11.2
0-day

12e3d47757b20af09b9fdb893a776c3b3745ab6fdea10795ec1104c57f2c66bd

7414b72cacf3583e2afa049021829698.exe

分析耗时

98s

最近分析

文件大小

548.5KB
静态报毒 动态报毒 100% AI SCORE=89 AIDETECTVM ATTRIBUTE BSCOPE CLASSIC CONFIDENCE ELDORADO GA5JD3RDAT8 GDSDA GENCIRC GENERICRXHI HIGH CONFIDENCE HIGHCONFIDENCE HUIVEX IMW@AY81WBI MALWARE1 MALWARE@#GSPJ7DODM06U PASSWORDSTEALER PREDATOR PWSX R03BC0DI220 R264426 SCORE SPYAGENT SUSGEN TROJANPSW TROJANPWS UNSAFE VIDAR VIDARSTEALER ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba TrojanPSW:Win32/PasswordStealer.4c1a6f3a 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:PWSX-gen [Trj] 20201031 20.10.5736.0
Tencent Malware.Win32.Gencirc.11ae2b4e 20201031 1.0.0.1
Kingsoft 20201031 2013.8.14.323
McAfee GenericRXHI-GE!7414B72CACF3 20201031 6.0.6.653
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
静态指标
Queries for the computername (2 个事件)
Time & API Arguments Status Return Repeated
1620775149.762626
GetComputerNameA
computer_name: OSKAR-PC
success 1 0
1620775160.450626
GetComputerNameA
computer_name: OSKAR-PC
success 1 0
Collects information to fingerprint the system (MachineGuid, DigitalProductId, SystemBiosDate) (1 个事件)
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
Tries to locate where the browsers are installed (1 个事件)
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available (1 个事件)
Time & API Arguments Status Return Repeated
1620775160.450626
GlobalMemoryStatusEx
success 1 0
行为判定
动态指标
HTTP traffic contains suspicious features which may be indicative of malware related traffic (1 个事件)
suspicious_features POST method with no referer header, POST method with no useragent header suspicious_request POST http://ip-api.com/line/
Performs some HTTP requests (1 个事件)
request POST http://ip-api.com/line/
Sends data using the HTTP POST Method (1 个事件)
request POST http://ip-api.com/line/
Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation (1 个事件)
Time & API Arguments Status Return Repeated
1620775155.684626
GetDiskFreeSpaceW
root_path: C:
sectors_per_cluster: 8362495
number_of_free_clusters: 8362495
total_number_of_clusters: 8362495
bytes_per_sector: 512
success 1 0
Steals private information from local Internet browsers (50 out of 147 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Subresource Filter\Web Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\chrome_shutdown_ms.txt
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\BrowserMetrics\History
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\hyphen-data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\ThirdPartyModuleList64\History
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\History
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\WidevineCdm
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Subresource Filter
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\MEIPreload\History
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\GrShaderCache\Login Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\CertificateRevocation
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\ShaderCache\Login Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\OnDeviceHeadSuggestModel
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\ShaderCache\Web Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\pnacl\Web Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\hyphen-data\Login Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\OriginTrials\History
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\ZxcvbnData\Web Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\Cookies
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\FontLookupTableCache\History
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\AutofillStates\Login Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\ThirdPartyModuleList64\Cookies
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\AutofillStates\Web Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Safe Browsing\History
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\ZxcvbnData\History
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\SwReporter
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\ThirdPartyModuleList64\Web Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\TLSDeprecationConfig
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Crowd Deny\History
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\FontLookupTableCache
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\AutofillStates\Cookies
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Crashpad\Web Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\RecoveryImproved\Web Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\TLSDeprecationConfig\Cookies
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\ShaderCache\History
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\FontLookupTableCache\Login Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\First Run
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\ZxcvbnData
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\FileTypePolicies\History
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Login Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\MEIPreload
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\SwReporter\Cookies
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\pnacl\Login Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Default\History
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\GrShaderCache
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\WidevineCdm\Login Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Floc\Login Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\SafetyTips\Login Data
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\Local State
file C:\Users\Administrator.Oskar-PC\AppData\Local\Google\Chrome\User Data\GrShaderCache\Web Data
Looks up the external IP address (1 个事件)
domain ip-api.com
Searches running processes potentially to identify processes for sandbox evasion, code injection or memory dumping (1 个事件)
Checks adapter addresses which can be used to detect virtual network interfaces (1 个事件)
Time & API Arguments Status Return Repeated
1620775150.543626
GetAdaptersAddresses
flags: 0
family: 0
failed 111 0
Queries for potentially installed applications (13 个事件)
Time & API Arguments Status Return Repeated
1620775160.450626
