8.6
极危

e39f6fc5d64d163b3180e3f4852ef1544cff540b0f4c2d40771b6ce5172c8740

86ea894e1a24a536798c9bcabc82c570.exe

分析耗时

105s

最近分析

文件大小

165.6KB
静态报毒 动态报毒 100% AGEN AI SCORE=86 AIDETECTVM AVA@89PP2Y BSCOPE CLASSIC CONFIDENCE DANGEROUSSIG DWYG ELDORADO EMOTET FQFUXX GENCIRC GENETIC GQEV GRLK HIGH CONFIDENCE KQX@AI KRYPTIK M7DJC MALICIOUS PE MALWARE1 QVM20 R + MAL R255822 SCORE STATIC AI SUSGEN UNSAFE Y5Q6VIRWKDQ ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Emotet-FMI!86EA894E1A24 20201229 6.0.6.653
Alibaba Trojan:Win32/Emotet.cc5cae61 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:DangerousSig [Trj] 20201229 21.1.5827.0
Tencent Malware.Win32.Gencirc.10ba342c 20201229 1.0.0.1
Kingsoft 20201229 2017.9.26.565
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
静态指标
Queries for the computername (1 个事件)
Time & API Arguments Status Return Repeated
1619712297.503626
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
This executable is signed
行为判定
动态指标
HTTP traffic contains suspicious features which may be indicative of malware related traffic (1 个事件)
suspicious_features POST method with no referer header suspicious_request POST https://update.googleapis.com/service/update2?cup2key=10:2865978569&cup2hreq=f92150667dc7131c4d74ba221967de48babc7f91ffccb08d1cd6f4d06d62dfcb
Performs some HTTP requests (4 个事件)
request HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
request HEAD http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619683212&mv=m&mvi=1&pl=23&shardbypass=yes
request HEAD http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=656b7228436ca15e&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619683212&mv=m
request POST https://update.googleapis.com/service/update2?cup2key=10:2865978569&cup2hreq=f92150667dc7131c4d74ba221967de48babc7f91ffccb08d1cd6f4d06d62dfcb
Sends data using the HTTP POST Method (1 个事件)
request POST https://update.googleapis.com/service/update2?cup2key=10:2865978569&cup2hreq=f92150667dc7131c4d74ba221967de48babc7f91ffccb08d1cd6f4d06d62dfcb
Allocates read-write-execute memory (usually to unpack itself) (9 个事件)
Time & API Arguments Status Return Repeated
1619712290.409124
NtAllocateVirtualMemory
process_identifier: 2712
region_size: 69632
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x003a0000
success 0 0
1619712290.925124
NtAllocateVirtualMemory
process_identifier: 2712
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x003c0000
success 0 0
1619712290.925124
NtAllocateVirtualMemory
process_identifier: 2712
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x003d0000
success 0 0
1619712290.925124
NtAllocateVirtualMemory
process_identifier: 2712
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x00400000
success 0 0
1619712291.753626
NtAllocateVirtualMemory
process_identifier: 1752
region_size: 69632
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x01c00000
success 0 0
1619712292.346626
NtAllocateVirtualMemory
process_identifier: 1752
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x01c20000
success 0 0
1619712292.346626
NtAllocateVirtualMemory
process_identifier: 1752
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x01c30000
success 0 0
1619712292.346626
NtAllocateVirtualMemory
process_identifier: 1752
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x00400000
success 0 0
1619712355.315499
NtAllocateVirtualMemory
process_identifier: 1424
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffffffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00000000041b0000
success 0 0
Checks whether any human activity is being performed by constantly checking whether the foreground window changed
Creates a service (1 个事件)
