1.4
低危

11b9f1785f02b9c025484401891ca6a67724b963dbf284b9aaf9f9b6de421323

11b9f1785f02b9c025484401891ca6a67724b963dbf284b9aaf9f9b6de421323.exe

分析耗时

194s

最近分析

372天前

文件大小

57.8KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER ZBOT
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.54
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Crypt-QFB [Trj] 20190915 18.4.3895.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20190915 2013.8.14.323
McAfee PWSZbot-FMO!B4ACB56FA64C 20190915 6.0.6.653
Tencent None 20190915 1.0.0.1
行为判定
动态指标
该二进制文件可能包含加密或压缩数据,表明使用了打包工具 (1 个事件)
section {'name': 'UPX1', 'virtual_address': '0x0000a000', 'virtual_size': '0x00002000', 'size_of_data': '0x00001e00', 'entropy': 7.46640452151023} entropy 7.46640452151023 description 发现高熵的节
可执行文件使用UPX压缩 (2 个事件)
section UPX0 description 节名称指示UPX
section UPX1 description 节名称指示UPX
网络通信
与未执行 DNS 查询的主机进行通信 (2 个事件)
host 114.114.114.114
host 8.8.8.8
文件已被 VirusTotal 上 60 个反病毒引擎识别为恶意 (50 out of 60 个事件)
ALYac Trojan.Downloader.JQFS
APEX Malicious
AVG Win32:Crypt-QFB [Trj]
Acronis suspicious
Ad-Aware Trojan.Downloader.JQFS
AhnLab-V3 Spyware/Win32.Zbot.C3054333
Antiy-AVL Trojan[Spy]/Win32.Zbot
Arcabit Trojan.Downloader.JQFS
Avast Win32:Crypt-QFB [Trj]
Avira TR/Spy.Zbot.rhwnyfl
BitDefender Trojan.Downloader.JQFS
CAT-QuickHeal Trojan.ZbotCS.S6383665
CMC Trojan-Spy.Win32.Zbot!O
ClamAV Win.Downloader.Upatre-5744087-0
Comodo Packed.Win32.MUPX.Gen@24tbus
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.fa64c0
Cylance Unsafe
Cyren W32/Trojan.GEPO-3375
DrWeb Trojan.DownLoad3.28161
ESET-NOD32 Win32/TrojanDownloader.Small.AAB
Emsisoft Trojan.Downloader.JQFS (B)
Endgame malicious (high confidence)
F-Prot W32/Trojan3.ANRL
F-Secure Trojan.TR/Spy.Zbot.rhwnyfl
FireEye Generic.mg.b4acb56fa64c0c39
Fortinet W32/Agent.AEUD!tr
GData Trojan.Downloader.JQFS
Invincea heuristic
Jiangmin TrojanSpy.Zbot.fnya
K7AntiVirus Trojan-Downloader ( 0040f6bd1 )
K7GW Trojan-Downloader ( 0040f6bd1 )
Kaspersky Trojan-Spy.Win32.Zbot.qsec
Lionic Trojan.Win32.Zbot.tpdt
MAX malware (ai score=89)
Malwarebytes Trojan.Email
MaxSecure Trojan.Upatre.Gen
McAfee PWSZbot-FMO!B4ACB56FA64C
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.qt
MicroWorld-eScan Trojan.Downloader.JQFS
Microsoft TrojanDownloader:Win32/Upatre.A
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM19.1.E54F.Malware.Gen
Rising Trojan.Waski!1.A489 (CLASSIC)
SUPERAntiSpyware Trojan.Agent/Gen-Injector
SentinelOne DFI - Malicious PE
Sophos Troj/Mdrop-FOC
Symantec ML.Attribute.HighConfidence
TotalDefense Win32/Zbot.HPB
Trapmine malicious.high.ml.score
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2004-09-05 11:09:05

PE Imphash

a61ba93a22191636008350381dfd1d6d

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
UPX0 0x00001000 0x00009000 0x00008200 2.8317056699746628
UPX1 0x0000a000 0x00002000 0x00001e00 7.46640452151023
.rsrc 0x0000c000 0x00002000 0x00001800 4.662354603978783
.imports 0x0000e000 0x00001000 0x00000400 3.9901466199707367

