3.2
中危

32e4b21f908a0fc0145d8b8a2b7a5ce302c2a7bc593a080678ce454e53c984ad

903b9656ded775a694754036c6296935.exe

分析耗时

88s

最近分析

文件大小

796.5KB
静态报毒 动态报毒 AI SCORE=88 AIDETECTVM BSCOPE BUKZWA CLASSIC CONFIDENCE DELFIH DELFINJECT DELPHILESS ENCS ENEZ FAREIT GENERICKD GENETIC HIGH CONFIDENCE HPRN HTARSL IGENT KRYPTIK MALWARE1 MALWARE@#ID7R51J1KEH6 MUQFR S15671550 SCORE SPYBOTNET SUSPICIOUS PE UNSAFE X2094 XGW@AGHCZ ZELPHIF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Fareit-FYT!903B9656DED7 20201024 6.0.6.653
Alibaba Trojan:Win32/DelfInject.41039d53 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Trojan-gen 20201024 18.4.3895.0
Tencent Win32.Trojan.Kryptik.Hprn 20201024 1.0.0.1
Kingsoft 20201024 2013.8.14.323
CrowdStrike win/malicious_confidence_90% (W) 20190702 1.0
静态指标
The executable contains unknown PE section names indicative of a packer (could be a false positive) (3 个事件)
section CODE
section DATA
section BSS
The executable uses a known packer (1 个事件)
packer BobSoft Mini Delphi -> BoB / BobSoft
One or more processes crashed (1 个事件)
Time & API Arguments Status Return Repeated
1619707342.319501
__exception__
stacktrace:
CCSetScrollInfo+0xa1 GetMUILanguage-0xbcfe comctl32+0x3535a @ 0x746d535a
DrawScrollBar+0x170 CCGetScrollInfo-0x9a comctl32+0x2fac4 @ 0x746cfac4
RemoveWindowSubclass+0xebf ImageList_GetIconSize-0x76 comctl32+0x15069 @ 0x746b5069
GetThemeBackgroundExtent+0x1bf BufferedPaintUnInit-0x211 uxtheme+0x27314 @ 0x75237314
SetScrollInfo+0x40 ShowScrollBar-0x53 user32+0x2410f @ 0x775b410f
FlatSB_SetScrollInfo+0x45 FlatSB_SetScrollProp-0x8a comctl32+0x32303 @ 0x752c2303
903b9656ded775a694754036c6296935+0x5a8a4 @ 0x45a8a4
903b9656ded775a694754036c6296935+0x5ac2f @ 0x45ac2f
903b9656ded775a694754036c6296935+0x5afd2 @ 0x45afd2
903b9656ded775a694754036c6296935+0x43ea3 @ 0x443ea3
903b9656ded775a694754036c6296935+0x46df0 @ 0x446df0
903b9656ded775a694754036c6296935+0x46a6b @ 0x446a6b
903b9656ded775a694754036c6296935+0x1abea @ 0x41abea
gapfnScSendMessage+0x332 GetAppCompatFlags2-0x8ea user32+0x162fa @ 0x775a62fa
GetThreadDesktop+0xd7 GetWindowLongW-0x2c4 user32+0x16d3a @ 0x775a6d3a
LoadStringW+0x210 SystemParametersInfoW-0xa user32+0x190c9 @ 0x775a90c9
WCSToMBEx+0xd2 MBToWCSEx-0xd5 user32+0x1cfef @ 0x775acfef
CloseThemeData-0x143d uxtheme+0x10b64 @ 0x75220b64
CloseThemeData+0x322 GetThemeColor-0x4fd uxtheme+0x122c3 @ 0x752222c3
WCSToMBEx+0x17e MBToWCSEx-0x29 user32+0x1d09b @ 0x775ad09b
gapfnScSendMessage+0x332 GetAppCompatFlags2-0x8ea user32+0x162fa @ 0x775a62fa
