1.1
低危

1212a0e79ebb454df1d6a539e6188f8081b0334fc8e5ed2f4ba2083adc6884f9

1212a0e79ebb454df1d6a539e6188f8081b0334fc8e5ed2f4ba2083adc6884f9.exe

分析耗时

193s

最近分析

369天前

文件大小

46.2KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER UPATRE
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.67
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Malware-gen 20200108 18.4.3895.0
Baidu Win32.Trojan.Kryptik.jr 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200108 2013.8.14.323
McAfee GenericRXII-AD!8A44028AC310 20200108 6.0.6.653
Tencent Malware.Win32.Gencirc.10b07790 20200108 1.0.0.1
静态指标
行为判定
动态指标
该二进制文件可能包含加密或压缩数据,表明使用了打包工具 (2 个事件)
section {'name': '.text', 'virtual_address': '0x00001000', 'virtual_size': '0x000021a0', 'size_of_data': '0x00002200', 'entropy': 7.204262997765282} entropy 7.204262997765282 description 发现高熵的节
entropy 0.2698412698412698 description 此PE文件的整体熵值较高
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 61 个反病毒引擎识别为恶意 (50 out of 61 个事件)
ALYac Trojan.Downloader.JRZA
APEX Malicious
AVG Win32:Malware-gen
Acronis suspicious
Ad-Aware Trojan.Downloader.JRZA
AhnLab-V3 Trojan/Win32.Upatre.R157839
Antiy-AVL Trojan[Downloader]/Win32.Upatre
Arcabit Trojan.Downloader.JRZA
Avast Win32:Malware-gen
Avira TR/Spy.Zbot.sbboqv
Baidu Win32.Trojan.Kryptik.jr
BitDefender Trojan.Downloader.JRZA
BitDefenderTheta Gen:NN.ZexaF.33558.cqY@aOoG7QeG
Bkav W32.AIDetectVM.malware
CAT-QuickHeal Trojan.GenericCS.S7574789
ClamAV Win.Downloader.Upatre-5744092-0
Comodo TrojWare.Win32.TrojanDownloader.Upatre.DOM@5st38w
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.ac310a
Cylance Unsafe
Cyren W32/Trojan.MSBQ-3359
DrWeb Trojan.Upatre.5278
ESET-NOD32 a variant of Win32/Kryptik.GVBD
Emsisoft Trojan.Downloader.JRZA (B)
Endgame malicious (high confidence)
F-Prot W32/Trojan3.QTL
F-Secure Trojan.TR/Spy.Zbot.sbboqv
FireEye Generic.mg.8a44028ac310a7ce
Fortinet W32/Kryptik.DQAA!tr
GData Win32.Trojan.Kryptik.CA
Ikarus Trojan.Win32.Crypt
Invincea heuristic
Jiangmin TrojanDownloader.Upatre.rqi
K7AntiVirus Trojan-Downloader ( 0055c6c71 )
K7GW Trojan-Downloader ( 0055c6c71 )
Kaspersky HEUR:Trojan.Win32.Generic
MAX malware (ai score=81)
Malwarebytes Trojan.Upatre
McAfee GenericRXII-AD!8A44028AC310
McAfee-GW-Edition BehavesLike.Win32.Upatre.pm
MicroWorld-eScan Trojan.Downloader.JRZA
Microsoft TrojanDownloader:Win32/Upatre.BN
NANO-Antivirus Trojan.Win32.Kryptik.dtrwge
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM02.0.6C53.Malware.Gen
Rising Trojan.Waski!1.A489 (CLASSIC)
SUPERAntiSpyware Trojan.Agent/Gen-Upatre
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos Troj/Kryptik-JN
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2014-07-30 14:18:20

PE Imphash

1d4a1b4cd524c16b61e652ff6a68afd1

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000021a0 0x00002200 7.204262997765282
.data 0x00004000 0x00000c5e 0x00000e00 3.8878547801960606
.rsrc 0x00005000 0x00004a10 0x00004c00 5.161696971054217
.reloc 0x0000a000 0x000001f8 0x00000200 0.0

Resources

Name Offset Size Language Sub-language File type
RT_CURSOR 0x00005470 0x00000134 LANG_POLISH SUBLANG_DEFAULT None
RT_BITMAP 0x00005320 0x000000e8 LANG_POLISH SUBLANG_DEFAULT None
RT_BITMAP 0x00005320 0x000000e8 LANG_POLISH SUBLANG_DEFAULT None
RT_ICON 0x000055c0 0x00004228 LANG_POLISH SUBLANG_DEFAULT None
RT_DIALOG 0x00005408 0x00000062 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_GROUP_CURSOR 0x000055a8 0x00000014 LANG_POLISH SUBLANG_DEFAULT None
RT_GROUP_ICON 0x000097e8 0x00000014 LANG_POLISH SUBLANG_DEFAULT None
RT_MANIFEST 0x00009800 0x0000020f LANG_POLISH SUBLANG_DEFAULT None

