4.6
中危

09c05a6d9cc832acd0ebed1b1b694c96165f425c9abe557af021f1cd13865541

970ab1e46fd38c7d60540b5f921c334e.exe

分析耗时

97s

最近分析

文件大小

4.2MB
静态报毒 动态报毒 AI SCORE=86 ARTEMIS ATTRIBUTE CLOUD CONFIDENCE DROPPERX GAMETHIEF GENCIRC GENERICKD GNJZM HIGHCONFIDENCE MALWARE@#24C38D3D2L1JW OAYM ONLINEGAMES R011C0WGE20 SCORE TROJANGAMETHIEF UNSAFE WOOOL YMACCO 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Artemis!970AB1E46FD3 20200721 6.0.6.653
Baidu 20190318 1.0.0.2
Alibaba Trojan:Win32/Woool.413403d7 20190527 0.3.0.5
Avast 20200722 18.4.3895.0
Kingsoft 20200721 2013.8.14.323
Tencent Malware.Win32.Gencirc.11a49068 20200721 1.0.0.1
CrowdStrike win/malicious_confidence_60% (W) 20190702 1.0
行为判定
动态指标
HTTP traffic contains suspicious features which may be indicative of malware related traffic (1 个事件)
suspicious_features POST method with no referer header suspicious_request POST https://update.googleapis.com/service/update2?cup2key=10:2837720938&cup2hreq=300a4d0a9278113284dce71ab4df864d1de59b37ff9f073649b3daba7d23a59d
Performs some HTTP requests (1 个事件)
request POST https://update.googleapis.com/service/update2?cup2key=10:2837720938&cup2hreq=300a4d0a9278113284dce71ab4df864d1de59b37ff9f073649b3daba7d23a59d
Sends data using the HTTP POST Method (1 个事件)
request POST https://update.googleapis.com/service/update2?cup2key=10:2837720938&cup2hreq=300a4d0a9278113284dce71ab4df864d1de59b37ff9f073649b3daba7d23a59d
Allocates read-write-execute memory (usually to unpack itself) (1 个事件)
Time & API Arguments Status Return Repeated
1619793679.949
NtAllocateVirtualMemory
process_identifier: 1912
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x003f0000
success 0 0
Foreign language identified in PE resource (15 个事件)
name EXE language LANG_CHINESE offset 0x000e5b10 filetype PE32 executable (GUI) Intel 80386, for MS Windows sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x002ad200
name PLS language LANG_CHINESE offset 0x00392d10 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000820c3
name RT_CURSOR language LANG_ENGLISH offset 0x00415774 filetype data sublanguage SUBLANG_ENGLISH_AUS size 0x00000134
name RT_CURSOR language LANG_ENGLISH offset 0x00415774 filetype data sublanguage SUBLANG_ENGLISH_AUS size 0x00000134
name RT_CURSOR language LANG_ENGLISH offset 0x00415774 filetype data sublanguage SUBLANG_ENGLISH_AUS size 0x00000134
name RT_CURSOR language LANG_ENGLISH offset 0x00415774 filetype data sublanguage SUBLANG_ENGLISH_AUS size 0x00000134
name RT_CURSOR language LANG_ENGLISH offset 0x00415774 filetype data sublanguage SUBLANG_ENGLISH_AUS size 0x00000134
name RT_CURSOR language LANG_ENGLISH offset 0x00415774 filetype data sublanguage SUBLANG_ENGLISH_AUS size 0x00000134
name RT_CURSOR language LANG_ENGLISH offset 0x00415774 filetype data sublanguage SUBLANG_ENGLISH_AUS size 0x00000134
name RT_CURSOR language LANG_ENGLISH offset 0x00415774 filetype data sublanguage SUBLANG_ENGLISH_AUS size 0x00000134
name RT_CURSOR language LANG_ENGLISH offset 0x00415774 filetype data sublanguage SUBLANG_ENGLISH_AUS size 0x00000134
name RT_ICON language LANG_CHINESE offset 0x00422944 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x00422944 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x00422944 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_GROUP_ICON language LANG_CHINESE offset 0x00430170 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000030
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 43 AntiVirus engines on VirusTotal as malicious (43 个事件)
MicroWorld-eScan Trojan.GenericKD.43481790
FireEye Trojan.GenericKD.43481790
CAT-QuickHeal TrojanGameThief.OnLineGames
McAfee Artemis!970AB1E46FD3
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
Sangfor Malware
K7AntiVirus Trojan ( 0049133a1 )
BitDefender Trojan.GenericKD.43481790
K7GW Trojan ( 0049133a1 )
Cybereason malicious.46fd38
TrendMicro TROJ_GEN.R011C0WGE20
Symantec ML.Attribute.HighConfidence
GData Trojan.GenericKD.43481790
Kaspersky HEUR:Trojan-GameThief.Win32.OnLineGames.gen
Alibaba Trojan:Win32/Woool.413403d7
AegisLab Trojan.Win32.OnLineGames.d!c
Rising Rootkit.Generic!8.7D6 (CLOUD)
Sophos Mal/Generic-S
Comodo Malware@#24c38d3d2l1jw
F-Secure Trojan.TR/Woool.gnjzm
Zillya Trojan.Woool.Win32.367
Emsisoft Trojan.GenericKD.43481790 (B)
Cyren W32/Trojan.OAYM-5291
Avira TR/Woool.gnjzm
MAX malware (ai score=86)
Antiy-AVL Trojan[GameThief]/Win32.OnLineGames
Microsoft Trojan:Win32/Ymacco.AA09
Arcabit Trojan.Generic.D2977ABE
ZoneAlarm HEUR:Trojan-GameThief.Win32.OnLineGames.gen
ALYac Trojan.GenericKD.43481790
Ad-Aware Trojan.GenericKD.43481790
ESET-NOD32 a variant of Win32/Woool.C
TrendMicro-HouseCall TROJ_GEN.R011C0WGE20
Tencent Malware.Win32.Gencirc.11a49068
Ikarus Trojan.Win32.Woool
eGambit Unsafe.AI_Score_96%
Fortinet W32/Woool.C!tr
BitDefenderTheta AI:Packer.B2E94A2819
AVG Win32:DropperX-gen [Drp]
Panda Trj/CI.A
CrowdStrike win/malicious_confidence_60% (W)
Qihoo-360 Win32/Trojan.GameThief.60c
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-06-20 06:22:17

