1.0
低危

22dc708df35fa3ca8f9d813ed90f11d3255ca464f824ba0daebd76e7aa747e3c

22dc708df35fa3ca8f9d813ed90f11d3255ca464f824ba0daebd76e7aa747e3c.exe

分析耗时

195s

最近分析

367天前

文件大小

45.0KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER BAVG
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.59
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Agent-ASIE [Trj] 20200113 18.4.3895.0
Baidu Win32.Trojan.Kryptik.mp 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200113 2013.8.14.323
McAfee GenericRXIO-IT!41A1909C7E7A 20200113 6.0.6.653
Tencent Malware.Win32.Gencirc.10b59506 20200113 1.0.0.1
行为判定
动态指标
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 63 个反病毒引擎识别为恶意 (50 out of 63 个事件)
ALYac Trojan.Agent.BAVG
APEX Malicious
AVG Win32:Agent-ASIE [Trj]
Acronis suspicious
Ad-Aware Trojan.Agent.BAVG
AhnLab-V3 Trojan/Win32.Zbot.R88085
Antiy-AVL Trojan/Win32.AGeneric
Arcabit Trojan.Agent.BAVG
Avast Win32:Agent-ASIE [Trj]
Avira TR/Yarwi.AD.5
Baidu Win32.Trojan.Kryptik.mp
BitDefender Trojan.Agent.BAVG
BitDefenderTheta AI:Packer.57E2A1A21E
Bkav W32.AIDetectVM.malware
CAT-QuickHeal Trojan.GenericCS.S8414404
ClamAV Win.Downloader.Upatre-5744087-0
Comodo TrojWare.Win32.TrojanDownloader.Upatre.BP@7j96vd
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.c7e7a2
Cylance Unsafe
Cyren W32/S-856e9e75!Eldorado
DrWeb Trojan.DownLoad3.28161
ESET-NOD32 Win32/TrojanDownloader.Small.AAB
Emsisoft Trojan.Agent.BAVG (B)
Endgame malicious (high confidence)
F-Prot W32/S-856e9e75!Eldorado
F-Secure Trojan.TR/Yarwi.AD.5
FireEye Generic.mg.41a1909c7e7a2bd6
Fortinet W32/Small.AAB!tr.dldr
GData Trojan.Agent.BAVG
Ikarus Packer.Win32.Krap
Invincea heuristic
Jiangmin Trojan/Bublik.hei
K7AntiVirus Trojan ( 0052964f1 )
K7GW Trojan ( 004ebb4c1 )
Kaspersky HEUR:Trojan.Win32.Generic
MAX malware (ai score=89)
Malwarebytes Trojan.Dropper
MaxSecure Trojan.Upatre.Gen
McAfee GenericRXIO-IT!41A1909C7E7A
McAfee-GW-Edition BehavesLike.Win32.Cutwail.pt
MicroWorld-eScan Trojan.Agent.BAVG
Microsoft TrojanDownloader:Win32/Upatre.A
NANO-Antivirus Trojan.Win32.DownLoad3.fnbrav
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM19.1.8BAB.Malware.Gen
Rising Spyware.Zbot!8.16B (TFE:dGZlOgJ+SkTFSgxWpA)
SUPERAntiSpyware Trojan.Agent/Gen-Dropper
Sangfor Malware
SentinelOne DFI - Malicious PE
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2004-09-03 14:08:25

PE Imphash

39b2903b7498188e4955572bbeb0f3fe

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.MPRESS1 0x00001000 0x00009000 0x00005600 3.9275585889048044
.MPRESS2 0x0000a000 0x00001000 0x00000600 5.411271105648145
.rsrc 0x0000b000 0x00003000 0x00002400 3.9006571578024136
.imports 0x0000e000 0x00001000 0x00000400 4.246841060562492

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0000b070 0x00001ca8 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_GROUP_ICON 0x0000cd58 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_VERSION 0x0000cdac 0x0000031c LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_MANIFEST 0x0000d108 0x00000193 LANG_NEUTRAL SUBLANG_NEUTRAL None