Imports

Library KERNEL32.DLL:
0x404010 FindFirstFileW
0x404014 GetLastError
0x404018 lstrcpynA
0x40401c lstrlenA
0x404020 GetModuleHandleA
0x404024 LoadLibraryA
0x404028 FindClose
0x40402c GetStartupInfoA
0x404030 CreateDirectoryW
0x404034 Sleep
0x404038 FindNextFileW
0x40403c GlobalAlloc
0x404040 WaitForSingleObject
0x404044 CreateThread
0x404048 TerminateThread
0x40404c CreateMutexW
0x404050 ReleaseMutex
0x404054 GlobalSize
Library COMCTL32.dll:
0x404000 None
Library GDI32.dll:
0x404008 TextOutA
Library MSVCRT.dll:
0x40405c _controlfp
0x404060 _except_handler3
0x404064 __set_app_type
0x404068 __p__fmode
0x40406c __p__commode
0x404070 _adjust_fdiv
0x404074 __setusermatherr
0x404078 _initterm
0x40407c __getmainargs
0x404080 __p__acmdln
0x404084 exit
0x404088 _XcptFilter
0x40408c _exit
0x404090 ??2@YAPAXI@Z
0x404094 ??3@YAXPAX@Z
Library USER32.dll:
0x40409c GetMessageA
0x4040a0 TranslateMessage
0x4040a4 RegisterClassExA
0x4040a8 LoadAcceleratorsA
0x4040ac LoadCursorA
0x4040b0 LoadIconA
0x4040b4 LoadStringA
0x4040b8 CreateWindowExA
0x4040bc PostQuitMessage
0x4040c0 EndPaint
0x4040c4 BeginPaint
0x4040c8 DefWindowProcA
0x4040cc DialogBoxParamA
0x4040d0 DestroyWindow
0x4040d4 PostMessageA
0x4040d8 SendMessageA
0x4040dc SetWindowTextA
0x4040e0 EndDialog
0x4040e8 DispatchMessageA

