5.2
中危

1703dd75dc777ab43b3f5bcc7055951ed79646e2b10549b0b784d253577ae562

b054de22d3e52d20228dfcf2d90bd0d5.exe

分析耗时

79s

最近分析

文件大小

2.4MB
静态报毒 动态报毒 100% AGEN AI SCORE=99 ARTEMIS ATTRIBUTE BESTAFERA BQZ@AKKFVXKB CLOUD CONFIDENCE DRAGON GDSDA HIGH HIGH CONFIDENCE HIGHCONFIDENCE HW32 MALICIOUS PE MALWAREX OCCAMY PCIE PUPXDZ SCORE SUSGEN SYMMI UNDEFINED UNSAFE WACATAC ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Artemis!B054DE22D3E5 20200424 6.0.6.653
Alibaba 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:MalwareX-gen [Trj] 20200423 18.4.3895.0
Kingsoft 20200424 2013.8.14.323
Tencent Win32.Trojan.Gen.Pcie 20200424 1.0.0.1
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
静态指标
Tries to locate where the browsers are installed (1 个事件)
file C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\data
The executable contains unknown PE section names indicative of a packer (could be a false positive) (1 个事件)
section .itext
The file contains an unknown PE resource name possibly indicative of a packer (6 个事件)
resource name BASS
resource name D3DX9_43
resource name IMESKIN
resource name SNAPPY32
resource name SOUNDLST
resource name UIPKG
行为判定
动态指标
HTTP traffic contains suspicious features which may be indicative of malware related traffic (1 个事件)
suspicious_features POST method with no referer header suspicious_request POST https://update.googleapis.com/service/update2?cup2key=10:4036354019&cup2hreq=592cfb0b28893397215bd32225c598999d13b9e3622c97c6896e314cd259c5dd
Performs some HTTP requests (4 个事件)
request HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
request HEAD http://r1---sn-j5o76n7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.105&mm=28&mn=sn-j5o76n7e&ms=nvh&mt=1619833698&mv=m&mvi=1&pl=23&shardbypass=yes
request HEAD http://r4---sn-j5o76n7l.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=4&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5oe7e&req_id=d9e6bd3f211b7e26&cms_redirect=yes&ipbypass=yes&mip=59.50.85.28&mm=28&mn=sn-j5o76n7l&ms=nvh&mt=1619833937&mv=m
request POST https://update.googleapis.com/service/update2?cup2key=10:4036354019&cup2hreq=592cfb0b28893397215bd32225c598999d13b9e3622c97c6896e314cd259c5dd
Sends data using the HTTP POST Method (1 个事件)
request POST https://update.googleapis.com/service/update2?cup2key=10:4036354019&cup2hreq=592cfb0b28893397215bd32225c598999d13b9e3622c97c6896e314cd259c5dd
Allocates read-write-execute memory (usually to unpack itself) (3 个事件)
Time & API Arguments Status Return Repeated
1619861115.203524
NtProtectVirtualMemory
process_identifier: 1544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 1224704
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00401000
success 0 0
1619861115.203524
NtProtectVirtualMemory
process_identifier: 1544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0052c000
success 0 0
1619861115.828524
NtAllocateVirtualMemory
process_identifier: 1544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00b00000
success 0 0
Foreign language identified in PE resource (8 个事件)
name BASS language LANG_CHINESE offset 0x0041fecc filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00016a38
name D3DX9_43 language LANG_CHINESE offset 0x00436904 filetype empty sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x001e7d58
name IMESKIN language LANG_CHINESE offset 0x0061e65c filetype empty sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000219c9
name SNAPPY32 language LANG_CHINESE offset 0x00640028 filetype empty sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00017800
name SOUNDLST language LANG_CHINESE offset 0x00657828 filetype empty sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000881e
name UIPKG language LANG_CHINESE offset 0x00660048 filetype empty sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0002a000
name RT_ICON language LANG_CHINESE offset 0x0041fbd0 filetype dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 2004318064, next used block 2005370999 sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000002e8
name RT_GROUP_ICON language LANG_CHINESE offset 0x0041feb8 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000014
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.9972289386079325 section {'size_of_data': '0x00237400', 'virtual_address': '0x001e6000', 'entropy': 7.9972289386079325, 'name': 'UPX1', 'virtual_size': '0x00237389'} description A section with a high entropy has been found
entropy 0.9964866051822574 description Overall entropy of this PE file is high
The executable is compressed using UPX (2 个事件)
section UPX0 description Section name indicates UPX
section UPX1 description Section name indicates UPX
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 45 AntiVirus engines on VirusTotal as malicious (45 个事件)
Bkav HW32.Packed.
MicroWorld-eScan Gen:Variant.Application.Symmi.88216
FireEye Generic.mg.b054de22d3e52d20
CAT-QuickHeal Trojan.Wacatac
McAfee Artemis!B054DE22D3E5
Cylance Unsafe
Zillya Trojan.BestaFera.Win32.8079
Sangfor Malware
K7AntiVirus Password-Stealer ( 004d58ef1 )
K7GW Password-Stealer ( 004d58ef1 )
Cybereason malicious.2d3e52
Arcabit Trojan.Application.Symmi.D15898
Invincea heuristic
BitDefenderTheta Gen:NN.ZexaF.34106.BQZ@aKkFVxkb
Symantec ML.Attribute.HighConfidence
TotalDefense Win32/Dragon_i
APEX Malicious
Avast Win32:MalwareX-gen [Trj]
BitDefender Gen:Variant.Application.Symmi.88216
Paloalto generic.ml
AegisLab Trojan.Win32.Symmi.4!c
Rising Malware.Undefined!8.C (CLOUD)
Ad-Aware Gen:Variant.Application.Symmi.88216
Sophos Mal/Generic-S
F-Secure Heuristic.HEUR/AGEN.1130339
McAfee-GW-Edition BehavesLike.Win32.PUPXDZ.vc
Trapmine malicious.high.ml.score
Emsisoft Gen:Variant.Application.Symmi.88216 (B)
SentinelOne DFI - Malicious PE
Jiangmin Trojan.Banker.BestaFera.gpl
Avira HEUR/AGEN.1130339
MAX malware (ai score=99)
Antiy-AVL Trojan[Banker]/Win32.BestaFera
Microsoft Trojan:Win32/Occamy.C
Endgame malicious (high confidence)
GData Gen:Variant.Application.Symmi.88216
AhnLab-V3 Adware/Win32.Agent.C3456258
Acronis suspicious
VBA32 Trojan.Wacatac
Tencent Win32.Trojan.Gen.Pcie
eGambit Unsafe.AI_Score_100%
MaxSecure Trojan.Malware.73836575.susgen
AVG Win32:MalwareX-gen [Trj]
Panda Trj/GdSda.A
CrowdStrike win/malicious_confidence_100% (W)
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-02-28 11:26:01