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x000003dc
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
options: 0
success 0 0
1620775160.450626
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x000003e0
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook
options: 0
success 0 0
1620775160.450626
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x000003e0
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager
options: 0
success 0 0
1620775160.450626
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x000003e0
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx
options: 0
success 0 0
1620775160.450626
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x000003e0
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore
options: 0
success 0 0
1620775160.450626
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x000003e0
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
options: 0
success 0 0
1620775160.450626
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x000003e0
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40
options: 0
success 0 0
1620775160.450626
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x000003e0
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data
options: 0
success 0 0
1620775160.450626
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x000003e0
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX
options: 0
success 0 0
1620775160.450626
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x000003e0
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData
options: 0
success 0 0
1620775160.450626
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x000003e0
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack
options: 0
success 0 0
1620775160.450626
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x000003e0
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent
options: 0
success 0 0
1620775160.450626
RegOpenKeyExA
access: 0x00020019
base_handle: 0x80000002
key_handle: 0x000003e0
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC
regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC
options: 0
success 0 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Checks the CPU name from registry, possibly for anti-virtualization (1 个事件)
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString
Harvests credentials from local FTP client softwares (2 个事件)
file C:\Users\Administrator\AppData\Roaming\FileZilla\recentservers.xml
registry HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\Configuration
Harvests information related to installed instant messenger clients (1 个事件)
file C:\Users\Administrator\AppData\Roaming\.purple\accounts.xml
Collects information about installed applications (1 个事件)
Time & API Arguments Status Return Repeated
1620775160.450626
RegQueryValueExA
key_handle: 0x000003e0
value: Google Chrome
regkey_r: DisplayName
reg_type: 1 (REG_SZ)
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName
success 0 0
Harvests credentials from local email clients (1 个事件)
registry HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003
Sets or modifies WPAD proxy autoconfiguration file for traffic interception (8 个事件)
Time & API Arguments Status Return Repeated
1620775154.668626
RegSetValueExA
key_handle: 0x00000364
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionReason
success 0 0
1620775154.668626
RegSetValueExA
key_handle: 0x00000364
value: ÀpÄF×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionTime
success 0 0
1620775154.668626
RegSetValueExA
key_handle: 0x00000364
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecision
success 0 0
1620775154.668626
RegSetValueExW
key_handle: 0x00000364
value: 网络 2
regkey_r: WpadNetworkName
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadNetworkName
success 0 0
1620775154.668626
RegSetValueExA
key_handle: 0x0000037c
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionReason
success 0 0
1620775154.668626
RegSetValueExA
key_handle: 0x0000037c
value: ÀpÄF×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionTime
success 0 0
1620775154.668626
RegSetValueExA
key_handle: 0x0000037c
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecision
success 0 0
1620775154.715626
RegSetValueExW
key_handle: 0x00000360
value: {40112ABE-63B3-43C3-BE93-1440EE3AF106}
regkey_r: WpadLastNetwork
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\WpadLastNetwork
success 0 0
File has been identified by 60 AntiVirus engines on VirusTotal as malicious (50 out of 60 个事件)
Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Generic.SpyAgent.6.4BF52171
FireEye Generic.mg.7414b72cacf3583e
CAT-QuickHeal Trojanpws.Vidar
ALYac Generic.SpyAgent.6.4BF52171
Cylance Unsafe
Sangfor Malware
K7AntiVirus Password-Stealer ( 00569ede1 )
Alibaba TrojanPSW:Win32/PasswordStealer.4c1a6f3a
K7GW Password-Stealer ( 00569ede1 )
Cybereason malicious.fdbe7e
Arcabit Generic.SpyAgent.6.4BF52171
Invincea Mal/Generic-S
BitDefenderTheta Gen:NN.ZexaF.34590.ImW@ay81wbi
Cyren W32/Vidar.A.gen!Eldorado
Symantec ML.Attribute.HighConfidence
TrendMicro-HouseCall TROJ_GEN.R03BC0DI220
Avast Win32:PWSX-gen [Trj]
ClamAV Win.Dropper.Vidar-9369449-0
Kaspersky HEUR:Trojan-PSW.Win32.Vidar.vho
BitDefender Generic.SpyAgent.6.4BF52171
NANO-Antivirus Trojan.Win32.Vidar.huivex
Paloalto generic.ml
Tencent Malware.Win32.Gencirc.11ae2b4e
Ad-Aware Generic.SpyAgent.6.4BF52171
Emsisoft Generic.SpyAgent.6.4BF52171 (B)
Comodo Malware@#gspj7dodm06u
F-Secure Trojan.TR/AD.VidarStealer.HU
DrWeb Trojan.PWS.Stealer.29176
VIPRE Trojan.Win32.Generic!BT
TrendMicro TROJ_GEN.R03BC0DI220
McAfee-GW-Edition BehavesLike.Win32.Generic.hh
Sophos Mal/Generic-S
APEX Malicious
Jiangmin Trojan.PSW.Vidar.kq
Avira TR/AD.VidarStealer.HU
MAX malware (ai score=89)
Antiy-AVL Trojan[PSW]/Win32.Agent
Gridinsoft Trojan.Win32.Agent.vb
Microsoft Trojan:Win32/PasswordStealer.KA!MTB
AegisLab Trojan.Win32.Vidar.i!c
ZoneAlarm HEUR:Trojan-PSW.Win32.Vidar.vho
GData Generic.SpyAgent.6.4BF52171
Cynet Malicious (score: 100)
AhnLab-V3 Downloader/Win32.Vidar.R264426
McAfee GenericRXHI-GE!7414B72CACF3
VBA32 BScope.Backdoor.Predator
Malwarebytes Spyware.PasswordStealer.Generic
Ikarus Trojan-PSW.Agent
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (2 个事件)
dead_host 172.217.24.14:443
dead_host 216.58.200.46:443
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-08-29 06:58:13

