2.4
中危

17abec09af5cfe4aac7526da945d18940e9e19df458706cbdc4abfe18a3cba46

9432d6061e33217ff0ef601c341025aa.exe

分析耗时

81s

最近分析

文件大小

2.3MB
静态报毒 动态报毒 ARTEMIS BSCOPE BURDEN CHINAD CLASSIC CONFIDENCE GENERIC PUA GB HIGH CONFIDENCE SOFTCNAPP UNSAFE 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Artemis!9432D6061E33 20200910 6.0.6.653
Alibaba AdWare:Win32/Softcnapp.8ac0705c 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Adware-gen [Adw] 20200911 18.4.3895.0
Kingsoft 20200911 2013.8.14.323
Tencent 20200911 1.0.0.1
CrowdStrike win/malicious_confidence_60% (D) 20190702 1.0
静态指标
This executable is signed
This executable has a PDB path (1 个事件)
pdb_path d:\Jenkins\workspace\srf_develop\ShuRuFa\程序\Trunk\Bin\pdbmap\WanNengWB\UserPage32.pdb
The file contains an unknown PE resource name possibly indicative of a packer (3 个事件)
resource name PIC
resource name XML
resource name ZIPRES
行为判定
动态指标
Foreign language identified in PE resource (50 out of 60 个事件)
name PIC language LANG_CHINESE offset 0x001b7ce8 filetype PNG image data, 85 x 85, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000026f
name XML language LANG_CHINESE offset 0x001b7f58 filetype XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000267
name ZIPRES language LANG_CHINESE offset 0x001b81c0 filetype Zip archive data, at least v2.0 to extract sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000479c7
name RT_CURSOR language LANG_CHINESE offset 0x00200d14 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000134
name RT_CURSOR language LANG_CHINESE offset 0x00200d14 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000134
name RT_CURSOR language LANG_CHINESE offset 0x00200d14 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000134
name RT_CURSOR language LANG_CHINESE offset 0x00200d14 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000134
name RT_CURSOR language LANG_CHINESE offset 0x00200d14 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000134
name RT_CURSOR language LANG_CHINESE offset 0x00200d14 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000134
name RT_CURSOR language LANG_CHINESE offset 0x00200d14 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000134
name RT_CURSOR language LANG_CHINESE offset 0x00200d14 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000134
name RT_CURSOR language LANG_CHINESE offset 0x00200d14 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000134
name RT_CURSOR language LANG_CHINESE offset 0x00200d14 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000134
name RT_CURSOR language LANG_CHINESE offset 0x00200d14 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000134
name RT_CURSOR language LANG_CHINESE offset 0x00200d14 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000134
name RT_CURSOR language LANG_CHINESE offset 0x00200d14 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000134
name RT_CURSOR language LANG_CHINESE offset 0x00200d14 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000134
name RT_CURSOR language LANG_CHINESE offset 0x00200d14 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000134
name RT_CURSOR language LANG_CHINESE offset 0x00200d14 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000134
name RT_BITMAP language LANG_CHINESE offset 0x00200f00 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_BITMAP language LANG_CHINESE offset 0x00200f00 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000144
name RT_ICON language LANG_CHINESE offset 0x002475ac filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x002475ac filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x002475ac filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x002475ac filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x002475ac filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x002475ac filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_DIALOG language LANG_CHINESE offset 0x00247afc filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000034