Imports

Library oleaut32.dll:
0x814000 SysFreeString
0x814004 SysReAllocStringLen
0x814008 SysAllocStringLen
Library advapi32.dll:
0x814010 RegQueryValueExA
0x814014 RegOpenKeyExA
0x814018 RegCloseKey
Library user32.dll:
0x814020 GetKeyboardType
0x814024 DestroyWindow
0x814028 LoadStringA
0x81402c MessageBoxA
0x814030 CharNextA
Library kernel32.dll:
0x814038 GetACP
0x81403c Sleep
0x814040 VirtualFree
0x814044 VirtualAlloc
0x814048 GetTickCount
0x814050 GetCurrentThreadId
0x81405c VirtualQuery
0x814060 WideCharToMultiByte
0x814068 MultiByteToWideChar
0x81406c lstrlenA
0x814070 lstrcpynA
0x814074 LoadLibraryExA
0x814078 GetThreadLocale
0x81407c GetStartupInfoA
0x814080 GetProcAddress
0x814084 GetModuleHandleA
0x814088 GetModuleFileNameA
0x81408c GetLocaleInfoA
0x814090 GetLastError
0x814098 GetCommandLineA
0x81409c FreeLibrary
0x8140a0 FindFirstFileA
0x8140a4 FindClose
0x8140a8 CreateDirectoryA
0x8140ac ExitProcess
0x8140b0 ExitThread
0x8140b4 CreateThread
0x8140b8 CompareStringA
0x8140bc WriteFile
0x8140c4 RtlUnwind
0x8140c8 RaiseException
0x8140cc GetStdHandle
Library kernel32.dll:
0x8140d4 TlsSetValue
0x8140d8 TlsGetValue
0x8140dc LocalAlloc
0x8140e0 GetModuleHandleA
Library user32.dll:
0x8140e8 CreateWindowExA
0x8140ec WindowFromPoint
0x8140f0 WaitMessage
0x8140f4 UpdateWindow
0x8140f8 UnregisterClassA
0x8140fc UnhookWindowsHookEx
0x814100 TranslateMessage
0x814108 TrackPopupMenu
0x814110 ShowWindow
0x814114 ShowScrollBar
0x814118 ShowOwnedPopups
0x81411c SetWindowRgn
0x814120 SetWindowsHookExA
0x814124 SetWindowTextA
0x814128 SetWindowPos
0x81412c SetWindowPlacement
0x814130 SetWindowLongW
0x814134 SetWindowLongA
0x814138 SetTimer
0x81413c SetScrollRange
0x814140 SetScrollPos
0x814144 SetScrollInfo
0x814148 SetRect
0x81414c SetPropA
0x814150 SetParent
0x814154 SetMenuItemInfoA
0x814158 SetMenu
0x81415c SetForegroundWindow
0x814160 SetFocus
0x814164 SetCursor
0x814168 SetClipboardData
0x81416c SetClassLongA
0x814170 SetCapture
0x814174 SetActiveWindow
0x814178 SendMessageW
0x81417c SendMessageA
0x814180 ScrollWindow
0x814184 ScreenToClient
0x814188 RemovePropA
0x81418c RemoveMenu
0x814190 ReleaseDC
0x814194 ReleaseCapture
0x8141a0 RegisterClassA
0x8141a4 RedrawWindow
0x8141a8 PtInRect
0x8141ac PostQuitMessage
0x8141b0 PostMessageA
0x8141b4 PeekMessageW
0x8141b8 PeekMessageA
0x8141bc OpenClipboard
0x8141c0 OffsetRect
0x8141c4 OemToCharA
0x8141d0 MessageBoxA
0x8141d4 MessageBeep
0x8141d8 MapWindowPoints
0x8141dc MapVirtualKeyA
0x8141e0 LoadStringA
0x8141e4 LoadKeyboardLayoutA
0x8141e8 LoadIconA
0x8141ec LoadCursorA
0x8141f0 LoadBitmapA