Imports

Library user32.dll:
0x40618c GetMessageA
0x406190 DefWindowProcA
0x406194 PostQuitMessage
0x406198 GetDoubleClickTime
0x40619c UpdateWindow
0x4061a0 GetQueueStatus
0x4061a4 LoadIconA
0x4061a8 RegisterClassA
Library GDI32.dll:
0x406300 CreateBitmap
0x406304 IntersectClipRect
0x406308 ExcludeClipRect
0x40630c UpdateColors
0x406314 CreateCompatibleDC
0x406318 DeleteObject
0x40631c TextOutA
0x406320 SetBkColor
0x406324 SetTextColor
0x406328 Rectangle
0x40632c CreateSolidBrush
0x406330 GetStockObject
0x406334 CreateFontIndirectA
0x40633c GetTextMetricsA
0x406340 CreateFontA
0x406344 RealizePalette
Library Msacm32.dll:
0x406520 acmDriverID
0x406524 acmStreamOpen
Library ADVAPI32.dll:
0x406250 RegQueryValueExA
0x406254 RegOpenKeyA
0x406258 GetUserNameA
0x40625c CopySid
0x406260 GetLengthSid
Library IMM32.dll:
0x4064a8 ImmGetContext
Library kernel32.dll:
0x4060f0 GetModuleHandleA
0x4060f4 GetProcAddress
0x4060f8 HeapCreate
0x4060fc HeapAlloc
0x406100 ExitProcess
0x406104 FreeLibrary

