2.9
中危

0d80ca4557b4a3765a3df371e2e1446a0a73c3cb1e795499890f816ed725a1c5

0d80ca4557b4a3765a3df371e2e1446a0a73c3cb1e795499890f816ed725a1c5.exe

分析耗时

133s

最近分析

379天前

文件大小

240.7KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN WORM GANELP
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.80
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Crypt-KOW [Trj] 20200323 18.4.3895.0
Baidu Win32.Trojan.Agent.dc 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200323 2013.8.14.323
McAfee Generic BackDoor.yo 20200322 6.0.6.653
Tencent Trojan.Win32.FakeFolder.bba 20200323 1.0.0.1
行为判定
动态指标
检查是否有任何人类活动正在进行,通过不断检查前景窗口是否发生变化
在 PE 资源中识别到外语 (1 个事件)
name RT_VERSION language LANG_TURKISH filetype None sublanguage SUBLANG_DEFAULT offset 0x000427e0 size 0x00000348
在文件系统上创建可执行文件 (1 个事件)
file C:\Program Files (x86)\e8fdc9ff\jusched.exe
投放一个二进制文件并执行它 (1 个事件)
file C:\Program Files (x86)\e8fdc9ff\jusched.exe
网络通信
与未执行 DNS 查询的主机进行通信 (2 个事件)
host 114.114.114.114
host 8.8.8.8
在 Windows 启动时自我安装以实现自动运行 (1 个事件)
file C:\Windows\Tasks\Update23.job
操作本地防火墙的策略和设置 (1 个事件)
registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
连接到不再响应请求的 IP 地址(合法服务通常会保持运行) (1 个事件)
dead_host 185.27.134.11:21
文件已被 VirusTotal 上 64 个反病毒引擎识别为恶意 (50 out of 64 个事件)
ALYac Worm.Generic.388387
APEX Malicious
AVG Win32:Crypt-KOW [Trj]
Acronis suspicious
Ad-Aware Worm.Generic.388387
AhnLab-V3 Trojan/Win32.Npkon.R18258
Antiy-AVL Trojan/Win32.Inject
Arcabit Worm.Generic.D5ED23
Avast Win32:Crypt-KOW [Trj]
Avira TR/Spy.Agent.586689
Baidu Win32.Trojan.Agent.dc
BitDefender Worm.Generic.388387
BitDefenderTheta Gen:NN.ZexaF.34100.pC1@a4LQqQoO
Bkav W32.OnGameERALXK.Worm
CAT-QuickHeal Trojan.Mauvaise.SL1
CMC Worm.Win32.Autorun!O
ClamAV Win.Worm.Ganelp-6776766-0
Comodo Worm.Win32.Jushed.KA@4cysvx
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.576581
Cylance Unsafe
Cyren W32/Agent.KI.gen!Eldorado
DrWeb Trojan.Proxy.19660
ESET-NOD32 Win32/Agent.SRG
Emsisoft Worm.Generic.388387 (B)
Endgame malicious (high confidence)
F-Prot W32/Agent.KI.gen!Eldorado
FireEye Generic.mg.4b463215765818b1
Fortinet W32/Virtu.F
GData Worm.Generic.388387
Ikarus Worm.Win32.Juched
Invincea heuristic
Jiangmin Trojan/Generic.zwio
K7AntiVirus EmailWorm ( 002a8f0e1 )
K7GW EmailWorm ( 002a8f0e1 )
Kaspersky Worm.Win32.Juched.fkf
MAX malware (ai score=80)
Malwarebytes Backdoor.IRCBot
MaxSecure Worm.Juched.ffz
McAfee Generic BackDoor.yo
McAfee-GW-Edition BehavesLike.Win32.Backdoor.dt
MicroWorld-eScan Worm.Generic.388387
Microsoft Worm:Win32/Ganelp.E
NANO-Antivirus Trojan.Win32.Juched.dfacwp
Panda Trj/Juched.A
Qihoo-360 HEUR/QVM02.0.1237.Malware.Gen
Rising Worm.Juched!8.11F1 (TFE:dGZlOgEYfTg3Feia8w)
SUPERAntiSpyware Trojan.Agent/Gen-Ganel
Sangfor Malware
SentinelOne DFI - Malicious PE
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1996-07-16 12:44:38

PE Imphash

43df92b7b77db2760430968647afb835

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00025bf0 0x00026000 3.8806037304705177
.rdata 0x00027000 0x00001a5c 0x00002000 4.347135788395797
.data 0x00029000 0x000156a4 0x00004000 0.43904937682003775
.idata 0x0003f000 0x000009e4 0x00001000 2.9006850755721927
.rsrc 0x00040000 0x0000345c 0x00004000 2.499534161689354
.reloc 0x00044000 0x00009000 0x00009000 6.478069450991929
uagnpgw 0x0004d000 0x00001000 0x00000000 0.0

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x00040220 0x000025a8 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_GROUP_ICON 0x000427c8 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_VERSION 0x000427e0 0x00000348 LANG_TURKISH SUBLANG_DEFAULT None