L!This program cannot be run in DOS mode.
7"aich
`.data
@.reloc
qi57vvG=
si57uuh.
vGuv57iu~
vGtih.
uqu57vvG=
vGtih.
vGqih.
rv57vqh.
qi57iuw
GG0vd8^,O|<
HH6e@6md
X?0BDgHC,w
)JRk7oZmHk
6{G{N.Z,C[K
sbW0ED}s0tei
7teD/.K
.20,_G([
3DZGpG0
q./n1PFr Z
e25{.CC
G8^Kn:0d1[Sd(1d1w.k6!
wViSiI^
DuakHDdm
S._ZWe
F{,cD< Dee
!@C18bM:[W
FM@{0
!F>Z2zG
JVH!De2N
mF{2H2e
25{GJCe2m<S
DWEZse
D[F{{GeZ{zJZteJz#0,'#
DSF{c.>Z3C
0.>Z2v
0@{G2Z!
DO<B2Hse
gZJZEw0
z{E.C.{
[[7tfh
HZld02
0CG.ERa
0d#.8bBDG2!
*gZHv#Z
GhZG>0h
rDL{-D
Ij.30H:
?De-<U
Hu3!Eu
JFFRXu
UU3H_@
_^]PuVF8%
L3]AUM
Mu^FF#
NMIIII
GHuGHHGH
Au^H9Et:YEP6e
VWW_^]
Ujh(F@
QUREPMQ
<"u>"u
fFu%@@
UWQ%_C@
jdh`F@
t,EPMQUR
TTEhlE@
Rjjdh
Pjjdh
EjdhE@
hRdPMQ
MX9OOQ
GVT1G%V6
Kilimanmen
Horapplist
Bisanoled Maxek
button
richedit
3+3:')
RICHED32.DLL
Hokeuj
think probably it was quite an attractive
ardly thought of it since then - that he had a charm
ardly thought of it since then - that he had a charm
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
RegisterClassExA
LoadAcceleratorsA
LoadCursorA
LoadIconA
LoadStringA
CreateWindowExA
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
DialogBoxParamA
DestroyWindow
PostMessageA
SendMessageA
SetWindowTextA
EndDialog
USER32.dll
ReleaseMutex
GlobalSize
CreateMutexW
TerminateThread
CreateThread
WaitForSingleObject
GlobalAlloc
FindNextFileW
CreateDirectoryW
FindFirstFileW
FindClose
LoadLibraryA
GetModuleHandleA
lstrlenA
lstrcpynA
GetLastError
KERNEL32.DLL
TextOutA
GDI32.dll
COMCTL32.dll
??3@YAXPAX@Z
??2@YAPAXI@Z
_XcptFilter
__p__acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
MSVCRT.dll
_controlfp
GetStartupInfoA
ffffff
aGGDDV
tttDP`
twGD``awwGtu
PawwwGE
PffffffWP
GtwwwP
33333333
7Ajx+*
5CNT14
chyfmyju{jp}knhijkjlkp}jtxiuwju|io~jmhjknkp~lq~kp}mq~lr
lqmrlq
lqltmrnklk
[Z~z/.
}{{xvvwvvvttvtt~z{
zwvpnnkiikikjhhiggyxy
qoofceeccwuu
{{wv//
#!)' )''
$215'.
mu* ("-!.(''('' ''
# * *!* * )
!) +!, * * + * * + *
#'!+ * , *"* )
"-!* * *!, *!+ + * )!*
"!!'$-!*!*"*!*
!,!*!*"*!*"*!*!*$.)
%"#*%.!)")!)!)!&$.
!Ze]g[[ZT+*
&!(GM]g]_]_22 & , '
]g_gah`edeBG
#!)!)#)!)!)")!)!)#,!+
'%%*&/#*#)")")$+'1")'%'1#*&0"-'1%-(0#+#)!+&",$1(2#+(3"+"+#.%.&0%.$*")#*")")"*")")#,!)
'#&+&0#*")"("(%/%.$) %,9-:%0(2%-!&!)'1.;,:*6)5%-!!(%,'0.=(0)2'2$,'-$*$*%*$*$*&+$*%+%,$,
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.2.8"
processorArchitecture="X86"
name="AMDInstaller"
type="win32"/>
<description>AMDInstaller</description>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges>
<requestedExecutionLevel
level="asInvoker"
uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
Zimbanda
MS Sans Serif
C:\Users\helenb\AppData\Local\Temp\Rar$DIa0.810\invoice-ITK709408.scr
c:\c0c533d59275c873a93ca73f8c23f9dd.exe
C:\6a18d59a7888c50aefffbfaf31b671864ded052cfa9da28b06c660bfa8d98bbe
C:\a814ba026ac41432d12be77935c036c918f14f7028cf88320b0afa359bf25fcd
C:\a64218aad6b14e7dbf450788147f4999355a278de31eb887ceb9455ecd5a1b73
C:\f6fd82d7ba6a51bcffd88d7c8204a61a3c9e7c2aba527ff029c86035a4dffa3a
C:\61QRF6wr.exe
C:\RCaMCNfa.exe
C:\wx45xxuX.exe
C:\KjnFHdfS.exe
C:\bZA3wgfR.exe
C:\v3_1tFwo.exe
C:\GfsMw5d6.exe
C:\tnzidkb5.exe
C:\7Jl_4WPy.exe
C:\FEwYsGbB.exe
C:\5CuxPLhu.exe
C:\d1YwoOgO.exe
C:\TGXWOHsl.exe
C:\FdNSgKL8.exe
C:\qVy_jfFw.exe
C:\wCUqgTjp.exe
