2.7
中危

047886cdd58a3032aeac72c457bf6707a819967a5ff15acb53dd0c36e2b8f205

047886cdd58a3032aeac72c457bf6707a819967a5ff15acb53dd0c36e2b8f205.exe

分析耗时

133s

最近分析

387天前

文件大小

41.8KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER UPATRE
鹰眼引擎
DACN 0.14
FACILE 1.00
IMCLNet 0.59
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Trojan-gen 20200328 18.4.3895.0
Baidu Win32.Trojan-Downloader.Small.c 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200328 2013.8.14.323
McAfee Downloader-FUD 20200326 6.0.6.653
Tencent Malware.Win32.Gencirc.10b8a072 20200328 1.0.0.1
静态指标
检查进程是否被调试器调试 (2 个事件)
Time & API Arguments Status Return Repeated
1727545294.4065
IsDebuggerPresent
failed 0 0
1727545294.890875
IsDebuggerPresent
failed 0 0
行为判定
动态指标
分配可读-可写-可执行内存(通常用于自解压) (4 个事件)
Time & API Arguments Status Return Repeated
1727545294.4995
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x01db0000
length: 24576
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 3028
success 0 0
1727545294.5775
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00403000
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 3028
success 0 0
1727545294.952875
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x005c0000
length: 24576
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 628
success 0 0
1727545294.984875
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00403000
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 628
success 0 0
在文件系统上创建可执行文件 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\gewos.exe
投放一个二进制文件并执行它 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\gewos.exe
将可执行文件投放到用户的 AppData 文件夹 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\gewos.exe
一个进程创建了一个隐藏窗口 (1 个事件)
Time & API Arguments Status Return Repeated
1727545294.7025
ShellExecuteExW
filepath: C:\Users\Administrator\AppData\Local\Temp\gewos.exe
filepath_r: C:\Users\ADMINI~1\AppData\Local\Temp\gewos.exe
parameters:
show_type: 0
success 1 0
将读写内存保护更改为可读执行(可能是为了避免在同时设置所有 RWX 标志时被检测) (8 个事件)
Time & API Arguments Status Return Repeated
1727545294.5775
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00401000
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
process_identifier: 3028
success 0 0
1727545294.5775
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00402000
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
process_identifier: 3028
success 0 0
1727545294.5775
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00404000
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
process_identifier: 3028
success 0 0
1727545294.5775
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00405000
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
process_identifier: 3028
success 0 0
1727545294.984875
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00401000
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
process_identifier: 628
success 0 0
1727545294.984875
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00402000
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
process_identifier: 628
success 0 0
1727545294.984875
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00404000
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
process_identifier: 628
success 0 0
1727545294.984875
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00405000
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
process_identifier: 628
success 0 0
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
连接到不再响应请求的 IP 地址(合法服务通常会保持运行) (1 个事件)
dead_host 35.212.119.5:443
文件已被 VirusTotal 上 63 个反病毒引擎识别为恶意 (50 out of 63 个事件)
ALYac Trojan.GenericKD.1325139
APEX Malicious
AVG Win32:Trojan-gen
Acronis suspicious
Ad-Aware Trojan.GenericKD.1325139
AhnLab-V3 Trojan/Win32.Bublik.R84216
Antiy-AVL Trojan/Win32.Bublik
Arcabit Trojan.Generic.D143853
Avast Win32:Trojan-gen
Avira TR/Agent.ZRFI
Baidu Win32.Trojan-Downloader.Small.c
BitDefender Trojan.GenericKD.1325139
BitDefenderTheta AI:Packer.F12A153020
Bkav W32.DownloadUpatre.Trojan
CAT-QuickHeal Downloader.Upatre.27317
ClamAV Win.Trojan.Upatre-3341
Comodo TrojWare.Win32.TrojanDownloader.Upatre.MAUA@5rueuc
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.da5d66
Cylance Unsafe
Cyren W32/Trojan.QDER-6676
DrWeb Trojan.DownLoad3.28161
ESET-NOD32 Win32/TrojanDownloader.Small.AAB
Emsisoft Trojan.GenericKD.1325139 (B)
Endgame malicious (high confidence)
F-Prot W32/Trojan3.GDT
F-Secure Trojan.TR/Agent.ZRFI
FireEye Generic.mg.b77da5dda5d66220
Fortinet W32/Agent.ABI!tr
GData Trojan.GenericKD.1325139
Ikarus Backdoor.Win32.Androm
Invincea heuristic
Jiangmin Trojan/Bublik.gbn
K7AntiVirus Trojan ( 0001140e1 )
K7GW Trojan ( 0001140e1 )
Kaspersky HEUR:Trojan.Win32.Generic
MAX malware (ai score=88)
MaxSecure Trojan.Upatre.Gen
McAfee Downloader-FUD
McAfee-GW-Edition BehavesLike.Win32.Downloader.pm
MicroWorld-eScan Trojan.GenericKD.1325139
Microsoft TrojanDownloader:Win32/Upatre.A
NANO-Antivirus Trojan.Win32.DownLoad3.cjebpc
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM20.1.2E61.Malware.Gen
Rising Downloader.Small!8.B41 (TFE:dGZlOgIZhyqGyFCLPw)
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos Troj/Zbot-GOA
Symantec Downloader.Upatre
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2012-04-04 22:40:43