Imports

Library KERNEL32.dll:
0x43f268 GetLastError
0x43f26c GetSystemTime
0x43f270 MultiByteToWideChar
0x43f274 GetLocaleInfoA
0x43f278 GetModuleHandleA
0x43f27c FindNextFileA
0x43f280 FindFirstFileA
0x43f284 FlushFileBuffers
0x43f288 SetStdHandle
0x43f28c FindClose
0x43f290 Sleep
0x43f294 SetFilePointer
0x43f298 LCMapStringW
0x43f29c LCMapStringA
0x43f2a0 GetStringTypeW
0x43f2a4 ExitProcess
0x43f2a8 TerminateProcess
0x43f2ac GetCurrentProcess
0x43f2b0 GetStartupInfoA
0x43f2b4 GetCommandLineA
0x43f2b8 GetVersion
0x43f2bc DebugBreak
0x43f2c0 GetStdHandle
0x43f2c4 WriteFile
0x43f2cc OutputDebugStringA
0x43f2d0 GetProcAddress
0x43f2d4 LoadLibraryA
0x43f2dc GetModuleFileNameA
0x43f2e0 IsBadWritePtr
0x43f2e4 IsBadReadPtr
0x43f2e8 HeapValidate
0x43f2f8 WideCharToMultiByte
0x43f304 SetHandleCount
0x43f308 GetFileType
0x43f310 GetVersionExA
0x43f314 HeapDestroy
0x43f318 HeapCreate
0x43f31c HeapFree
0x43f320 VirtualFree
0x43f324 RtlUnwind
0x43f32c HeapAlloc
0x43f330 HeapReAlloc
0x43f334 VirtualAlloc
0x43f338 GetCPInfo
0x43f33c GetACP
0x43f340 GetOEMCP
0x43f344 GetStringTypeA
0x43f348 CloseHandle
Library USER32.dll:
0x43f3a4 MessageBoxA
Library ADVAPI32.dll:
0x43f238 GetUserNameW
Library ole32.dll:
0x43f3d4 CoUninitialize
0x43f3d8 CoCreateInstance
0x43f3dc CoInitialize