Imports

Library kernel32.dll:
0x4d11c8 VirtualFree
0x4d11cc VirtualAlloc
0x4d11d0 LocalFree
0x4d11d4 LocalAlloc
0x4d11d8 GetVersion
0x4d11dc GetCurrentThreadId
0x4d11e8 VirtualQuery
0x4d11ec WideCharToMultiByte
0x4d11f0 MultiByteToWideChar
0x4d11f4 lstrlenA
0x4d11f8 lstrcpynA
0x4d11fc LoadLibraryExA
0x4d1200 GetThreadLocale
0x4d1204 GetStartupInfoA
0x4d1208 GetProcAddress
0x4d120c GetModuleHandleA
0x4d1210 GetModuleFileNameA
0x4d1214 GetLocaleInfoA
0x4d1218 GetCommandLineA
0x4d121c FreeLibrary
0x4d1220 FindFirstFileA
0x4d1224 FindClose
0x4d1228 ExitProcess
0x4d122c WriteFile
0x4d1234 RtlUnwind
0x4d1238 RaiseException
0x4d123c GetStdHandle
Library user32.dll:
0x4d1244 GetKeyboardType
0x4d1248 LoadStringA
0x4d124c MessageBoxA
0x4d1250 CharNextA
Library advapi32.dll:
0x4d1258 RegQueryValueExA
0x4d125c RegOpenKeyExA
0x4d1260 RegCloseKey
Library oleaut32.dll:
0x4d1268 SysFreeString
0x4d126c SysReAllocStringLen
0x4d1270 SysAllocStringLen
Library kernel32.dll:
0x4d1278 TlsSetValue
0x4d127c TlsGetValue
0x4d1280 LocalAlloc
0x4d1284 GetModuleHandleA
Library advapi32.dll:
0x4d128c RegQueryValueExA
0x4d1290 RegOpenKeyExA
0x4d1294 RegFlushKey
0x4d1298 RegCreateKeyExA
0x4d129c RegCloseKey
Library kernel32.dll:
0x4d12a4 lstrcpyA
0x4d12a8 lstrcmpA
0x4d12ac WriteFile
0x4d12b0 WaitForSingleObject
0x4d12b4 VirtualQuery
0x4d12b8 VirtualAlloc
0x4d12bc Sleep
0x4d12c0 SizeofResource
0x4d12c4 SetThreadLocale
0x4d12c8 SetFilePointer
0x4d12cc SetEvent
0x4d12d0 SetErrorMode
0x4d12d4 SetEndOfFile
0x4d12d8 ResetEvent
0x4d12dc ReadFile
0x4d12e0 MultiByteToWideChar
0x4d12e4 MulDiv
0x4d12e8 LockResource
0x4d12ec LoadResource
0x4d12f0 LoadLibraryA
0x4d12fc GlobalUnlock
0x4d1300 GlobalSize
0x4d1304 GlobalReAlloc
0x4d1308 GlobalHandle
0x4d130c GlobalLock
0x4d1310 GlobalFree
0x4d1314 GlobalFindAtomA
0x4d1318 GlobalDeleteAtom
0x4d131c GlobalAlloc
0x4d1320 GlobalAddAtomA
0x4d1324 GetVersionExA
0x4d1328 GetVersion
0x4d132c GetUserDefaultLCID
0x4d1330 GetTickCount
0x4d1334 GetThreadLocale
0x4d1338 GetTempPathA
0x4d133c GetSystemInfo
0x4d1340 GetStringTypeExA
0x4d1344 GetStdHandle
0x4d1348 GetProcAddress
0x4d134c GetModuleHandleA
0x4d1350 GetModuleFileNameA
0x4d1354 GetLocaleInfoA
0x4d1358 GetLocalTime
0x4d135c GetLastError
0x4d1360 GetFullPathNameA
0x4d1364 GetFileSize
0x4d1368 GetFileAttributesA
0x4d136c GetDiskFreeSpaceA
0x4d1370 GetDateFormatA
0x4d1374 GetCurrentThreadId
0x4d1378 GetCurrentProcessId
0x4d137c GetComputerNameA
0x4d1380 GetCPInfo
0x4d1384 GetACP
0x4d1388 FreeResource
0x4d138c InterlockedExchange
0x4d1390 FreeLibrary
