13.2
0-day

3b0fe17e2086bb94ee047be91ffdcf2495862499f47f1048d938283d08c1b6c2

43b75375b823640ac7d722461d7893a5.exe

分析耗时

105s

最近分析

文件大小

10.6MB
静态报毒 动态报毒 MALWARE@#3VZ2RHY1U9ECO PROTECTAV TOTALAV
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Baidu 20190318 1.0.0.2
Alibaba 20190527 0.3.0.5
Kingsoft 20201010 2013.8.14.323
McAfee 20201012 6.0.6.653
Avast 20201010 18.4.3895.0
CrowdStrike 20190702 1.0
静态指标
Queries for the computername (10 个事件)
Time & API Arguments Status Return Repeated
1620726242.581553
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1620740523.465501
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1620740526.246001
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1620740528.152751
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1620740529.996501
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1620740583.684001
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1620740584.106001
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1620740585.934001
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1620740591.746001
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
1620740598.402001
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
Checks if process is being debugged by a debugger (14 个事件)
Time & API Arguments Status Return Repeated
1620740544.512876
IsDebuggerPresent
failed 0 0
1620740544.512876
IsDebuggerPresent
failed 0 0
1620740569.809001
IsDebuggerPresent
failed 0 0
1620740569.809001
IsDebuggerPresent
failed 0 0
1620740573.231001
IsDebuggerPresent
failed 0 0
1620740574.512001
IsDebuggerPresent
failed 0 0
1620740574.731001
IsDebuggerPresent
failed 0 0
1620740575.121001
IsDebuggerPresent
failed 0 0
1620740576.137001
IsDebuggerPresent
failed 0 0
1620740582.512001
IsDebuggerPresent
failed 0 0
1620740582.512001
IsDebuggerPresent
failed 0 0
1620740588.809001
IsDebuggerPresent
failed 0 0
1620740603.356001
IsDebuggerPresent
failed 0 0
1620740606.934001
IsDebuggerPresent
failed 0 0
Command line console output was observed (2 个事件)
Time & API Arguments Status Return Repeated
1620740553.934626
WriteConsoleA
buffer: Elapsed Time: 00 00:00:00 Done: 1, Modified 1, Failed 0, Syntax errors 0
console_handle: 0x0000000f
success 1 0
1620740553.934626
WriteConsoleA
buffer: Last Done : SecurityService
console_handle: 0x0000000f
success 1 0
Uses Windows APIs to generate a cryptographic key (50 out of 71 个事件)
Time & API Arguments Status Return Repeated
1620740570.699001
CryptExportKey
crypto_handle: 0x00624af0
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740571.027001
CryptExportKey
crypto_handle: 0x00624af0
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740571.465001
CryptExportKey
crypto_handle: 0x00624af0
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740573.090001
CryptExportKey
crypto_handle: 0x005f1198
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740573.106001
CryptExportKey
crypto_handle: 0x005f1198
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740573.106001
CryptExportKey
crypto_handle: 0x005f1658
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740573.106001
CryptExportKey
crypto_handle: 0x005f1658
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740573.121001
CryptExportKey
crypto_handle: 0x005f1658
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740573.152001
CryptExportKey
crypto_handle: 0x005f1b18
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740573.152001
CryptExportKey
crypto_handle: 0x005f1b18
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740573.152001
CryptExportKey
crypto_handle: 0x005f1b18
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.668001
CryptExportKey
crypto_handle: 0x005f1d58
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.731001
CryptExportKey
crypto_handle: 0x005f1858
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.731001
CryptExportKey
crypto_handle: 0x005f1858
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.731001
CryptExportKey
crypto_handle: 0x005f1858
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.746001
CryptExportKey
crypto_handle: 0x005f1798
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.746001
CryptExportKey
crypto_handle: 0x005f1798
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.746001
CryptExportKey
crypto_handle: 0x005f1798
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.746001
CryptExportKey
crypto_handle: 0x005f1798
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.762001
CryptExportKey
crypto_handle: 0x005f1798
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.762001