name RT_DIALOG language LANG_CHINESE offset 0x00247afc filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000034
name RT_STRING language LANG_CHINESE offset 0x00249200 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000042
name RT_STRING language LANG_CHINESE offset 0x00249200 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000042
name RT_STRING language LANG_CHINESE offset 0x00249200 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000042
name RT_STRING language LANG_CHINESE offset 0x00249200 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000042
name RT_STRING language LANG_CHINESE offset 0x00249200 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000042
name RT_STRING language LANG_CHINESE offset 0x00249200 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000042
name RT_STRING language LANG_CHINESE offset 0x00249200 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000042
name RT_STRING language LANG_CHINESE offset 0x00249200 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000042
name RT_STRING language LANG_CHINESE offset 0x00249200 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000042
name RT_STRING language LANG_CHINESE offset 0x00249200 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000042
name RT_STRING language LANG_CHINESE offset 0x00249200 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000042
name RT_STRING language LANG_CHINESE offset 0x00249200 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000042
name RT_STRING language LANG_CHINESE offset 0x00249200 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000042
name RT_STRING language LANG_CHINESE offset 0x00249200 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000042
name RT_GROUP_CURSOR language LANG_CHINESE offset 0x0024936c filetype Lotus unknown worksheet or configuration, revision 0x1 sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000014
name RT_GROUP_CURSOR language LANG_CHINESE offset 0x0024936c filetype Lotus unknown worksheet or configuration, revision 0x1 sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000014
name RT_GROUP_CURSOR language LANG_CHINESE offset 0x0024936c filetype Lotus unknown worksheet or configuration, revision 0x1 sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000014
name RT_GROUP_CURSOR language LANG_CHINESE offset 0x0024936c filetype Lotus unknown worksheet or configuration, revision 0x1 sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000014
name RT_GROUP_CURSOR language LANG_CHINESE offset 0x0024936c filetype Lotus unknown worksheet or configuration, revision 0x1 sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000014
name RT_GROUP_CURSOR language LANG_CHINESE offset 0x0024936c filetype Lotus unknown worksheet or configuration, revision 0x1 sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000014
name RT_GROUP_CURSOR language LANG_CHINESE offset 0x0024936c filetype Lotus unknown worksheet or configuration, revision 0x1 sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000014
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 24 AntiVirus engines on VirusTotal as malicious (24 个事件)
Elastic malicious (high confidence)
McAfee Artemis!9432D6061E33
Cylance Unsafe
K7AntiVirus Adware ( 004d97001 )
Alibaba AdWare:Win32/Softcnapp.8ac0705c
K7GW Adware ( 004d97001 )
ESET-NOD32 a variant of Win32/Softcnapp.BD potentially unwanted
APEX Malicious
Kaspersky not-a-virus:HEUR:AdWare.Win32.Burden.gen
Avast Win32:Adware-gen [Adw]
Rising Adware.Agent!1.C6F0 (CLASSIC)
DrWeb Adware.Softcnapp.80
Invincea Generic PUA GB (PUA)
FireEye Generic.mg.9432d6061e33217f
Sophos Generic PUA GB (PUA)
ZoneAlarm not-a-virus:HEUR:AdWare.Win32.Burden.gen
Microsoft PUA:Win32/Softcnapp
VBA32 BScope.Adware.Softcnapp
Malwarebytes Adware.ChinAd
Yandex Riskware.Agent!
Fortinet Riskware/Softcnapp
MaxSecure Adware.not-a-virus.WIN32.AdWare.Burden.gen_b_192414
AVG Win32:Adware-gen [Adw]
CrowdStrike win/malicious_confidence_60% (D)
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2018-12-25 11:05:59