0x8141f4 KillTimer
0x8141f8 IsZoomed
0x8141fc IsWindowVisible
0x814200 IsWindowUnicode
0x814204 IsWindowEnabled
0x814208 IsWindow
0x81420c IsRectEmpty
0x814210 IsIconic
0x814214 IsDialogMessageW
0x814218 IsDialogMessageA
0x81421c IsChild
0x814220 InvalidateRect
0x814224 IntersectRect
0x814228 InsertMenuItemA
0x81422c InsertMenuA
0x814230 InflateRect
0x814238 GetWindowTextA
0x81423c GetWindowRect
0x814240 GetWindowPlacement
0x814244 GetWindowLongW
0x814248 GetWindowLongA
0x81424c GetWindowDC
0x814250 GetTopWindow
0x814254 GetSystemMetrics
0x814258 GetSystemMenu
0x81425c GetSysColorBrush
0x814260 GetSysColor
0x814264 GetSubMenu
0x814268 GetScrollRange
0x81426c GetScrollPos
0x814270 GetScrollInfo
0x814274 GetPropA
0x814278 GetParent
0x81427c GetWindow
0x814280 GetMessageTime
0x814284 GetMessagePos
0x814288 GetMenuStringA
0x81428c GetMenuState
0x814290 GetMenuItemInfoA
0x814294 GetMenuItemID
0x814298 GetMenuItemCount
0x81429c GetMenu
0x8142a0 GetLastActivePopup
0x8142a4 GetKeyboardState
0x8142b0 GetKeyboardLayout
0x8142b4 GetKeyState
0x8142b8 GetKeyNameTextA
0x8142bc GetIconInfo
0x8142c0 GetForegroundWindow
0x8142c4 GetFocus
0x8142c8 GetDlgItem
0x8142cc GetDesktopWindow
0x8142d0 GetDCEx
0x8142d4 GetDC
0x8142d8 GetCursorPos
0x8142dc GetCursor
0x8142e0 GetClipboardData
0x8142e4 GetClientRect
0x8142e8 GetClassLongA
0x8142ec GetClassInfoA
0x8142f0 GetCapture
0x8142f4 GetActiveWindow
0x8142f8 FrameRect
0x8142fc FindWindowExA
0x814300 FindWindowA
0x814304 FillRect
0x814308 EqualRect
0x81430c EnumWindows
0x814310 EnumThreadWindows
0x81431c EnumChildWindows
0x814320 EndPaint
0x814324 EnableWindow
0x814328 EnableScrollBar
0x81432c EnableMenuItem
0x814330 EmptyClipboard
0x814334 DrawTextA
0x814338 DrawMenuBar
0x81433c DrawIconEx
0x814340 DrawIcon
0x814344 DrawFrameControl
0x814348 DrawFocusRect
0x81434c DrawEdge
0x814350 DispatchMessageW
0x814354 DispatchMessageA
0x814358 DestroyWindow
0x81435c DestroyMenu
0x814360 DestroyIcon
0x814364 DestroyCursor
0x814368 DeleteMenu
0x81436c DefWindowProcA
0x814370 DefMDIChildProcA
0x814374 DefFrameProcA
0x814378 CreatePopupMenu
0x81437c CreateMenu
0x814380 CreateIcon
0x814384 CloseClipboard
0x814388 ClientToScreen
0x81438c CheckMenuItem
0x814390 CallWindowProcA
0x814394 CallNextHookEx
0x814398 BeginPaint
0x81439c CharNextA
0x8143a0 CharLowerBuffA
0x8143a4 CharLowerA
0x8143a8 CharUpperBuffA
0x8143ac CharToOemA
0x8143b0 AdjustWindowRectEx
Library gdi32.dll:
0x8143bc UnrealizeObject
0x8143c0 StretchDIBits
0x8143c4 StretchBlt
0x8143c8 SetWindowOrgEx
0x8143cc SetWinMetaFileBits
0x8143d0 SetViewportOrgEx