L!This program cannot be run in DOS mode.
b,b,b,n,b,i,b,Bl,b,h,b,b,b,q,b,c,b,t,b,
d,b,Richb,
.rdata
@.data
.idata
@.reloc
uagnpgw
UDSVW}
E_^[]UPSVW}
_^[P;FQ
]UTSVW}
_^[]ULSVW}
MU;U}gE
E}^}7M
_^[L;M
]U@SVW}
]UDSVW}
_^[]UPSVW}
>E<DQC
_^[]UDSVW}
_^[]UlSVW}
u,U;Uu
t\U;Uu
E_^[l;$E
]UpSVW}
EMMU3f
Q<UE8PE
MQxUEH|MU
M;M}-U
_^[p;(C
]U`SVW}
EMMU3f
Q<UE8PE
3_MQxUEH|MU
ME_^[]UtSVW}
_^[t;a?
]UtSVW}
]U@SVW}
_^[@;9
]U|SVW}
_^[|;/
]UHSVW}
_^[H;%
]UHSVW}
E_^[H;$
]UHSVW}
9Us)E3
_^[H;"
3EEEfE
jdTQhDB
MQh`pB
URh@pB
EPR ;
MQPp;
MQPx;\
fUfUfEfEfMfMfE
-oje`[VQLG_^[
;}}PRcPA
wuWhHuB
E}tEEP
9UtOEi
9UtVEi
9MtVUi
9EtVMi
tAt2t$
PRSVWhvB
_^[ZX]
DDDDDDDDDDDDDD
GIt%t)
Gt/KuD$
GKu[^D$
[^_U=C
]UQ=,C
]UjhwB
P%EEPQM
EMQUR'
eEPJMd
_^[]U=<C
E]UQlC
t h|xB
@v)URc
RPQRPQRPQREPM
EE]UQE
u&hpzB
E _^[]UQj
EE]UQj
EE]UQj
3u&h0|B
;t!hX{B
$REPw:
M;Mt!h${B
;Et!hzB
E_^[]UQj
EE]UQj
]UQSVWB
t!ht}B
uCE PMQ
uCE PMQ
;Mt!h|B
;Mt!h|B
_^[]Uj
t!ht}B
EE_^[]UQ
E]UQSVWE
t!ht}B
_^[]UQ B
E]UQSVWE
E_^[]U
3uNh~B
u&ht~B
u:U REH
QURhH}B
u:E PMQ
u/M Qh@~B
QURh ~B
RE PMQh}B
E_^[]@
REPn5
ucMQURE
E]UQ`C
H0_^[]U
A,+B,M
J0+H0U
E_^[]U
u_^[]U\SVWE
UB E=\B
EPMQhB
u_^[]U4SVWEP
3_^[]UQSVW}
3u_^[]U
E]UQ=C
=tGjyh
EMMUREPj
UREPMU
PMQUR#
EPMQUREPj
3%MQUREPO
MU;U}eE8tXM
E}tXMQ
E}@}2M< C
]USVWUj
t.;t$$t(4v
VC20XC00U
]_^[]UL$
_^[]UQE
]U0SVWEE
E_^[]U,SVWEE
E_^[]Q=
EE]UQ}
PMQUREPB/
EE]U0E
REPMQURR,
MQUREP
UREPMQ$
uKUREPM
UREPMQ?#
EE]Uh]U=
UE;Es%MU
MU;Us$EM#
MU;UuIC
U#TDU}
E}?} MU
UE;Ew]MA
UUE+EE
M;tU;u
tn} }2
,3]ULB
u3]UQE
MU;UsiE
MU;UsiE
EM;M}4U
s3E;Eu
3{UU[E
UE]U(E
3]U0SVWEE
E_^[]U
MQUREPj
]UQ=$C
s{Uk0E
Mk0UEfAtB
Ar;Zw2C
Qar;zw2C
M0M_=\B
B8t6t8t't
8t3^[_G^[_
^[_UWVSM
[^_SVD$
ddIdd.wld3a
``C``5
fEfMQRa
U tHE@t
RPRPu0RPQR9~
ERM+MM
fZfZPxQ
QtRxP)
fA]UWVu
DDDDDDDDDDDDDD
^_UjhB
SVWe=C
3CMQURE
PMQURE
_^[]UjhB
SVWe=C
REPMQU
EPMQUREPM
EPMQh
QUREPh
UREPMQh
QU+RQU
E+]UQSVW}
_^[]UE
@]UQ= C
M}-s#UE
~VUREH
;Eu!MQ
E_^[]UQE
EE]UQVE
3^]USVW}
_^[]%C
Oe !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_abcdefghijklmnopqrstuvwxyz{|}~
VmfantunmoelIriGoeotA
WoitAtdDcyenserGiwro
yeploiCFA
EreabtimVaAevntieGnonrl
MllmtuiaedFNAGoeee
aitAeDcyreerCtro
FAieterteltuASitbs
erebyrirFLa
drAabyoirLLa
MlnAtuaeedHlGoed
PAetcreodsGrds
n2lr3leldke.
broFlleGae
bloAclloGal
FSteeelzGii
dealeiRF
tliirFWee
aieFAreeCtl
snoaelHlCed
c3xosersNPe2t
c3rosirsFtPe2s
CerstrPedertcIGunos
aoe2pteTh3aorelpnhCtolSs
LcrSntiDeiAeglvrsGoaitg
DeetvpeiyGrTA
eilFAeeeDtl
oitAmDcyeeerRvro
dsnoilFCe
dtenxlieiFNFA
dslnriiiFAFFte
etsnteoaennlHlIrCed
GipFAtteFel
etnAtentnnocIrCe
etnteennpIrOA
i.ntlielwnd
PipFAtteFul
leeexthEuSlcA
l.e2lh3lsld
$*$%u}-sEBB5>Ds?>DB?<$5D-$5BF935C-$81B54q335CC-!1B1=5D5BC-v9B5G1<<!?<93I-$D1>41B4!B?69<5-qED8?B9J54q@@<931D9?>C-|9CD
bd:ael*nE::
CegsyeoeRlK
SaEgVeetuARelx
OKxgnEeeyRpeA
a2lv3ldidap.
DtlgeaAelVeReeu
CtygaeAeeKxRreE
\Java\jre-
gFsomeralPri
$?6DG1B5]aaaaaaaaaaaaaaaaa]sEBB5>D'5BC9?>]#E>
e.gteeixrde
/Downs/HelpVer.hlp
/Downs/Help.hlp
Help.hlp
/Private/
Pfile.hlp
gdaheb123
?>D85<9>EH
6D@]DB9@?4]3?=
gdaheb
eedeia
7B9@D?<?:9]8?CD\54]>5D
ieagecJH
2ab0h_hbige
6D@]2I5D8?CDab]3?=
jusched.
!B?7B1=v9<5C
Fi386\chkesp.c
The value of ESP was not properly saved across a function call. This is usually a result of calling a function declared with one calling convention with a function pointer declared with a different calling convention.
Assertion Failed
Warning
%s(%d) : %s
Assertion failed!
Assertion failed:
_CrtDbgReport: String too long or IO Error
Second Chance Assertion Failed: File %s, Line %d
wsprintfA
user32.dll
Microsoft Visual C++ Debug Library