Imports

Library gdiplus.dll:
0x541b28 GdiplusShutdown
0x541b2c GdipFree
0x541b30 GdipAlloc
0x541b34 GdipDeleteGraphics
0x541b38 GdipDisposeImage
0x541b3c GdipGetImageWidth
0x541b40 GdipGetImageHeight
0x541b4c GdipCreateFromHDC
0x541b54 GdipCloneImage
0x541b58 GdiplusStartup
Library SHLWAPI.dll:
0x5417bc PathFindExtensionW
0x5417c0 PathFindFileNameW
0x5417c4 PathStripToRootW
0x5417c8 PathIsUNCW
0x5417cc PathFileExistsW
Library DuiLib32.dll:
Library KERNEL32.dll:
0x541464 GetFullPathNameW
0x54146c TlsGetValue
0x541474 GlobalReAlloc
0x541478 GlobalHandle
0x541480 TlsAlloc
0x541484 TlsSetValue
0x541488 LocalReAlloc
0x541490 TlsFree
0x541494 GlobalFlags
0x541498 lstrlenA
0x54149c MoveFileW
0x5414a0 SetFilePointer
0x5414a4 FlushFileBuffers
0x5414a8 LockFile
0x5414ac UnlockFile
0x5414b0 SetEndOfFile
0x5414b4 DuplicateHandle
0x5414bc GetStartupInfoW
0x5414c0 RtlUnwind
0x5414c4 RaiseException
0x5414c8 TerminateProcess
0x5414d0 IsDebuggerPresent
0x5414d8 FindFirstFileA
0x5414dc HeapReAlloc
0x5414e0 GetDriveTypeA
0x5414e4 ExitThread
0x5414e8 ExitProcess
0x5414ec HeapSize
0x5414f0 VirtualQuery
0x5414f4 GetStdHandle
0x5414f8 GetModuleFileNameA
0x54150c GetCommandLineA
0x541510 SetHandleCount
0x541514 GetFileType
0x541518 GetStartupInfoA
0x54151c HeapDestroy
0x541520 HeapCreate
0x541524 GetCPInfo
0x541528 GetACP
0x54152c SleepEx
0x541530 IsValidCodePage
0x541534 LCMapStringA
0x541538 LCMapStringW
0x541540 GetConsoleCP
0x541544 GetConsoleMode
0x541548 GetUserDefaultLCID
0x54154c GetLocaleInfoA
0x541550 EnumSystemLocalesA
0x541554 IsValidLocale
0x541558 GetStringTypeA
0x54155c GetStringTypeW
0x541560 GetFullPathNameA
0x54156c SetStdHandle
0x541570 WriteConsoleA
0x541574 GetConsoleOutputCP
0x541578 WriteConsoleW
0x541580 GetFileTime
0x541584 GetCurrentThread
0x541590 lstrcmpA
0x541594 GetLocaleInfoW
0x541598 CompareStringA
0x54159c InterlockedExchange
0x5415a0 GetModuleHandleA
0x5415a4 GetThreadLocale
0x5415a8 GetVersion
0x5415ac GlobalGetAtomNameW
0x5415b4 FreeResource
0x5415b8 GlobalAddAtomW
0x5415bc GlobalFindAtomW
0x5415c0 GlobalDeleteAtom
0x5415c4 CompareStringW
0x5415c8 SetLastError
0x5415cc GetVersionExA
0x5415d0 GetTempFileNameW
0x5415d4 OpenFileMappingW
0x5415d8 CreateFileMappingW
0x5415dc MapViewOfFile
0x5415e0 UnmapViewOfFile
0x5415e4 lstrcmpW
0x5415e8 GetCommandLineW
0x5415ec IsBadReadPtr
0x5415f0 LoadLibraryA
0x5415f4 VirtualFree
0x5415f8 VirtualProtect
0x5415fc VirtualAlloc
0x541600 GetSystemDirectoryW
0x541608 MulDiv
0x54160c GetLongPathNameW
0x541610 ReleaseMutex
0x541614 CreateMutexW
0x541618 CreateFileA
0x54161c SetPriorityClass
0x541620 OutputDebugStringA
0x541624 DeviceIoControl
0x54162c LocalAlloc
0x541630 FormatMessageW
0x54163c LocalFree
0x541640 FindFirstFileW
0x541644 FindClose
0x541648 GetSystemInfo
0x54164c WriteFile
0x541650 GetFileAttributesW
0x541654 GetTempPathW
0x541658 MoveFileExW
0x54165c DeleteFileW
0x541660 CopyFileW
