查杀引擎 | 查杀结果 | 查杀时间 | 查杀版本 |
---|---|---|---|
McAfee | Artemis!7DDDA3378B04 | 20190608 | 6.0.6.653 |
Baidu | 20190318 | 1.0.0.2 | |
Avast | Win32:PUP-gen [PUP] | 20190606 | 18.4.3895.0 |
Alibaba | AdWare:Win32/InstallCore.cf9ce5e2 | 20190527 | 0.3.0.5 |
Kingsoft | 20190608 | 2013.8.14.323 | |
Tencent | 20190608 | 1.0.0.1 | |
CrowdStrike | win/malicious_confidence_100% (D) | 20190212 | 1.0 |
Time & API | Arguments | Status | Return | Repeated |
---|---|---|---|---|
1620968215.043751 GetComputerNameA |
computer_name:
OSKAR-PC
|
success | 1 | 0 |
section | CODE |
section | DATA |
section | BSS |
suspicious_features | POST method with no referer header | suspicious_request | POST https://update.googleapis.com/service/update2?cup2key=10:4134395546&cup2hreq=99ba2234c947345887632bbb37f07c510e68bdd9b4ace90350d80fdfd5182d78 |
request | HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe |
request | HEAD http://r1---sn-j5o76n7l.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.99&mm=28&mn=sn-j5o76n7l&ms=nvh&mt=1620938900&mv=u&mvi=1&pl=23&shardbypass=yes |
request | POST https://update.googleapis.com/service/update2?cup2key=10:4134395546&cup2hreq=99ba2234c947345887632bbb37f07c510e68bdd9b4ace90350d80fdfd5182d78 |
request | POST https://update.googleapis.com/service/update2?cup2key=10:4134395546&cup2hreq=99ba2234c947345887632bbb37f07c510e68bdd9b4ace90350d80fdfd5182d78 |
file | C:\Users\Public\Desktop\Google Chrome.lnk |
file | C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\is-HADVA.tmp\7ddda3378b0464394d0600849ba1d0b4.tmp |
host | 172.217.24.14 |
dead_host | 172.217.27.142:443 |
Bkav | W32.HfsAdware.9B47 |
MicroWorld-eScan | Application.DealAgent.ADUO |
CAT-QuickHeal | Trojan.IGENERIC |
McAfee | Artemis!7DDDA3378B04 |
Malwarebytes | PUP.Optional.InstallCore |
VIPRE | Trojan.Win32.Generic!BT |
BitDefender | Application.DealAgent.ADUO |
K7GW | Adware ( 005104571 ) |
K7AntiVirus | Adware ( 005104571 ) |
NANO-Antivirus | Virus.InnoSetup.Gen.ccng |
Symantec | Trojan.Gen.MBT |
Avast | Win32:PUP-gen [PUP] |
ClamAV | Win.Malware.Installcore-6912929-0 |
Kaspersky | not-a-virus:HEUR:AdWare.Win32.DealPly.gen |
Alibaba | AdWare:Win32/InstallCore.cf9ce5e2 |
ViRobot | Adware.Installcore.1544224.AP |
Rising | PUF.InstallCore!1.AB2C (CLASSIC) |
Ad-Aware | Application.DealAgent.ADUO |
Sophos | InnoMod (PUA) |
Comodo | ApplicUnwnt@#2frh4ei7gqm61 |
DrWeb | Program.Freemake.1 |
Zillya | Adware.DealPly.Win32.176388 |
Invincea | heuristic |
McAfee-GW-Edition | Artemis |
Trapmine | malicious.high.ml.score |
FireEye | Generic.mg.7ddda3378b046439 |
Emsisoft | Application.Downloader (A) |
SentinelOne | DFI - Suspicious PE |
Fortinet | Riskware/InstallCore_Gen |
Endgame | malicious (high confidence) |
Arcabit | Application.DealAgent.ADUO |
SUPERAntiSpyware | PUP.InstallCore/Variant |
ZoneAlarm | not-a-virus:AdWare.Win32.DealPly.heur |
Microsoft | PUA:Win32/Bitrepeyp.A |
AhnLab-V3 | PUP/Win32.InstallCore.R196141 |
Acronis | suspicious |
VBA32 | Adware.DealPly |
MAX | malware (ai score=95) |
Cylance | Unsafe |
ESET-NOD32 | Win32/InstallCore.Gen.A potentially unwanted |
TrendMicro-HouseCall | TROJ_GEN.R01FH0CDA19 |
Yandex | PUA.DealPly! |
GData | Win32.Application.InstallCore.LO |
AVG | Win32:PUP-gen [PUP] |
Cybereason | malicious.78b046 |
Paloalto | generic.ml |
CrowdStrike | win/malicious_confidence_100% (D) |
Qihoo-360 | Win32/Virus.Adware.5f0 |
No hosts contacted.