Resources

Name Offset Size Language Sub-language File type
RT_BITMAP 0x00007178 0x00000368 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_ICON 0x0000c17c 0x00000ea8 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_GROUP_ICON 0x0000d028 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_VERSION 0x0000d040 0x00000328 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_MANIFEST 0x0000d36c 0x00000193 LANG_NEUTRAL SUBLANG_NEUTRAL None

Imports

Library KERNEL32.DLL:
0x4060f4 GetModuleHandleA
0x4060f8 GetProcAddress
0x4060fc HeapCreate
0x406100 HeapAlloc
0x406104 GetACP
0x406108 ExitProcess
0x40610c FreeLibrary
Library ADVAPI32.dll:
0x40624c RegQueryValueExA
0x406250 RegOpenKeyA
0x406254 GetUserNameA
0x406258 CopySid
0x40625c GetLengthSid
Library GDI32.dll:
0x4062ec IntersectClipRect
0x4062f0 ExcludeClipRect
0x4062f4 UpdateColors
0x4062f8 DeleteObject
0x4062fc TextOutA
0x406300 SetBkColor
0x406304 SetTextColor
0x406308 Rectangle
0x40630c CreateSolidBrush
0x406310 GetStockObject
0x406314 CreateFontIndirectA
0x40631c GetTextMetricsA
0x406320 CreateFontA
Library IMM32.dll:
0x406434 ImmGetContext
Library Msacm32.dll:
0x4064ac acmMetrics
0x4064b0 acmStreamOpen
Library user32.dll:
0x40619c GetMessageA
0x4061a0 DefWindowProcA
0x4061a4 PostQuitMessage
0x4061a8 GetDoubleClickTime
0x4061ac GetQueueStatus
0x4061b0 LoadIconA
0x4061b4 RegisterClassA