Debug %s!
Program: %s%s%s%s%s%s%s%s%s%s%s
(Press Retry to debug the application)
Module:
File:
Line:
Expression:
For information on how your program can cause an assertion
failure, see the Visual C++ documentation on asserts.
<program name unknown>
dbgrpt.c
szUserMessage != NULL
Client
Ignore
Normal
Error: memory allocation: bad memory block type.
Invalid allocation size: %u bytes.
Client hook allocation failure.
Client hook allocation failure at file %hs line %d.
dbgheap.c
_CrtCheckMemory()
_pFirstBlock == pOldBlock
_pLastBlock == pOldBlock
fRealloc || (!fRealloc && pNewBlock == pOldBlock)
_BLOCK_TYPE(pOldBlock->nBlockUse)==_BLOCK_TYPE(nBlockUse)
pOldBlock->nLine == IGNORE_LINE && pOldBlock->lRequest == IGNORE_REQ
_CrtIsValidHeapPointer(pUserData)
Allocation too large or negative: %u bytes.
Client hook re-allocation failure.
Client hook re-allocation failure at file %hs line %d.
_pFirstBlock == pHead
_pLastBlock == pHead
pHead->nBlockUse == nBlockUse
pHead->nLine == IGNORE_LINE && pHead->lRequest == IGNORE_REQ
DAMAGE: after %hs block (#%d) at 0x%08X.
DAMAGE: before %hs block (#%d) at 0x%08X.
_BLOCK_TYPE_IS_VALID(pHead->nBlockUse)
Client hook free failure.
memory check error at 0x%08X = 0x%02X, should be 0x%02X.
%hs located at 0x%08X is %u bytes long.
%hs allocated at file %hs(%d).
DAMAGE: on top of Free block at 0x%08X.
DAMAGED
_heapchk fails with unknown return value!
_heapchk fails with _HEAPBADPTR.
_heapchk fails with _HEAPBADEND.
_heapchk fails with _HEAPBADNODE.
_heapchk fails with _HEAPBADBEGIN.
Bad memory block found at 0x%08X.
_CrtMemCheckPoint: NULL state pointer.
_CrtMemDifference: NULL state pointer.
Object dump complete.
crt block at 0x%08X, subtype %x, %u bytes long.
normal block at 0x%08X, %u bytes long.
client block at 0x%08X, subtype %x, %u bytes long.
{%ld}
%hs(%d) :
#File Error#(%d) :
Dumping objects ->
Data: <%s> %s
Detected memory leaks!
Total allocations: %ld bytes.
Largest number used: %ld bytes.
%ld bytes in %ld %hs Blocks.
stdenvp.c
stdargv.c
a_env.c
ioinit.c
__GLOBAL_HEAP_SELECTED
__MSVCRT_HEAP_SELECT
runtime error
TLOSS error
SING error
DOMAIN error
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
abnormal program termination
- not enough space for environment
- not enough space for arguments
- floating point not loaded
Microsoft Visual C++ Runtime Library
Runtime Error!
Program:
format != NULL
sprintf.c
string != NULL
vsprintf.c
GetLastActivePopup
GetActiveWindow
MessageBoxA
("inconsistent IOB fields", stream->_ptr - stream->_base >= 0)
_flsbuf.c
str != NULL
`h````
ppxxxx
(null)
output.c
ch != _T('\0')
_getbuf.c
_file.c
osfinfo.c
fclose.c
_freebuf.c
stream != NULL
aa3vd2apeJUt
a3d2peUt
htdocs
GetModuleHandleA
GetLastError
GetSystemTime
MultiByteToWideChar
GetLocaleInfoA
FindClose
FindNextFileA
FindFirstFileA
KERNEL32.dll
MessageBoxA
USER32.dll
GetUserNameW
ADVAPI32.dll
CoUninitialize
CoCreateInstance
CoInitialize
ole32.dll
ExitProcess
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
GetVersion
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
GetProcAddress
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
IsBadWritePtr
IsBadReadPtr
HeapValidate
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
HeapFree
VirtualFree
RtlUnwind
SetConsoleCtrlHandler
HeapAlloc
HeapReAlloc
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetFilePointer
SetStdHandle
FlushFileBuffers
CloseHandle
ICONMD5.6c78a9fa
-kkeJ/
.nnnnnnnS8
/qqqqqqqqqqq\@$
tttttttttttttttfI3
wwwwwwwwwwwwwwwwwwwpS<
zzzzzzzFzzzzzzzzzzzzzzzz\E&