L!Win32 .EXE.
.MPRESS1
.MPRESS2
.imports
M-1M-5
:YGHPOOY
^\_`!N
oHVc~n
`EoCYN~b^K
]57dfs
K('.8V
89]fY
user32.dll
GetMessageA
DefWindowProcA
PostQuitMessage
GetDoubleClickTime
UpdateWindow
GetQueueStatus
LoadIconA
RegisterClassA
GDI32.dll
CreateBitmap
IntersectClipRect
ExcludeClipRect
UpdateColors
GetTextExtentPoint32A
CreateCompatibleDC
DeleteObject
TextOutA
SetBkColor
SetTextColor
Rectangle
CreateSolidBrush
GetStockObject
CreateFontIndirectA
GetTextExtentExPointA
GetTextMetricsA
CreateFontA
RealizePalette
Msacm32.dll
acmDriverID
acmStreamOpen
(ADVAPI32.dll
RegQueryValueExA
RegOpenKeyA
GetUserNameA
CopySid
GetLengthSid
IMM32.dll
ImmGetCompositionStringW
ImmSetCompositionFontA
ImmGetContext
ImmSetCompositionWindow
@kernel32.dll
GetModuleHandleA
GetProcAddress
HeapCreate
HeapAlloc
ExitProcess
FreeLibrary
8Muex<
KERNEL32
VirtualProtect
G(XPTPjxWXt=
CreateWindowExA
play e:\\rrrtwr\agef.wav alias PRFT
LoadLibraryExA
user32.dll
LoadCursorA
Winmm.dll
TranslateMessage
mciSendStringA
02000000008000
0000:000000000D00000090000000
000800u0<0a0
0040'0#00000}0H00u0@000L0Y0
0,000F0a0000D0Y0
0Y0000A00u0@000D00F00040
000H00000
0008000<00}0@0a0
00N00O000080000000'0#000*00003000300010w0y00
000<00000
04000u0,010000000000/0E0 00p000000900u0,000u0,00000000000000000
0@00u0 0000000000u0$0201000000u0(0100000000u0,0100000000
0<0040T0{00t0T01000t0T02000t0T03000t0T04000t0T05000t0T060c00t0T070b00t0T080^00t0T09000t0T0:000t0T0;000t0T0<0000
00000000/0E000p0000u0 000<00
0>0040T000t0T01000t0T02000t0T03000t0T04000t0T05000t0T06000t0T07000t0T08000t0T09000t0T0:000t0T0;000t0T0<000t0T0=000t0T0>000040T00/00 0/0E0$00p00000>00~00p0000
0<0040T000t0T01000t0T02000t0T03000t0T04000t0T05000t0T06000t0T070q00t0T08000t0T09000t0T0:000t0T0;000t0T0<000040T00/00 0/0E0$00p00000<0000p0000000
0@00u0 0000000000u0$0201000000u0(0100000000u0,0100000000
0:0040T000t0T01000t0T02000t0T03000t0T04000t0T050^00t0T06000t0T07000t0T08000t0T090000
00000000/0E000p0000u0 00
0C0040T000t0T01000t0T02000t0T030t00t0T04000t0T05000t0T06000t0T07000t0T08000t0T09000t0T0:000t0T0;000t0T0<000t0T0=0r00t0T0>000t0T0?000t0T0@000t0T0A000t0T0B000t0T0C000040T00/00 0/0E0$00p0000u0(000,00/00D0/00@0/00<0/0080/00$0/00(0/00 0/0E0400p00000@00000
0X000T0\00u0
0400000000u0
0400000000u0
050F000000u0
0000000000u0
0000000000u0
0000000000u0 0000000000u0$0000000000u0(0000000000u0,000000000000
0000000000/000,0/0/00u0
0/000,0/0/00u0 0/000,0/0/00u0$0/000,0/0/00u0(0/00
0,0/0/00u0,0/00
0,0/0/00u0
0h0-0/0/0040000@00000/00
0000/0E000p00000050
000000000u0
0040'0#000u0
00E00500000300
00,0/0/00u0
00E00Q00000300
00,0/0/00u0
00E00200000300
00,0/0/00u0
00E00N00000300
0o0,0/0/00u0
0/00 0/00(0/00
0/00$0/00
0+0/0/0040000@00000/00,0000/0E000p0000u0
0/00,0/00
00-0/0/0
0Y0,0/0/0000R00/00,0/00
0H00000000D0000r0l010
0004000D00p0@010
0H0100000000800
00200000000u0 0000p0000@00000/00@0000/0E000p00000020
0000@00/00800
00100000000u0$00c00
00200000/0`00u0(0/00400u0,0/00,0/00(0/00$0
00200000/00$0
0F00000000008000u0$000<000000000000000<00000