Source | Source Port | Destination | Destination Port |
---|---|---|---|
192.168.56.101 | 49188 | 203.208.40.98 update.googleapis.com | 443 |
192.168.56.101 | 49189 | 203.208.41.65 redirector.gvt1.com | 80 |
192.168.56.101 | 49190 | 58.63.233.66 r1---sn-j5o76n7l.gvt1.com | 80 |
Source | Source Port | Destination | Destination Port |
---|---|---|---|
192.168.56.101 | 49713 | 114.114.114.114 | 53 |
192.168.56.101 | 50002 | 114.114.114.114 | 53 |
192.168.56.101 | 53657 | 114.114.114.114 | 53 |
192.168.56.101 | 57236 | 114.114.114.114 | 53 |
192.168.56.101 | 58970 | 114.114.114.114 | 53 |
192.168.56.101 | 60088 | 114.114.114.114 | 53 |
192.168.56.101 | 60384 | 114.114.114.114 | 53 |
192.168.56.101 | 62318 | 114.114.114.114 | 53 |
192.168.56.101 | 62912 | 114.114.114.114 | 53 |
192.168.56.101 | 137 | 192.168.56.255 | 137 |
192.168.56.101 | 138 | 192.168.56.255 | 138 |
192.168.56.101 | 123 | 20.189.79.72 time.windows.com | 123 |
192.168.56.101 | 49235 | 224.0.0.252 | 5355 |
192.168.56.101 | 50534 | 224.0.0.252 | 5355 |
192.168.56.101 | 51808 | 224.0.0.252 | 5355 |
192.168.56.101 | 51963 | 224.0.0.252 | 5355 |
192.168.56.101 | 53210 | 224.0.0.252 | 5355 |
192.168.56.101 | 54178 | 224.0.0.252 | 5355 |
192.168.56.101 | 56804 | 224.0.0.252 | 5355 |
192.168.56.101 | 57756 | 224.0.0.252 | 5355 |
URI | Data |
---|---|
http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe | HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe HTTP/1.1 Connection: Keep-Alive Accept: */* Accept-Encoding: identity User-Agent: Microsoft BITS/7.5 X-Old-UID: cnt=0 X-Last-HR: 0x0 X-Last-HTTP-Status-Code: 0 X-Retry-Count: 0 X-HTTP-Attempts: 1 Host: redirector.gvt1.com |
http://r1---sn-j5o76n7l.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.99&mm=28&mn=sn-j5o76n7l&ms=nvh&mt=1620938900&mv=u&mvi=1&pl=23&shardbypass=yes | HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.99&mm=28&mn=sn-j5o76n7l&ms=nvh&mt=1620938900&mv=u&mvi=1&pl=23&shardbypass=yes HTTP/1.1 Connection: Keep-Alive Accept: */* Accept-Encoding: identity User-Agent: Microsoft BITS/7.5 X-Old-UID: cnt=0 X-Last-HR: 0x0 X-Last-HTTP-Status-Code: 0 X-Retry-Count: 0 X-HTTP-Attempts: 1 Host: r1---sn-j5o76n7l.gvt1.com |
No ICMP traffic performed.
No IRC requests performed.
No Suricata Alerts
No Suricata TLS
No Snort Alerts