·C‹‡EëÊU‹ìQSW3ÿWWjWjh@ÿuÿV‹Øƒûÿu3Àë&WWWS‰}üÿV0W‹}EüPWÿu SÿV SÿV3À9}ü”À_[ÉÅÉtè•…Àt3Éf‰ÃU‹ììV‹ð…äüÿÿP3ÀPPjPÿVl…À…Žj\Xf‰Eü3Àj.f‰EþXjvf‰EðXf‰EòjbXf‰EôjsXf‰Eö3Àf‰EøUü…äüÿÿèÖ‹U è΍UðèÆÿu…ìþÿÿÿuPÿVxƒÄ …äüÿÿPÿV…ìþÿÿPèÂ@P…ìþÿÿP…äüÿÿPèîþÿÿƒÄ^ÉÃU‹ìì,j:XjZf‰EÜXjof‰EÞXjnf‰EàXjef‰EâXjIf‰EäXjdf‰EæXjef‰EèXjnf‰EêXjtf‰EìXjif‰EîXjff‰EðXjif‰EòXf‰EôjeXf‰EöjrXf‰Eø3Àf‰Eú…Ôýÿÿ謍UÜè÷EÿPÆEÿèPEÿP…ÔýÿÿPè?þÿÿƒÄÉÃU‹ìQƒeüV‹ðEüPÿuèþYY…Àtƒ}ütÿuüPÿu è þÿÿƒÄ …Àt3À@ë3À^ÉÃU‹ììSV‹ð‹Ï…øýÿÿè'‹Èè(þÿÿ3ÛS…øýÿÿPÿVWÿV8] uWÿu‹Æè~ÿÿÿYY‹Øë €} u5SWÿuÿWÿV(3ۃøÿ‹Ï•Ãèªþÿÿƒûu9]u WÿV(ƒÈPWÿV,3À@ë3À^[ÉÃU‹ìƒìSVWèsüÿÿ‹ø…ÿ„"h"¿ŠWèÌüÿÿ‹ØYY…Û„ jh0h„jÿӋð…ö„ñh¼Û«½W‰~`‰^@è•üÿÿhÒ¼‰W‰F$è‡üÿÿh|QgjW‰F(èyüÿÿhëI”W‰F,èküÿÿh•å©—W‰F0è]üÿÿh¥°(W‰F4èOüÿÿh)·W‰F8èAüÿÿh[uŠðW‰FDè3üÿÿƒÄ@‹Øhd†óuW‰^ è üÿÿh¢¦aëW‰F èüÿÿhÕOd"W‰Fèüÿÿhy.ÔW‰Fèöûÿÿh±÷W‰FèèûÿÿheóW÷W‰FèÚûÿÿh¯4P“W‰FèÌûÿÿh{=#W‰F<è¾ûÿÿƒÄ@hOû~ W‰Fè­ûÿÿhà=!6W‰FHèŸûÿÿhh‰#W‰è’ûÿÿ‰FLhÍeWè„ûÿÿhÓ1ÆVW‰FPèvûÿÿh7œ½W‰FTèhûÿÿh£-ãW‰FXèZûÿÿ‰F\ƒÄ8EðPÇEðshelÇEôl32ÿӋø…ÿt"hÀåz°W‰~dè,ûÿÿhêêºW‰FlèûÿÿƒÄ‰FpEøPÇEøuserfÇEü32ÆEþÿV ‹ø…ÿtAhqV°0W‰~hèìúÿÿhkV°0W‰FxèÞúÿÿh&cj—W‰FtèÐúÿÿh<cj—W‰F|èÂúÿÿƒÄ ‰†€‹Æë3À_^[ÉÃU‹ìƒì\V‹uW3ÿ;÷„îSè¤ýÿÿ‹Ø;ßu WÿDéՍ†‰EüPëj2ÿSPÿuüWWÿSL…ÀuïjdÿSPF‰Eø‰E9>tYÿ¶¶ŽQP¾ ‹Ãè¾üÿÿ‰}3ÿƒÄ 9>t1jDE¤WPèjEèWPèüƒÄEèPE¤PWWj WWWWÿuÿS$9¾(t†lP†,Pÿu‹Ãè½úÿÿƒÄ 9¾tëj2ÿSPÿuüWWÿSL…ÀuïjdÿSPÿuøÿSWÿSD[_3À^ÉÂU‹ìƒì SW3ÿWWjWjh€ÿu‰}øÿV‹Øƒûÿu3Àë>WSÿV‰Eô;Çt+jh0PWÿV@‰Eø;ÇtWMüQÿuô‰}üPSÿV‹Eü‹M ‰SÿV‹Eø_[É÷f‰f…ÒtV‹ð+ñƒÁ·f‰f…Òuñ^ÃU‹ìQQ‹E‰Eü‹EüE‰Eø‹Eü;Eøt‹EüŠM ˆ‹Eü@‰Eüëç‹EÉÃfƒ8V‹ðt ƒÆfƒ>u÷+ò· f‰ ƒÂf…Éuñ^ËD$Š@„Éuù+D$HÅÉu3ÀÃfƒ9‹Át ƒÀfƒ8u÷+ÁÑøÃ…Ét èÚÿÿÿ…ÀtDAþë fƒù\t ƒè·f…Éuï3ÀÃ
process_handle: 0x00000118
base_address: 0x000f0000
success 1 0
1619390158.476126
WriteProcessMemory
process_identifier: 3044
buffer: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\40c901ab1669ea27f52ce3c0b8f07bdb.exe"C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\40c901ab1669ea27f52ce3c0b8f07bdb.exe" chrome.exeset kUcqOoLy = cReaTEobjeCt("wsCript.shEll") KuCqooLY.rUn """%ls""", 0, False
process_handle: 0x00000118
base_address: 0x00100000
success 1 0
1619390159.038126
CreateProcessInternalW
thread_identifier: 880
thread_handle: 0x00000260
process_identifier: 2420
current_directory: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp
filepath:
track: 1
command_line: "C:\Users\ADMINI~1.OSK\AppData\Local\Temp\Mercury.bat"
filepath_r:
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
process_handle: 0x00000254
inherit_handles: 0
success 1 0
1619390159.132126
CreateProcessInternalW
thread_identifier: 1812
thread_handle: 0x00000250
process_identifier: 912
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\40c901ab1669ea27f52ce3c0b8f07bdb.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000244