0x541664 OpenProcess
0x541668 GetExitCodeProcess
0x54166c GetTickCount
0x541670 GetFileSize
0x541674 ReadFile
0x54167c Process32FirstW
0x541680 Process32NextW
0x54168c GetVersionExW
0x541698 LoadLibraryW
0x54169c CreateDirectoryW
0x5416a0 CreateFileW
0x5416a4 GetCurrentThreadId
0x5416a8 GetCurrentProcessId
0x5416ac GetCurrentProcess
0x5416b0 FreeLibrary
0x5416b4 SetErrorMode
0x5416b8 HeapAlloc
0x5416bc GetModuleHandleW
0x5416c0 GetProcAddress
0x5416c4 GetLastError
0x5416c8 GetProcessHeap
0x5416cc HeapFree
0x5416d0 CreateThread
0x5416d4 WaitForSingleObject
0x5416d8 CreateProcessW
0x5416dc CloseHandle
0x5416e4 GetModuleFileNameW
0x5416e8 GlobalAlloc
0x5416ec GlobalLock
0x5416f0 GlobalUnlock
0x5416f4 GlobalFree
0x5416f8 lstrlenW
0x5416fc MultiByteToWideChar
0x541700 FindResourceW
0x541704 LoadResource
0x541708 LockResource
0x54170c SizeofResource
0x541710 Sleep
0x541718 WideCharToMultiByte
0x541720 SetConsoleMode
0x541724 ReadConsoleInputA
0x541730 GlobalMemoryStatus
0x541738 PeekNamedPipe
0x54173c GetSystemDirectoryA
0x541740 GetLocalTime
0x541744 GetOEMCP
Library USER32.dll:
0x5417d4 IsWindowEnabled
0x5417d8 IsDialogMessageW
0x5417e0 SendDlgItemMessageW
0x5417e4 SendDlgItemMessageA
0x5417e8 WinHelpW
0x5417ec GetCapture
0x5417f0 SetWindowsHookExW
0x5417f4 CallNextHookEx
0x5417f8 GetClassLongW
0x5417fc SetPropW
0x541800 GetPropW
0x541804 RemovePropW
0x541808 SetFocus
0x541810 GetLastActivePopup
0x541814 SetActiveWindow
0x541818 BeginDeferWindowPos
0x54181c EndDeferWindowPos
0x541820 GetDlgItem
0x541824 GetTopWindow
0x541828 UnhookWindowsHookEx
0x54182c GetMessageTime
0x541830 GetMessagePos
0x541834 PeekMessageW
0x541838 ScrollWindow
0x54183c TrackPopupMenu
0x541840 GetKeyState
0x541844 SetScrollRange
0x541848 GetScrollRange
0x54184c SetScrollPos
0x541850 GetScrollPos
0x541854 ShowScrollBar
0x541858 GetMenu
0x54185c GetSubMenu
0x541860 GetMenuItemID
0x541864 GetMenuItemCount
0x541868 MessageBoxW
0x54186c GetClassInfoExW
0x541870 GetClassInfoW
0x541874 RegisterClassW
0x541878 GetSysColor
0x54187c ScreenToClient
0x541880 EqualRect
0x541884 DeferWindowPos
0x541888 GetScrollInfo
0x54188c SetScrollInfo
0x541890 CopyRect
0x541898 GetWindowPlacement
0x54189c GetWindow
0x5418a0 GetDlgCtrlID
0x5418a4 IsChild
0x5418a8 UpdateWindow
0x5418ac IsIconic
0x5418b0 MapWindowPoints
0x5418b4 SetWindowTextW
0x5418b8 SetTimer
0x5418bc KillTimer
0x5418c0 OffsetRect
0x5418c4 GetWindowRgn
0x5418c8 ClientToScreen
0x5418cc SendMessageW
0x5418d0 CheckMenuItem
0x5418d4 PostQuitMessage
0x5418d8 GetCursorPos
0x5418dc CreateWindowExW
0x5418e0 ShowWindow
0x5418e4 SetWindowPos
0x5418e8 DestroyWindow
0x5418ec MoveWindow
0x5418f0 GetDC
0x5418f4 ReleaseDC
0x5418f8 MonitorFromPoint
0x5418fc EnableMenuItem
0x541900 GetMenuState
0x541904 ModifyMenuW
0x541908 LoadBitmapW
0x54190c PtInRect
0x541914 EnumDisplayMonitors
0x541918 GetMonitorInfoW
0x54191c wsprintfW
0x541920 FindWindowW