L!This program cannot be run in DOS mode.
.imports
N.2N.6
;ZHIQPPZ
_]`a"O
aFpDZO
CreateWindowExA
set waveaudio door open
LoadLibraryExA
user32.dll
LoadCursorA
TranslateMessage
mciSendStringA
Winmm.dll
00000i0H0
000000f000000000V0000+0_00a0K00a0
000000_00'0a0#00a0
00a0+000000/0a00
00a03000000000_0
00_0300_00Y000000000+0_00a0K00a0S00a0#00
00`00^00_000000000<0Y000K00Y000Y000
00K000000+0_00Y000600
000000@0000060
00[00J00_0
0070a0
0000700000000+0_00Y0000
0000000
0000000
0000000
000000Y000000!00
000;00
000H00
000D00
000;00
000B00
000:00
000B00
000B00
0000_00@00@00&0000:0
00Y000Y000000,00
000?00
000H00
000J00
000K00
000700
000B00
000&00
000H00
000E00
000J00
000;00
000900
000J00
0000c000&00K0000060
00Y000y00:0
00Y000000,00
000?00
000H00
000J00
000K00
000700
000B00
000B00
000B00
000E00
000900
0000c000&00K0000060
00Y000y00:0
0000+0_00Y0000
0000000
0000000
0000000
000000Y000000D00
000J00
000:00
000B00
000B00
000:00
000B00
000B00
0000_00@00@00&0000:0
00Y000000(00
000J00
000B00
000;00
000900
000E00
000C00
000F00
000H00
000;00
000I00
000I00
000K00
000<00
000<00
000;00
000H00
0000c000&00K0000060
00c0300)00K000K000K000K000K000+000K0000070
000000+0_00Y000a0200
0000000
0000000
0000000
0000000
0000000
0000000
0000000
0000000
0000000
000000f0_03000000000000000e0
00000000e0
00000000e0
00000000e0
00000000e0
00000000e0
0000@00>000000K00@00000:0
00[00K0000000_0
000K00a0
000000&0e0
00c000
0000+000K000K00(00o0000a0
00c000P0000+000K000K00(00Q0000a0
00c000
0000+000K000K00(0030000a0
00c000K0000+000K000K00(00
0000e0
000K000K000K000K000K000K0000000@00>000000K00@00000:0
000K000K000K000K000c000000000[00J00&00K000K0000000J00_00a0
000Y000Y000a0
00000000+0_00W00000060a0300)00.0000[00_0
00J050@0
0>000000K00@00000:0
00[00K0000a0300)00K00&0070000[00_0
0&00(00000
000F00e0
000K000K000K000H00000K0000000[00J0070a0
00000070000000000+0_00W00000060a0+00a0
000Y000Y000c0
060Y000a0000_0
00c0K000000000^00
00K00a0300c0K00_00000000|0J00)00K0000000[00J00Y000007000000000070000000000+0_00W00000060a0
00_00@00@00)0000:0
00[000Z0U0000_0
00a0+00a000
0000a0
0000a00[00J0'0_000000V0K000300c0100_00'0)00K0000060
00/0[00J0
0a030000_00Y00000W00000V0_00'0)00K0000060
00/0[00J00a030000_00Y0000z07000000000070000000000+0_00W00000060a0+00<0a00a0
000Y00000<0a0
00_0[00000Y000_0k00000a0k00000c00060a0
020000000000_0
0000000a0k00000000
00a030000_0
00a0S00a0K00a0#000z0a0c00000a03000K000K00)000000[00J00Y0000K0070a0
00000070000000000+0_0060a0+00a0P000S00a0K000H00a0 000z0a0+00a0
007000000000070000000+0_00Y00060a0+00<0a00<0
0#000K00a0
000a00
000K00_0+0070a0
00000070000000+0_00Y00060a0+00<0a00<0
0#000K00a0
000a00
000K00W00v0000_0+0070a0
00000070000000+0_00Y0000
000000a0+00a0
000a0.0
0_0300:0w0
0000_0&00:0w00000a0
00Y000a00_0&00a0300
0300_0300a03000300a0!00a0!00'0Y00000'0)00K000K0000000c0*0!00]00/00#00K000000+0_00Y00060a0#00a0+00a0300a00a0K00_0
00Y000
0<0.0<0
0K00Y00000<00000
00000Y00000700000
GetModuleHandleA
GetProcAddress
HeapCreate
HeapAlloc
GetACP
ExitProcess