Time & API Arguments Status Return Repeated
1619712298.721626
CreateServiceW
service_start_name:
start_type: 2
service_handle: 0x0034d4a8
display_name: dmapnf
error_control: 0
service_name: dmapnf
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\"C:\Windows\SysWOW64\dmapnf.exe"
filepath_r: "C:\Windows\SysWOW64\dmapnf.exe"
service_manager_handle: 0x0034d598
desired_access: 18
service_type: 16
password:
success 3462312 0
Creates a shortcut to an executable file (1 个事件)
file C:\Users\Public\Desktop\Google Chrome.lnk
Moves the original executable to a new location (1 个事件)
Time & API Arguments Status Return Repeated
1619712297.784626
MoveFileWithProgressW
oldfilepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\86ea894e1a24a536798c9bcabc82c570.exe
newfilepath: C:\Windows\SysWOW64\dmapnf.exe
newfilepath_r: C:\Windows\SysWOW64\dmapnf.exe
flags: 3
oldfilepath_r: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\86ea894e1a24a536798c9bcabc82c570.exe
success 1 0
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.157239907990297 section {'size_of_data': '0x00016e00', 'virtual_address': '0x00001000', 'entropy': 7.157239907990297, 'name': '.text', 'virtual_size': '0x00016ce6'} description A section with a high entropy has been found
entropy 0.5772870662460567 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (3 个事件)
host 172.217.24.14
host 181.15.177.100
host 189.143.52.49
Installs itself for autorun at Windows startup (1 个事件)
service_name dmapnf service_path C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\"C:\Windows\SysWOW64\dmapnf.exe"
Attempts to remove evidence of file being downloaded from the Internet (1 个事件)
file C:\Windows\SysWOW64\dmapnf.exe:Zone.Identifier
File has been identified by 60 AntiVirus engines on VirusTotal as malicious (50 out of 60 个事件)
Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.Agent.DWYG
FireEye Generic.mg.86ea894e1a24a536
McAfee Emotet-FMI!86EA894E1A24
Cylance Unsafe
SUPERAntiSpyware Trojan.Agent/Gen-Emotet
Sangfor Malware
K7AntiVirus Trojan ( 0054e0681 )
Alibaba Trojan:Win32/Emotet.cc5cae61
K7GW Trojan ( 0054e0681 )
Cybereason malicious.e1a24a
Arcabit Trojan.Agent.DWYG
Cyren W32/Emotet.AAP.gen!Eldorado
Symantec Packed.Generic.459
APEX Malicious
Avast Win32:DangerousSig [Trj]
ClamAV Win.Malware.Emotet-6971817-0
Kaspersky HEUR:Trojan.Win32.Generic
BitDefender Trojan.Agent.DWYG
NANO-Antivirus Trojan.Win32.Kryptik.fqfuxx
Paloalto generic.ml
AegisLab Trojan.Win32.Malicious.4!c
Tencent Malware.Win32.Gencirc.10ba342c
Ad-Aware Trojan.Agent.DWYG
Sophos Mal/Generic-R + Mal/Emotet-Q
Comodo TrojWare.Win32.Emotet.AVA@89pp2y
F-Secure Heuristic.HEUR/AGEN.1125423
VIPRE Trojan.Win32.Generic!BT
TrendMicro TrojanSpy.Win32.EMOTET.SMC
McAfee-GW-Edition Emotet-FMI!86EA894E1A24
Emsisoft Trojan.Agent.DWYG (B)
Ikarus Trojan-Banker.Emotet
Jiangmin Trojan.Banker.Emotet.iph
eGambit Unsafe.AI_Score_66%
Avira HEUR/AGEN.1125423
Antiy-AVL Trojan/Win32.Emotet
Gridinsoft Trojan.Win32.Kryptik.vb!s1
Microsoft Trojan:Win32/Emotet.PA!MTB
ZoneAlarm HEUR:Trojan.Win32.Generic
GData Trojan.Agent.DWYG
Cynet Malicious (score: 100)
AhnLab-V3 Malware/Win32.Generic.R255822
Acronis suspicious
BitDefenderTheta Gen:NN.ZexaF.34700.kqX@ai!m7Djc
ALYac Trojan.Agent.Emotet
MAX malware (ai score=86)
VBA32 BScope.Malware-Cryptor.Emotet
Malwarebytes Trojan.Emotet
ESET-NOD32 a variant of Win32/Kryptik.GQEV
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (5 个事件)
dead_host 172.217.160.110:443
dead_host 172.217.24.14:443
dead_host 181.15.177.100:443
dead_host 189.143.52.49:443
dead_host 172.217.160.78:443
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2019-05-16 11:45:03