0H0100000000800r0l010
0004000D00p00008000010
00D0000000000060v0y00*000
00D0000000#000B00/0080
0M0000000000?000D0
00010000000004000000000000000400000
0<010000000u0<00p0<030u080000000000/0E000p00000?0000000000u0,000<002030u0800u0$00r0@030u0800u0(0Y000u0$0100000000000U000000000T03008000200
000/00,0/0E0$00p0000000j000(01000300040
000#000000000
000/00,0/0E0$00p0000000F000(01000300040
000010000000008000000000000000800000
0H0100000000<000200r0l01000040Y0000r02000
0.0/0/000D000 0.0/0/000 0.0/0/00000r00080000000'0
00u0(00X000000000
0.0/0/0'0
030u0(000<0Y0
00u0,0008000<00}0,0#0000
0.0/0/000(0/00<0/00800
0L0000000000>000X0y00
000u08000<000000000000000<00000
00008000<0300<000@0300D00z0@0#0000800r0<030u0<0001000000000<0000Y0000<00000
0400008000200m0}000I00r0l0100020m00u000000;000,000u0,00040000Y0000400000
0400008000200m0}000O00r0l0100020m00u000000A000000000000,000u0,00040000Y0000400000
0@00u0 00000000000800r0l010
000d000(000`0000000008000H00000000p0`00p0<000<000000H00080[00(000,00080300<00{0400{04000
000/00,0/0080
0@000000000{0800
00Y0}0@00
000<00000
04000}0D000<000@003000800u0,00080a000/0c0000000`00500020
0:00U0/0?030u0,010D0600020
0000@000
GetModuleHandleA
GetProcAddress
KERNEL32.DLL
user32.dll
LoadIconA
GDI32.dll
TextOutA
Msacm32.dll
acmDriverID
ADVAPI32.dll
CopySid
IMM32.dll
ImmGetContext
t7Kt'Kt
H8( xp
H@0 P@
80PHxp
@8( h`
H@`Xh`
0(0((
0 @800
hXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXP`X`XXPXPXPXPHH
H@xp0
( ( ( ( ( (
( ( ( ( (
xxxxxxxxx
( ( ( ( ( (
0 ( ( ( 0
( 0 0 0 0 0 0
P@XH0 0 0 0 0 ( 0
( ( ( ( ( ( (
( ( ( ( ( ( 0(
0 0 0 0 0 0 0 (
H@`X`XH@
8(0 0 0 0 0 0(
0 0 0 0 0 0 0 0 8(H@PHH80 8(H@PH800 0 8(P@XHH80 0 0 0 0 0 8(
0 0 0 0 0 0 0 0 0 (
0 0 0 (
0 8(8(0 (
0 8(8(8(8(8(0 8(
8(H8H8H8H8H8H8H8@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0H8
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
user32.dll
GetMessageA
DefWindowProcA
PostQuitMessage
GetDoubleClickTime
UpdateWindow
GetQueueStatus
LoadIconA
RegisterClassA
GDI32.dll
CreateBitmap
IntersectClipRect
ExcludeClipRect
UpdateColors
GetTextExtentPoint32A
CreateCompatibleDC
DeleteObject
TextOutA
SetBkColor
SetTextColor
Rectangle
CreateSolidBrush
GetStockObject
CreateFontIndirectA
GetTextExtentExPointA
GetTextMetricsA
CreateFontA
RealizePalette
Msacm32.dll
acmDriverID
acmStreamOpen
ADVAPI32.dll
RegQueryValueExA
RegOpenKeyA
GetUserNameA
CopySid
GetLengthSid
IMM32.dll
ImmGetCompositionStringW
ImmSetCompositionFontA
ImmGetContext
ImmSetCompositionWindow
kernel32.dll
GetModuleHandleA
GetProcAddress
HeapCreate
HeapAlloc
ExitProcess
FreeLibrary
C:\brOwBF_u.exe
C:\IlDuLUQJ.exe
C:\7FmPxZQy.exe
C:\1jYj7nlP.exe
C:\FrwMfDLc.exe
C:\3aAAgXsu.exe
C:\1gaL6tvP.exe
C:\DZQ7Selv.exe
C:\44uRsqWM.exe
C:\SB5Jd782.exe
C:\BuC5FtJG.exe
C:\yEK5QwJO.exe
C:\KvvEonh6.exe
C:\sIXuwWoU.exe
VS_VERSION_INFO
StringFileInfo
08000025
Comments
CompanyName
FileDescrsiption
FileVersion
5.2.1.2
InternalName
go.exe
LegalCopyright
Copyright (C) 2010
LegalTrademarks
OriginalFilename
gog.exe
PrivateBuild