FreeLibrary
RegQueryValueExA
RegOpenKeyA
GetUserNameA
CopySid
GetLengthSid
IntersectClipRect
ExcludeClipRect
UpdateColors
DeleteObject
TextOutA
SetBkColor
SetTextColor
Rectangle
CreateSolidBrush
GetStockObject
CreateFontIndirectA
GetTextExtentExPointA
GetTextMetricsA
CreateFontA
ImmGetCompositionStringW
ImmSetCompositionFontA
ImmGetContext
ImmSetCompositionWindow
acmMetrics
acmStreamOpen
GetMessageA
DefWindowProcA
PostQuitMessage
GetDoubleClickTime
GetQueueStatus
LoadIconA
RegisterClassA
`.data
.data3
.idata
000A0'
s#w!#0
500000/
_Yuw'Y0Ws1LSk`00^0!K7<I
=wg60%G@
_%$t7I
?JKL2$7B&2$HEJ`L;9
X7cKsto
$LBBE(K29P`g$L2DJ:L2BB
9L2dCECF2$H;I2
5t_3)
2++C07t]
Q7<0OK
0K`_5o2x
aY&i5ugcG0
?#5_;0PD2Q0
!7Lq0Y
0JEi\SW
0qbd3?WA6P)U.3un
=0OnW&70l
)K|'-o-
XwwZ0U
A+pH6?_)
'qSV,<p
<!5d?[w
,;3Mck
YmK&9W#$t_
OK9z;c
kH_PzfAH S
au8Yt]7y
eLUJZ7_~)x
Sm#v7_~F
E6XoFy
oS47~_
woYQ06#IS
={CWphY6
=BhwxD
6a/C62
By$G#E7{d
[]Ew?{pS
$FO0\lHP}
"@'oG)
HPwo"w
w<}"!{wozg
0_RZwac<
-;.>Hzw6:
uw7w7L
O*tSi6
YpqI30HM?
.y6G}o
moiXr?
D8GY5pp!)L
^ia},)"H
&Xa"`W
a(:M4HT^la
(cM4<N^nz4M4
E@d\vV
M[~kwV
R7x6{wa
RL.iAZ%8:Dg{Vsn
#%JTeSr)
8ia|ksw"f
7{]")
>Qg">7
{H2Li}
8'E'BW
7ori1!
DwpJo/j=
DYya<Jn
\f7&+`
sX)Z7 y8
}uU{H.v}
,NwokLZ
8<wwc"pVS
0n{&Z=D
{?E-,[
1o7_{;&j"
B&\Z4z
f.0|+pH%L4C.(
v>q|n]0i
m5[]$ p2)o
O.FG~TeA
GetModuleHandleAPr}+AocAddr
HeapbA.
Exi/+F
fLRRegQue
O]KeypUs
Nam~CopySid
>Inr.ctClipR
UpdIrDe
TextOutiS
EazloS
StkP!Fo7sodir
csA<A,Tomm)mpos]i
Ss-,:1
bb~acm
QQAEpsfD
i!-Doublk
^r[ui*Icm3<
is-a@s
'yS`.a'0B
RvA;p"'
XPTPSWXaD$j
###;KK>
26;2+#####
#######
#####+bEXL
+######+
#####3
######3#
PD[>J22Ib|tLx63
333#3##3#>>
vDDP>2
333333333+ug
DW[[FvV####
333333333#J~~3#5gJIk#
3333333333+g +zT
##++++######
3333333333#J%Tz+3333333######
33333333333+
#33333333######
33333333333@II#33333333######
33333333333@+3333333333#####
333333333@?a
+23333333333####
33@j+233333333333###
j@3333333333333##
+jj23333333333333#
+I@3333333333333
2+$333333333333
al$2$33333333
$$$$233333
$$$$$$$$$$&&&
&&&&$$$$
7:::::::****************ss****@$$$$$
788888881;111n;;;11p;11111111;
))))))
o,,,,,,,L6,6Lr66rq6,,,,,,,E
)f/HHHH/
8(((((,Lx|>>Eq6,(,((,EM&/-999N/
K((((((XmV#R?DlV((((((EMC/N9<<<<<
,444444X|JJVT
DRmXF4444F4VMC-9<UUU
(444444X3?
DPIDP#F04440tM
4000000y2WIWRIuRI
0000050
5y{kkJ0? D~`f9f
0%%%%%%_
3^%%%%%y`f\f#
%%%%%%%%^_a%G_a%%G=%%%%%%^`f\f#
%%%%%%%%%BB%%%BB%GG%BB%GGGGG%G`f
G.......'''''''''''''''''''''.
-----------------d-)/
$$$$$$$$$$$$$$$$$$$$$h
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
ADVAPI32.dll
GDI32.dll
IMM32.dll
KERNEL32.DLL
Msacm32.dll
user32.dll
CopySid
TextOutA
ImmGetContext
ExitProcess
GetProcAddress
LoadLibraryA
VirtualProtect
acmMetrics
LoadIconA
KERNEL32.DLL
GetModuleHandleA
GetProcAddress
HeapCreate
HeapAlloc
GetACP
ExitProcess
FreeLibrary
ADVAPI32.dll
RegQueryValueExA
RegOpenKeyA
GetUserNameA
CopySid
GetLengthSid
GDI32.dll
IntersectClipRect
ExcludeClipRect
UpdateColors
DeleteObject
TextOutA
SetBkColor
SetTextColor
Rectangle