Imports

Library KERNEL32.dll:
0x41818c GetProcAddress
0x418194 GetProcessHeap
0x41819c GetStartupInfoA
0x4181a0 GetStartupInfoW
0x4181a4 GetStdHandle
0x4181a8 GetStringTypeA
0x4181ac GetStringTypeExW
0x4181b0 GetStringTypeW
0x4181b8 GetSystemDirectoryW
0x4181bc GetSystemInfo
0x4181c4 GetSystemTime
0x4181cc GetSystemTimes
0x4181d4 GetTempFileNameW
0x4181d8 GetTempPathW
0x4181dc GetTickCount
0x4181e0 GetTimeFormatA
0x4181e8 GetUserDefaultLCID
0x4181f0 GetVersion
0x4181f4 GetVersionExW
0x418200 GlobalAlloc
0x418204 GlobalFindAtomA
0x418208 GlobalFree
0x41820c GlobalUnWire
0x418210 HeapAlloc
0x418214 HeapCreate
0x418218 HeapDestroy
0x41821c HeapFree
0x418220 HeapReAlloc
0x418224 HeapSize
0x418238 InterlockedExchange
0x418244 IsBadReadPtr
0x418248 IsDebuggerPresent
0x418250 IsValidCodePage
0x418254 IsValidLocale
0x418258 IsWow64Process
0x41825c LCMapStringA
0x418260 LCMapStringW
0x418268 LoadLibraryA
0x41826c LoadLibraryExW
0x418270 LoadLibraryW
0x418274 LoadResource
0x418278 LocalAlloc
0x418280 LocalFree
0x418284 LockFile
0x418288 LockResource
0x41828c MapViewOfFileEx
0x418290 Module32FirstW
0x418294 MoveFileW
0x418298 MulDiv
0x41829c MultiByteToWideChar
0x4182a0 OpenEventA
0x4182ac OpenMutexW
0x4182b0 OpenProcess
0x4182b4 OpenThread
0x4182b8 OutputDebugStringW
0x4182bc PeekNamedPipe
0x4182c0 Process32FirstW
0x4182c4 Process32NextW
0x4182d0 RaiseException
0x4182d8 ReadFile
0x4182dc ReadProcessMemory
0x4182e0 ReleaseMutex
0x4182e4 ReleaseSemaphore
0x4182e8 ReplaceFile
0x4182ec ResetEvent
0x4182f0 ResumeThread
0x4182f4 RtlUnwind
0x418300 SetEndOfFile
0x418308 SetEvent
0x41830c SetFileAttributesA
0x418310 SetFilePointer
0x418314 SetFilePointerEx
0x418318 SetHandleCount
0x41831c SetLastError
0x418324 SetStdHandle
0x418328 SetThreadLocale
0x418330 SetWaitableTimer
0x418334 SizeofResource
0x418338 Sleep
0x418340 TerminateProcess
0x418344 TerminateThread
0x418348 TlsAlloc
0x41834c TlsFree
0x418350 TlsGetValue
0x418354 TlsSetValue
0x418360 UnlockFile
0x418364 UnmapViewOfFile
0x418368 VerSetConditionMask
0x41836c VerifyVersionInfoW
0x418370 VirtualAlloc
0x418374 VirtualAllocEx
0x418378 VirtualFree
0x41837c VirtualFreeEx
0x418380 VirtualLock
0x41838c WaitForSingleObject
0x418390 WideCharToMultiByte
0x418394 WriteConsoleA
0x418398 WriteConsoleW
0x41839c WriteFile
0x4183a8 lstrcmpA
0x4183ac lstrcmpiA
0x4183b0 lstrcmpiW
0x4183b4 lstrcpynW
0x4183b8 lstrlen
0x4183bc lstrlenA
0x4183c0 lstrlenW
0x4183c4 FlushFileBuffers
0x4183c8 FindResourceW
0x4183d0 GetOverlappedResult
0x4183d4 GetOEMCP
0x4183dc GetModuleHandleW
0x4183e0 GetModuleHandleA
0x4183e4 GetModuleFileNameW
0x4183e8 GetModuleFileNameA
0x4183ec GetLongPathNameW
0x4183f0 GetLogicalDrives
0x4183f4 GetLocaleInfoW
0x4183f8 GetLocaleInfoA