}}}}}F}}}}}}}}}}}}}}}}}}}}M
H''FFf*
H((wf,
I33lfZ
KUUmfh
]WWnFFf
6666666i777
8(8<8L8^8k8|888888
9)909=9D9Q9X9b9l9v999999999~::::::::
;";,;6;=;J;Q;[;e;r;y;;;;;;;;;;;;<<c=
>2>V>]>n>>>>>>>
0K2c2o2v2222222222
3-343@3G3_3f3r3y33333333333
4'4.4:4A4Y4`4l4s4444{55555555555
6)606<6C6[6b6n6u66666666666
7#7*767=7U7\7h7o777777777777
8$80878O8V8b8i888888888888
:.::::U;;;
<.<E<p<<<<====
> ><>H>O>k>w>}>>>>>
?5?E?a?m?s????
1,181?1[1g1m1v1
2!212M2Y2_2n222y333333/4U44
585L5q5}555555555
6u6666
898^8r8888888
9"9G9R9p9}9999999
=?=K=i=z=========
?"?-?@????
0)0:0L0^0q0z00000
1'2>2L2V222222233_4!56666
777777
8 848b9x999:W:';;;i<<<< =8=.>:>P>>>>>>>
?!?0?9?H?]?e?z????????
0H11111122
303m3333
4:4W4c4w444444
565|5555!656I6]6q666666"7B7N7b7v78888
9939a:u::::;;;;
<D<c<l<<<<<<<<<
='=X>w>>>>>>>
? ?E?L?\?c??
:3@3F3L3R3X3^3d3j3p3v3|3334$4+44
5E5k5555555555555
6j6u66666666
7$7(7,7074787<7@777777u:~:::::6;C;J;P;];i;r;;;;;;;;;
<F<K<h<m<r<
<<<<<<<<<<<
=I=====
>1>L>\>>>>>>>>>
???????????
1-1Z1u11111111
2v2|2222222=333333
4%4@4P4\4w444444'5-5J5c55566666
757X7]777
8W8`88888888888
9O9Y9s99
;(;D;P;s;;;;;1<6<g<s<<<(=4==============
>(>D>>>>>
?#?@?J?V?v?|?????
X0m0y00000
1[1g1111110262u22222
33%3N3X3d3333333!4j4
5$5i5u555#6/6e6q66
7j7o7t7777777
8K88888
9K9999 :V:Z:^:b:u::::
;,;;;;;;.<M<T<e<l<
=e=q=====>>>
!0&0U000
1@11111W222
44444Z55555555
656L6c6z6666666
8\8}8888
9*9=9X9j9r9x9|99999
: ::;t==v>
>>>>>>9?I?j?????
'0H0j000000i1|111111S2j222
3|33333
5856666666666
7$7B7[7o7}77777777777
8E88889999
:M:`:y::::::::
;Z;k;;;;
<$<<?E?f?o?
60?0`0i01111111111
2!2)252222222222
3333333"4+4;4D4T4h4n4
4444444444'5@5H5U5^5555555555555555
636E6Q6d6u66&727Y777777
8A888882999g9n999::7;>;M;z;;~<<<<
=Y=`=o=====A>H>V>]>}>>>>>>>
?%?-?F?Z?q?????
/050[0b0g0m0}0000000005
6*656<6G6O6X6h6v6666666666666
7#7,7=7C7L7T7h7q77
8>8o8{888h<s<{<<<<<<<<<<<
=E=c=j===Y>
555555555
6606;6D6P6X6d6k6p6y66666666666
=(=2=@=G=k============>>>>
?*?1?Z?a?i???
000d111112'3d3q334"5Q599;
<%<F<O<
?X?r??
0?0j00000000(101Q1~11111$20282F2L2X2
22222222233:3`3d3h3l3p333333"4)444
5,5=5a5555
6,6:6666666
7%7-7E7X7778"9F9s9d:p=y=t>}>>>K?Z?
G0s0000
11122a3h3$44]5666
< <$<(<,<0<4<8<M<Q<U<Y<]<<<<<<<<<<<<<<<<>>>>>>>
?;?U?\?`?d?h?l?p?t?x??????
:0E0`0g0l0p0t0000000
1Z1`1d1h1l111111
2#2-2@2O2l2w222=3`3333333333!4B4M4`44
5'5w55'6Y66'7E7v77+8@8R8\888888
939E9O999::::
;;:;G;m;;;;;;;
<<<<<<<<<
=&=0=>=D=t=}=====%>=>h>~>>>>>>>
?#?/?o?|????
0/0y0000000
1)1B1a1m11111111
2,272A22222.3d3n3}3333K5Y5l5555L6U66
7 7<7[7e777777718D8f8882989>9D9J9P9V9\9b9h9n9t9z99999999999999999999999
:":(:.:4:::@:F:L:
555555
3 6:::::::::;;;;;;;;;;;;;;
< <(<,<0<4<
H<P<T<`?d?p?x?
;5uKD7i8
)BjPF#
/5wG$A
[V8I1w
F=>WmcZ
9)gU@/z#
htb/:EI
)Z#*_r
;`?`HR
yN`o"K
P'[}23
Nw:t\R
1~aJdG
KVd~5+[y,r8
w#'"4-
b_7bYA
K)4q#uY
ajd9:O
j;Cp=
]Z&9*uT
JTsy,R}
2= b@&*
=mrf,|
b=H]Jskd
;LB1QFrP
7|&_>5qdw&-a
L%<n<8
ArggQq
$;$qJu~p#Y
m]zrnq
`=@dbA"l/go
JVqm7O%c
S(\Qsyr?
(%Evc&F^
M])3S(
pr+BGx|
L+YRtE
+RiR< {
kAU,^O
u#R:` sF)
i]C0:X
;I--Z7
j!=4GRHyMu
);] <SBm(w&[U
mt>tOr2~5}
~}A{[Olf
:PBG*8;.[ ND
dfW["x
J@<^:P-M&L
KjQ7m h};
iA*V@Oj)Iz
NXiTQ*#2f
ls)gD5&+
bh7(\A=L5W
pDBXwMPd`
LCZ]%o
:io"=%
2oG<"4hu4PtWy
Kx|9cX4
lT;0Nh\MFG
Rq&9~PV
mekp$)dU
hv>gII
G_/]"%9GM>=c
sm>M<Et
`+&, !
dTkf8RSKri
}lgHHFZY
qdx6'SY
^I4e/jY"p
kNobG<cj
;vrpP=#J
#/Fb1^t
5!6_@}^;~Z8
;D:G"/?fIf/D
8K7J]m*.{Lt
|bCyh5\V^'
jf^(A5<
>,9&YnOYj)(#
?^U+@*u1@i
vi'^)
VZg m-E,
k45KqlE
PRsp0!_Nr
@*97?Ua
[>UiBRBeiA(
#5cmsMh
&@]qP5x
Y+P]sU@0i'U
ZZ* jO
1aC>1[5 QJ;
<|},]n
","g'4
;b_xM>.07wtU
*eeF,V
Y;o"c^
yjco3S\\gUac f[
ne=#>
X08d_1UiQ
|l "AG|*