0x541924 IsWindowVisible
0x541928 GetFocus
0x54192c GetClassNameW
0x541930 GetWindowRect
0x541934 GetDesktopWindow
0x541938 GetSystemMetrics
0x54193c GetWindowLongW
0x541940 SetWindowLongW
0x541944 FindWindowExW
0x541948 GetWindowTextW
0x54194c GetForegroundWindow
0x541954 AttachThreadInput
0x541958 SetForegroundWindow
0x54195c BringWindowToTop
0x541960 GetParent
0x541964 LoadIconW
0x541968 LoadCursorW
0x54196c DefWindowProcW
0x541970 RegisterClassExW
0x541974 GetMessageW
0x541978 TranslateMessage
0x54197c DispatchMessageW
0x541980 IsWindow
0x541984 AdjustWindowRectEx
0x541988 GetClientRect
0x541990 SetMenuItemBitmaps
0x541994 IsRectEmpty
0x541998 FillRect
0x54199c PostThreadMessageW
0x5419a0 CharUpperW
0x5419a4 UnregisterClassW
0x5419b0 GetNextDlgTabItem
0x5419b4 EndDialog
0x5419b8 GetMenuItemInfoW
0x5419bc InflateRect
0x5419c0 GetSysColorBrush
0x5419c4 ShowOwnedPopups
0x5419c8 ValidateRect
0x5419d0 MapDialogRect
0x5419d4 CharNextW
0x5419d8 EndPaint
0x5419dc BeginPaint
0x5419e0 EnableWindow
0x5419e4 PostMessageW
0x5419e8 InvalidateRect
0x5419ec MessageBeep
0x5419f0 GetNextDlgGroupItem
0x5419f4 CallWindowProcW
0x5419f8 MessageBoxA
0x541a04 UnregisterClassA
0x541a08 GetWindowDC
0x541a0c GrayStringW
0x541a10 DrawTextExW
0x541a14 DrawTextW
0x541a18 TabbedTextOutW
0x541a1c UnpackDDElParam
0x541a20 ReuseDDElParam
0x541a24 LoadMenuW
0x541a28 DestroyMenu
0x541a2c GetActiveWindow
0x541a30 LoadAcceleratorsW
0x541a34 InsertMenuItemW
0x541a38 CreatePopupMenu
0x541a3c SetRectEmpty
0x541a40 SetMenu
0x541a48 InvalidateRgn
0x541a4c SetRect
0x541a54 ReleaseCapture
0x541a58 SetCursor
0x541a5c SetCapture
0x541a60 SetWindowRgn
0x541a64 IntersectRect
0x541a68 DrawIcon
Library GDI32.dll:
0x5413a4 GetViewportExtEx
0x5413a8 GetWindowExtEx
0x5413ac BitBlt
0x5413b0 GetPixel
0x5413b4 PtVisible
0x5413b8 RectVisible
0x5413bc TextOutW
0x5413c0 ExtTextOutW
0x5413c4 Escape
0x5413c8 SetViewportOrgEx
0x5413cc OffsetViewportOrgEx
0x5413d0 SetViewportExtEx
0x5413d4 ScaleViewportExtEx
0x5413d8 SetWindowExtEx
0x5413dc ScaleWindowExtEx
0x5413e0 ExtSelectClipRgn
0x5413e4 CreatePatternBrush
0x5413e8 GetStockObject
0x5413ec CreateSolidBrush
0x5413f0 GetBkColor
0x5413f4 GetTextColor
0x5413f8 CreateFontIndirectW
0x5413fc GetMapMode
0x541400 DeleteDC
0x541404 SetMapMode
0x541408 RestoreDC
0x54140c SaveDC
0x541414 GetRgnBox
0x54141c Ellipse
0x541420 LPtoDP
0x541424 CreateEllipticRgn
0x541428 CreateBitmap
0x54142c GetObjectW
0x541430 SetBkColor
0x541434 SetTextColor
0x541438 GetClipBox
0x54143c SetBkMode
0x541444 CreateRectRgn
0x541448 PtInRegion
0x54144c CreateDIBSection
0x541450 CreateCompatibleDC
0x541454 SelectObject
0x541458 DeleteObject
0x54145c GetDeviceCaps
Library comdlg32.dll:
0x541b20 GetFileTitleW
Library WINSPOOL.DRV:
0x541a8c ClosePrinter
0x541a90 OpenPrinterW
0x541a94 DocumentPropertiesW
Library ADVAPI32.dll:
0x541004 ReportEventA
0x54100c RegEnumValueW