GetThreadDesktop+0xd7 GetWindowLongW-0x2c4 user32+0x16d3a @ 0x775a6d3a
GetClientRect+0xc5 CallWindowProcW-0xb user32+0x20d27 @ 0x775b0d27
CallWindowProcA+0x1b GetClassNameA-0x95 user32+0x2794a @ 0x775b794a
903b9656ded775a694754036c6296935+0x46ed4 @ 0x446ed4
903b9656ded775a694754036c6296935+0x46df0 @ 0x446df0
903b9656ded775a694754036c6296935+0x46a6b @ 0x446a6b
903b9656ded775a694754036c6296935+0x1abea @ 0x41abea
gapfnScSendMessage+0x332 GetAppCompatFlags2-0x8ea user32+0x162fa @ 0x775a62fa
GetDC+0x52 ReleaseDC-0x130 user32+0x17316 @ 0x775a7316
GetThreadDesktop+0x185 GetWindowLongW-0x216 user32+0x16de8 @ 0x775a6de8
LoadStringW+0xee SystemParametersInfoW-0x12c user32+0x18fa7 @ 0x775a8fa7
KiUserCallbackDispatcher+0x2e KiUserExceptionDispatcher-0x1a ntdll+0x1011a @ 0x77d4011a
903b9656ded775a694754036c6296935+0x5cebf @ 0x45cebf
903b9656ded775a694754036c6296935+0x5e320 @ 0x45e320
903b9656ded775a694754036c6296935+0x43ea3 @ 0x443ea3
903b9656ded775a694754036c6296935+0x46df0 @ 0x446df0
903b9656ded775a694754036c6296935+0x46a6b @ 0x446a6b
903b9656ded775a694754036c6296935+0x1abea @ 0x41abea
gapfnScSendMessage+0x332 GetAppCompatFlags2-0x8ea user32+0x162fa @ 0x775a62fa
GetDC+0x52 ReleaseDC-0x130 user32+0x17316 @ 0x775a7316
GetThreadDesktop+0x185 GetWindowLongW-0x216 user32+0x16de8 @ 0x775a6de8
UnregisterClassW+0x7bc LoadIconW-0xa02 user32+0x1a740 @ 0x775aa740
KiUserCallbackDispatcher+0x2e KiUserExceptionDispatcher-0x1a ntdll+0x1011a @ 0x77d4011a
UnregisterClassW+0xab8 LoadIconW-0x706 user32+0x1aa3c @ 0x775aaa3c
CreateWindowExA+0x33 LoadCursorA-0x874 user32+0x1d261 @ 0x775ad261
903b9656ded775a694754036c6296935+0x6b24 @ 0x406b24
903b9656ded775a694754036c6296935+0x4643d @ 0x44643d
903b9656ded775a694754036c6296935+0x4635f @ 0x44635f
903b9656ded775a694754036c6296935+0x5a9be @ 0x45a9be
903b9656ded775a694754036c6296935+0x1828a @ 0x41828a
903b9656ded775a694754036c6296935+0x17c7a @ 0x417c7a
903b9656ded775a694754036c6296935+0x17c5c @ 0x417c5c
903b9656ded775a694754036c6296935+0x19fd2 @ 0x419fd2
903b9656ded775a694754036c6296935+0x17ad4 @ 0x417ad4
903b9656ded775a694754036c6296935+0x17cee @ 0x417cee
903b9656ded775a694754036c6296935+0x17c5c @ 0x417c5c
903b9656ded775a694754036c6296935+0x19fd2 @ 0x419fd2
903b9656ded775a694754036c6296935+0x6928d @ 0x46928d
903b9656ded775a694754036c6296935+0x17cee @ 0x417cee
903b9656ded775a694754036c6296935+0x17c5c @ 0x417c5c
903b9656ded775a694754036c6296935+0x19fd2 @ 0x419fd2
903b9656ded775a694754036c6296935+0x696ca @ 0x4696ca
903b9656ded775a694754036c6296935+0x17cee @ 0x417cee