0x4d1394 FormatMessageA
0x4d1398 FindResourceA
0x4d139c FindFirstFileA
0x4d13a0 FindClose
0x4d13ac EnumCalendarInfoA
0x4d13b8 CreateThread
0x4d13bc CreateFileA
0x4d13c0 CreateEventA
0x4d13c4 CompareStringA
0x4d13c8 CloseHandle
Library version.dll:
0x4d13d0 VerQueryValueA
0x4d13d8 GetFileVersionInfoA
Library gdi32.dll:
0x4d13e0 UnrealizeObject
0x4d13e4 StretchBlt
0x4d13e8 SetWindowOrgEx
0x4d13ec SetWindowExtEx
0x4d13f0 SetWinMetaFileBits
0x4d13f4 SetViewportOrgEx
0x4d13f8 SetViewportExtEx
0x4d13fc SetTextColor
0x4d1400 SetTextAlign
0x4d1404 SetStretchBltMode
0x4d1408 SetROP2
0x4d140c SetPixel
0x4d1410 SetMapMode
0x4d1414 SetEnhMetaFileBits
0x4d1418 SetDIBColorTable
0x4d141c SetBrushOrgEx
0x4d1420 SetBkMode
0x4d1424 SetBkColor
0x4d1428 SelectPalette
0x4d142c SelectObject
0x4d1430 SelectClipRgn
0x4d1434 SaveDC
0x4d1438 RestoreDC
0x4d143c Rectangle
0x4d1440 RectVisible
0x4d1444 RealizePalette
0x4d1448 Polyline
0x4d144c Polygon
0x4d1450 PolyPolyline
0x4d1454 PlayEnhMetaFile
0x4d1458 PatBlt
0x4d145c MoveToEx
0x4d1460 MaskBlt
0x4d1464 LineTo
0x4d1468 LPtoDP
0x4d146c IntersectClipRect
0x4d1470 GetWindowOrgEx
0x4d1474 GetWinMetaFileBits
0x4d1478 GetViewportOrgEx
0x4d147c GetTextMetricsA
0x4d1484 GetTextAlign
0x4d148c GetStockObject
0x4d1490 GetPixel
0x4d1494 GetPaletteEntries
0x4d1498 GetObjectA
0x4d14a8 GetEnhMetaFileBits
0x4d14ac GetDeviceCaps
0x4d14b0 GetDIBits
0x4d14b4 GetDIBColorTable
0x4d14b8 GetDCOrgEx
0x4d14c0 GetClipBox
0x4d14c4 GetBrushOrgEx
0x4d14c8 GetBitmapBits
0x4d14cc GdiFlush
0x4d14d0 ExtTextOutA
0x4d14d4 ExtCreatePen
0x4d14d8 ExcludeClipRect
0x4d14dc DeleteObject
0x4d14e0 DeleteEnhMetaFile
0x4d14e4 DeleteDC
0x4d14e8 CreateSolidBrush
0x4d14ec CreateRectRgn
0x4d14f0 CreatePenIndirect
0x4d14f4 CreatePalette
0x4d14fc CreateFontIndirectA
0x4d1500 CreateEnhMetaFileA
0x4d1504 CreateDIBitmap
0x4d1508 CreateDIBSection
0x4d150c CreateCompatibleDC
0x4d1514 CreateBrushIndirect
0x4d1518 CreateBitmap
0x4d151c CopyEnhMetaFileA
0x4d1520 CombineRgn
0x4d1524 CloseEnhMetaFile
0x4d1528 BitBlt
Library user32.dll:
0x4d1530 CreateWindowExA
0x4d1534 WindowFromPoint
0x4d1538 WinHelpA
0x4d153c WaitMessage
0x4d1540 ValidateRect
0x4d1544 UpdateWindow
0x4d1548 UnregisterClassA
0x4d154c UnionRect
0x4d1550 UnhookWindowsHookEx
0x4d1554 TranslateMessage
0x4d155c TrackPopupMenu
0x4d1564 ShowWindow
0x4d1568 ShowScrollBar
0x4d156c ShowOwnedPopups
0x4d1570 ShowCursor
0x4d1574 SetWindowRgn
0x4d1578 SetWindowsHookExA
0x4d157c SetWindowTextA
0x4d1580 SetWindowPos
0x4d1584 SetWindowPlacement
0x4d1588 SetWindowLongA
0x4d158c SetTimer