0x8143d4 SetTextColor
0x8143d8 SetTextAlign
0x8143dc SetStretchBltMode
0x8143e0 SetROP2
0x8143e4 SetPixel
0x8143e8 SetPaletteEntries
0x8143ec SetMapMode
0x8143f0 SetEnhMetaFileBits
0x8143f4 SetDIBColorTable
0x8143f8 SetBrushOrgEx
0x8143fc SetBkMode
0x814400 SetBkColor
0x814404 SelectPalette
0x814408 SelectObject
0x81440c SaveDC
0x814410 RestoreDC
0x814414 ResizePalette
0x814418 Rectangle
0x81441c RectVisible
0x814420 RealizePalette
0x814424 Polyline
0x814428 Polygon
0x81442c PlayEnhMetaFile
0x814430 PathToRegion
0x814434 PatBlt
0x814438 MoveToEx
0x81443c MaskBlt
0x814440 LineTo
0x814444 LPtoDP
0x814448 IntersectClipRect
0x81444c GetWindowOrgEx
0x814450 GetWinMetaFileBits
0x814454 GetTextMetricsA
0x814458 GetTextExtentPointA
0x814464 GetStockObject
0x814468 GetRgnBox
0x81446c GetPixel
0x814470 GetPaletteEntries
0x814474 GetObjectA
0x814488 GetEnhMetaFileBits
0x81448c GetDeviceCaps
0x814490 GetDIBits
0x814494 GetDIBColorTable
0x814498 GetDCOrgEx
0x8144a0 GetClipBox
0x8144a4 GetBrushOrgEx
0x8144a8 GetBitmapBits
0x8144ac GdiFlush
0x8144b0 ExtTextOutA
0x8144b4 ExcludeClipRect
0x8144b8 EndPath
0x8144bc DeleteObject
0x8144c0 DeleteEnhMetaFile
0x8144c4 DeleteDC
0x8144c8 CreateSolidBrush
0x8144cc CreatePenIndirect
0x8144d0 CreatePalette
0x8144d8 CreateFontIndirectA
0x8144dc CreateEnhMetaFileA
0x8144e0 CreateDIBitmap
0x8144e4 CreateDIBSection
0x8144e8 CreateCompatibleDC
0x8144f0 CreateBrushIndirect
0x8144f4 CreateBitmap
0x8144f8 CopyEnhMetaFileA
0x8144fc CloseFigure
0x814500 CloseEnhMetaFile
0x814504 BitBlt
0x814508 BeginPath
Library version.dll:
0x814510 VerQueryValueA
0x814518 GetFileVersionInfoA
Library mpr.dll:
0x814520 WNetGetConnectionA
Library kernel32.dll:
0x814528 lstrcpyA
0x81452c lstrcmpA
0x814534 WriteFile
0x814538 WinExec
0x81453c WideCharToMultiByte
0x814540 WaitForSingleObject
0x814548 VirtualQuery
0x81454c VirtualAlloc
0x814550 UnmapViewOfFile
0x814554 SuspendThread
0x814558 Sleep
0x81455c SizeofResource
0x814560 SetThreadPriority
0x814564 SetThreadLocale
0x814568 SetLastError
0x81456c SetFileTime
0x814570 SetFilePointer
0x814574 SetFileAttributesA
0x814578 SetEvent
0x81457c SetErrorMode
0x814580 SetEndOfFile
0x814584 ResumeThread
0x814588 ResetEvent
0x81458c ReadFile
0x814590 MultiByteToWideChar
0x814594 MulDiv
0x814598 MoveFileA
0x81459c MapViewOfFile
0x8145a0 LockResource
0x8145a8 LoadResource
0x8145ac LoadLibraryA
0x8145b8 GlobalUnlock
0x8145bc GlobalSize
0x8145c0 GlobalLock
0x8145c4 GlobalFree
0x8145c8 GlobalFindAtomA
0x8145cc GlobalDeleteAtom
0x8145d0 GlobalAlloc
0x8145d4 GlobalAddAtomA
0x8145dc GetVersionExA
0x8145e0 GetVersion