0x4183fc GetLocalTime
0x418400 GetLastError
0x418404 GetFileType
0x418408 GetFileTime
0x41840c GetFileSizeEx
0x418410 GetFileSize
0x418414 GetFileAttributesW
0x418420 GetExitCodeThread
0x418424 GetExitCodeProcess
0x41842c GetDriveTypeA
0x418430 GetDiskFreeSpaceExW
0x418434 GetDateFormatA
0x418438 GetCurrentThreadId
0x41843c GetCurrentProcessId
0x418440 GetCurrentProcess
0x418448 GetConsoleOutputCP
0x41844c GetConsoleMode
0x418450 GetConsoleCP
0x418454 GetConsoleAliasesW
0x418458 GetCommandLineW
0x41845c GetCommState
0x418460 GetCPInfoExA
0x418464 GetCPInfo
0x418468 GetAtomNameW
0x41846c GetACP
0x418470 FreeResource
0x418474 FreeLibrary
0x41847c FreeConsole
0x418480 OpenMutexA
0x418484 FormatMessageW
0x418488 FindResourceExW
0x41848c FindNextFileW
0x418490 FindFirstFileW
0x418498 FindClose
0x41849c FindAtomW
0x4184a8 FatalAppExitA
0x4184ac ExitThread
0x4184b0 ExitProcess
0x4184b4 EnumSystemLocalesA
0x4184bc DuplicateHandle
0x4184c0 DisconnectNamedPipe
0x4184c4 DeviceIoControl
0x4184cc DeleteFileW
0x4184d0 DeleteFileA
0x4184d8 DeleteAtom
0x4184e4 CreateThread
0x4184e8 CreateSemaphoreW
0x4184ec CreateSemaphoreA
0x4184f0 CreateRemoteThread
0x4184f4 CreateProcessW
0x4184f8 CreateNamedPipeW
0x4184fc CreateMutexW
0x418500 CreateMutexA
0x418504 CreateFileW
0x418508 CreateFileMappingW
0x41850c CreateFileA
0x418510 CreateEventW
0x418514 CreateEventA
0x418518 CreateDirectoryW
0x41851c CreateDirectoryA
0x418520 CopyFileW
0x418524 CopyFileExA
0x418528 ConnectNamedPipe
0x41852c CompareStringW
0x418530 CompareStringA
0x418534 CompareFileTime
0x418538 CloseHandle
0x41853c CancelIo
0x418540 OpenEventW
0x418544 AddAtomW
Library USER32.dll:
0x418610 keybd_event
0x418614 WindowFromPoint
0x418618 WaitForInputIdle
0x41861c UpdateWindow
0x418620 UpdateLayeredWindow
0x418624 UnregisterClassA
0x418628 TranslateMessage
0x418630 SwitchToThisWindow
0x418634 ShowWindow
0x418638 ShowOwnedPopups
0x41863c SetWindowsHookExA
0x418640 SetWindowsHookA
0x418644 SetWindowTextW
0x418648 SetWindowPos
0x41864c SetWindowLongW
0x418650 SetTimer
0x418654 SetRectEmpty
0x418658 SetRect
0x41865c SetForegroundWindow
0x418660 SetFocus
0x418664 SetCursor
0x418668 SetClipboardViewer
0x41866c SetClassLongW
0x418670 SetActiveWindow
0x418674 SendMessageW
0x418678 SendMessageTimeoutW
0x41867c ScreenToClient
0x418680 ReleaseDC
0x418684 ReleaseCapture
0x41868c RegisterClassExW
0x418690 PtInRect
0x418694 PostQuitMessage
0x418698 PostMessageW
0x41869c PeekMessageW
0x4186a0 OpenInputDesktop
0x4186a4 OffsetRect
0x4186a8 MonitorFromWindow
0x4186ac MonitorFromRect
0x4186b0 MonitorFromPoint
0x4186b4 MessageBoxW
0x4186b8 MapWindowPoints
0x4186bc LoadStringW
0x4186c0 LoadImageW
0x4186c4 LoadCursorW
0x4186c8 KillTimer
0x4186cc IsWindowVisible