PE Imphash

a2bfa209044e11b72a41f731968fdff2

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00002a34 0x00002c00 6.120370252187977
.data 0x00004000 0x00000d2c 0x00000e00 4.107523237538056
.rsrc 0x00005000 0x00002840 0x00002a00 5.040049616306608

Resources

Name Offset Size Language Sub-language File type
RT_BITMAP 0x00007780 0x000000ba LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_BITMAP 0x00007780 0x000000ba LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_BITMAP 0x00007780 0x000000ba LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_BITMAP 0x00007780 0x000000ba LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_BITMAP 0x00007780 0x000000ba LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_BITMAP 0x00007780 0x000000ba LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_ICON 0x00005618 0x00001c10 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_MENU 0x00007240 0x000000d8 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_DIALOG 0x00007318 0x000000e8 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_GROUP_ICON 0x00007228 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_VERSION 0x00005480 0x00000198 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_MANIFEST 0x00005320 0x0000015a LANG_ENGLISH SUBLANG_ENGLISH_US None

Imports

Library user32.dll:
0x404030 BeginPaint
0x404034 DispatchMessageA
0x404038 DrawTextA
0x40403c EndPaint
0x404040 TranslateMessage
0x404044 PostQuitMessage
0x404048 ShowWindow
0x40404c UpdateWindow
0x404050 CreateWindowExA
0x404054 RegisterClassExA
0x404058 DefWindowProcA
0x40405c MessageBoxA
0x404060 SendMessageA
0x404064 DestroyWindow
0x404068 LoadIconA
0x40406c LoadCursorA
0x404070 SetWindowPos
0x404074 GetWindowRect
0x404078 GetMessageA
0x40407c DialogBoxParamA
Library kernel32.dll:
0x404008 GetLastError
0x40400c lstrcpyA
0x404010 GetModuleHandleA
0x404014 GetCommandLineA
0x40401c CloseHandle
0x404020 GetCurrentProcessId
0x404024 GetCurrentProcess
0x404028 CreateFileA
Library gdi32.dll:
0x404000 CreateFontIndirectA