registers.esp: 1631209
registers.edi: 196998
registers.eax: 6728784
registers.ebp: 1631228
registers.edx: 43
registers.ebx: 4
registers.esi: 6728784
registers.ecx: 1631213
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x1e766608
success 0 0
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (1 个事件)
Time & API Arguments Status Return Repeated
1619707342.053501
NtAllocateVirtualMemory
process_identifier: 2404
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x005d0000
success 0 0
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.567502800403891 section {'size_of_data': '0x0003c000', 'virtual_address': '0x00090000', 'entropy': 7.567502800403891, 'name': '.rsrc', 'virtual_size': '0x0003bea8'} description A section with a high entropy has been found
entropy 0.3016970458830924 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 51 AntiVirus engines on VirusTotal as malicious (50 out of 51 个事件)
Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.34426263
FireEye Generic.mg.903b9656ded775a6
CAT-QuickHeal Trojan.DelfIH.S15671550
McAfee Fareit-FYT!903B9656DED7
Cylance Unsafe
Sangfor Malware
K7AntiVirus Trojan ( 0056c99c1 )
Alibaba Trojan:Win32/DelfInject.41039d53
K7GW Trojan ( 0056c99c1 )
Cybereason malicious.6ded77
Arcabit Trojan.Generic.D20D4D97
Symantec Trojan.Gen.2
APEX Malicious
Avast Win32:Trojan-gen
Kaspersky HEUR:Trojan.Win32.Kryptik.gen
BitDefender Trojan.GenericKD.34426263
NANO-Antivirus Trojan.Win32.Kryptik.htarsl
Paloalto generic.ml
Tencent Win32.Trojan.Kryptik.Hprn
Ad-Aware Trojan.GenericKD.34426263
Comodo Malware@#id7r51j1keh6
DrWeb BackDoor.SpyBotNET.25
VIPRE Trojan.Win32.Generic!BT
Invincea Mal/Generic-S
McAfee-GW-Edition BehavesLike.Win32.Fareit.bc
Sophos Mal/Generic-S
SentinelOne DFI - Suspicious PE
Jiangmin Trojan.Kryptik.ceb
Avira TR/Kryptik.muqfr
Microsoft Trojan:Win32/DelfInject.VD!MTB
ZoneAlarm HEUR:Trojan.Win32.Kryptik.gen
GData Trojan.GenericKD.34426263
AhnLab-V3 Suspicious/Win.Delphiless.X2094
Acronis suspicious
BitDefenderTheta Gen:NN.ZelphiF.34590.XGW@aGhcZ!fi
ALYac Trojan.GenericKD.34426263
MAX malware (ai score=88)
VBA32 BScope.Trojan.Kryptik
Zoner Trojan.Win32.92522
ESET-NOD32 a variant of Win32/Injector.ENCS
Rising Trojan.Injector!1.CB34 (CLASSIC)
Yandex Trojan.Igent.bUkZwa.1
Ikarus Trojan.Inject
eGambit Unsafe.AI_Score_99%
Fortinet W32/Injector.ENEZ!tr
AVG Win32:Trojan-gen
Panda Trj/Genetic.gen
CrowdStrike win/malicious_confidence_90% (W)
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-06-20 06:22:17