CryptExportKey
crypto_handle: 0x005f1798
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.777001
CryptExportKey
crypto_handle: 0x005f1798
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.777001
CryptExportKey
crypto_handle: 0x005f1798
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.793001
CryptExportKey
crypto_handle: 0x005f1798
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.793001
CryptExportKey
crypto_handle: 0x005f1798
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.793001
CryptExportKey
crypto_handle: 0x005f1798
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.793001
CryptExportKey
crypto_handle: 0x005f1798
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.824001
CryptExportKey
crypto_handle: 0x005f1798
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.981001
CryptExportKey
crypto_handle: 0x005f0f98
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.981001
CryptExportKey
crypto_handle: 0x005f1798
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.981001
CryptExportKey
crypto_handle: 0x005f1918
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740576.981001
CryptExportKey
crypto_handle: 0x005f1918
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740584.809001
CryptExportKey
crypto_handle: 0x005f1598
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740587.012001
CryptExportKey
crypto_handle: 0x005f1618
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740587.012001
CryptExportKey
crypto_handle: 0x005f1618
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740587.027001
CryptExportKey
crypto_handle: 0x005f1618
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740587.074001
CryptExportKey
crypto_handle: 0x005f1618
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740587.074001
CryptExportKey
crypto_handle: 0x005f1618
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740587.074001
CryptExportKey
crypto_handle: 0x005f1618
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740587.106001
CryptExportKey
crypto_handle: 0x005f1618
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740587.137001
CryptExportKey
crypto_handle: 0x005f1618
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740587.152001
CryptExportKey
crypto_handle: 0x005f1618
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740587.152001
CryptExportKey
crypto_handle: 0x005f1618
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740587.152001
CryptExportKey
crypto_handle: 0x005f1618
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740587.199001
CryptExportKey
crypto_handle: 0x005f1618
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740587.199001
CryptExportKey
crypto_handle: 0x005f1618
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740587.199001
CryptExportKey
crypto_handle: 0x005f1618
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740587.199001
CryptExportKey
crypto_handle: 0x005f1618
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740587.496001
CryptExportKey
crypto_handle: 0x005f1618
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
1620740593.184001
CryptExportKey
crypto_handle: 0x00624670
crypto_export_handle: 0x00000000
buffer: <INVALID POINTER>
blob_type: 6
flags: 0
success 1 0
This executable is signed
Tries to locate where the browsers are installed (1 个事件)
file C:\Program Files\Mozilla Firefox\firefox.exe
Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available (1 个事件)
Time & API Arguments Status Return Repeated
1620726220.174553
GlobalMemoryStatusEx
success 1 0
The executable contains unknown PE section names indicative of a packer (could be a false positive) (1 个事件)
section .ndata
One or more processes crashed (1 个事件)
Time & API Arguments Status Return Repeated
1620740585.856001
__exception__
stacktrace:
0x67bda69
0x67bd6d9
0x67bb70d
0x67bb4b3
0x7e6c4d
mscorlib+0x2ad871 @ 0x710ed871
mscorlib+0x272b66 @ 0x710b2b66
mscorlib+0x2723f3 @ 0x710b23f3
mscorlib+0x272299 @ 0x710b2299
DllUnregisterServerInternal-0x3e21 clr+0x21db @ 0x738021db
CoUninitializeEE+0x6862 DllRegisterServerInternal-0xc91e clr+0x24a2a @ 0x73824a2a
CoUninitializeEE+0x6a04 DllRegisterServerInternal-0xc77c clr+0x24bcc @ 0x73824bcc
CoUninitializeEE+0x6a39 DllRegisterServerInternal-0xc747 clr+0x24c01 @ 0x73824c01
LogHelp_TerminateOnAssert+0x2d1d1 StrongNameErrorInfo-0x5acc9 clr+0x89c29 @ 0x73889c29
LogHelp_TerminateOnAssert+0x591ad StrongNameErrorInfo-0x2eced clr+0xb5c05 @ 0x738b5c05
LogHelp_TerminateOnAssert+0x5922f StrongNameErrorInfo-0x2ec6b clr+0xb5c87 @ 0x738b5c87
LogHelp_TerminateOnAssert+0x592ea StrongNameErrorInfo-0x2ebb0 clr+0xb5d42 @ 0x738b5d42