CreateSolidBrush
GetStockObject
CreateFontIndirectA
GetTextExtentExPointA
GetTextMetricsA
CreateFontA
IMM32.dll
ImmGetCompositionStringW
ImmSetCompositionFontA
ImmGetContext
ImmSetCompositionWindow
Msacm32.dll
acmMetrics
acmStreamOpen
user32.dll
GetMessageA
DefWindowProcA
PostQuitMessage
GetDoubleClickTime
GetQueueStatus
LoadIconA
RegisterClassA
VS_VERSION_INFO
StringFileInfo
08000025
Comments
CompanyName
HP Corp
FileDescrsiption
calc.exe
FileVersion
6.3.3.1
InternalName
calc.exe
LegalCopyright
Copyright (C) 2011
LegalTrademarks
OriginalFilename
calc.exe
PrivateBuild
ProductName
calc.exe
ProductVersion
6.3.3.1
SpecialBuild
VarFileInfo
Translation
C:\DOCUME~1\Debbieg\LOCALS~1\Temp\jZip\jZip232DE\jZipC3D8\Xerox_Scan_002_20112013.exe
C:\0f4d3c8013716488a87f6ed97041a4a162fba466a6a99e876ab5ac8c4db8205e
C:\G7yDWg4m.exe
C:\6ea5f32ad2c7098008a3a21cfaa7536f7ebd528f34637b4ef963431bf6239f94
C:\4dbb16a9f2ea1f0f1812f2d39f3a43a60137e485fa2b6c08026676e59239edc6
C:\8326a93fa616011abfa93ce3efcc04d64378b5cd3486610041a8e470411aae05
C:\aEO4lQ9K.exe
C:\N7_ie1x5.exe
C:\3RikCP41.exe
C:\9P47SeyQ.exe
C:\hRTi3VNE.exe
C:\TnHNHnZx.exe
C:\887569828e4fb72823427dbf7390c8ecd8373d748f29d8c059179aa9b9c046fe
C:\8b9b6ad849b7d2def0374be0a338be756e43eeefa1d4fc3b7f41ea5151d0b51d
C:\DBecOMUS.exe
C:\j88wTmmw.exe
C:\WaFObEk9.exe
C:\Y1Svx6cI.exe
C:\zGgGWBSI.exe
C:\zI2mBRwM.exe
C:\2OH70Ney.exe
C:\zLR4mrIW.exe
C:\vOQuptpz.exe
C:\HSOYBf8u.exe
C:\q1ipvGEL.exe
C:\056f3c0053c77244d24f6682237dadf3ec89d456c02d2207b9a66916b3e4f9a3
C:\39c23961e5722161ece3b6d13a43cc61d8ef15de413d09c5db1169e2fc1b4227
C:\7e373a1ac797bc15dc127f0bf74efa3882885bb2859d37954dda1039f884f93e
C:\3f7544bcfd5b8607dd8bdda5b355998b3d60fb00fdfe5a43e94230d627e68039
C:\bf990a7fccc600fb267a2c8810ff22da0a599ce8693788f3afed8db519ba8db5
C:\uN4UShDC.exe
C:\h19Fft78.exe
C:\2EsWwU5x.exe
C:\h5TLfSky.exe
C:\WQOvJqw4.exe
C:\m9LcHBIS.exe
C:\KRRhHamy.exe
C:\4D86FNGj.exe
C:\TSX4beaM.exe
C:\yqKGsgqX.exe
C:\vF_iRPSz.exe
C:\_yHwTquR.exe
C:\22BZh8U_.exe
C:\9LDq4bnn.exe
C:\NFQKFnTn.exe
C:\2UDQHxpb.exe
C:\LW2kNyAI.exe
C:\A6D1XtLq.exe
C:\KLzyYNcC.exe
C:\TsdHiIgn.exe
C:\BPRizkr3.exe
C:\MmkMgr0X.exe
C:\AyvGZ6Hu.exe
C:\39eNsgUg.exe
C:\jMdTdMrO.exe
C:\GTjZP_Jv.exe
C:\D3YeqdNG.exe
C:\9Nt4m1fr.exe
C:\25bWnRZI.exe
C:\tGB55SdN.exe
C:\8KWoctQg.exe
C:\ZxUyGj9t.exe
C:\B4MUap0O.exe
C:\hN8sREJF.exe
C:\tZEDxuXh.exe
C:\B3jkzuSf.exe
C:\czeN34hs.exe
C:\mjZQ6cii.exe
C:\TQZaHYC5.exe
C:\rYIaKH3G.exe
C:\sJ5WCXYG.exe
C:\I1_vaID1.exe
C:\H3oUwfUj.exe
C:\0gj48HS8.exe
C:\5mf43eGj.exe
C:\pwu9C88n.exe
C:\Sas5XOkJ.exe
C:\h5Kx1NKR.exe
C:\MHLQnWwb.exe
C:\Nnv5Besp.exe
C:\WgJCpEoR.exe
C:\fKb6RXwe.exe
C:\asWCriFJ.exe
C:\GO3BDvfr.exe
C:\rvxDQeVf.exe
C:\3d9187170e0edb1d63903eacc659ac557914e9dc36e65bb8933fd8929891af20
C:\a7f1a810f32ff43f6b6bdd35de8d8df8538558e27717a0abb841417737c852a0
C:\30495e2c39f168667d4f467af930876d71d8c2e430814844af340c57e4c7bb5a
C:\QSWnsYOD.exe
C:\t4kcvx\kv4fui.exe
C:\zkg9sv\2p6xy4.exe
C:\f3vyrQ74.exe