Imports

Library KERNEL32.dll:
0x473058 CreateDirectoryA
0x47305c GetLastError
0x473060 CreateMutexA
0x473064 CloseHandle
0x473068 WriteFile
0x47306c CreateFileA
0x473070 MultiByteToWideChar
0x473074 ReadFile
0x473078 GetFileSize
0x47307c GetVersionExA
0x473080 GetFileSizeEx
0x473084 Process32Next
0x473088 Process32First
0x473090 TerminateProcess
0x473094 OpenProcess
0x473098 GetProcAddress
0x47309c LoadLibraryA
0x4730a4 FreeLibrary
0x4730ac lstrcatA
0x4730b0 GetFileAttributesW
0x4730c8 AreFileApisANSI
0x4730cc SetFilePointer
0x4730d0 SetEndOfFile
0x4730d4 FlushFileBuffers
0x4730d8 UnlockFile
0x4730dc LockFile
0x4730e0 LockFileEx
0x4730e4 UnlockFileEx
0x4730e8 GetFileAttributesA
0x4730f8 GetTickCount
0x4730fc GetSystemTime
0x473100 CopyFileW
0x473104 UnmapViewOfFile
0x473108 GetTempPathA
0x47310c GetTempPathW
0x473110 FormatMessageA
0x473114 FormatMessageW
0x473118 GetFullPathNameA
0x47311c GetFullPathNameW
0x473120 GetDiskFreeSpaceA
0x473124 GetDiskFreeSpaceW
0x473128 CreateFileW
0x47312c GetSystemInfo
0x473130 MapViewOfFile
0x473134 CreateFileMappingA
0x473138 GetComputerNameA
0x47313c IsWow64Process
0x473140 GetCurrentProcess
0x473144 GlobalMemoryStatus
0x473148 GetModuleHandleA
0x473158 GetLocaleInfoA
0x473164 GetLocalTime
0x473168 CompareStringW
0x47316c SetStdHandle
0x473170 IsValidLocale
0x473174 EnumSystemLocalesA
0x473178 GetUserDefaultLCID
0x47317c GetLocaleInfoW
0x473180 GetStringTypeW
0x473184 GetModuleFileNameA
0x473188 GetCurrentProcessId
0x47318c Sleep
0x473190 DeleteFileA
0x473194 ExitProcess
0x47319c GetDriveTypeA
0x4731a0 LoadLibraryW
0x4731a4 CreateDirectoryW
0x4731a8 lstrcpyW
0x4731ac lstrlenA
0x4731b0 lstrcatW
0x4731b4 FindFirstFileW
0x4731b8 lstrcmpW
0x4731bc DeleteFileW
0x4731c0 FindNextFileW
0x4731c4 FindClose
0x4731c8 HeapFree
0x4731cc GetProcessHeap
0x4731d0 HeapAlloc
0x4731d4 WideCharToMultiByte
0x4731e8 GetConsoleMode
0x4731ec GetConsoleCP
0x4731f0 GetModuleFileNameW
0x4731f4 IsValidCodePage
0x4731f8 LocalFree
0x4731fc LocalAlloc
0x473204 GetOEMCP
0x473208 GetACP
0x47320c HeapCreate
0x473210 GetFileType
0x473218 GetStdHandle
0x47321c SetHandleCount
0x473220 HeapSize
0x473224 IsDebuggerPresent
0x473230 GetCurrentThreadId
0x473234 SetLastError
0x473238 GetModuleHandleW
0x47323c TlsFree
0x473240 TlsSetValue
0x473244 TlsGetValue
0x473248 TlsAlloc
0x473250 GetCPInfo
0x473254 LCMapStringW
0x473258 GetStartupInfoW
0x47325c HeapSetInformation
0x473260 GetCommandLineA
0x473264 HeapReAlloc
0x473268 RtlUnwind