0x4186d0 IsWindowEnabled
0x4186d4 IsWindow
0x4186d8 IsDialogMessageW
0x4186dc InvalidateRect
0x4186e4 GetWindowTextW
0x4186e8 GetWindowRect
0x4186ec GetWindowPlacement
0x4186f0 GetWindowLongW
0x4186f4 GetWindowInfo
0x4186f8 GetWindow
0x4186fc GetSystemMetrics
0x418700 GetShellWindow
0x418704 GetParent
0x418708 GetMonitorInfoW
0x41870c GetMessageW
0x418710 GetMessagePos
0x418714 GetKeyboardState
0x418718 GetForegroundWindow
0x41871c GetDesktopWindow
0x418720 GetDC
0x418724 GetCursorPos
0x418728 GetClientRect
0x41872c GetClassLongW
0x418730 GetClassInfoExW
0x418734 GetAncestor
0x418738 GetActiveWindow
0x41873c FindWindowW
0x418740 FindWindowExW
0x418744 ExitWindowsEx
0x418750 EnableWindow
0x418754 DrawTextW
0x418758 DispatchMessageW
0x41875c DestroyWindow
0x418760 DestroyIcon
0x418764 DefWindowProcW
0x418768 CreateWindowExW
0x41876c CopyRect
0x418770 CloseDesktop
0x418774 ClientToScreen
0x418778 CharNextW
0x41877c CallWindowProcW
0x418780 AttachThreadInput
0x418788 AdjustWindowRect
Library GDI32.dll:
0x4180c8 AngleArc
0x4180cc CloseMetaFile
0x4180d0 CreateBrushIndirect
0x4180d8 CreateCompatibleDC
0x4180dc CreateDIBSection
0x4180e0 CreateEllipticRgn
0x4180e4 CreateFontIndirectW
0x4180e8 CreateFontW
0x4180ec CreatePolygonRgn
0x4180f0 DeleteDC
0x4180f4 DeleteObject
0x4180fc EngDeletePath
0x418100 EngFillPath
0x418104 EngReleaseSemaphore
0x418108 ExtCreatePen
0x418110 GdiEntry9
0x418114 GdiValidateHandle
0x418118 GetBkMode
0x418120 GetCharABCWidthsI
0x418124 GetCharWidthInfo
0x41812c GetLogColorSpaceA
0x418130 GetObjectW
0x418138 GetStockObject
0x418140 GetTextExtentPointI
0x418148 LPtoDP
0x41814c PATHOBJ_bEnum
0x418150 PlayMetaFile
0x418154 PolyBezier
0x418158 RoundRect
0x41815c SelectObject
0x418160 SetDIBColorTable
0x418164 SetROP2
0x418168 SetRectRgn
0x41816c SetTextColor
0x418170 SwapBuffers
0x418174 UnloadNetworkFonts
0x418178 cGetTTFFromFOT
0x41817c BitBlt
Library ADVAPI32.dll:
0x418004 CloseServiceHandle
0x418010 CreateWellKnownSid
0x418018 CryptGenRandom
0x41801c CryptReleaseContext
0x418020 DuplicateToken
0x418024 DuplicateTokenEx
0x418028 EqualSid
0x41802c FreeSid
0x418034 GetTokenInformation
0x418038 GetUserNameW
0x418044 LookupAccountSidW
0x41804c OpenEventLogW
0x418050 OpenProcessToken
0x418054 OpenSCManagerW
0x418058 OpenServiceW
0x41805c QueryServiceStatus
0x418060 ReadEventLogW
0x418064 RegCloseKey
0x418068 RegCreateKeyA
0x41806c RegCreateKeyExW
0x418070 RegDeleteKeyW
0x418074 RegDeleteValueW
0x418078 RegEnumKeyExA
0x41807c RegEnumKeyExW
0x418084 RegOpenKeyExA
0x418088 RegOpenKeyExW
0x41808c RegOpenKeyW
0x418090 RegQueryInfoKeyW
0x418094 RegQueryValueExA
0x418098 RegQueryValueExW
0x41809c RegSetValueExW
0x4180a0 RevertToSelf
0x4180a4 SetEntriesInAclW