C:\0db098ec5b52cf086cd252a8ae7100892f7d18c2b3e023f14454f4032af7ac1a
C:\18d7593b62da81a2c6824b8d8249ee7932c9240f085daee36064abb1e34cf746
C:\244b40d379f9843b17fc8c9809525bc5596389aa81bf4f67388f0fe913d9428f
C:\Users\Lisa\Desktop\M5fOQrKu.exe
C:\jvqUMBO1.exe
C:\6e02ecdc95c942f32dae0596bc4b322ad83a7b0dc0de84d81880e74c6937666c
C:\49477299feee6361d27a6423091cc14e22618140e3892ea17de4138d90b831c0
C:\Downloads\14cbdc6ad94c6d9c72fa71fb8ae8e3c3.exe
C:\YqIxshuo.exe
C:\dc0d341866829e582f35e1b402f6554b5ae2f44f48fdd29d5e826ab784acb853
C:\Documents and Settings\luser\Desktop\ike80hmp.exe
C:\b74dc53a6dd0892390382ba3c6940c9a9ef23d703b9efcff993c4fe5eec94ed4
C:\OBOurF_Y.exe
C:\Users\Lisa\Desktop\CuAa96tj.exe
C:\e7NLFHzD.exe
C:\Users\Lisa\Desktop\nnduXCUY.exe
C:\Ke6dqOQo.exe
C:\Users\Lisa\Desktop\s17Lw9zf.exe
C:\p_8sRW7i.exe
C:\d2ac42b5160c9088f9fe3efd081838568047c40e751d8b35f762fa3b81898924
C:\Documents and Settings\Administrator\Desktop\usXDxkju.exe
C:\4bcc31fc5c7a449931270edeead814d26549d89759fd7dd46b291cc3ceaa3c41
C:\BdJ2UF7d.exe
C:\8754e912af1e8d2caa6c6cb6764c6750ca0578cffa323df37a4505c2ab9f6fa2
C:\30d6c90a00c0981162cc52aa9e382d91df2e44fef0e5334e007fc576191c571a
C:\Documents and Settings\Administrator\Desktop\5YtK5NYy.exe
C:\qKSWLQah.exe
C:\Users\Lisa\Desktop\AvvvgdPY.exe
C:\SeGVWzAe.exe
C:\bbadf7474fe48ff6a12a094b970d772cbfdc90e9df7042f3e3ba1416b538dd86
c:\task\A9A010A2CD751C87AAF62E23987F2008.exe
C:\rxX5c7k0.exe
C:\6e86d6e6292a76a5a495fec19a55392b91cfbeacd888072c8b8ed2024357a622
C:\2531c45e7870e3f13d8969204db0fe2fb7066e94d717e6828c24c17c36b987d2
C:\vbC1yjPi.exe
C:\Users\admin\Downloads\sample.exe
C:\KlKuFe_s.exe
C:\Users\admin\Downloads\sample.exe
C:\Users\admin\Downloads\factura.exe
C:\Users\admin\Downloads\sample.exe
C:\Users\admin\Downloads\sample.exe
C:\75ebf684bc69996b2819b9bfff62602d6e49ba2259d00f7fb420d84ba1aa3100
C:\u80v6UG1.exe
c:\VID690551486.exe
C:\453882b75c48f01937b0da73ac490569aadd973a73fa6ad8806defd23daf3011
C:\gPVkc2OG.exe
C:\cd386a82d06abb1e4722992cf9fdcb0e0639c883038bb1dcbc2028d2ae915212
C:\a63c42ef1bad236577c6568e6a65544c59d65fa262e48dd68e0a698e2bebe308
C:\5e94fb8bf0f5e74d5fb908e0f1287f329b53c610cd0bfdf19c8b26fcdbc0fc13
C:\85baad524883a2cbe936c8744bbaa00d51125b117e402f9a714a848b90d1bc12
C:\bece1ad164def8b026f10e1b7f8a0df573a655e1f8bb781d0686f8481bac3fff
C:\Users\admin\Downloads\invoice.exe
C:\06629daa55072e1f12a67f86fe3bbb02a25d367ade9064067d810b0d19577dc9
C:\_JdVXMaz.exe
C:\Users\admin\Downloads\factura.exe
C:\865b04ad0f04512ace7dc07885c7618ed9335ca0427272154a8ae83e99e7b940
C:\c0c95eb682bc767f8b18c8819975ed490eb6a3e392fa64143883fac3f430e41c

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255
dns.msftncsi.com

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 61714 8.8.8.8 53
192.168.56.101 56933 8.8.8.8 53
192.168.56.101 138 192.168.56.255 138
192.168.56.101 58485 114.114.114.114 53
192.168.56.101 58485 8.8.8.8 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.