L!This program cannot be run in DOS mode.
`.data
@@ 31c
@Lmcnu
EcloP3-l
x@tci<
lWh2-e
+u]UuM
GFu;uu_+
u!M9MEvh
E;Es%N
h%`:@
dTsa*|
j8~#e
@hV-ieX
@wcfOak
hJxi@
*h^Rh@
51h%pG
hbu\
Bklheh
hzi*zs
e3Rf F
h*d}r>f:
2lcl<
moEA02x
mE.|1e
ur j`1Zd
@td`'0Xe
FGIu5NA@
FFFF=F@
@;sy;s
FGIu=F@
\Nouh@0/I
Ndju@}
` t0W
FG3@_^]
(onEu
@XDoD G+
@WEASn% EVPP
/c^xd<e
'S'oMu8/
@%Wr$uT)fe
8|nQ"jU
EM+PEM+X+Pj
GV+=F@
QRRhF@
u~BA@
GGGGBBBBIujj
S,tCCjp!ei
_Oh:iS
EP$9,s'"L
j9e2e"P
H"| Ve
hd@$"e
(.otCE
) aur#
lul vee
eeelt#PrbLen
rpC+"B
l#;; e
#sTiiMfr!rr)
tepV_a
lotader
Consolas
state.ini
static
kilasdg
button
asdlkjalsdj ai8
DialogBoxParamA
SetWindowPos
GetWindowRect
LoadCursorA
LoadIconA
DestroyWindow
SendMessageA
MessageBoxA
DefWindowProcA
RegisterClassExA
CreateWindowExA
TranslateMessage
BeginPaint
DispatchMessageA
DrawTextA
EndPaint
GetMessageA
PostQuitMessage
ShowWindow
UpdateWindow
user32.dll
GetCurrentProcess
GetCurrentProcessId
CloseHandle
GetCurrentDirectoryA
GetCommandLineA
GetModuleHandleA
lstrcpyA
GetLastError
CreateFileA
kernel32.dll
CreateFontIndirectA
gdi32.dll
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
xxxyyy
---------F:--SH------------*
. . . . . . . . F:. F:yq. . ,
- . . . . . . . ,
. 0!0!0!0!0!0!0!0!~t0!yq1"0!0!dX0!0!0!0!0!0!0!.
0!1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"1"0!
2#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#3#2#
4$I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;I;4$
"""""""
"""#"""
"""DB""
"""BB""
""$BD""
""$"$""
""$"$""
"""""""
"""""""
"""""""
#33""""
"""""""
DDDDDDD
F"RRR%d
FVfffRd
F&DDD%d
DDFfdDD
DDDDDDD
""""""""""!
""""""
""""!!
""""" @"""""""2""""""$D""""""$$""""""D$B"""""B"B"""""B"B"""""B"B""""""""""
"""""""""""""""""""
22"""#
3""""#332""""""""""""
IDR_VERSION1
VS_VERSION_INFO
FileInfo
FFFF04E3
FileVersion
2.0.1.7
ProductVersion
2.0.1.0
CompanyName
Sanny Ltd.
ProductName
LookFor
VFileInfo
Translation
&About
About
MS Sans Serif
C:\Users\hossam\AppData\Local\Temp\Rar$EXa0.639\VAT_08102013.exe
C:\OwUl3K7y.exe
C:\7dSAlN7y.exe
C:\ldZo36mQ.exe
C:\_8VYhapr.exe
C:\lFjVSRkA.exe
C:\HSrisgRC.exe
C:\q4slo0fL.exe
C:\zQTuHIYg.exe
C:\BlLp66UV.exe
C:\ac71b03106a4bf8b44b971d4f26a100cc3649a38d19fcce07757ee212082b5e2
C:\iiTFJbWP.exe
C:\jb0qCU6n.exe
C:\PuhK9YT2.exe
C:\OXza7aqC.exe
C:\o3qwGeJl.exe
C:\yoNBGmKP.exe
C:\c32bfa92e82338e2d19e943029696ec3a367307c52990253895a77c482089b2c
C:\XSElVo5N.exe
C:\1R1dOdHI.exe
C:\dzvWUn6b.exe
C:\6CaADazd.exe
C:\qZrrw4sO.exe
C:\oJcnNwoE.exe