0x4180b0 StartServiceW
0x4180b4 RegOpenKeyA
0x4180c0 CloseEventLog
Library SHELL32.dll:
0x41854c ShellExecuteW
0x418550 ShellExecuteExW
0x418554 ShellExecuteA
0x418558 SHLoadInProc
0x418560 SHGetMalloc
0x418568 SHGetFolderPathW
0x41856c SHGetFolderPathA
0x418570 SHFileOperationA
0x418578 SHChangeNotify
0x418580 DragQueryFileA
0x418584 Shell_NotifyIconW
Library SHLWAPI.dll:
0x41858c ColorHLSToRGB
0x418590 ColorRGBToHLS
0x418594 PathAddBackslashW
0x418598 PathAppendW
0x41859c PathCombineA
0x4185a0 PathCombineW
0x4185a4 PathCompactPathW
0x4185a8 PathFileExistsA
0x4185ac AssocQueryStringW
0x4185b0 PathFindExtensionW
0x4185b4 PathFindFileNameA
0x4185b8 PathFindFileNameW
0x4185bc PathIsDirectoryW
0x4185c0 PathIsPrefixW
0x4185cc PathRemoveFileSpecW
0x4185d0 PathStripPathW
0x4185d4 SHDeleteKeyW
0x4185d8 SHDeleteValueA
0x4185dc SHDeleteValueW
0x4185e0 SHGetValueA
0x4185e4 SHGetValueW
0x4185e8 SHSetValueA
0x4185ec SHSetValueW
0x4185f0 StrCmpIW
0x4185f4 StrCmpNA
0x4185f8 StrRStrIW
0x4185fc StrStrIW
0x418600 StrStrW
0x418604 wnsprintfW
0x418608 PathFileExistsW

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49193 113.108.239.194 r1---sn-j5o7dn7e.gvt1.com 80
192.168.56.101 49194 113.108.239.196 r3---sn-j5o7dn7e.gvt1.com 80
192.168.56.101 49192 203.208.41.33 redirector.gvt1.com 80
192.168.56.101 49191 203.208.41.66 update.googleapis.com 443

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50568 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 54991 114.114.114.114 53
192.168.56.101 55368 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 56743 114.114.114.114 53
192.168.56.101 57236 114.114.114.114 53
192.168.56.101 58070 114.114.114.114 53
192.168.56.101 58970 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 50002 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 53210 224.0.0.252 5355
192.168.56.101 54178 224.0.0.252 5355
192.168.56.101 54260 224.0.0.252 5355

HTTP & HTTPS Requests

URI Data
http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: redirector.gvt1.com

http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619683212&mv=m&mvi=1&pl=23&shardbypass=yes
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619683212&mv=m&mvi=1&pl=23&shardbypass=yes HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: r1---sn-j5o7dn7e.gvt1.com

http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=656b7228436ca15e&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619683212&mv=m
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=656b7228436ca15e&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619683212&mv=m HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: r3---sn-j5o7dn7e.gvt1.com

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.