0x47326c RaiseException
0x473270 DecodePointer
0x473274 EncodePointer
0x473278 InterlockedExchange
0x473284 WriteConsoleW
Library USER32.dll:
0x4732b0 GetSystemMetrics
0x4732b4 wsprintfA
0x4732b8 EnumDisplayDevicesW
0x4732bc CharToOemA
0x4732c0 GetDC
0x4732c4 ReleaseDC
0x4732cc GetDesktopWindow
Library GDI32.dll:
0x47303c SelectObject
0x473040 BitBlt
0x473044 DeleteObject
0x473048 CreateDCA
0x47304c GetDeviceCaps
0x473050 CreateCompatibleDC
Library ADVAPI32.dll:
0x473000 RegOpenKeyExA
0x473004 RegQueryValueExA
0x473008 RegEnumKeyExA
0x47300c GetUserNameA
0x473014 RegOpenKeyExW
0x473018 RegGetValueW
0x47301c RegCloseKey
0x473020 RegGetValueA
0x473024 RegEnumValueA
Library SHELL32.dll:
0x47329c SHGetFolderPathA
0x4732a0 ShellExecuteA
Library ole32.dll:
0x47334c CoCreateInstance
0x473350 CoUninitialize
Library SHLWAPI.dll:
0x4732a8 PathMatchSpecW
Library CRYPT32.dll:
0x473030 CryptUnprotectData
Library PSAPI.DLL:
0x473290 EnumProcessModules
0x473294 GetModuleBaseNameA
Library WININET.dll:
0x4732d4 InternetConnectA
0x4732d8 HttpOpenRequestA
0x4732dc HttpSendRequestA
0x4732e0 InternetCloseHandle
0x4732e8 InternetReadFile
0x4732ec HttpQueryInfoA
0x4732f4 InternetSetOptionA
0x4732f8 InternetOpenA
0x4732fc InternetOpenUrlA
Library gdiplus.dll:
0x473324 GdipSaveImageToFile
0x47332c GdiplusShutdown
0x473330 GdiplusStartup
0x473334 GdipCloneImage
0x473338 GdipDisposeImage
0x47333c GdipAlloc
0x473344 GdipFree
Library bcrypt.dll:
0x473304 BCryptDecrypt
0x47330c BCryptDestroyKey
0x473314 BCryptSetProperty

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49176 208.95.112.1 ip-api.com 80

UDP

Source Source Port Destination Destination Port
192.168.56.101 49713 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 53210 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 60215 114.114.114.114 53
192.168.56.101 61680 114.114.114.114 53
192.168.56.101 62191 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 50002 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 50568 224.0.0.252 5355
192.168.56.101 53380 224.0.0.252 5355
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57756 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355

HTTP & HTTPS Requests

URI Data
http://ip-api.com/line/
POST /line/ HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
Content-Length: 25
Host: ip-api.com
Connection: Keep-Alive
Cache-Control: no-cache

--1BEF0A57BE110FD467A--

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.