LogHelp_TerminateOnAssert+0x59381 StrongNameErrorInfo-0x2eb19 clr+0xb5dd9 @ 0x738b5dd9
CorDllMainForThunk+0x1864f ClrCreateManagedInstance-0xbb7a clr+0x1856d5 @ 0x739856d5
LogHelp_TerminateOnAssert+0x2d10f StrongNameErrorInfo-0x5ad8b clr+0x89b67 @ 0x73889b67
CorDllMainForThunk+0x181d9 ClrCreateManagedInstance-0xbff0 clr+0x18525f @ 0x7398525f
CorDllMainForThunk+0x19a3f ClrCreateManagedInstance-0xa78a clr+0x186ac5 @ 0x73986ac5
LogHelp_TerminateOnAssert+0x58fb0 StrongNameErrorInfo-0x2eeea clr+0xb5a08 @ 0x738b5a08
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 116780936
registers.edi: 116780964
registers.eax: 0
registers.ebp: 116780980
registers.edx: 8
registers.ebx: 48958240
registers.esi: 50969576
registers.ecx: 0
exception.instruction_r: 8b 01 8b 40 28 ff 10 89 45 d8 b8 16 21 59 2f 35
exception.instruction: mov eax, dword ptr [ecx]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x73fbbac
success 0 0
行为判定
动态指标
One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
HTTP traffic contains suspicious features which may be indicative of malware related traffic (1 个事件)
suspicious_features GET method with no useragent header suspicious_request GET http://storage.googleapis.com/ss-installers/windows/avirasdk/3.0.0/avira32redist.zip
Performs some HTTP requests (1 个事件)
request GET http://storage.googleapis.com/ss-installers/windows/avirasdk/3.0.0/avira32redist.zip
Allocates read-write-execute memory (usually to unpack itself) (50 out of 677 个事件)
Time & API Arguments Status Return Repeated
1620726222.877553
NtProtectVirtualMemory
process_identifier: 2856
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x10004000
success 0 0
1620740590.840501
NtAllocateVirtualMemory
process_identifier: 1424
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffffffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x0000000004070000
success 0 0
1620740543.824876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 458752
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x003c0000
success 0 0
1620740543.824876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x003f0000
success 0 0
1620740544.059876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 524288
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x00480000
success 0 0
1620740544.059876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x004c0000
success 0 0
1620740544.340876
NtProtectVirtualMemory
process_identifier: 2240
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x73e71000
success 0 0
1620740544.512876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 2097152
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x02840000
success 0 0
1620740544.512876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02a00000
success 0 0
1620740544.512876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x0046a000
success 0 0
1620740544.512876
NtProtectVirtualMemory
process_identifier: 2240
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x73e72000
success 0 0
1620740544.512876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00462000
success 0 0
1620740545.043876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00482000
success 0 0
1620740545.277876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x004a5000
success 0 0
1620740545.293876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x004ab000
success 0 0
1620740545.293876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x004a7000
success 0 0
1620740545.637876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00483000
success 0 0
1620740545.637876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00484000
success 0 0
1620740545.637876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 20480
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00790000
success 0 0
1620740545.668876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00795000
success 0 0
1620740545.746876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x0048c000
success 0 0
1620740545.918876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x008f0000
success 0 0
1620740545.981876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00796000
success 0 0
1620740546.027876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x008f1000
success 0 0
1620740546.121876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x008f2000
success 0 0
1620740546.246876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x008f3000
success 0 0
1620740546.527876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00797000
success 0 0