inherit_handles: 0
success 1 0
1619390159.132126
NtUnmapViewOfSection
process_identifier: 912
region_size: 4096
process_handle: 0x00000244
base_address: 0x00400000
success 0 0
1619390159.148126
NtMapViewOfSection
section_handle: 0x000001e0
process_identifier: 912
commit_size: 1134592
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000244
allocation_type: 0 ()
section_offset: 0
view_size: 1134592
base_address: 0x00400000
success 0 0
1619390159.179126
NtGetContextThread
thread_handle: 0x00000250
success 0 0
1619390159.179126
NtSetContextThread
thread_handle: 0x00000250
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5324240
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 912
success 0 0
1619390159.335126
NtResumeThread
thread_handle: 0x00000250
suspend_count: 1
process_identifier: 912
success 0 0
1619390159.710626
CreateProcessInternalW
thread_identifier: 1752
thread_handle: 0x00000084
process_identifier: 1888
current_directory: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp
filepath: C:\Windows\System32\mode.com
track: 1
command_line: mode con: cols=100 lines=35
filepath_r: C:\Windows\system32\mode.com
stack_pivoted: 0
creation_flags: 524288 (EXTENDED_STARTUPINFO_PRESENT)
process_handle: 0x00000080
inherit_handles: 1
success 1 0
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (2 个事件)
dead_host 172.217.24.14:443
dead_host 172.217.160.110:443
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-06-20 06:22:17

Imports

Library kernel32.dll:
0x46d164 VirtualFree
0x46d168 VirtualAlloc
0x46d16c LocalFree
0x46d170 LocalAlloc
0x46d174 GetVersion
0x46d178 GetCurrentThreadId
0x46d184 VirtualQuery
0x46d188 WideCharToMultiByte
0x46d18c MultiByteToWideChar
0x46d190 lstrlenA
0x46d194 lstrcpynA
0x46d198 LoadLibraryExA
0x46d19c GetThreadLocale
0x46d1a0 GetStartupInfoA
0x46d1a4 GetProcAddress
0x46d1a8 GetModuleHandleA
0x46d1ac GetModuleFileNameA
0x46d1b0 GetLocaleInfoA
0x46d1b4 GetCommandLineA
0x46d1b8 FreeLibrary
0x46d1bc FindFirstFileA
0x46d1c0 FindClose
0x46d1c4 ExitProcess
0x46d1c8 WriteFile
0x46d1d0 RtlUnwind
0x46d1d4 RaiseException
0x46d1d8 GetStdHandle
Library user32.dll:
0x46d1e0 GetKeyboardType
0x46d1e4 LoadStringA
0x46d1e8 MessageBoxA
0x46d1ec CharNextA
Library advapi32.dll:
0x46d1f4 RegQueryValueExA
0x46d1f8 RegOpenKeyExA
0x46d1fc RegCloseKey
Library oleaut32.dll:
0x46d204 SysFreeString
0x46d208 SysReAllocStringLen
0x46d20c SysAllocStringLen
Library kernel32.dll:
0x46d214 TlsSetValue
0x46d218 TlsGetValue
0x46d21c LocalAlloc
0x46d220 GetModuleHandleA
Library advapi32.dll:
0x46d228 RegQueryValueExA
0x46d22c RegOpenKeyExA
0x46d230 RegCloseKey
Library kernel32.dll:
0x46d238 lstrcpyA
0x46d23c lstrcmpA
0x46d240 WriteFile
0x46d248 WaitForSingleObject
0x46d24c VirtualQuery
0x46d250 VirtualAlloc
0x46d254 Sleep
0x46d258 SizeofResource
0x46d25c SetThreadLocale
0x46d260 SetFilePointer
0x46d264 SetEvent
0x46d268 SetErrorMode
0x46d26c SetEndOfFile
0x46d270 ResetEvent
0x46d274 ReadFile
0x46d278 MulDiv
0x46d27c LockResource
0x46d280 LoadResource
0x46d284 LoadLibraryA
0x46d290 GlobalUnlock
0x46d294 GlobalReAlloc
0x46d298 GlobalHandle
0x46d29c GlobalLock
0x46d2a0 GlobalFree
0x46d2a4 GlobalFindAtomA
0x46d2a8 GlobalDeleteAtom
0x46d2ac GlobalAlloc
0x46d2b0 GlobalAddAtomA
0x46d2b4 GetVersionExA
0x46d2b8 GetVersion
0x46d2bc GetTickCount
0x46d2c0 GetThreadLocale
0x46d2c8 GetSystemTime
0x46d2cc GetSystemInfo
0x46d2d0 GetStringTypeExA
0x46d2d4 GetStdHandle
0x46d2d8 GetProcAddress
0x46d2dc GetModuleHandleA
0x46d2e0 GetModuleFileNameA
0x46d2e4 GetLocaleInfoA
0x46d2e8 GetLocalTime
0x46d2ec GetLastError
0x46d2f0 GetFullPathNameA
0x46d2f4 GetFileAttributesA
0x46d2f8 GetDiskFreeSpaceA
0x46d2fc GetDateFormatA
0x46d300 GetCurrentThreadId
0x46d304 GetCurrentProcessId
0x46d308 GetCPInfo
0x46d30c GetACP
0x46d310 FreeResource
0x46d314 InterlockedExchange
0x46d318 FreeLibrary
0x46d31c FormatMessageA
0x46d320 FindResourceA
0x46d324 FindFirstFileA
0x46d328 FindClose
0x46d334 ExitThread
0x46d338 EnumCalendarInfoA
0x46d344 CreateThread
0x46d348 CreateFileA
0x46d34c CreateEventA
0x46d350 CompareStringA
0x46d354 CloseHandle
Library version.dll:
0x46d35c VerQueryValueA
0x46d364 GetFileVersionInfoA
Library gdi32.dll:
0x46d36c UnrealizeObject
0x46d370 StretchBlt
0x46d374 SetWindowOrgEx
0x46d378 SetWinMetaFileBits
0x46d37c SetViewportOrgEx
0x46d380 SetTextColor
0x46d384 SetStretchBltMode
0x46d388 SetROP2
0x46d38c SetPixel
0x46d390 SetEnhMetaFileBits
0x46d394 SetDIBColorTable
0x46d398 SetBrushOrgEx
0x46d39c SetBkMode
0x46d3a0 SetBkColor
0x46d3a4 SelectPalette
0x46d3a8 SelectObject
0x46d3ac SaveDC
0x46d3b0 RestoreDC
0x46d3b4 Rectangle
0x46d3b8 RectVisible
0x46d3bc RealizePalette
0x46d3c0 Polyline
0x46d3c4 PlayEnhMetaFile
0x46d3c8 PatBlt
0x46d3cc MoveToEx
0x46d3d0 MaskBlt
0x46d3d4 LineTo
0x46d3d8 IntersectClipRect
0x46d3dc GetWindowOrgEx
0x46d3e0 GetWinMetaFileBits
0x46d3e4 GetTextMetricsA
0x46d3f0 GetStockObject
0x46d3f4 GetPixel
0x46d3f8 GetPaletteEntries
0x46d3fc GetObjectA
0x46d408 GetEnhMetaFileBits
0x46d40c GetDeviceCaps
0x46d410 GetDIBits
0x46d414 GetDIBColorTable
0x46d418 GetDCOrgEx
0x46d420 GetClipBox
0x46d424 GetBrushOrgEx
0x46d428 GetBitmapBits
0x46d42c ExcludeClipRect