C:\26331d7be84cb3e37a7235e9d4324a80a343f76063cb489e2ed011e692dce8f9
C:\bc710dc4a1403fa1184900f219415b2a866dbd93c37614ebca5093ea5ca07be5
C:\1701e100263038ece3e77c2aed37083af2842e6a595ff68763b94b208d8e9b7c
C:\75a2b05953565d4ba69f9f4764046b73ebbbf8c4bf1623f64554ff358925ad32
C:\NNUIYnlK.exe
C:\1pjnm6zB.exe
C:\rC7Hh4jZ.exe
C:\SEIL8Jdj.exe
C:\a9CYN4UW.exe
C:\dVJHeIu_.exe
C:\YNCDaNY0.exe
C:\usRrqKTt.exe
C:\ZQ1aKeu5.exe
C:\XiE2Pr93.exe
C:\ALIr80Ig.exe
C:\0e0208e27829af16f2d67961683b58b52509cadc7ef51edd074b45159577720f
C:\1fd7fa2904c5de24f1023f94e3a508f60bc8ac5753530ace151139c7f5e9c7cb
C:\kiDIQQEK.exe
C:\bh2kWRZD.exe
C:\2ofbvXzM.exe
C:\Ztlp16DJ.exe
C:\9wZEtV3S.exe
C:\ZDBffs3V.exe
C:\_GPliGJU.exe
C:\eadb888f3eae4cfe233ce8417bcc808448a91127f37122803a8bf677d547ac5d
C:\539418b32214970848f47eab32fd2fd6c1e381e4671428b2fca20318b70a0e24
C:\d200fff96348d7b936e23b79d8a6dad1bbe47bb554e27823ee785edc4b6723ef
C:\82e6e7c17e01c5fff9c59051b8d3b9fa9a8b015dcf7862e465ff223de7602830
C:\Q0_cm819.exe
C:\L1ZjRytk.exe
C:\n4reSWIQ.exe
C:\8c37cd65f0f05bc7a947fce413ea2b448d0699dfe58ebd5940a78367819532b6
C:\69040cf8972a6331c208514309d632b3c2af753eb7286c2ca67df1e2ba98c98b
C:\45f18588c41b1ac5c9e2cf962484a7e748f4cef705cae9b1e65ca0218617c896
C:\m9rT1P4i.exe
C:\pldbavKY.exe
C:\WGI8kKXe.exe
C:\CFgq_VJJ.exe
C:\coFXHyeJ.exe
C:\88dS28W6.exe
C:\UZULpTXt.exe
C:\3NLQMCta.exe
C:\qVzXepdU.exe
C:\LlxSh0Rv.exe
C:\bMuwCjoS.exe
C:\sVhJQxLT.exe
C:\zz_RlXHE.exe
C:\2ddWgei5.exe
C:\1dSiUJhT.exe
C:\_kTruNo8.exe
C:\lvPX5aPu.exe
C:\ZtKRq11X.exe
C:\ya8rwTLx.exe
C:\WuHlI9CM.exe
C:\7c43bcf24eda2757cd2850182683bb81f2b8c0ea0ed7d48b1b84a90f1da138d9
C:\e36596f369c5c09339eaa38c12dd0d6267113ea597028b0a904946a6e2134748
C:\a870fea488b426fb9d781f09a90ed4dbc95b9d52b5d5ba1d68d74680aaacfccf
C:\d76e0b631f097d12639a704587067450f0a0aaf18b70be0783805e4847bfb8aa
C:\TwvcdHMY.exe
C:\ywaPXOvd.exe
C:\5trqckZx.exe
C:\16df0901a095374990e9e1f1f6cd022582fc1335a48ace3ca2dcb49d6c34f217
C:\05ad441e27d18b3f6052cb474599f48abb05537bba869b75525f53f6d0411eed
C:\61594b7b307522c41823ac9e236c52511e6660b20c27203cfd1ec5a389e45998
C:\6baafa3e7016a8b9fedf9d88e570bce878839bb0dd027c8ad8d5bfb844212367
C:\apR0nTnz.exe
C:\VID659819469.exe
C:\f37fb0680cca5a306d30d95ac04c0629cef8075c5c1faaa10e1c2edb27695d14
C:\818f92f18bf06d2a7cbdea64a1390f8f4326e007065ba56a98d639de2cc3d172
C:\afb724b71f95c85d4a94c6a53fd63e0f5a05306b5b0d5b0766422b36432ca913
C:\VA1QsmoL.exe
C:\91ff981b557fc3ec5a4c8065d55b02586040f7692387f634c1bf391002abd253
C:\PflMuDYs.exe