C:\5FSBE2CG.exe
C:\9d293ca1f3dd644668bae2e84712f0cd07a44e7bb7bcded93cbef08a22fbb340
C:\uFkVO8NE.exe
C:\6zcChwR3.exe
C:\Sm4qvAmt.exe
C:\2SK4YZmd.exe
C:\i7S3CiKk.exe
C:\kYkuqOLL.exe
C:\sLjtT5_C.exe
C:\2eb308d7e6a14c0ab41c68f7f4c712528f31cfb6b5cd91315dfe00a7baa54e0b
C:\82465681b9bd69985a9b39b82ac2f102a1e99cb574403e87b0fefd990ab5ab81
C:\b7641dda496dd9d522227bfad389ad0e738cfccc37188199ee60d5c1f7b1eacf
C:\Raiden\Goat\FTP\Sample\57F9CFCFD27E66D548EAC07C4D827340.bin.exe
C:\Users\admin\Downloads\sample.exe
C:\26492c31d090a82a70b5e3ec3a509a6953e28735d5266c8993bf218a28bf0281
C:\Documents and Settings\Administrator\Desktop\I1fPbMJS.exe
C:\Users\admin\Downloads\important_document.exe
C:\Users\admin\Downloads\factura.exe
C:\5811907f6366e81f48721761a819ae910a61c5a14a7452d62cb211d77767d1fe
c:\VID685116636.exe
C:\05374fb9b4a6eb50be2d87b9b524f15d44cd31df38804c19932155b4ac00b5b6
C:\a862d88ca80ddcfad26bc8bf2a03c4101e6dca1f316e242549290de32114181e
C:\Documents and Settings\Administrator\Desktop\EadRMUHn.exe
C:\Users\admin\Downloads\factura.exe
C:\Users\admin\Downloads\factura.exe
C:\cf3dcbcd89c73398a49e4563f02fc270d6996c1f491a1f3ccb6e6b9a85ed4b4f
C:\7cf8315ed1586edd74b0695e4394d910a6f2c15a5a9cc0fa9a68546b5167d987
C:\Documents and Settings\Administrator\Desktop\lcRmw5lC.exe
C:\b7fd62866a05b68629d304b3a89c5040db804523b3568597d576e76c5984f931
C:\127443814b1de735aee851584feaa8c0a91750f77e351e867436162e44b049d0
C:\2aac2d3e64d34961744c4c75a7a1ed7833f27983fd211116abbbf55935bcb162
C:\Users\admin\Downloads\factura.exe
C:\2c7342f068c9a1d3b483e8148b7a98691eb74cf075e8c8a58e6ec3920671361d
C:\2c9beef630e9485114e6a0482678f80ba241063766a3e2fbbd5e6070de8bf34c
C:\Users\Joe Cage\AppData\Local\Temp\26087869421e656de86ea2d4bdcd337077349b62668b1bc741598099fde4f50e.exe
C:\Documents and Settings\Administrator\Desktop\TqIWhoTy.exe
C:\Users\Petra\AppData\Local\Temp\.pe32.exe
C:\Users\admin\Downloads\ce6b5629a56ed7dc_zonicex.exe
C:\Users\Petra\AppData\Local\Temp\zonicex.pe32
C:\Documents and Settings\luser\Desktop\TqEA7Lvt.exe
C:\241090dd8debb245e4f21e28339c2bbcd51e0f495a0e5e3fa59904ab98fd592e
C:\241415e5ca91acb2acd105356446e9eda31eb56b6d779ccd1dd716e7046995e1
C:\dda60a961a68b7ffc816ae3c54d6a5aaba8c24b98a02d1d5046722b61cf9f34e
C:\Documents and Settings\luser\Desktop\Qw2E17sp.exe
C:\0425cd799bfb3cdaa6139c1ccdd7ff0f8fcc42b44b8d1ff468b218f6ca459453
C:\33b0a3296e57ec860dcf4f2184151a13c51f9e36e4281ac1c3ef9daafae524e0
C:\Documents and Settings\Administrator\Desktop\uvOhmQmB.exe
C:\30e1c1f36bb40971c8597cd7909af38e5b6a3a33ff1abaeb711d90034966f458
C:\Documents and Settings\Administrator\Desktop\j6KrVvTQ.exe
C:\8372819fb1678511e633087b0b95043cd2338258eef0f5ced700a0514abb2646
C:\Users\admin\Downloads\zonicex.exe
C:\Documents and Settings\Administrator\Desktop\3m96pxio.exe
C:\Users\admin\Downloads\a8f1b1733fad535cd72ecb0ce020edae8dc2b86fa803b5bacce11502cd8d3ed4.exe
C:\Documents and Settings\Administrator\Desktop\7wbZTHlW.exe
C:\1ff3e7a1e160fefa9cbda72aea69ba4f864ac6196066891e0eb8c106b9468da2
C:\Users\admin\Downloads\zonicex.exe
C:\Documents and Settings\Administrator\Desktop\2PTHoGbh.exe
C:\Users\admin\Downloads\94307f7ba9ff094ca97ec37254b736dbd7fae6764fdb85c7cb95951f03d3426c.exe
C:\49a821d9f3945d94f303c75ce2e249d931fe042ab216d0d7a9889f4119c05508