p'<\.zrH4hhAy
~oZcCs
!8G-/.
`Yzs8H>F0
/ftI'9
x[BBk!.
&[&i2%
@X^;/DLv`NN
pH=jo-p
_i-Ar)
96k*03FmlOY
FQCx$,Z
>a!D(H
$f/8Mf"
|%uS7y
9/Bn-VThnp
Q;X4|]m
%" 7HF
g0$5v2x\
'I98k~@Q
)xT}7i_
C-]a-.sV
&HS(IQbq<R$&>}Q50
;-OJ:Nc+ :
M~yw%RSx%|zW
Un=U'GX
eP>kTM7Ufsv
ZadfPE
SKZ@{Z4[
p#h'aUdm#1O~
#4">v+
zor-Dk7
n}0y_o>j="TcU
}p,ZKCO@}.s%(
/Y!ejD:
2HPG(\st8PG
gJ(fO)ki4;
x>"Nzg8
Ni/PR4
>B.)rI
E@a{fXJL;
O}nDHB
74}FAeZ
80r2~n=
Go~fud(<V&_*YrDu1Y'
U%RksGF
^}zJuzcS_dF8=zi3
8^=4\\&H(IEx[A"2`t
$&Y.iaE
TE[pP?
!.J5?T
0{po:/Ppg
HuMfBda
-|kE#N
y&bI6Ll
PZ3>8}cGn
N7fF#kPJyS
2UtSr^&-!7
>ZBiV(>
+=/gz%~fIbH
(8f7a3r
_;dw|"oB$5(d
;EjX3`;{%L4
+$f?JK
sC&2e+
OZ B@?j
j%1g**b
]BIMDhoB;+Q
01@8s(H
v!ao`
OL}<G1`
EMW>H_.
16EP#a
\fjjHR;A.
)5r#2D=M_
|q0MY+
Dg)U+A
hKVH8&/k
0|THVG^Aa&gNrR
p%?fH8
,HANR6i+
-ne`"Bb#t$
}@uRCj
%Nj8JJ
7-$b~OX~
zBe_[d}P
L<CT._wuf4
<J7+X%
D[,QQ'"X,{kc/
gw%Z%K>
d9yjO"U^
WJ-YOn
BRioM,
<"h5p&0nGm
cOOtf$+
J(.}Qw
l='[{G
_;oqvQ
`qjSwR
q5>|~*S
r/X8RcGy`W[+?D
x/SRu\.FrT l`F,9rmC
{QU3;]
K|\MOi
!R13-e
}~-x_*2
'T9P;)
RdBkQ;
`F.8nGAk
AG:<-Gl#PI
h~p@Btoi#
|W7se*
o9\'0M&vu
Ou2~d`
6AZYhoO
9Cmp>d
}/Z}6:
u[KYt
Tc;n.:g
V4fw%!4
KkQ7S9
N~jrJM=w`m
Fixt8~
_hi1L5
aXw@sX*
MbJ:i8
`HU\@F
nK`5^D+$G
d+?F,>HrY
?vuRg5
E|:Z0QV
u{Xsn]a
je+Bxj
w%K{. %e}
R"O?jQ
jG]~Hy
\(~j!m
$0NL-BD}y!
.pZ=:4}
/Qp@89n
D3{6QJZ!x
/YbU;I'`T^
FT+:6h!x4n
edxdXNWSe
)Gj0kk
coVnBag@
~Qs3FOk!
h%BN8Vo5U
H$UJ}tbt;-:k
]i9\?ZW4.*3!
`F4Q4V
8*]vzK5K
fv9h\@qh
~LAQ.{
|U&'w9,
UFc]_8CNB
"bW {j2;.C
ph#pvgs
jM+Q%GA4d
C`>[Qa
%~-tOX 4
C?I]SV
<]>n,V
Xw+Wy_fk
lHcC"J
XTY1X8g$yPVIP
3Lfj\A!
}55!8~
}<&##_aU=
w%jk~ob'^a4;q.8.
3uDi)f
cYSuQkX
FB!xK9
*.p{FwLF
=M_RR hP
[pavN6y:3\S
(SA{Y4
nPSHl=S
r$U*g}` +z
JzD70<G
-v#BL
~s\5_pX8
QgoK@f#
Y#Z*+&
KnxUayP
N+T<fV~-K;}
1Q;f6f8+4aE*
n 1`z@
vEIdV7gCj
+|N'h?^*N5>V%Oh#l
Wqe%7|
I\+yn%[o-
GvlQ`R`"
|fVZi"$F]|6
C-]a-.sV
?mHQOB
[}5st,f+
Rq^YO`
`8L&fgT
<lvRyU
VKWhPT?
V"m}fV'h*J
yj[,+&
#|tpAb
1;3ecv;2}kwi{'
Yuc:#b9BW
irVA4;
m>Q/EhpV\*
g.*kr=R
,`h8J"AxKn#a
mKr;8M"Z'
V0\NkB=L
dn4n\>=Yz
j.Y-;0,Kc|E}a^
F-xxME
|_~=S|^W
L!q!'`1
/knb$8
CF~dk<e
NbVv\&?0tyR
r/O;`[J8
Z<5n)Q
U\%^xZ
SpP<w}6"(vZ#RN\
G*v+dY{W%-
WOtP3(:;oaIobAU
vWrfDh3
~C9l9,(E<
8%h0r;Ub
`=5kYGJ
=e8xOZ
Yp^e{?
{iZ=2b
sE^)O!0z
Dn1??@^;o
\Kw@Q{
Z-a}aN
z!E%[aUQ
oR2WGW
M)+T9zOQ
kDxb9Z
&{b=Di$Dh
tO|4R~/2FF$
$)03??
$~wpp_
E#Tq>8
LpzVkH,^dBG
rD=Zd&3la
)lIT"L=
<U`Ncj
mBA@)*$#
h/MX_g
|Y.7_:JjOAD
;GH"syt
i9^VF~w
q1Z\pE^'SxF
1@uxAI
l7vmK(grXZ|,
H1YZ6]/%$8~2
57:mU0
6}(]T:
Thl'qO,
L<^{lIGW7
!p|TlXN&
G^f #udN4@1^D>
=gy(:N#m
f;Ls;Kl
j8%~G@fes
RWB>(+
/_@[duv
w".J++M
DXIjEZ
Z_8*K,
$=+\K=(
i)*T2Z3*6
cjiNEL
ROT:A5
C;G?\1[
km,A%e20
}bbQAG
83&IiD_w
<\,BvkM
Q3%7BN
e(B[]:M
&$\g'Q&Ck6
KMWH@d
NqKb>Tt:8`&i5
{g'D>9XOgiz
I+Zot^(.k
<#Yc[?
8m2@R!<Dl(
:SXG1~5
#E0{r#]4
q!vo<iD8
S~G;l>j(K-hdKI0
xmf2By
<-CO6ceV
{,s8h!
wr7oNU5pPA(Q
W[IIo?
JkQF#{
aUX^..ab
([PYVd/h,_('+6tHLftJT3j%+haFw{|V[~s}
^]NBe]%
3WU!3q%KGxD
)zV8*X?r)`bI
Q8EX#m
Ny~nB
J7NR2'tZ
f{8}pY
bbx33.N
Tl9e{eY\I
{zRn)a5
SA:/$W
TYXN/{Fg
ae8e4g
k=1zH;h
}rtHji6
M[ ]O0
{ZM6&eX
^b8i}])reR(k
r&uThny
jbrc[RL8
JeN.E2g{S(
TM@)xN'DMw^-O#O
FQQV'b!\6[
]5gb9xG
pf|dkEn
b2a-hA
SSD;L T
gLF}FJYM)
s*:JAk5q@
3S)8,rrG
1p;Kc\;'
QTp\HZUX
xW1URj
) S!OJ&JuAG
${,Jl}!#
kBPtY&eX
(#53yo
[P-Di6
{^|<d,.RPH
Yx-W8
J_MYdr$dV-`
YD%*Qe~
gdf(_
"90kF@d60
w<4A@/
v#:().\.)$LsI)x
3SCrc)}s
)Md'^9M
BSg\65G
?`i1l\
XAD`oO
492;e6>=<A:Cm>FEDIBKuFNMLQJS}NVUTYR[V^]\aZc^fedibka16g<58li9>oD=@tqAFwLEH|yIN
TMPQV\UXY^d]`aflehintmpqv|uxy~}d57f7<lhl=?n?DtptEGvGL|x|MO~OTUWW\]__degglmootuww|}
bd9;5k::jlAC=sBBrtIKE{JJz|QSMRRY[UZZac]bbikejjqsmrry{uzz}
f5738j?9n=?;@rGAvEGCHzOI~MOKPWQUWSX_Y]_[`gaegchoimokpwquwsx