C:\7d00729b571c640db4e8e1ec85b2b7c9fbbbc54c892e2a71085521984ca2f0d0
C:\e334359fc7ce42bd75591982c4c1b2ba3d8b8bfa852603ef4e7deb749282800d
C:\7074b256e6577795ff8adedcd3416f6ef942af790b1dbffd2588af016ef259bd
C:\6A8s77wv.exe
C:\fa5b1987d9f9bc8794805382c5fadd6c925b0101dcd7a2b396ce4b1fec891acd
C:\bcbcdf068343474e72e7e52b34e5fcc276bba001575d8f8fa23416fd2eda19d1
C:\178fff0116a716f1041a2037b5f595ba8c39a4cee7a4833d1b6746e4de0dcaa5
C:\uAfbJRjQ.exe
C:\961bf2e7720137b5b2a5b25f2c3e501519205d86dcea7003b71d8218a2a20c4e
C:\Users\Virtual\AppData\Local\Temp\4a19f330e4619f8a0f48ac4d178a9f9d670f7f90f1bab3dcdf2f9a9ec2944412.exe
C:\dWwJrAMC.exe
C:\812611661da23b24ce6727643397e2db6ed1dcec1afbeaaba27e01293e227d5e
C:\xC0QErkf.exe
C:\Users\Joe Cage\Desktop\mdhmwapHoe.exe
C:\c0e213eb94f7be3b2a514f2842a4543c82b25c05d484975a8dea24a2b9d10f0d
C:\Users\admin\Downloads\gewos.exe
C:\ffc2f3040ceae2560b335af0115be740ada63d446f906d2316097782117da1bd
C:\Users\admin\Downloads\gewos.exe
C:\FizrYaQb.exe
C:\62d13719c4050e7655c6779c59898329d8044cfadbbd4bfc320f1c6ad45b7532
C:\Users\admin\Downloads\gewos.exe
C:\f00fbc6084db8057ea6c6e2d80b72c0d2c89ecef39d561da67ad3caa6c9d3e9a
C:\Users\admin\Downloads\gewos.exe
C:\144f5faf8bc97726eb9d2d8a4e04c0a162b90a346e35289aae5d9aea4ea9e6b4
C:\42e03b08b83a6fa5ba4e934085cabb0424c0b4ba3317ce00a9755e6ad74032e8
C:\d866f5431462fb6ecd91ddda8ce9f81ec77cbcfa63d05f81e63f8b75fcace7d2
C:\Users\admin\Downloads\gewos.exe
C:\GRYYj079.exe
C:\cd53f973139ec39d09c380d3a4d511978834e05f59b6d6b572a31e6924829f2a
C:\f976101cc6fdd620228f87f3498c2431a03295d753bd77ecb6cfb6bedccf2600
C:\Users\admin\Downloads\gewos.exe
C:\vFNpXy86.exe
C:\Users\admin\Downloads\b449bbe335525efb4f7b67fa0f3eaf26.exe
C:\zdt24bIJ.exe
C:\0117a4f8bf857b8bfb2e8a776c3f971cc3431f72a4f75b6c221324316ace4d54
C:\5bc2b8528022faace172f1933291f0e8448d76656a9e58912cbbc922b7e1ee8d
C:\Users\admin\Downloads\gewos.exe
C:\ad08992989b3f714d5227f0bff4a9df911e791369cc5a34fb233c82911c9780a
C:\1bdd09f6da70be9f727a697b5b84de0732eb0c56d3d6203921969413bba8b34c
C:\f3195f23a64721561484cc623dd9e393e6be43485d0ce8435536aa521a364cc7
C:\9b34bac17bba839e74dd37795d753492433595250dea2642c22980555f1cb239
C:\Users\admin\Downloads\gewos.exe
C:\51b26599e690648051545726fba662072cd4a4f8712489b90882d9a883264674
C:\358197e8c3863a7f915af5928be7c42ed81a9a32e555021754f5206bc237d944
C:\ff059d4940cb89a1bccb808c1dc3a7ce2ec521f3c1ec53a6db46642b3c7dd3b9
C:\190b0b93a3e64ef4e01632a8ae2acae6da089c58e3fbb10dec191cf577bd6cd0