0x541010 RegQueryValueExW
0x541014 RegQueryValueW
0x541018 RegDeleteKeyW
0x54101c LookupAccountSidW
0x541020 GetTokenInformation
0x541024 RegOpenKeyW
0x541034 AddAccessAllowedAce
0x541038 AddAce
0x54103c EqualSid
0x541040 GetAce
0x541044 InitializeAcl
0x541048 GetLengthSid
0x54104c GetAclInformation
0x541054 LookupAccountNameW
0x541058 RegSetValueExW
0x54105c RegOpenKeyExW
0x541064 RevertToSelf
0x541068 RegCreateKeyExW
0x54106c DuplicateTokenEx
0x541070 OpenProcessToken
0x541074 RegEnumKeyW
0x541078 RegCloseKey
Library SHELL32.dll:
0x5417a4 SHGetFolderPathW
0x5417ac ShellExecuteW
0x5417b0 DragQueryFileW
0x5417b4 DragFinish
Library COMCTL32.dll:
0x541080
Library oledlg.dll:
0x541bb4 OleUIBusyW
Library ole32.dll:
0x541b6c CoGetClassObject
0x541b70 CoTaskMemAlloc
0x541b78 OleInitialize
0x541b7c OleUninitialize
0x541b80 CoTaskMemFree
0x541b84 CoInitialize
0x541b88 CoUninitialize
0x541b8c CLSIDFromString
0x541b9c CLSIDFromProgID
0x541ba4 CoRevokeClassObject
0x541bac OleFlushClipboard
Library OLEAUT32.dll:
0x541750 SafeArrayGetLBound
0x541754 SafeArrayGetUBound
0x541758 SafeArrayAccessData
0x541760 SafeArrayDestroy
0x54176c SysStringLen
0x541770 VariantInit
0x541774 VariantChangeType
0x541778 VariantClear
0x54177c SysAllocString
0x541780 SysAllocStringLen
0x541784 SysFreeString
0x541788 SafeArrayGetDim
0x541790 SafeArrayCreate
0x541794 VariantCopy
Library urlmon.dll:
0x541bbc URLDownloadToFileW
Library WININET.dll:
0x541a70 HttpQueryInfoW
0x541a74 InternetCloseHandle
0x541a78 InternetOpenUrlW
0x541a7c InternetReadFile
0x541a80 InternetSetOptionW
0x541a84 InternetOpenW
Library PSAPI.DLL:
Library iphlpapi.dll:
0x541b60 GetAdaptersInfo
Library WS2_32.dll:
0x541a9c select
0x541aa0 bind
0x541aa4 ntohs
0x541aa8 getsockname
0x541aac send
0x541ab0 recv
0x541ab4 socket
0x541ab8 closesocket
0x541abc WSAGetLastError
0x541ac0 WSAStartup
0x541ac4 WSACleanup
0x541ac8 htonl
0x541acc __WSAFDIsSet
0x541ad0 gethostbyaddr
0x541ad4 getservbyport
0x541ad8 sendto
0x541adc recvfrom
0x541ae0 accept
0x541ae4 setsockopt
0x541ae8 connect
0x541aec WSASetLastError
0x541af0 ioctlsocket
0x541af4 gethostname
0x541af8 inet_addr
0x541afc getpeername
0x541b00 getsockopt
0x541b04 getservbyname
0x541b08 htons
0x541b0c gethostbyname
0x541b10 inet_ntoa
0x541b14 shutdown
0x541b18 listen

Exports

Ordinal Address Name
1 0x46ffd0 curl_easy_cleanup
2 0x470060 curl_easy_duphandle
3 0x498590 curl_easy_escape
4 0x470040 curl_easy_getinfo
5 0x46feb0 curl_easy_init
6 0x470300 curl_easy_pause
7 0x46ff20 curl_easy_perform
8 0x470470 curl_easy_recv
9 0x470260 curl_easy_reset
10 0x4704d0 curl_easy_send

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 51809 239.255.255.250 3702
192.168.56.101 51811 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702
192.168.56.101 60124 239.255.255.250 3702
192.168.56.101 62194 239.255.255.250 1900

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.