查杀引擎 | 查杀结果 | 查杀时间 | 查杀版本 |
---|---|---|---|
McAfee | PUP-HMN | 20200830 | 6.0.6.653 |
Alibaba | 20190527 | 0.3.0.5 | |
Baidu | 20190318 | 1.0.0.2 | |
Kingsoft | 20200830 | 2013.8.14.323 | |
Tencent | Malware.Win32.Gencirc.10b39d7b | 20200830 | 1.0.0.1 |
CrowdStrike | win/malicious_confidence_100% (D) | 20190702 | 1.0 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\InstallDate |
resource name | AFX_DIALOG_LAYOUT |
entropy | 7.122248871398701 | section | {'size_of_data': '0x0009b600', 'virtual_address': '0x00036000', 'entropy': 7.122248871398701, 'name': '.reloc', 'virtual_size': '0x0009b500'} | description | A section with a high entropy has been found | |||||||||
entropy | 0.7556231003039514 | description | Overall entropy of this PE file is high |
host | 172.217.24.14 |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Application.Bundler.iStartSurf.AJF |
FireEye | Generic.mg.4c5d1ce214023ba6 |
CAT-QuickHeal | PUA.PrepscramRI.S5497904 |
McAfee | PUP-HMN |
SUPERAntiSpyware | Trojan.Agent/Generic |
Sangfor | Malware |
K7AntiVirus | Trojan ( 005485b41 ) |
K7GW | Trojan ( 005485b41 ) |
Cybereason | malicious.214023 |
Arcabit | Application.Bundler.iStartSurf.AJF |
Invincea | heuristic |
BitDefenderTheta | Gen:NN.ZexaF.34196.Zu0@aGEDK0jk |
Cyren | W32/S-72dde2d3!Eldorado |
Symantec | ML.Attribute.HighConfidence |
APEX | Malicious |
Cynet | Malicious (score: 90) |
Kaspersky | HEUR:Trojan.Win32.Generic |
BitDefender | Application.Bundler.iStartSurf.AJF |
NANO-Antivirus | Trojan.Win32.Vittalia.fnizub |
Rising | Malware.Obscure/Heur!1.9E03 (CLASSIC) |
Ad-Aware | Application.Bundler.iStartSurf.AJF |
Emsisoft | Application.Bundler.iStartSurf.AJF (B) |
Comodo | Application.Win32.Prepscram.AJF@826n85 |
F-Secure | Heuristic.HEUR/AGEN.1103345 |
DrWeb | Trojan.Vittalia.17926 |
Sophos | Mal/Kryptik-DI |
SentinelOne | DFI - Malicious PE |
Jiangmin | Trojan.Chapak.bbr |
eGambit | Unsafe.AI_Score_99% |
Avira | HEUR/AGEN.1103345 |
Antiy-AVL | GrayWare[Bundler]/Win32.Prepscram |
Microsoft | SoftwareBundler:Win32/Prepscram |
ZoneAlarm | HEUR:Trojan.Win32.Generic |
GData | Application.Bundler.iStartSurf.AJF |
AhnLab-V3 | PUP/Win32.IStartSurf.R256540 |
Acronis | suspicious |
VBA32 | BScope.Trojan.Chapak |
Malwarebytes | Adware.IStartSurf |
ESET-NOD32 | a variant of Win32/Kryptik.GQBC |
Tencent | Malware.Win32.Gencirc.10b39d7b |
MAX | malware (ai score=76) |
Fortinet | W32/GenKryptik.DAKE!tr |
Webroot | W32.Adware.Gen |
AVG | Win32:StartSurf-B [Adw] |
Panda | Trj/Genetic.gen |
CrowdStrike | win/malicious_confidence_100% (D) |
Qihoo-360 | HEUR/QVM20.1.99DB.Malware.Gen |
No hosts contacted.
Name | Response | Post-Analysis Lookup |
---|---|---|
time.windows.com |
A 20.189.79.72
CNAME time.microsoft.akadns.net |
|
dns.msftncsi.com | A 131.107.255.255 | 131.107.255.255 |
one.mountaincanvas.pw | ||
dns.msftncsi.com | AAAA fd3e:4f5a:5b81::1 | 131.107.255.255 |
two.wastescrew.pw | ||
teredo.ipv6.microsoft.com |
No TCP connections recorded.
Source | Source Port | Destination | Destination Port |
---|---|---|---|
192.168.56.101 | 49713 | 114.114.114.114 | 53 |
192.168.56.101 | 50002 | 114.114.114.114 | 53 |
192.168.56.101 | 53237 | 114.114.114.114 | 53 |
192.168.56.101 | 57756 | 114.114.114.114 | 53 |
192.168.56.101 | 58367 | 114.114.114.114 | 53 |
192.168.56.101 | 60384 | 114.114.114.114 | 53 |
192.168.56.101 | 62318 | 114.114.114.114 | 53 |
192.168.56.101 | 137 | 192.168.56.255 | 137 |
192.168.56.101 | 138 | 192.168.56.255 | 138 |
192.168.56.101 | 123 | 20.189.79.72 time.windows.com | 123 |
192.168.56.101 | 49235 | 224.0.0.252 | 5355 |
192.168.56.101 | 50534 | 224.0.0.252 | 5355 |
192.168.56.101 | 51963 | 224.0.0.252 | 5355 |
192.168.56.101 | 53657 | 224.0.0.252 | 5355 |
192.168.56.101 | 56804 | 224.0.0.252 | 5355 |
192.168.56.101 | 57874 | 224.0.0.252 | 5355 |
192.168.56.101 | 62191 | 224.0.0.252 | 5355 |
192.168.56.101 | 63429 | 224.0.0.252 | 5355 |
192.168.56.101 | 1900 | 239.255.255.250 | 1900 |
192.168.56.101 | 50003 | 239.255.255.250 | 3702 |
No HTTP requests performed.
No ICMP traffic performed.
No IRC requests performed.
No Suricata Alerts
No Suricata TLS
No Snort Alerts