0x4d1590 SetScrollRange
0x4d1594 SetScrollPos
0x4d1598 SetScrollInfo
0x4d159c SetRect
0x4d15a0 SetPropA
0x4d15a4 SetParent
0x4d15a8 SetMenuItemInfoA
0x4d15ac SetMenu
0x4d15b0 SetKeyboardState
0x4d15b4 SetForegroundWindow
0x4d15b8 SetFocus
0x4d15bc SetCursor
0x4d15c0 SetClipboardData
0x4d15c4 SetClassLongA
0x4d15c8 SetCapture
0x4d15cc SetActiveWindow
0x4d15d0 SendMessageA
0x4d15d4 ScrollWindowEx
0x4d15d8 ScrollWindow
0x4d15dc ScreenToClient
0x4d15e0 RemovePropA
0x4d15e4 RemoveMenu
0x4d15e8 ReleaseDC
0x4d15ec ReleaseCapture
0x4d15f8 RegisterClassA
0x4d15fc RedrawWindow
0x4d1600 PtInRect
0x4d1604 PostQuitMessage
0x4d1608 PostMessageA
0x4d160c PeekMessageA
0x4d1610 OpenClipboard
0x4d1614 OffsetRect
0x4d1618 OemToCharA
0x4d161c MessageBoxA
0x4d1620 MessageBeep
0x4d1624 MapWindowPoints
0x4d1628 MapVirtualKeyA
0x4d162c LoadStringA
0x4d1630 LoadKeyboardLayoutA
0x4d1634 LoadIconA
0x4d1638 LoadCursorA
0x4d163c LoadBitmapA
0x4d1640 KillTimer
0x4d1644 IsZoomed
0x4d1648 IsWindowVisible
0x4d164c IsWindowEnabled
0x4d1650 IsWindow
0x4d1654 IsRectEmpty
0x4d1658 IsIconic
0x4d165c IsDialogMessageA
0x4d1664 IsChild
0x4d1668 IsCharAlphaNumericA
0x4d166c IsCharAlphaA
0x4d1670 InvalidateRect
0x4d1674 IntersectRect
0x4d1678 InsertMenuItemA
0x4d167c InsertMenuA
0x4d1680 InflateRect
0x4d1688 GetWindowTextA
0x4d168c GetWindowRect
0x4d1690 GetWindowPlacement
0x4d1694 GetWindowLongA
0x4d1698 GetWindowDC
0x4d169c GetTopWindow
0x4d16a0 GetSystemMetrics
0x4d16a4 GetSystemMenu
0x4d16a8 GetSysColorBrush
0x4d16ac GetSysColor
0x4d16b0 GetSubMenu
0x4d16b4 GetScrollRange
0x4d16b8 GetScrollPos
0x4d16bc GetScrollInfo
0x4d16c0 GetPropA
0x4d16c4 GetParent
0x4d16c8 GetWindow
0x4d16cc GetMessageTime
0x4d16d0 GetMenuStringA
0x4d16d4 GetMenuState
0x4d16d8 GetMenuItemInfoA
0x4d16dc GetMenuItemID
0x4d16e0 GetMenuItemCount
0x4d16e4 GetMenu
0x4d16e8 GetLastActivePopup
0x4d16ec GetKeyboardState
0x4d16f4 GetKeyboardLayout
0x4d16f8 GetKeyState
0x4d16fc GetKeyNameTextA
0x4d1700 GetIconInfo
0x4d1704 GetForegroundWindow
0x4d1708 GetFocus
0x4d170c GetDoubleClickTime
0x4d1710 GetDlgItem
0x4d1714 GetDesktopWindow
0x4d1718 GetDCEx
0x4d171c GetDC
0x4d1720 GetCursorPos
0x4d1724 GetCursor
0x4d1728 GetClipboardData
0x4d172c GetClientRect
0x4d1730 GetClassNameA
0x4d1734 GetClassInfoA
0x4d1738 GetCaretPos
0x4d173c GetCapture
0x4d1740 GetActiveWindow
0x4d1744 FrameRect
0x4d1748 FindWindowA
0x4d174c FillRect
0x4d1750 EqualRect
0x4d1754 EnumWindows
0x4d1758 EnumThreadWindows
0x4d1760 EndPaint
0x4d1764 EnableWindow
0x4d1768 EnableScrollBar
0x4d176c EnableMenuItem