0x46d430 DeleteObject
0x46d434 DeleteEnhMetaFile
0x46d438 DeleteDC
0x46d43c CreateSolidBrush
0x46d440 CreatePenIndirect
0x46d444 CreatePalette
0x46d44c CreateFontIndirectA
0x46d450 CreateDIBitmap
0x46d454 CreateDIBSection
0x46d458 CreateCompatibleDC
0x46d460 CreateBrushIndirect
0x46d464 CreateBitmap
0x46d468 CopyEnhMetaFileA
0x46d46c BitBlt
Library opengl32.dll:
0x46d474 wglDeleteContext
Library user32.dll:
0x46d47c CreateWindowExA
0x46d480 WindowFromPoint
0x46d484 WinHelpA
0x46d488 WaitMessage
0x46d48c UpdateWindow
0x46d490 UnregisterClassA
0x46d494 UnhookWindowsHookEx
0x46d498 TranslateMessage
0x46d4a0 TrackPopupMenu
0x46d4a8 ShowWindow
0x46d4ac ShowScrollBar
0x46d4b0 ShowOwnedPopups
0x46d4b4 ShowCursor
0x46d4b8 SetWindowsHookExA
0x46d4bc SetWindowTextA
0x46d4c0 SetWindowPos
0x46d4c4 SetWindowPlacement
0x46d4c8 SetWindowLongA
0x46d4cc SetTimer
0x46d4d0 SetScrollRange
0x46d4d4 SetScrollPos
0x46d4d8 SetScrollInfo
0x46d4dc SetRect
0x46d4e0 SetPropA
0x46d4e4 SetParent
0x46d4e8 SetMenuItemInfoA
0x46d4ec SetMenu
0x46d4f0 SetForegroundWindow
0x46d4f4 SetFocus
0x46d4f8 SetCursor
0x46d4fc SetClassLongA
0x46d500 SetCapture
0x46d504 SetActiveWindow
0x46d508 SendMessageA
0x46d50c ScrollWindow
0x46d510 ScreenToClient
0x46d514 RemovePropA
0x46d518 RemoveMenu
0x46d51c ReleaseDC
0x46d520 ReleaseCapture
0x46d52c RegisterClassA
0x46d530 RedrawWindow
0x46d534 PtInRect
0x46d538 PostQuitMessage
0x46d53c PostMessageA
0x46d540 PeekMessageA
0x46d544 OffsetRect
0x46d548 OemToCharA
0x46d54c MessageBoxA
0x46d550 MapWindowPoints
0x46d554 MapVirtualKeyA
0x46d558 LoadStringA
0x46d55c LoadKeyboardLayoutA
0x46d560 LoadIconA
0x46d564 LoadCursorA
0x46d568 LoadBitmapA
0x46d56c KillTimer
0x46d570 IsZoomed
0x46d574 IsWindowVisible
0x46d578 IsWindowEnabled
0x46d57c IsWindow
0x46d580 IsRectEmpty
0x46d584 IsIconic
0x46d588 IsDialogMessageA
0x46d58c IsChild
0x46d590 InvalidateRect
0x46d594 IntersectRect
0x46d598 InsertMenuItemA
0x46d59c InsertMenuA
0x46d5a0 InflateRect
0x46d5a8 GetWindowTextA
0x46d5ac GetWindowRect
0x46d5b0 GetWindowPlacement
0x46d5b4 GetWindowLongA
0x46d5b8 GetWindowDC
0x46d5bc GetTopWindow
0x46d5c0 GetSystemMetrics
0x46d5c4 GetSystemMenu
0x46d5c8 GetSysColorBrush
0x46d5cc GetSysColor
0x46d5d0 GetSubMenu
0x46d5d4 GetScrollRange
0x46d5d8 GetScrollPos
0x46d5dc GetScrollInfo
0x46d5e0 GetPropA
0x46d5e4 GetParent
0x46d5e8 GetWindow
0x46d5ec GetMenuStringA
0x46d5f0 GetMenuState
0x46d5f4 GetMenuItemInfoA
0x46d5f8 GetMenuItemID
0x46d5fc GetMenuItemCount
0x46d600 GetMenu
0x46d604 GetLastActivePopup
0x46d608 GetKeyboardState
0x46d610 GetKeyboardLayout
0x46d614 GetKeyState
0x46d618 GetKeyNameTextA