cd:4==jkklB<EErsstJDMMz{{|RLUUZT]]b\eejdmmrluuzt}}|
21;f:6>@:9CnB>FHBAKvJFNPJIS~RNVXRQ[ZV^`ZYcb^fhba4d74:k?@<l?<BsGHDtGDJ{OPL|OLRWXTWTZ_`\_\bghdgd4d74:k?@<l?<BsGHDtGDJ{OPL|OLRWXTWTZ_`\_\bghdgd4d74:k?@<l?<BsGHDtGDJ{OPL|OLRWXTWTZ_`\_\bghdgd4d74:k?@<l?<BsGHDtGDJ{OPL|OLRWXTWTZ_`\_\bghdgd4d74:k?@<l?<BsGHDtGDJ{OPL|OLRWXTWTZ_`\_\bghdgd4d74:k?@<l?<BsGHDtGDJ{OPL|OLRWXTWTZ_`\_\bghdgd4d74:k?@<l?<BsGHDtGDJ{OPL|OLRWXTWTZ_`\_\bghdgd69c;9:ki>AkCABsqFIsKIJ{yNQ{SQRVY[YZ^acabfikije5;d:>:im=ClBFBquEKtJNJy}MS|RVRU[Z^Z]cbfbekjnjmsrvru{z~z}
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn52:;<:98=:BCDBA@EBJKLJIHMJRSTRQPURZ[\ZYX]Zbcdba`ebjkle38fggh:m;@noopBuCHvwwxJ}KP~
RSXZ[`bchjkprsxz{
e4hdig:@m<plqoBHuDxtywJP}L|
RXTZ`\bhdjplrxtz|
45e64gh
<=m><op
DEuFDwx
TUVT'\]^\/def2579<>>>:=?ADFFFBEGILNNNJMOQTVVVRUWY\^^^Z]_adfffbe3d6h459>;l>p<=AFCtFxDEINK|NLMQVSVTUY^[^\]afcf3c985jk:;kA@=rsBCsIHEz{JK{QPMRSYXUZ[a`]bcia27ef=>@i:?mnEFHqBGuvMNPyJO}~UVXRW]^`Z_efhbgmnpjouvxrw}~z
2g4ej5?::o<mr=GBBwDuzEOJJ
L}MWRRTU_ZZ\]gbba569:f8ii=>ABn@qqEFIJvHyyMNQR~PUVYZX]^ab`efijhmnqrpuvyzx}~6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffiknf85de<8>n@=lmD@FvHEtuLHN~PM|}TPVXU\X^`]d`fhelhnpmtpvxu|x~}
c55:gi;>k==BoqCFsEEJwyKN{MMR
SVUUZ[^]]bcfeejknmmrsvuuz{~}}
722;;>li?::CCFtqGBBKKN|yOJJSSVWRR[[^_ZZccfgbbkknfgd9h578nolAp=?@vwtIxEGH~
|QMOPYUWXa]_`ieghqmopyuwx}
67efe;6<>?mnmC>DFGuvuKFLNO}~}SNTVW[V\^_c^dfgk84ehj6ik@<mpr>qsHDuxzFy{PL}NXTV`\^hdf4467j>k:<<>?rFsBDDFGzN{JLLNOVRTTVW^Z\\^_fbddfge3;5;>iim;C=CFqquCKEKNyy}KSMSVS[U[^[c]cfckeknksmsvs{u{~{}
292;5k?k:A:C=sGsBIBKE{O{JQJSMWRYR[U_ZaZc]gbi3g2h4=j?;o:p<ErGCwBxDMzOK
JLUWSRT]_[Z\egcb6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn76c7g9>:?>k?oAFBGFsGwINJON{O
QVRWVWY^Z_^_afbgfgin4e7g7=i:<m?o?EqBDuGwGMyJL}O
OURTWW]Z\__ebdg46e;8;8:<>mC@C@BDFuKHKHJLN}SPSPRTV[X[XZ\^c`c`bdfk6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikncc8eh=j>kk@mpErFssHuxMzN{{P}UVX]^`efhmnpuvx}~
5343<gg8=;<;Doo@ECDCLwwHMKLKT
PUSTS\X][\[d`ecdcl44e5hg;:<<m=poCBDDuExwKJLL}M
SRTTU[Z\\]cbddee32de77
m;:lm??
uCBtuGG
}KJ|}OOSRWW'[Z__/cbgg7kjoo?srwwG{z
f3e46<l>n;m<>DtFvCuDFL|N~K}LNTVSTV\^[\^dfcdflnklntvstv|~{|~
5g9d:g<>=oAlBoDFEwItJwLNM
TVUYZ\^]abdfeij72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm399e6j7k;AAm>r?sCIIuFzG{KQQ}NOSYYVW[aa^_cii47c5g6<<<?k=o>DDDGsEwFLLLO{M
NTTTWUV\\\_]^dddge34;g;=l@;<CoCEtHCDKwKM|PKLS
SUXST[[]`[\ccehcdk2g95597i:oA==A?qBwIEEIGyJ
QMMQORYUUYWZa]]a_b72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemm6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn1123:k<999:;BsDAAABCJ{LIIIJKRTQQQRSZ\YYYZ[bdaad53e<<;:l=;mDDCBtECuLLKJ|MK}TTSRUS\\[Z][ddcbecllkjmkttsrus||{z}{
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffiknf53i95h8n=;qA=p@vECyIExH~MKQMPUSYUX][a]`eciehmkqmpusyux}{}
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffiknfdhei9?knlpmqAGsvtxuyIO{~|}QWY_agioqwy
72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemmfdhei9?knlpmqAGsvtxuyIO{~|}QWY_agioqwy
b4:9f>9=j<BAnFAErDJIvNIMzLRQ~VQUTZY^Y]\bafaedjinimlrqvqutzy~y}|
72f5g==l?:n=oEEtGBvEwMM|OJ~M
UUWRU]]_Z]eegbemmd53e<<;:l=;mDDCBtECuLLKJ|MK}TTSRUS\\[Z][ddcbecllkjmkttsrus||{z}{
6d9;e>lh>lACmFtpFtIKuN|xN|QS}VVY[^^acffikn
(null)
((((( H
VS_VERSION_INFO
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
FileVersion
6.0.150.3
InternalName
jusched
LegalCopyright
Copyright
LegalTrademarks
OriginalFilename
jusched
PrivateBuild
Sun Microsystems, Inc.
ProductName
Java(TM) Platform SE 6 U15
ProductVersion
6.0.150.3
SpecialBuild
VarFileInfo
Translation

