9.0
极危

3ce275e9e12fc0a2134d78f940ea7fdb3bd0a642295f40d6016813ce1ddd2f63

bb17736081cbd7380ea03cc4a2cf2e01.exe

分析耗时

86s

最近分析

文件大小

5.3MB
静态报毒 动态报毒 A@8FKTGB ACSM AGEN AI SCORE=85 AIDETECTVM ATTRIBUTE CHISTILKA CMRTAZRGXZ+EN7AE4IEPB8RPWDUH CONDUIT ELDORADO FRJG GAOQKC GENERICKD GENETIC GRAYWARE HIGH CONFIDENCE HIGHCONFIDENCE KHALESI MALICIOUS PCCHIST QVM41 R002C0PDN20 RDMK SUSGEN SUSPICIOUS PE UNSAFE VKONTAKTEDJ 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Trojan-FRJG!BB17736081CB 20200508 6.0.6.653
Alibaba Trojan:Win32/Khalesi.39b87759 20190527 0.3.0.5
Avast Win32:PUP-gen [PUP] 20200508 18.4.3895.0
Baidu 20190318 1.0.0.2
Kingsoft 20200508 2013.8.14.323
Tencent 20200508 1.0.0.1
CrowdStrike 20190702 1.0
静态指标
This executable is signed
This executable has a PDB path (1 个事件)
pdb_path D:\build\93ede267e0821512\build\build_UTIL\bin\cleaner-util.pdb
The file contains an unknown PE resource name possibly indicative of a packer (8 个事件)
resource name AFX_DIALOG_LAYOUT
resource name CONFIG
resource name GIF
resource name PARTNERID
resource name PNG
resource name TXT
resource name ZFONT
resource name None
行为判定
动态指标
The binary likely contains encrypted or compressed data indicative of a packer (3 个事件)
entropy 7.236246438996441 section {'size_of_data': '0x001d0e00', 'virtual_address': '0x00289000', 'entropy': 7.236246438996441, 'name': '.rdata', 'virtual_size': '0x001d0d82'} description A section with a high entropy has been found
entropy 7.777031072770406 section {'size_of_data': '0x000c5200', 'virtual_address': '0x00474000', 'entropy': 7.777031072770406, 'name': '.rsrc', 'virtual_size': '0x000c5164'} description A section with a high entropy has been found
entropy 0.48564878496102704 description Overall entropy of this PE file is high
Checks for the Locally Unique Identifier on the system for a suspicious privilege (3 个事件)
Time & API Arguments Status Return Repeated
1620985509.443269
LookupPrivilegeValueW
system_name:
privilege_name: SeTakeOwnershipPrivilege
success 1 0
1620985509.443269
LookupPrivilegeValueW
system_name:
privilege_name: SeRestorePrivilege
success 1 0
1620985509.443269
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Checks the version of Bios, possibly for anti-virtualization (2 个事件)
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Checks the presence of IDE drives in the registry, possibly for anti-virtualization (8 个事件)
registry HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\IDE\DiskVBOX_HARDDISK___________________________1.0_____
registry HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\IDE\DiskVBOX_HARDDISK___________________________1.0_____\5&33d1638a&0&0.0.0\HardwareID
registry HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\IDE\CdRomVBOX_CD-ROM_____________________________1.0_____\5&2117b2e5&0&1.0.0\HardwareID
registry HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\IDE\CdRomVBOX_CD-ROM_____________________________1.0_____
registry HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\IDE\CdRomHL-DT-ST_DVD-ROM_GDR-T10N_______________1.05____
registry HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\IDE\DiskVBOX_HARDDISK___________________________1.0_____\5&33d1638a&0&0.0.0
registry HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\IDE\CdRomVBOX_CD-ROM_____________________________1.0_____\5&2117b2e5&0&1.0.0
registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\IDE