1620740547.090876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00798000
success 0 0
1620740547.246876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00799000
success 0 0
1620740547.246876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x0079a000
success 0 0
1620740547.309876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x008f4000
success 0 0
1620740547.481876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x0079b000
success 0 0
1620740547.574876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x0079c000
success 0 0
1620740547.590876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x0048d000
success 0 0
1620740547.606876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x008f5000
success 0 0
1620740547.746876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x0079d000
success 0 0
1620740547.746876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00496000
success 0 0
1620740547.840876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x008f6000
success 0 0
1620740547.840876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x0079e000
success 0 0
1620740547.871876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x0049a000
success 0 0
1620740547.871876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00497000
success 0 0
1620740548.027876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x008f7000
success 0 0
1620740549.543876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x0079f000
success 0 0
1620740549.543876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02650000
success 0 0
1620740549.543876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x008f8000
success 0 0
1620740549.574876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02651000
success 0 0
1620740549.606876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x008f9000
success 0 0
1620740549.621876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02652000
success 0 0
1620740549.621876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x0048e000
success 0 0
1620740549.684876
NtAllocateVirtualMemory
process_identifier: 2240
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x0046c000
success 0 0
Checks whether any human activity is being performed by constantly checking whether the foreground window changed
Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation (1 个事件)
Time & API Arguments Status Return Repeated
1620740544.324501
GetDiskFreeSpaceExW
root_path: C:\Users\Administrator.Oskar-PC\AppData\Local\Microsoft\Windows\Explorer
free_bytes_available: 19423051776
total_number_of_free_bytes: 0
total_number_of_bytes: 0
success 1 0
Steals private information from local Internet browsers (2 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Default\Preferences
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
Creates executable files on the filesystem (36 个事件)
file C:\Program Files (x86)\TotalAV\uninst.exe
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsi62CE.tmp\AccessControl.dll
file C:\Program Files (x86)\TotalAV\x86\SQLite.Interop.dll
file C:\Program Files (x86)\TotalAV\msvcr90.dll
file C:\Program Files (x86)\TotalAV\SCAPI.dll
file C:\Program Files (x86)\TotalAV\ovpn\libeay32.dll
file C:\Program Files (x86)\TotalAV\msvcm90.dll
file C:\Program Files (x86)\TotalAV\ovpn\openvpn_down.bat
file C:\Program Files (x86)\TotalAV\driver\i386\devcon.exe
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsi62CE.tmp\nsDialogs.dll
file C:\Program Files (x86)\TotalAV\ovpn\openvpn.exe
file C:\Users\Administrator.Oskar-PC\Desktop\TotalAV.lnk
file C:\Program Files (x86)\TotalAV\System.Data.SQLite.dll
file C:\Program Files (x86)\TotalAV\ovpn\liblzo2-2.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsi62CE.tmp\nsRandom.dll
file C:\Program Files (x86)\TotalAV\ovpn\openvpn_up.bat
file C:\Program Files (x86)\TotalAV\ovpn\openvpnserv.exe
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsi62CE.tmp\System.dll
file C:\Program Files (x86)\TotalAV\ovpn\libpkcs11-helper-1.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsi62CE.tmp\nsis7z.dll
file C:\Program Files (x86)\TotalAV\vccorlib120.dll
file C:\Program Files (x86)\TotalAV\SecurityService.exe
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsi62CE.tmp\nsExec.dll
file C:\Program Files (x86)\TotalAV\x64\SQLite.Interop.dll
file C:\Program Files (x86)\TotalAV\msvcr120.dll
file C:\Program Files (x86)\TotalAV\bins\subinacl.exe
file C:\Program Files (x86)\TotalAV\driver\amd64\devcon.exe
file C:\Program Files (x86)\TotalAV\TotalAV.exe
file C:\Program Files (x86)\TotalAV\PasswordExtension.Win.exe