Imports

Library kernel32.dll:
0x483178 VirtualFree
0x48317c VirtualAlloc
0x483180 LocalFree
0x483184 LocalAlloc
0x483188 GetVersion
0x48318c GetCurrentThreadId
0x483198 VirtualQuery
0x48319c WideCharToMultiByte
0x4831a4 MultiByteToWideChar
0x4831a8 lstrlenA
0x4831ac lstrcpynA
0x4831b0 LoadLibraryExA
0x4831b4 GetThreadLocale
0x4831b8 GetStartupInfoA
0x4831bc GetProcAddress
0x4831c0 GetModuleHandleA
0x4831c4 GetModuleFileNameA
0x4831c8 GetLocaleInfoA
0x4831cc GetLastError
0x4831d4 GetCommandLineA
0x4831d8 FreeLibrary
0x4831dc FindFirstFileA
0x4831e0 FindClose
0x4831e4 ExitProcess
0x4831e8 WriteFile
0x4831f0 RtlUnwind
0x4831f4 RaiseException
0x4831f8 GetStdHandle
Library user32.dll:
0x483200 GetKeyboardType
0x483204 LoadStringA
0x483208 MessageBoxA
0x48320c CharNextA
Library advapi32.dll:
0x483214 RegQueryValueExA
0x483218 RegOpenKeyExA
0x48321c RegCloseKey
Library oleaut32.dll:
0x483224 SysFreeString
0x483228 SysReAllocStringLen
0x48322c SysAllocStringLen
Library kernel32.dll:
0x483234 TlsSetValue
0x483238 TlsGetValue
0x48323c LocalAlloc
0x483240 GetModuleHandleA
Library advapi32.dll:
0x483248 RegQueryValueExA
0x48324c RegOpenKeyExA
0x483250 RegCloseKey
Library kernel32.dll:
0x483258 lstrcpyA
0x48325c WriteFile
0x483260 WinExec
0x483264 WaitForSingleObject
0x483268 VirtualQuery
0x48326c VirtualProtect
0x483270 VirtualAlloc
0x483274 Sleep
0x483278 SizeofResource
0x48327c SetThreadLocale
0x483280 SetFilePointer
0x483284 SetEvent
0x483288 SetErrorMode
0x48328c SetEndOfFile
0x483290 ResetEvent
0x483294 ReadFile
0x483298 MulDiv
0x48329c LockResource
0x4832a0 LoadResource
0x4832a4 LoadLibraryA
0x4832b0 GlobalUnlock
0x4832b4 GlobalReAlloc
0x4832b8 GlobalHandle
0x4832bc GlobalLock
0x4832c0 GlobalFree
0x4832c4 GlobalFindAtomA
0x4832c8 GlobalDeleteAtom
0x4832cc GlobalAlloc
0x4832d0 GlobalAddAtomA
0x4832d4 GetVersionExA
0x4832d8 GetVersion
0x4832dc GetTickCount
0x4832e0 GetThreadLocale
0x4832e8 GetSystemTime
0x4832ec GetSystemInfo
0x4832f0 GetStringTypeExA
0x4832f4 GetStdHandle
0x4832f8 GetProcAddress
0x4832fc GetModuleHandleA
0x483300 GetModuleFileNameA
0x483304 GetLocaleInfoA
0x483308 GetLocalTime
0x48330c GetLastError
0x483310 GetFullPathNameA
0x483314 GetFileAttributesA
0x483318 GetDiskFreeSpaceA
0x48331c GetDateFormatA
0x483320 GetCurrentThreadId
0x483324 GetCurrentProcessId
0x483328 GetCPInfo
0x48332c GetACP
0x483330 FreeResource
0x483334 InterlockedExchange
0x483338 FreeLibrary
0x48333c FormatMessageA
0x483340 FindResourceA
0x483344 FindNextFileA
0x483348 FindFirstFileA
0x48334c FindClose
0x48335c EnumCalendarInfoA
0x483368 CreateThread
0x48336c CreateFileA
0x483370 CreateEventA
0x483374 CompareStringA
0x483378 CloseHandle
Library version.dll:
0x483380 VerQueryValueA
0x483388 GetFileVersionInfoA
Library gdi32.dll:
0x483390 UnrealizeObject
0x483394 StretchBlt
0x483398 SetWindowOrgEx
0x48339c SetWinMetaFileBits
0x4833a0 SetViewportOrgEx
0x4833a4 SetTextColor
0x4833a8 SetStretchBltMode
0x4833ac SetROP2
0x4833b0 SetPixel
0x4833b4 SetEnhMetaFileBits
0x4833b8 SetDIBColorTable
0x4833bc SetBrushOrgEx
0x4833c0 SetBkMode