0x8145e4 GetUserDefaultLCID
0x8145ec GetTickCount
0x8145f0 GetThreadLocale
0x8145f4 GetTempPathA
0x8145f8 GetSystemDirectoryA
0x8145fc GetStdHandle
0x814600 GetProcAddress
0x814608 GetModuleHandleA
0x81460c GetModuleFileNameA
0x814610 GetLogicalDrives
0x814614 GetLocaleInfoA
0x814618 GetLocalTime
0x81461c GetLastError
0x814620 GetFullPathNameA
0x814624 GetFileTime
0x814628 GetFileSize
0x81462c GetFileAttributesA
0x814630 GetExitCodeThread
0x814634 GetDriveTypeA
0x814638 GetDiskFreeSpaceA
0x81463c GetDateFormatA
0x814640 GetCurrentThreadId
0x814644 GetCurrentProcessId
0x814648 GetComputerNameA
0x81464c GetCPInfo
0x814650 FreeResource
0x814658 InterlockedExchange
0x814664 FreeLibrary
0x814668 FormatMessageA
0x81466c FlushFileBuffers
0x814670 FindResourceA
0x814674 FindNextFileA
0x814678 FindFirstFileA
0x81467c FindClose
0x814688 ExitProcess
0x81468c EnumCalendarInfoA
0x814698 DeleteFileA
0x8146a0 CreateThread
0x8146a4 CreateProcessA
0x8146a8 CreateMutexA
0x8146ac CreateFileMappingA
0x8146b0 CreateFileA
0x8146b4 CreateEventA
0x8146b8 CreateDirectoryA
0x8146bc CompareStringA
0x8146c0 CloseHandle
Library advapi32.dll:
0x8146c8 RegQueryValueExA
0x8146cc RegOpenKeyExA
0x8146d0 RegFlushKey
0x8146d4 RegCreateKeyExA
0x8146d8 RegCloseKey
Library oleaut32.dll:
0x8146e0 GetErrorInfo
0x8146e4 GetActiveObject
0x8146e8 SysFreeString
Library ole32.dll:
0x8146f4 IsAccelerator
0x8146f8 OleDraw
0x814700 CoTaskMemFree
0x814704 CoTaskMemAlloc
0x814708 ProgIDFromCLSID
0x81470c StringFromCLSID
0x814710 CoCreateInstance
0x814714 CoGetClassObject
0x814718 CoUninitialize
0x81471c CoInitializeEx
0x814720 CoInitialize
0x814724 IsEqualGUID
Library kernel32.dll:
0x81472c Sleep
Library ole32.dll:
0x814734 CLSIDFromString
Library oleaut32.dll:
0x81473c SafeArrayPtrOfIndex
0x814740 SafeArrayGetUBound
0x814744 SafeArrayGetLBound
0x814748 SafeArrayCreate
0x81474c VariantChangeType
0x814750 VariantCopy
0x814754 VariantClear
0x814758 VariantInit
Library comctl32.dll:
0x814760 _TrackMouseEvent
0x81476c ImageList_Write
0x814770 ImageList_Read
0x81477c ImageList_DragMove
0x814780 ImageList_DragLeave
0x814784 ImageList_DragEnter
0x814788 ImageList_EndDrag
0x81478c ImageList_BeginDrag
0x814790 ImageList_Remove
0x814794 ImageList_DrawEx
0x814798 ImageList_Draw
0x8147a4 ImageList_Add
0x8147b0 ImageList_Destroy
0x8147b4 ImageList_Create
0x8147b8 InitCommonControls
Library shell32.dll:
0x8147c0 ShellExecuteExA
0x8147c4 ShellExecuteA
Library shell32.dll:
0x8147d0 SHGetMalloc
0x8147d4 SHGetDesktopFolder
0x8147d8 SHBrowseForFolderA
Library comdlg32.dll:
0x8147e0 GetOpenFileNameA