C:\bcc7e9bfca1213893512ee769b671a2430718c17a2d30f3de24607d50e568442
C:\Users\admin\Downloads\gewos.exe
C:\185f808e72fe8888183e3e48ee71afd62804951276eb1ba97fd6201cee277180
C:\caed12a9ba6322dcc12e404304c8a8ad8097bbab36d9d414a9266dd4ad57804d
C:\Users\admin\Downloads\gewos.exe
C:\1f3e0f2cd97cc79d8399447d62497f1c2ff400ce3baf4ea5f6d8717d9fd9429c
C:\2f1bc1f4a9d16a43197cf7385150ef511ca5da985e8fedf33a009ee9ccec6539
C:\70861f0f2fd1839ed9ba657e38d558622959ee31f7bba1e363f13c5fe8c50b93
C:\bd1f7cbbfb64fa9e517b71122807b2b2f9a0cd56de50838534418121291bb0eb
C:\Users\admin\Downloads\gewos.exe
C:\745d657ae6c6604aaeeb93d4dbb296914583c50147ab624a6fe47e54fd469d53
C:\21dac620ddf44141a6d136ac8e54e7ed603f8ee0ba33ecfe6c3f08e35218de14
C:\Users\admin\Downloads\gewos.exe
C:\a1fdd3801fc5db4b9b2d9ce607b33ccbf16c6e058709df948c1c343778102abe
C:\cbd1102f017722c42985d67ca857eb593e8494f6c3cf7be608dadb59c3d1dd27
C:\e029c324dadd9d3909a788f5c1102013569c6517f54f83d6b939fde7a1e7bcff
C:\e5645f43db88ac0a797131ddb2c0d2c76b3438b511a853b0ff9eb235a56fa9f8
C:\a27fa7d63354b33df3b5e5c271bbc5660c2ee0df46cb5e76f841a57e9cd91fae
C:\4a697673a78233c15b309cf059747b979182da051d2c4affecc14eb24874e4a3
C:\Users\admin\Downloads\gewos.exe
C:\tYIoRj06.exe
C:\Users\admin\Downloads\a372d53d725e95b05835356ce44ab5f6.exe
C:\ead6fc24c0916d0636e3599b8d14cf521bb3a5794ce47769f67811ce2f80bb97
C:\VWczfs5n.exe
C:\Users\admin\Downloads\da6668824654a91b8cee52e0878dc991.virus.exe
C:\b50d6bc42b24073577472424894f0386af1cca6b4629d95581c2fe528fc6da4b
C:\TUmPNINe.exe
C:\Users\win7user\a9a5f7beba7f3c482c11d9c71c89cb22cc4b8c1885c8cf7377f7e882f4d55892.exe
C:\a20c2dc6cca1487c3f41f1a42dccbcd3b45e15815333c31a82b970bf2a01dad5
C:\Users\Petra\AppData\Local\Temp\gewos.pe32
C:\fc26905ecb35b59e4382c976e7062239d09ebf3f63de4f6ce13e4d00e5e2324e
c:\task\C8A30773E898431C0C7FA71AE03F73F1.exe
C:\Users\admin\Downloads\7c445ebd44ab3b822fa662b7b571f616.virus.exe
C:\614e15d8e01788d49e6a31a49f9bb54c74c780ea256f6591b95169a5fdb017a1
C:\4017c8fe47ae46a109c0921a00cdacabb7ab6f8dedddd2e26c3612bcf8205616
C:\Users\RA491~1.VUL\AppData\Local\Temp\29c540d3d1a728cb845b7ca03f960248.exe
C:\Users\admin\Downloads\gewos.exe
C:\Users\Petra\AppData\Local\Temp\gewos.pe32
C:\Users\admin\Downloads\4e7bb493ace69b6d_gewos.exe
C:\Users\admin\Downloads\446687674cc86102547da18ec29910f397cc40b36f8386e2c49c51c579b2388d.exe
c:\task\53ECB8CA49A4EFDFF370F0EDEDEC2CE5.exe
C:\LJZLmSPS.exe
C:\0adbcd12ea87a796160b7e281b97611803cc7bba8b4d6ef4f9e7de15cfeba4b4