0x4833c4 SetBkColor
0x4833c8 SelectPalette
0x4833cc SelectObject
0x4833d0 SaveDC
0x4833d4 RestoreDC
0x4833d8 Rectangle
0x4833dc RectVisible
0x4833e0 RealizePalette
0x4833e4 Polyline
0x4833e8 PlayEnhMetaFile
0x4833ec PatBlt
0x4833f0 MoveToEx
0x4833f4 MaskBlt
0x4833f8 LineTo
0x4833fc IntersectClipRect
0x483400 GetWindowOrgEx
0x483404 GetWinMetaFileBits
0x483408 GetTextMetricsA
0x483414 GetStockObject
0x483418 GetPixel
0x48341c GetPaletteEntries
0x483420 GetObjectA
0x48342c GetEnhMetaFileBits
0x483430 GetDeviceCaps
0x483434 GetDIBits
0x483438 GetDIBColorTable
0x48343c GetDCOrgEx
0x483444 GetClipBox
0x483448 GetBrushOrgEx
0x48344c GetBitmapBits
0x483450 ExtTextOutA
0x483454 ExcludeClipRect
0x483458 DeleteObject
0x48345c DeleteEnhMetaFile
0x483460 DeleteDC
0x483464 CreateSolidBrush
0x483468 CreatePenIndirect
0x48346c CreatePalette
0x483474 CreateFontIndirectA
0x483478 CreateDIBitmap
0x48347c CreateDIBSection
0x483480 CreateCompatibleDC
0x483488 CreateBrushIndirect
0x48348c CreateBitmap
0x483490 CopyEnhMetaFileA
0x483494 BitBlt
Library opengl32.dll:
0x48349c wglCreateContext
Library user32.dll:
0x4834a4 CreateWindowExA
0x4834a8 WindowFromPoint
0x4834ac WinHelpA
0x4834b0 WaitMessage
0x4834b4 UpdateWindow
0x4834b8 UnregisterClassA
0x4834bc UnhookWindowsHookEx
0x4834c0 TranslateMessage
0x4834c8 TrackPopupMenu
0x4834d0 ShowWindow
0x4834d4 ShowScrollBar
0x4834d8 ShowOwnedPopups
0x4834dc ShowCursor
0x4834e0 SetWindowsHookExA
0x4834e4 SetWindowTextA
0x4834e8 SetWindowPos
0x4834ec SetWindowPlacement
0x4834f0 SetWindowLongA
0x4834f4 SetTimer
0x4834f8 SetScrollRange
0x4834fc SetScrollPos
0x483500 SetScrollInfo
0x483504 SetRect
0x483508 SetPropA
0x48350c SetParent
0x483510 SetMenuItemInfoA
0x483514 SetMenu
0x483518 SetForegroundWindow
0x48351c SetFocus
0x483520 SetCursor
0x483524 SetClassLongA
0x483528 SetCapture
0x48352c SetActiveWindow
0x483530 SendMessageA
0x483534 ScrollWindow
0x483538 ScreenToClient
0x48353c RemovePropA
0x483540 RemoveMenu
0x483544 ReleaseDC
0x483548 ReleaseCapture
0x483554 RegisterClassA
0x483558 RedrawWindow
0x48355c PtInRect
0x483560 PostQuitMessage
0x483564 PostMessageA
0x483568 PeekMessageA
0x48356c OffsetRect
0x483570 OemToCharA
0x483574 MessageBoxA
0x483578 MapWindowPoints
0x48357c MapVirtualKeyA
0x483580 LoadStringA
0x483584 LoadKeyboardLayoutA
0x483588 LoadIconA
0x48358c LoadCursorA
0x483590 LoadBitmapA
0x483594 KillTimer
0x483598 IsZoomed
0x48359c IsWindowVisible
0x4835a0 IsWindowEnabled
0x4835a4 IsWindow
0x4835a8 IsRectEmpty
0x4835ac IsIconic
0x4835b0 IsDialogMessageA
0x4835b4 IsChild
0x4835b8 InvalidateRect
0x4835bc IntersectRect
0x4835c0 InsertMenuItemA
0x4835c4 InsertMenuA
0x4835c8 InflateRect
0x4835d0 GetWindowTextA
0x4835d4 GetWindowRect
0x4835d8 GetWindowPlacement
0x4835dc GetWindowLongA
0x4835e0 GetWindowDC
0x4835e4 GetTopWindow
0x4835e8 GetSystemMetrics
0x4835ec GetSystemMenu
0x4835f0 GetSysColorBrush
0x4835f4 GetSysColor
0x4835f8 GetSubMenu
0x4835fc GetScrollRange
0x483600 GetScrollPos
0x483604 GetScrollInfo
0x483608 GetPropA
0x48360c GetParent
0x483610 GetWindow
0x483614 GetMenuStringA