ProductName
ProductVersion
5.2.1.3
SpecialBuild
VarFileInfo
Translation
C:\7e6f513075d20597fc0c5d226f0e8c16d6a90e8eecc11a58d031c9b724002f95
C:\Raiden\Goat\FTP\Sample\EE71D19812F4B4F23C92D161F8F247A9.bin.exe
C:\39deb94c235abd66bdd9085866c37daf7e152f4183dfb79d9827801d3f216989
C:\Users\admin\Downloads\important_document.exe
C:\e91b6bbe84ef4c6460a465ec893f7f87a957cac77b6a9e764b9655da72345219
C:\Documents and Settings\Administrator\Desktop\FZqIF3PK.exe
C:\Users\admin\Downloads\factura.exe
C:\Users\admin\Downloads\sample.exe
C:\DjeBSHBQ.exe
C:\Users\admin\Downloads\sample.exe
C:\XjxFvzMU.exe
C:\f93acefa121c46174fbc0c582ae8339241338a2147f0b7e33ad95f9b048374e0
C:\Users\admin\Downloads\factura.exe
C:\de3820a7de80d211caa708cf313c993cc5347be54bc18e4f7029ba1d8230fec9
C:\ARhpi_AM.exe
C:\8976e7519fe13c0c6cdc21c92271d21d89d092313b41d81d767ab01472e80edb
C:\301f82c18b16fe50d3c276c299f524efdab82d2948a0039cd452271cfd08947c
C:\Users\admin\Downloads\budha.exe
C:\012ad6cd574704b714861d7cf95efe1b6f245cff04ddd32e86f524cf1c1c7593
C:\3e210249051d78c8ad4146919a24a640fc26f01a22ade60d57832fd4d793763f
C:\Users\admin\Downloads\budha.exe
C:\c0cba5bb1c4c8518cf946d6b5b3623b2c722ba351171bde1c2d7c58b4dee2330
C:\Users\Petra\AppData\Local\Temp\budha.pe32
C:\Users\admin\Downloads\9de26add10020d70_budha.exe
C:\1fcab5846de8589388a9123bf36b504deda263acb2a455d1337f817917ec32a4
C:\Users\Petra\AppData\Local\Temp\budha.pe32
C:\f6f5cc775f8e8869902d04fe12bf0ce412c4f18833e228154947940bc9eb219a
C:\27611bcac2c0536e63d5bf010225578b0b850331151fd052a2361050271a47bd
C:\a9348872448ac3fa665aae568d1c2a9b8d8177e54cfc39edb9ee6c28de6d11f6
C:\15cd0710cc77e465155f8de2530cefb38f19601edc2904a81ca9045a33b03f9a
C:\Users\Petra\AppData\Local\Temp\budha.pe32
C:\c881dd2328d49d9b50140cedf89cfa8fb355e6109d4c71673f0a8d5c54fc28e0
C:\Documents and Settings\Administrator\Desktop\veg2BoCC.exe
C:\532de4962c21b7a796af8e309711c49266b7d503c67fb31234d41edbc5fdcc17
C:\eb6993eaa8ba60d965366818f4155eb53b6d635c40dc904d3cb46e083317fb47
C:\Users\Petra\AppData\Local\Temp\budha.pe32
C:\28fb7054662a3af77d0d7ed115040c6e818ee7d4c446992aa8831325f1c9d3d0
C:\57bbfeec18f288715a0b44b55ee68d10bb1a1b26095c66664f1057224cff33dd
C:\Documents and Settings\Administrator\Desktop\sfOTXKFf.exe
C:\Users\Petra\AppData\Local\Temp\.pe32.exe
C:\Documents and Settings\Administrator\Desktop\aVFe7TUe.exe
C:\769084d38035257beee8b18eaa4609b35834f8a496e85d07f9d9788c567d2826
C:\1bd9cb7f84bcbadd8f6de877a805d5d1d057028da75ee94c615f69a44a2d94c8
C:\3bcf8dd7aa01319f603beed2deae866b3c142f7fc4392fe2298fe2bdb1072e0a
C:\7463c13ebae1d37ea6da84899a8640f03432b58926338e68e6f7a009c5b17d09
C:\Documents and Settings\Administrator\Desktop\CmiyhbXw.exe
C:\Users\admin\Downloads\933554c3a544b6b2acb49373f47d2f9d42ca1e9573ccbffaed65dc9f7c5f613e.exe
C:\Documents and Settings\Administrator\Desktop\aHKPEE3W.exe
C:\Users\Petra\AppData\Local\Temp\.pe32.exe
C:\Users\admin\Downloads\77e0fb0a31bdf956_budha.exe
C:\212e88182442baab060c1e8155d1b1a1049fa8b74cfdbc7446bca45a628ae82b