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49190 113.108.239.130 r1---sn-j5o76n7e.gvt1.com 80
192.168.56.101 49189 203.208.41.33 redirector.gvt1.com 80
192.168.56.101 49188 203.208.41.66 update.googleapis.com 443
192.168.56.101 49191 58.63.233.69 r4---sn-j5o76n7l.gvt1.com 80

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50002 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51378 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 57756 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 62318 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 53237 224.0.0.252 5355
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 56540 239.255.255.250 3702

HTTP & HTTPS Requests

URI Data
http://r1---sn-j5o76n7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.105&mm=28&mn=sn-j5o76n7e&ms=nvh&mt=1619833698&mv=m&mvi=1&pl=23&shardbypass=yes
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.105&mm=28&mn=sn-j5o76n7e&ms=nvh&mt=1619833698&mv=m&mvi=1&pl=23&shardbypass=yes HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: r1---sn-j5o76n7e.gvt1.com

http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: redirector.gvt1.com

http://r4---sn-j5o76n7l.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=4&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5oe7e&req_id=d9e6bd3f211b7e26&cms_redirect=yes&ipbypass=yes&mip=59.50.85.28&mm=28&mn=sn-j5o76n7l&ms=nvh&mt=1619833937&mv=m
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=4&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5oe7e&req_id=d9e6bd3f211b7e26&cms_redirect=yes&ipbypass=yes&mip=59.50.85.28&mm=28&mn=sn-j5o76n7l&ms=nvh&mt=1619833937&mv=m HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: r4---sn-j5o76n7l.gvt1.com

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.