0x483618 GetMenuState
0x48361c GetMenuItemInfoA
0x483620 GetMenuItemID
0x483624 GetMenuItemCount
0x483628 GetMenu
0x48362c GetLastActivePopup
0x483630 GetKeyboardState
0x483638 GetKeyboardLayout
0x48363c GetKeyState
0x483640 GetKeyNameTextA
0x483644 GetIconInfo
0x483648 GetForegroundWindow
0x48364c GetFocus
0x483650 GetDlgItem
0x483654 GetDesktopWindow
0x483658 GetDCEx
0x48365c GetDC
0x483660 GetCursorPos
0x483664 GetCursor
0x483668 GetClipboardData
0x48366c GetClientRect
0x483670 GetClassNameA
0x483674 GetClassInfoA
0x483678 GetCapture
0x48367c GetActiveWindow
0x483680 FrameRect
0x483684 FindWindowA
0x483688 FillRect
0x48368c EqualRect
0x483690 EnumWindows
0x483694 EnumThreadWindows
0x483698 EndPaint
0x48369c EnableWindow
0x4836a0 EnableScrollBar
0x4836a4 EnableMenuItem
0x4836a8 DrawTextA
0x4836ac DrawMenuBar
0x4836b0 DrawIconEx
0x4836b4 DrawIcon
0x4836b8 DrawFrameControl
0x4836bc DrawFocusRect
0x4836c0 DrawEdge
0x4836c4 DispatchMessageA
0x4836c8 DestroyWindow
0x4836cc DestroyMenu
0x4836d0 DestroyIcon
0x4836d4 DestroyCursor
0x4836d8 DeleteMenu
0x4836dc DefWindowProcA
0x4836e0 DefMDIChildProcA
0x4836e4 DefFrameProcA
0x4836e8 CreatePopupMenu
0x4836ec CreateMenu
0x4836f0 CreateIcon
0x4836f4 ClientToScreen
0x4836f8 CheckMenuItem
0x4836fc CallWindowProcA
0x483700 CallNextHookEx
0x483704 BeginPaint
0x483708 CharNextA
0x48370c CharLowerBuffA
0x483710 CharLowerA
0x483714 CharToOemA
0x483718 AdjustWindowRectEx
Library kernel32.dll:
0x483724 Sleep
Library oleaut32.dll:
0x48372c SafeArrayPtrOfIndex
0x483730 SafeArrayGetUBound
0x483734 SafeArrayGetLBound
0x483738 SafeArrayCreate
0x48373c VariantChangeType
0x483740 VariantCopy
0x483744 VariantClear
0x483748 VariantInit
Library comctl32.dll:
0x483758 ImageList_Write
0x48375c ImageList_Read
0x48376c ImageList_DragMove
0x483770 ImageList_DragLeave
0x483774 ImageList_DragEnter
0x483778 ImageList_EndDrag
0x48377c ImageList_BeginDrag
0x483780 ImageList_Remove
0x483784 ImageList_DrawEx
0x483788 ImageList_Replace
0x48378c ImageList_Draw
0x48379c ImageList_Add
0x4837a4 ImageList_Destroy
0x4837a8 ImageList_Create
0x4837ac InitCommonControls
Library comdlg32.dll:
0x4837b4 GetOpenFileNameA
Library user32.dll:
0x4837bc DdeCmpStringHandles
0x4837c0 DdeFreeStringHandle
0x4837c4 DdeQueryStringA
0x4837cc DdeGetLastError
0x4837d0 DdeFreeDataHandle
0x4837d4 DdeUnaccessData
0x4837d8 DdeAccessData
0x4837dc DdeCreateDataHandle
0x4837e4 DdeNameService
0x4837e8 DdePostAdvise
0x4837ec DdeSetUserHandle
0x4837f0 DdeQueryConvInfo
0x4837f4 DdeDisconnect
0x4837f8 DdeConnect
0x4837fc DdeUninitialize
0x483800 DdeInitializeA
Library kernel32.dll:

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 53237 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 60384 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 49713 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 58367 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 62318 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 51964 239.255.255.250 3702
192.168.56.101 58368 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.