C:\de030ac73a19471907ea73b16730e32782c958d28493f36af83d38f59a63ce26
C:\Users\Petra\AppData\Local\Temp\budha.pe32
C:\0d28b3077439795e7cba429dbb985e9eb2fc404552b3dacfd2f78094ce4e677a
C:\Users\admin\Downloads\budha.exe
C:\Users\Virtual\AppData\Local\Temp\5df0be27bc00fa833e0e947c919684863a69c197df4b551ac93b04f773c23706.exe
C:\Users\admin\Downloads\budha.exe
C:\Users\Petra\AppData\Local\Temp\budha.pe32
C:\Users\admin\Downloads\56d9966c887de0ee_budha.exe
C:\Users\Virtual\AppData\Local\Temp\e8647ab9a03c1b7be8dcfc1a82aed90f8dbbc83dfb9ace2eb32eb1daa808e673.exe
C:\Documents and Settings\Administrator\Desktop\nF8FCkiL.exe
C:\b12b4a7090f04d281c1eaa31aa72faf83a7d522b2a2dd9b4ceb2a9caed841732
C:\Users\admin\Downloads\budha.exe
C:\0c52c9d240bf21d18aa7c16bfb4f397425f7a90e7e3e759e0317a1ff032f7d03
C:\Users\admin\Downloads\budha.exe
C:\efdcf7c21d812c8fffec12e9d9554e2d05fd1ebc87ee6ccd2e844500c92d0af7
C:\466bc15db0e3f640c66791ff92dd164c589087fec0e179189a8e611fca732fde
C:\Users\Petra\AppData\Local\Temp\budha.pe32
C:\Users\Petra\AppData\Local\Temp\budha.pe32
C:\Documents and Settings\Administrator\Desktop\NBmvQAFe.exe
C:\70efb1a1a7521725c5387ed8bf791eedba4406a5f372658f2ae3d1fd7016fa6f
C:\Users\admin\Downloads\budha.exe
C:\8b6be0bab4d3a11fc89c200ac3ce88be315b65b4d3f26d4970ff3dd5d7742e6c
C:\Users\Petra\AppData\Local\Temp\budha.pe32
C:\ed9a965442cf5254fd8758f74c6e0bed3da7bdc170523e4f444758f9e82a1ac6
C:\Documents and Settings\Administrator\Desktop\83vYyrjX.exe
C:\Users\admin\Downloads\df4eaa22d116f928a479a23ece1bec673cd62ef5dea539f49206476c3cd8fe4d.exe
C:\Documents and Settings\luser\Desktop\AraLIYFF.exe
C:\Users\admin\Downloads\962ecf8959c0a7c3ff14acff05b69bd09a0ab224dba91e6dea291a9b01a938be.exe
C:\Documents and Settings\luser\Desktop\iu0pXvBH.exe
C:\e9eec0244bafc42e507924c38638b08af958c3a8ce258e857ac5101a7e2811f8
C:\b46dfacab638aefc093eec1e1b8072e8ca74dbaa39ad52ce1962ce79d951ca68
C:\Documents and Settings\Administrator\Desktop\CwWSGwT0.exe
C:\abbaef1aa1d00422cb9f31679b5ae069a110e1b862749a9d0df8c21f77166b7a
C:\Users\admin\Downloads\budha.exe
C:\Documents and Settings\Administrator\Desktop\pjaUbQIe.exe
C:\bd245f2ec75cff885afea0ff2c45d9baefc1fb2a5fa1b63bd918813cd7941327
C:\Documents and Settings\Administrator\Desktop\RloYenYw.exe
C:\1ecce0deed5aa5cfa7e1f5dd3d3edb11fc033152930e23473a2564ab9443fca6
C:\Documents and Settings\Administrator\Desktop\z4WHFThB.exe
C:\bef68ec0585e248bc48a9c79eb317ce1b2f1d59725d4a5e0ddf66476a88acab5
C:\Users\admin\Downloads\budha.exe
C:\715567fa85a9a7d89de367f316f1683909a4e2cc2900da04ccc5a453d11c2afa
C:\Users\admin\Downloads\budha.exe
C:\Documents and Settings\Administrator\Desktop\2h5PhiXE.exe
C:\Users\RA491~1.VUL\AppData\Local\Temp\1b76f94299cdd13026c3b5c0c87a04f9.virus
C:\b8e226d16a0c6402ae461330638ce18793b55fa1654e6c29a4804b2b1ee5c276
C:\347fbe6c94eb89a5a02a59f16876cf07de846e17e9f1aa13721e4eed40b2a9c2
C:\Users\admin\Downloads\budha.exe

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.