Process Tree


047886cdd58a3032aeac72c457bf6707a819967a5ff15acb53dd0c36e2b8f205.exe, PID: 3028, Parent PID: 2600

default registry file network process services synchronisation iexplore office pdf

gewos.exe, PID: 628, Parent PID: 3028

default registry file network process services synchronisation iexplore office pdf

TCP

Source Source Port Destination Destination Port
192.168.56.101 49164 35.212.119.5 nasap.net 443
192.168.56.101 49165 35.212.119.5 nasap.net 443
192.168.56.101 49166 35.212.119.5 nasap.net 443
192.168.56.101 49168 35.212.119.5 nasap.net 443
192.168.56.101 49169 35.212.119.5 nasap.net 443
192.168.56.101 49170 35.212.119.5 nasap.net 443
192.168.56.101 49172 35.212.119.5 nasap.net 443
192.168.56.101 49173 35.212.119.5 nasap.net 443
192.168.56.101 49174 35.212.119.5 nasap.net 443
192.168.56.101 49176 35.212.119.5 nasap.net 443
192.168.56.101 49177 35.212.119.5 nasap.net 443
192.168.56.101 49178 35.212.119.5 nasap.net 443
192.168.56.101 49180 35.212.119.5 nasap.net 443
192.168.56.101 49181 35.212.119.5 nasap.net 443
192.168.56.101 49182 35.212.119.5 nasap.net 443
192.168.56.101 49184 35.212.119.5 nasap.net 443
192.168.56.101 49185 35.212.119.5 nasap.net 443
192.168.56.101 49186 35.212.119.5 nasap.net 443
192.168.56.101 49188 35.212.119.5 nasap.net 443
192.168.56.101 49189 35.212.119.5 nasap.net 443
192.168.56.101 49190 35.212.119.5 nasap.net 443
192.168.56.101 49192 35.212.119.5 nasap.net 443
192.168.56.101 49193 35.212.119.5 nasap.net 443
192.168.56.101 49194 35.212.119.5 nasap.net 443
192.168.56.101 49196 35.212.119.5 nasap.net 443
192.168.56.101 49197 35.212.119.5 nasap.net 443
192.168.56.101 49198 35.212.119.5 nasap.net 443
192.168.56.101 49200 35.212.119.5 nasap.net 443
192.168.56.101 49201 35.212.119.5 nasap.net 443
192.168.56.101 49202 35.212.119.5 nasap.net 443
192.168.56.101 49204 35.212.119.5 nasap.net 443
192.168.56.101 49205 35.212.119.5 nasap.net 443
192.168.56.101 49206 35.212.119.5 nasap.net 443
192.168.56.101 49208 35.212.119.5 nasap.net 443
192.168.56.101 49209 35.212.119.5 nasap.net 443
192.168.56.101 49210 35.212.119.5 nasap.net 443
192.168.56.101 49212 35.212.119.5 nasap.net 443
192.168.56.101 49213 35.212.119.5 nasap.net 443
192.168.56.101 49214 35.212.119.5 nasap.net 443
192.168.56.101 49216 35.212.119.5 nasap.net 443
192.168.56.101 49217 35.212.119.5 nasap.net 443
192.168.56.101 49218 35.212.119.5 nasap.net 443
192.168.56.101 49220 35.212.119.5 nasap.net 443
192.168.56.101 49221 35.212.119.5 nasap.net 443
192.168.56.101 49222 35.212.119.5 nasap.net 443
192.168.56.101 49224 35.212.119.5 nasap.net 443
192.168.56.101 49225 35.212.119.5 nasap.net 443
192.168.56.101 49226 35.212.119.5 nasap.net 443
192.168.56.101 49228 35.212.119.5 nasap.net 443
192.168.56.101 49229 35.212.119.5 nasap.net 443
192.168.56.101 49230 35.212.119.5 nasap.net 443
192.168.56.101 49232 35.212.119.5 nasap.net 443
192.168.56.101 49233 35.212.119.5 nasap.net 443
192.168.56.101 49234 35.212.119.5 nasap.net 443
192.168.56.101 49236 35.212.119.5 nasap.net 443
192.168.56.101 49237 35.212.119.5 nasap.net 443
192.168.56.101 49238 35.212.119.5 nasap.net 443
192.168.56.101 49240 35.212.119.5 nasap.net 443
192.168.56.101 49241 35.212.119.5 nasap.net 443
192.168.56.101 49242 35.212.119.5 nasap.net 443
192.168.56.101 49244 35.212.119.5 nasap.net 443
192.168.56.101 49245 35.212.119.5 nasap.net 443
192.168.56.101 49246 35.212.119.5 nasap.net 443
192.168.56.101 49248 35.212.119.5 nasap.net 443
192.168.56.101 49249 35.212.119.5 nasap.net 443
192.168.56.101 49250 35.212.119.5 nasap.net 443
192.168.56.101 49252 35.212.119.5 nasap.net 443
192.168.56.101 49253 35.212.119.5 nasap.net 443
192.168.56.101 49254 35.212.119.5 nasap.net 443
192.168.56.101 49256 35.212.119.5 nasap.net 443
192.168.56.101 49257 35.212.119.5 nasap.net 443
192.168.56.101 49258 35.212.119.5 nasap.net 443
192.168.56.101 49260 35.212.119.5 nasap.net 443
192.168.56.101 49261 35.212.119.5 nasap.net 443
192.168.56.101 49262 35.212.119.5 nasap.net 443
192.168.56.101 49264 35.212.119.5 nasap.net 443
192.168.56.101 49265 35.212.119.5 nasap.net 443
192.168.56.101 49266 35.212.119.5 nasap.net 443
192.168.56.101 49268 35.212.119.5 nasap.net 443
192.168.56.101 49269 35.212.119.5 nasap.net 443