file C:\Program Files (x86)\TotalAV\msvcp90.dll
file C:\Program Files (x86)\TotalAV\ShellBrowser.dll
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TotalAV.lnk
file C:\Program Files (x86)\TotalAV\ovpn\ssleay32.dll
file C:\Program Files (x86)\TotalAV\lib_SCAPI.dll
file C:\Program Files (x86)\TotalAV\msvcp120.dll
file C:\Program Files (x86)\TotalAV\Update.Win.exe
Creates a shortcut to an executable file (3 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TotalAV.lnk
file C:\Users\Public\Desktop\Google Chrome.lnk
file C:\Users\Administrator.Oskar-PC\Desktop\TotalAV.lnk
Drops a binary and executes it (1 个事件)
file C:\Program Files (x86)\TotalAV\TotalAV.exe
Drops an executable to the user AppData folder (6 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsi62CE.tmp\nsDialogs.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsi62CE.tmp\System.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsi62CE.tmp\nsRandom.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsi62CE.tmp\AccessControl.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsi62CE.tmp\nsExec.dll
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsi62CE.tmp\nsis7z.dll
Executes one or more WMI queries (5 个事件)
wmi SELECT Tag, SerialNumber FROM win32_physicalmedia
wmi Select * From Win32_Processor
wmi SELECT * FROM Win32_SystemDriver WHERE Name='tap0901'
wmi Select * From Win32_BaseBoard
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
A process created a hidden window (1 个事件)
Time & API Arguments Status Return Repeated
1620740552.496876
CreateProcessInternalW
thread_identifier: 3104
thread_handle: 0x000002f0
process_identifier: 3100
current_directory: C:\Program Files (x86)\TotalAV
filepath:
track: 1
command_line: "C:\Program Files (x86)\TotalAV\bins\subinacl.exe" /SERVICE "SecurityService" /GRANT=everyone=T
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
process_handle: 0x000002fc
inherit_handles: 1
success 1 0
File has been identified by 5 AntiVirus engines on VirusTotal as malicious (5 个事件)
Comodo Malware@#3vz2rhy1u9eco
DrWeb Program.Unwanted.2627
GData MSIL.Application.ProtectAV.B (7x)
Malwarebytes PUP.Optional.TotalAV
ESET-NOD32 a variant of MSIL/TotalAV.A potentially unwanted
Checks adapter addresses which can be used to detect virtual network interfaces (1 个事件)
Time & API Arguments Status Return Repeated
1620740588.356001
GetAdaptersAddresses
flags: 15
family: 0
failed 111 0
Checks for the Locally Unique Identifier on the system for a suspicious privilege (13 个事件)
Time & API Arguments Status Return Repeated
1620726239.081553
LookupPrivilegeValueW
system_name:
privilege_name: SeSecurityPrivilege
success 1 0
1620740523.449501
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620740526.231001
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620740528.121751
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620740529.996501
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620740551.012876
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620740553.559626
LookupPrivilegeValueW
system_name:
privilege_name: SeSecurityPrivilege
success 1 0
1620740553.559626
LookupPrivilegeValueW
system_name:
privilege_name: SeBackupPrivilege
success 1 0
1620740553.559626
LookupPrivilegeValueW
system_name:
privilege_name: SeRestorePrivilege
success 1 0
1620740553.559626
LookupPrivilegeValueW
system_name:
privilege_name: SeRestorePrivilege
success 1 0
1620740553.559626
LookupPrivilegeValueW
system_name:
privilege_name: SeTakeOwnershipPrivilege
success 1 0
1620740553.559626
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1620740585.199001
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
Uses Windows utilities for basic Windows functionality (4 个事件)
cmdline "taskkill" /f /T /IM "Update.Win.exe"
cmdline "taskkill" /F /FI "WINDOWTITLE eq TotalAV"
cmdline "taskkill" /f /T /IM "PasswordExtension.Win.exe"
cmdline "taskkill" /f /T /IM "avupdate.exe"
Executes one or more WMI queries which can be used to identify virtual machines (1 个事件)
wmi Select * From Win32_Processor
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Attempts to identify installed AV products by installation directory (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Roaming\TotalAV\3.0.0\avira32redist.zip
Looks for the Windows Idle Time to determine the uptime (1 个事件)
Time & API Arguments Status Return Repeated
1620740553.074876
NtQuerySystemInformation
information_class: 8 (SystemProcessorPerformanceInformation)
success 0 0
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2016-12-12 05:50:45