C:\Users\Petra\AppData\Local\Temp\zonicex.pe32
C:\Users\Petra\AppData\Local\Temp\zonicex.pe32
C:\68fea377c5d7e1f0e312b1bcbf2605c17e4fe56eb02eef6c21591c348590129c
C:\Users\admin\Downloads\zonicex.exe
C:\Documents and Settings\luser\Desktop\xSYlTtMC.exe
C:\94b7b76de661c0a44a265a42c4a7995aabda357fbe6335062e2597722c84bd54
C:\Users\admin\Downloads\zonicex.exe
C:\Users\Petra\AppData\Local\Temp\zonicex.pe32
C:\Users\admin\Downloads\927cd594ef112c13_zonicex.exe
C:\8753d8491e42ea3aa9dac73fea3131a25ea32fe4119aab025d9b2455e4b5b0f0
C:\Documents and Settings\Administrator\Desktop\TRubJDNK.exe
C:\Users\Petra\AppData\Local\Temp\.pe32.exe
C:\9c91989143c497e391d0325f35592540dfdc3a782a872b6adcafd33dd2a88173
C:\3296e21b10651b0cd66d7ac2791133ce3297454e48123da86d513b3aec669ed1
C:\Documents and Settings\Administrator\Desktop\HtdVYgSN.exe
C:\Users\Petra\AppData\Local\Temp\.pe32.exe
C:\Users\admin\Downloads\a3de48fa5485a7fd_zonicex.exe
C:\Documents and Settings\luser\Desktop\v8nmTuQQ.exe
C:\d0977846931b198b587acbd0a16e47ce242af65b2589c51cc8a4dd2afe631590
C:\137279e5c09cbccc0081f75def0c2215af6c48b2da2ea813697e40b053310581
C:\425cba20c826686a48dca6516846e991d57e51de4c1695efb0d83e19a2264d2b
C:\dbf5ca1fa96cfd0b16db9105fe293f698ab3cd182264d6280b7df7e3abc14ce5
C:\Users\Petra\AppData\Local\Temp\zonicex.pe32
C:\330a3e1ea9d7cf88b53f1f93afad12773d5eaa056f8a99acbf508c579c8704d9
C:\Users\admin\Downloads\zonicex.exe
C:\52ff42186ae60c9e58ce9039bba586909a1b09433d331032a4c71888ba13e92d
C:\Users\Petra\AppData\Local\Temp\zonicex.pe32
C:\Users\admin\Downloads\f09c6a07833eb2d6_zonicex.exe
C:\0e8ec9589aefa52646ffa2de0086c684f3a6a1d5e03cbc26466e82aa9cf96927
C:\d3f38802d2a09c9e11e637decd62c5e0e101851e372eced672517d68183f2efa
C:\fc7a31d43a08b9ba4e03d51766689901aeb1ef5f0f2e2e6af42d9ece6e5da701
C:\Users\Petra\AppData\Local\Temp\zonicex.pe32
C:\Users\Petra\AppData\Local\Temp\zonicex.pe32
C:\e4f8bc74b6ad17aabc18564eae7a261fbb898a5915cc0d3ee84ed462a35cc468
C:\3b65070460767596351f78e4ffa5c0970555a936e48126a2bb7c299f12f37397
C:\a95e3c6ccb3a0e46abdc71743b10240ab1ef4841b0619a489b03357c029d0122
C:\Users\admin\Downloads\zonicex.exe
C:\Users\Petra\AppData\Local\Temp\zonicex.pe32
C:\b8cd3b62ac090829a985467ad54f0c39fb21fd8d4542057b5b0362020f802544
C:\097cfd31d5c49bdf09b2fba317e08d35737222a36b70e5ebe1d33bb2f695022e
C:\af5b2e5fd83661aaf1bb407e23b414de0fe2531e02c916c9d444fba1fdd36736
C:\db0b36aa423a713ea478654572e2f2c4ec0428a6a75bbd1eef57843e41812c78
C:\eb0f14aa3039a63be36e7163e14152ff54afe2d1c2b295237cf904a49b1ef8ac
C:\Users\admin\Downloads\zonicex.exe
C:\Users\Petra\AppData\Local\Temp\zonicex.pe32
C:\b1db8093375224fc111720621f964f3b8966573f173d8451a63f4eca402fe399
C:\Users\admin\Downloads\zonicex.exe
C:\d57bea704c3c07f4e86139e16ed5fd0e1316100dcd3a1455c9567fcff751d7b9
C:\Users\admin\Downloads\zonicex.exe
C:\Users\Petra\AppData\Local\Temp\zonicex.pe32
C:\319958b7b256d3ae7d104cb6605bd9145a5c4cf88a94a469e664491e53203f61
C:\38074a6781ec605805bbf7f15cea87a6e1909b0e30196b424ea1f00ba4762307
C:\4404b096c7f5d77da4eabc42afe06863a60a46df5014bd9e5e26a1fda30bb88d
C:\Users\admin\Downloads\zonicex.exe
C:\7ac70bb4162f54c98ac6e8b2e27bb38dd4fb6d110285945178356449f01941f4

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.