192.168.56.101 49270 35.212.119.5 nasap.net 443
192.168.56.101 49272 35.212.119.5 nasap.net 443
192.168.56.101 49273 35.212.119.5 nasap.net 443
192.168.56.101 49274 35.212.119.5 nasap.net 443
192.168.56.101 49276 35.212.119.5 nasap.net 443
192.168.56.101 49277 35.212.119.5 nasap.net 443
192.168.56.101 49278 35.212.119.5 nasap.net 443
192.168.56.101 49280 35.212.119.5 nasap.net 443
192.168.56.101 49281 35.212.119.5 nasap.net 443
192.168.56.101 49282 35.212.119.5 nasap.net 443
192.168.56.101 49284 35.212.119.5 nasap.net 443
192.168.56.101 49285 35.212.119.5 nasap.net 443
192.168.56.101 49286 35.212.119.5 nasap.net 443
192.168.56.101 49288 35.212.119.5 nasap.net 443
192.168.56.101 49289 35.212.119.5 nasap.net 443
192.168.56.101 49290 35.212.119.5 nasap.net 443
192.168.56.101 49292 35.212.119.5 nasap.net 443
192.168.56.101 49293 35.212.119.5 nasap.net 443
192.168.56.101 49294 35.212.119.5 nasap.net 443
192.168.56.101 49296 35.212.119.5 nasap.net 443
192.168.56.101 49297 35.212.119.5 nasap.net 443
192.168.56.101 49298 35.212.119.5 nasap.net 443
192.168.56.101 49300 35.212.119.5 nasap.net 443
192.168.56.101 49301 35.212.119.5 nasap.net 443
192.168.56.101 49302 35.212.119.5 nasap.net 443
192.168.56.101 49304 35.212.119.5 nasap.net 443
192.168.56.101 49305 35.212.119.5 nasap.net 443
192.168.56.101 49306 35.212.119.5 nasap.net 443
192.168.56.101 49308 35.212.119.5 nasap.net 443
192.168.56.101 49309 35.212.119.5 nasap.net 443
192.168.56.101 49310 35.212.119.5 nasap.net 443
192.168.56.101 49312 35.212.119.5 nasap.net 443
192.168.56.101 49313 35.212.119.5 nasap.net 443
192.168.56.101 49314 35.212.119.5 nasap.net 443
192.168.56.101 49316 35.212.119.5 nasap.net 443
192.168.56.101 49317 35.212.119.5 nasap.net 443
192.168.56.101 49318 35.212.119.5 nasap.net 443
192.168.56.101 49320 35.212.119.5 nasap.net 443
192.168.56.101 49321 35.212.119.5 nasap.net 443
192.168.56.101 49322 35.212.119.5 nasap.net 443
192.168.56.101 49324 35.212.119.5 nasap.net 443
192.168.56.101 49325 35.212.119.5 nasap.net 443
192.168.56.101 49326 35.212.119.5 nasap.net 443
192.168.56.101 49328 35.212.119.5 nasap.net 443
192.168.56.101 49329 35.212.119.5 nasap.net 443
192.168.56.101 49330 35.212.119.5 nasap.net 443
192.168.56.101 49332 35.212.119.5 nasap.net 443
192.168.56.101 49333 35.212.119.5 nasap.net 443
192.168.56.101 49334 35.212.119.5 nasap.net 443
192.168.56.101 49336 35.212.119.5 nasap.net 443
192.168.56.101 49337 35.212.119.5 nasap.net 443
192.168.56.101 49338 35.212.119.5 nasap.net 443
192.168.56.101 49340 35.212.119.5 nasap.net 443
192.168.56.101 49341 35.212.119.5 nasap.net 443
192.168.56.101 49342 35.212.119.5 nasap.net 443
192.168.56.101 49344 35.212.119.5 nasap.net 443
192.168.56.101 49345 35.212.119.5 nasap.net 443
192.168.56.101 49346 35.212.119.5 nasap.net 443
192.168.56.101 49348 35.212.119.5 nasap.net 443
192.168.56.101 49349 35.212.119.5 nasap.net 443
192.168.56.101 49350 35.212.119.5 nasap.net 443
192.168.56.101 49352 35.212.119.5 nasap.net 443
192.168.56.101 49353 35.212.119.5 nasap.net 443
192.168.56.101 49354 35.212.119.5 nasap.net 443
192.168.56.101 49356 35.212.119.5 nasap.net 443
192.168.56.101 49357 35.212.119.5 nasap.net 443
192.168.56.101 49358 35.212.119.5 nasap.net 443
192.168.56.101 49360 35.212.119.5 nasap.net 443
192.168.56.101 49361 35.212.119.5 nasap.net 443
192.168.56.101 49362 35.212.119.5 nasap.net 443
192.168.56.101 49364 35.212.119.5 nasap.net 443
192.168.56.101 49365 35.212.119.5 nasap.net 443
192.168.56.101 49366 35.212.119.5 nasap.net 443
192.168.56.101 49368 35.212.119.5 nasap.net 443
192.168.56.101 49369 35.212.119.5 nasap.net 443
192.168.56.101 49370 35.212.119.5 nasap.net 443

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138
192.168.56.101 58485 114.114.114.114 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name abe5492610de6796_gewos.exe
Filepath C:\Users\Administrator\AppData\Local\Temp\gewos.exe
Size 42.0KB
Processes 3028 (047886cdd58a3032aeac72c457bf6707a819967a5ff15acb53dd0c36e2b8f205.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 9c0718d44bc7ab456332e513aee2d5e7
SHA1 89391aa4059a041b522062c044e4d8748ef791bb
SHA256 abe5492610de6796d9f39ab3f47a4bc40f67500bbcf89459983fc9bc02b03168
CRC32 ED677DF3
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.