0x4d1770 EmptyClipboard
0x4d1774 DrawTextA
0x4d1778 DrawMenuBar
0x4d177c DrawIconEx
0x4d1780 DrawIcon
0x4d1784 DrawFrameControl
0x4d1788 DrawFocusRect
0x4d178c DrawEdge
0x4d1790 DispatchMessageA
0x4d1794 DestroyWindow
0x4d1798 DestroyMenu
0x4d179c DestroyIcon
0x4d17a0 DestroyCursor
0x4d17a4 DeleteMenu
0x4d17a8 DefWindowProcA
0x4d17ac DefMDIChildProcA
0x4d17b0 DefFrameProcA
0x4d17b4 CreatePopupMenu
0x4d17b8 CreateMenu
0x4d17bc CreateIcon
0x4d17c0 CloseClipboard
0x4d17c4 ClipCursor
0x4d17c8 ClientToScreen
0x4d17cc CheckMenuItem
0x4d17d0 CallWindowProcA
0x4d17d4 CallNextHookEx
0x4d17d8 BeginPaint
0x4d17dc CharNextA
0x4d17e0 CharLowerBuffA
0x4d17e4 CharLowerA
0x4d17e8 CharUpperBuffA
0x4d17ec CharToOemA
0x4d17f0 AdjustWindowRectEx
Library kernel32.dll:
0x4d17fc Sleep
Library oleaut32.dll:
0x4d1804 SafeArrayPtrOfIndex
0x4d1808 SafeArrayGetUBound
0x4d180c SafeArrayGetLBound
0x4d1810 SafeArrayCreate
0x4d1814 VariantChangeType
0x4d1818 VariantCopy
0x4d181c VariantClear
0x4d1820 VariantInit
Library ole32.dll:
0x4d182c IsAccelerator
0x4d1830 OleDraw
0x4d1838 CoTaskMemFree
0x4d183c ProgIDFromCLSID
0x4d1840 StringFromCLSID
0x4d1844 CoCreateInstance
0x4d1848 CoGetClassObject
0x4d184c CoUninitialize
0x4d1850 CoInitialize
0x4d1854 IsEqualGUID
Library oleaut32.dll:
0x4d185c GetErrorInfo
0x4d1860 GetActiveObject
0x4d1864 SysFreeString
Library comctl32.dll:
0x4d1874 ImageList_Write
0x4d1878 ImageList_Read
0x4d1888 ImageList_DragMove
0x4d188c ImageList_DragLeave
0x4d1890 ImageList_DragEnter
0x4d1894 ImageList_EndDrag
0x4d1898 ImageList_BeginDrag
0x4d189c ImageList_Remove
0x4d18a0 ImageList_DrawEx
0x4d18a4 ImageList_Replace
0x4d18a8 ImageList_Draw
0x4d18b8 ImageList_Add
0x4d18c0 ImageList_Destroy
0x4d18c4 ImageList_Create
0x4d18c8 InitCommonControls
Library shell32.dll:
0x4d18d0 ShellExecuteA
Library comdlg32.dll:
0x4d18d8 ChooseColorA
0x4d18dc GetSaveFileNameA
0x4d18e0 GetOpenFileNameA
Library IMAGEHLP.DLL:
0x4d18e8 CheckSumMappedFile
Library ole32.dll:
0x4d18f0 CoUninitialize
0x4d18f4 CoInitialize
Library shell32.dll:
0x4d18fc SHGetMalloc

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49187 203.208.41.98 update.googleapis.com 443

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 53237 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 55368 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 50535 239.255.255.250 3702
192.168.56.101 50537 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702
192.168.56.101 62196 239.255.255.250 1900

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.