Process Tree


0d80ca4557b4a3765a3df371e2e1446a0a73c3cb1e795499890f816ed725a1c5.exe, PID: 3028, Parent PID: 2600

default registry file network process services synchronisation iexplore office pdf

explorer.exe, PID: 1412, Parent PID: 1304

default registry file network process services synchronisation iexplore office pdf

jusched.exe, PID: 2708, Parent PID: 3028

default registry file network process services synchronisation iexplore office pdf

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 61714 8.8.8.8 53
192.168.56.101 56933 8.8.8.8 53
192.168.56.101 138 192.168.56.255 138
192.168.56.101 58485 114.114.114.114 53
192.168.56.101 57665 114.114.114.114 53
192.168.56.101 51758 114.114.114.114 53
192.168.56.101 51758 8.8.8.8 53
192.168.56.101 52215 8.8.8.8 53
192.168.56.101 52215 114.114.114.114 53
192.168.56.101 62361 114.114.114.114 53
192.168.56.101 62361 8.8.8.8 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name 9c49bc4b6a992c83_e8fdc9ff
Filepath C:\Program Files (x86)\e8fdc9ff\e8fdc9ff
Size 30.0B
Processes 3028 (0d80ca4557b4a3765a3df371e2e1446a0a73c3cb1e795499890f816ed725a1c5.exe)
Type ASCII text, with CRLF line terminators
MD5 fc9277b80966526daf567c000e9fa8de
SHA1 ecc8f3573741456fc255e76a41a664c728a0f692
SHA256 9c49bc4b6a992c83e151036e6fb904bd92634368337ae3e8da3109b3d28f67c4
CRC32 9759EB6D
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 92efbb5b29dd84e0_update23.job
Filepath C:\Windows\Tasks\Update23.job
Size 258.0B
Processes 3028 (0d80ca4557b4a3765a3df371e2e1446a0a73c3cb1e795499890f816ed725a1c5.exe)
Type VAX-order 68k Blit mpx/mux executable
MD5 4fad0fb3823815c82c42c510d3de2805
SHA1 81942b6645318af6d676d3fa9a9fd0479c3007ff
SHA256 92efbb5b29dd84e06e7d23f30531d61bc4a0f73efe27f39be31f162244527237
CRC32 081498EE
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 25c823df297d159f_jusched.exe
Filepath C:\Program Files (x86)\e8fdc9ff\jusched.exe
Size 240.8KB
Processes 3028 (0d80ca4557b4a3765a3df371e2e1446a0a73c3cb1e795499890f816ed725a1c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 950b18a2fb5beee033cc018860a4a354
SHA1 68fda5d32fbc2ec32f9926471b7e7faf7fd37bfa
SHA256 25c823df297d159f95971ed874089c6a4e7e47c60e0a0f5a8b8caa005dc9c34d
CRC32 BFC6B999
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.