Detects VirtualBox through the presence of a device (2 个事件)
file \??\VBoxMiniRdrDN
file \\?\pipe\VBoxTrayIPC
Detects VirtualBox through the presence of a file (7 个事件)
file C:\Windows\System32\vboxdisp.dll
file C:\Windows\System32\vboxhook.dll
file C:\Windows\System32\vboxmrxnp.dll
file C:\Windows\System32\drivers\VBoxSF.sys
file C:\Windows\System32\drivers\VBoxGuest.sys
file C:\Windows\System32\drivers\VBoxMouse.sys
file C:\Windows\System32\drivers\VBoxVideo.sys
Detects VirtualBox through the presence of a registry key (4 个事件)
registry HKEY_LOCAL_MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions
registry HKEY_LOCAL_MACHINE\HARDWARE\ACPI\FADT\VBOX__
registry HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
registry HKEY_LOCAL_MACHINE\HARDWARE\ACPI\RSDT\VBOX__
Detects VirtualBox using WNetGetProviderName trick (1 个事件)
Time & API Arguments Status Return Repeated
1620985510.193269
WNetGetProviderNameW
net_type: 0x00250000
success 0 0
Detects VirtualBox through the presence of a window (2 个事件)
Time & API Arguments Status Return Repeated
1620985509.959269
FindWindowA
class_name: VBoxTrayToolWndClass
window_name:
success 65840 0
1620985509.959269
FindWindowA
class_name: #0
window_name: VBoxTrayToolWnd
success 65840 0
Detects Virtual Machines through their custom firmware (1 个事件)
Time & API Arguments Status Return Repeated
1620985509.959269
NtQuerySystemInformation
information_class: 76 (SystemFirmwareTableInformation)
failed 3221225507 0
Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) (1 个事件)
dead_host 31.13.95.37:80
File has been identified by 52 AntiVirus engines on VirusTotal as malicious (50 out of 52 个事件)
Bkav W32.AIDetectVM.malware
DrWeb Program.VKontakteDJ.79
MicroWorld-eScan Trojan.GenericKD.32480291
FireEye Generic.mg.bb17736081cbd738
McAfee Trojan-FRJG!BB17736081CB
Cylance Unsafe
Zillya Dropper.Injector.Win32.86410
Sangfor Malware
K7AntiVirus Adware ( 00557e001 )
Alibaba Trojan:Win32/Khalesi.39b87759
K7GW Adware ( 00557e001 )
Arcabit Trojan.Generic.D1EF9C23
TrendMicro TROJ_GEN.R002C0PDN20
F-Prot W32/Trojan.DJH.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Chistilka.B potentially unwanted
APEX Malicious
Avast Win32:PUP-gen [PUP]
Kaspersky Trojan.Win32.Khalesi.acsm
BitDefender Trojan.GenericKD.32480291
NANO-Antivirus Riskware.Win32.Chistilka.gaoqkc
Rising PUF.Chistilka!1.BC9E (RDMK:cmRtazrgxz+EN7AE4IePB8RPwduH)
Ad-Aware Trojan.GenericKD.32480291
Sophos VKontakteDJ (PUA)
Comodo Application.Win32.Chistilka.A@8fktgb
F-Secure Heuristic.HEUR/AGEN.1103060
VIPRE Trojan.Win32.Generic!BT
Invincea heuristic
McAfee-GW-Edition BehavesLike.Win32.Suspicious.tc
Emsisoft Application.AdLoad (A)
SentinelOne DFI - Suspicious PE
Cyren W32/Trojan.DJH.gen!Eldorado
Jiangmin Trojan.Khalesi.chq
Avira HEUR/AGEN.1103060
Antiy-AVL GrayWare/Win32.Chistilka
Microsoft PUA:Win32/Conduit
Endgame malicious (high confidence)
ViRobot Adware.Chistilka.5589576.BKP
ZoneAlarm Trojan.Win32.Khalesi.acsm
GData Trojan.GenericKD.32480291
VBA32 TrojanDropper.Injector
ALYac Trojan.GenericKD.32480291
MAX malware (ai score=85)
Malwarebytes PUP.Optional.Chistilka
TrendMicro-HouseCall TROJ_GEN.R002C0PDN20
Ikarus Trojan.PSW.Agent
MaxSecure Trojan.Malware.91401761.susgen
Fortinet W32/PCChist.C00D!tr
Webroot W32.Adware.Gen
AVG Win32:PUP-gen [PUP]
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2019-09-09 18:19:48