0x46d61c GetIconInfo
0x46d620 GetForegroundWindow
0x46d624 GetFocus
0x46d628 GetDlgItem
0x46d62c GetDesktopWindow
0x46d630 GetDCEx
0x46d634 GetDC
0x46d638 GetCursorPos
0x46d63c GetCursor
0x46d640 GetClipboardData
0x46d644 GetClientRect
0x46d648 GetClassNameA
0x46d64c GetClassInfoA
0x46d650 GetCapture
0x46d654 GetActiveWindow
0x46d658 FrameRect
0x46d65c FindWindowA
0x46d660 FillRect
0x46d664 EqualRect
0x46d668 EnumWindows
0x46d66c EnumThreadWindows
0x46d670 EndPaint
0x46d674 EnableWindow
0x46d678 EnableScrollBar
0x46d67c EnableMenuItem
0x46d680 DrawTextA
0x46d684 DrawMenuBar
0x46d688 DrawIconEx
0x46d68c DrawIcon
0x46d690 DrawFrameControl
0x46d694 DrawEdge
0x46d698 DispatchMessageA
0x46d69c DestroyWindow
0x46d6a0 DestroyMenu
0x46d6a4 DestroyIcon
0x46d6a8 DestroyCursor
0x46d6ac DeleteMenu
0x46d6b0 DefWindowProcA
0x46d6b4 DefMDIChildProcA
0x46d6b8 DefFrameProcA
0x46d6bc CreatePopupMenu
0x46d6c0 CreateMenu
0x46d6c4 CreateIcon
0x46d6c8 ClientToScreen
0x46d6cc CheckMenuItem
0x46d6d0 CallWindowProcA
0x46d6d4 CallNextHookEx
0x46d6d8 BeginPaint
0x46d6dc CharNextA
0x46d6e0 CharLowerBuffA
0x46d6e4 CharLowerA
0x46d6e8 CharToOemA
0x46d6ec AdjustWindowRectEx
Library kernel32.dll:
0x46d6f8 Sleep
Library oleaut32.dll:
0x46d700 SafeArrayPtrOfIndex
0x46d704 SafeArrayGetUBound
0x46d708 SafeArrayGetLBound
0x46d70c SafeArrayCreate
0x46d710 VariantChangeType
0x46d714 VariantCopy
0x46d718 VariantClear
0x46d71c VariantInit
Library ole32.dll:
0x46d724 CoTaskMemAlloc
0x46d728 CoCreateInstance
0x46d72c CoUninitialize
0x46d730 CoInitialize
Library comctl32.dll:
0x46d740 ImageList_Write
0x46d744 ImageList_Read
0x46d754 ImageList_DragMove
0x46d758 ImageList_DragLeave
0x46d75c ImageList_DragEnter
0x46d760 ImageList_EndDrag
0x46d764 ImageList_BeginDrag
0x46d768 ImageList_Remove
0x46d76c ImageList_DrawEx
0x46d770 ImageList_Replace
0x46d774 ImageList_Draw
0x46d784 ImageList_Add
0x46d78c ImageList_Destroy
0x46d790 ImageList_Create
0x46d794 InitCommonControls
Library comdlg32.dll:
0x46d79c GetOpenFileNameA

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 53210 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 55368 114.114.114.114 53
192.168.56.101 60215 114.114.114.114 53
192.168.56.101 63429 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 50002 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 53380 224.0.0.252 5355
192.168.56.101 56539 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57756 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 60384 224.0.0.252 5355
192.168.56.101 61680 224.0.0.252 5355

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.