Imports

Library KERNEL32.dll:
0x407070 CopyFileA
0x407074 Sleep
0x407078 GetTickCount
0x40707c CreateFileA
0x407080 GetFileSize
0x407084 GetModuleFileNameA
0x407088 ReadFile
0x40708c GetFileAttributesA
0x407090 SetFileAttributesA
0x407094 ExitProcess
0x4070a0 GetTempPathA
0x4070a4 GetCommandLineA
0x4070a8 lstrlenA
0x4070ac GetVersion
0x4070b0 GetCurrentProcess
0x4070b4 GetFullPathNameA
0x4070b8 GetDiskFreeSpaceA
0x4070bc GlobalUnlock
0x4070c0 GlobalLock
0x4070c4 CreateThread
0x4070c8 GetLastError
0x4070cc CreateDirectoryA
0x4070d0 CreateProcessA
0x4070d4 RemoveDirectoryA
0x4070d8 GetTempFileNameA
0x4070dc WriteFile
0x4070e0 lstrcpyA
0x4070e4 MoveFileExA
0x4070e8 lstrcatA
0x4070ec GetSystemDirectoryA
0x4070f0 GetProcAddress
0x4070f4 CloseHandle
0x4070fc MoveFileA
0x407100 CompareFileTime
0x407104 GetShortPathNameA
0x407108 SearchPathA
0x40710c lstrcmpiA
0x407110 SetFileTime
0x407114 lstrcmpA
0x40711c lstrcpynA
0x407120 SetErrorMode
0x407124 GlobalFree
0x407128 FindFirstFileA
0x40712c FindNextFileA
0x407130 DeleteFileA
0x407134 SetFilePointer
0x40713c FindClose
0x407140 MultiByteToWideChar
0x407144 FreeLibrary
0x407148 MulDiv
0x407150 LoadLibraryExA
0x407154 GetModuleHandleA
0x407158 GetExitCodeProcess
0x40715c WaitForSingleObject
0x407160 GlobalAlloc
Library USER32.dll:
0x407184 ScreenToClient
0x407188 GetSystemMenu
0x40718c SetClassLongA
0x407190 IsWindowEnabled
0x407194 SetWindowPos
0x407198 GetSysColor
0x40719c GetWindowLongA
0x4071a0 SetCursor
0x4071a4 LoadCursorA
0x4071a8 CheckDlgButton
0x4071ac GetMessagePos
0x4071b0 LoadBitmapA
0x4071b4 CallWindowProcA
0x4071b8 IsWindowVisible
0x4071bc CloseClipboard
0x4071c0 SetClipboardData
0x4071c4 EmptyClipboard
0x4071c8 PostQuitMessage
0x4071cc GetWindowRect
0x4071d0 EnableMenuItem
0x4071d4 CreatePopupMenu
0x4071d8 GetSystemMetrics
0x4071dc SetDlgItemTextA
0x4071e0 GetDlgItemTextA
0x4071e4 MessageBoxIndirectA
0x4071e8 CharPrevA
0x4071ec DispatchMessageA
0x4071f0 PeekMessageA
0x4071f4 ReleaseDC
0x4071f8 EnableWindow
0x4071fc InvalidateRect
0x407200 SendMessageA
0x407204 DefWindowProcA
0x407208 BeginPaint
0x40720c GetClientRect
0x407210 FillRect
0x407214 DrawTextA
0x407218 EndDialog
0x40721c RegisterClassA
0x407224 CreateWindowExA
0x407228 GetClassInfoA
0x40722c DialogBoxParamA
0x407230 CharNextA
0x407234 ExitWindowsEx
0x407238 GetDC
0x40723c CreateDialogParamA
0x407240 SetTimer
0x407244 GetDlgItem
0x407248 SetWindowLongA
0x40724c SetForegroundWindow
0x407250 LoadImageA
0x407254 IsWindow
0x407258 SendMessageTimeoutA
0x40725c FindWindowExA
0x407260 OpenClipboard
0x407264 TrackPopupMenu
0x407268 AppendMenuA
0x40726c EndPaint
0x407270 DestroyWindow
0x407274 wsprintfA
0x407278 ShowWindow
0x40727c SetWindowTextA
Library GDI32.dll:
0x40704c SelectObject
0x407050 SetBkMode
0x407054 CreateFontIndirectA
0x407058 SetTextColor
0x40705c DeleteObject
0x407060 GetDeviceCaps
0x407064 CreateBrushIndirect
0x407068 SetBkColor
Library SHELL32.dll:
0x407170 SHBrowseForFolderA
0x407174 SHGetFileInfoA
0x407178 ShellExecuteA
0x40717c SHFileOperationA
Library ADVAPI32.dll:
0x407000 RegDeleteKeyA
0x407004 SetFileSecurityA
0x407008 OpenProcessToken
0x407014 RegOpenKeyExA
0x407018 RegEnumValueA
0x40701c RegDeleteValueA
0x407020 RegCloseKey
0x407024 RegCreateKeyExA
0x407028 RegSetValueExA
0x40702c RegQueryValueExA
0x407030 RegEnumKeyA
Library COMCTL32.dll:
0x407038 ImageList_Create
0x40703c ImageList_AddMasked
0x407040 ImageList_Destroy
0x407044
Library ole32.dll:
0x407284 OleUninitialize
0x407288 OleInitialize
0x40728c CoTaskMemFree
0x407290 CoCreateInstance

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49222 172.217.160.80 storage.googleapis.com 80

UDP

Source Source Port Destination Destination Port
192.168.56.101 49713 114.114.114.114 53
192.168.56.101 50002 114.114.114.114 53
192.168.56.101 53237 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 61680 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 50568 224.0.0.252 5355
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 62318 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 49714 239.255.255.250 3702
192.168.56.101 49716 239.255.255.250 3702

HTTP & HTTPS Requests

URI Data
http://storage.googleapis.com/ss-installers/windows/avirasdk/3.0.0/avira32redist.zip
GET /ss-installers/windows/avirasdk/3.0.0/avira32redist.zip HTTP/1.1
Host: storage.googleapis.com
Connection: Keep-Alive

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.