Imports

Library KERNEL32.dll:
0x6891b4 LockFileEx
0x6891b8 UnlockFile
0x6891bc HeapCompact
0x6891c0 GetSystemInfo
0x6891c4 DeleteFileA
0x6891cc LoadLibraryA
0x6891d0 CreateFileA
0x6891d4 FlushViewOfFile
0x6891d8 GetFileAttributesA
0x6891dc GetDiskFreeSpaceA
0x6891e0 FormatMessageW
0x6891e4 GetTempPathA
0x6891e8 HeapValidate
0x6891ec UnlockFileEx
0x6891f0 SetEndOfFile
0x6891f4 GetFullPathNameA
0x6891f8 LockFile
0x6891fc OutputDebugStringA
0x689200 GetDiskFreeSpaceW
0x689204 HeapCreate
0x689208 AreFileApisANSI
0x689218 QueryDosDeviceW
0x68921c TerminateProcess
0x689220 VirtualAlloc
0x689224 VirtualFree
0x689228 ReadProcessMemory
0x689230 Process32FirstW
0x689234 Process32NextW
0x68923c GetDriveTypeW
0x689240 GetLogicalDrives
0x689248 GetNativeSystemInfo
0x68924c IsWow64Process
0x689250 DeviceIoControl
0x689254 ResumeThread
0x689258 FreeResource
0x68925c VerSetConditionMask
0x689260 lstrcpynW
0x689264 VerifyVersionInfoW
0x689268 FindFirstFileA
0x68926c FindNextFileA
0x689270 lstrcmpiA
0x68927c SetFileTime
0x689284 GetLocalTime
0x689288 CreateEventW
0x68928c ResetEvent
0x689290 SetEvent
0x689294 GetCommandLineW
0x689298 WriteConsoleW
0x6892a4 GetCommandLineA
0x6892a8 GetOEMCP
0x6892ac GetACP
0x6892b0 IsValidCodePage
0x6892b8 CreatePipe
0x6892bc SetStdHandle
0x6892c0 GetTickCount
0x6892c4 GetConsoleMode
0x6892c8 GetConsoleCP
0x6892d0 GetUserDefaultLCID
0x6892d4 FormatMessageA
0x6892d8 GetTimeFormatW
0x6892dc GetDateFormatW
0x6892e4 GetFileType
0x6892e8 GetStdHandle
0x6892ec ExitThread
0x6892f0 ExitProcess
0x6892f4 RtlUnwind
0x6892fc UnregisterWaitEx
0x689300 QueryDepthSList
0x68930c VirtualProtect
0x689314 GetThreadTimes
0x689318 UnregisterWait
0x689334 GetThreadPriority
0x689338 SetThreadPriority
0x68933c CreateThread
0x689340 SignalObjectAndWait
0x689344 CreateTimerQueue
0x689348 GetProcessTimes
0x68934c CreateSemaphoreW
0x689350 ReleaseSemaphore
0x689354 GetModuleHandleA
0x689358 GetModuleFileNameA
0x68935c CreateFileMappingA
0x689360 GetFileSizeEx
0x689364 GetStartupInfoW
0x68936c LCMapStringW
0x689370 CompareStringW
0x689374 GetCPInfo
0x689378 TlsFree
0x68937c TlsSetValue
0x689380 TlsGetValue
0x689384 TlsAlloc
0x68938c CreateDirectoryExW
0x689390 CreateHardLinkW
0x689394 SetFilePointerEx
0x689398 GetDiskFreeSpaceExW
0x68939c FindFirstFileExW
0x6893a4 GetModuleHandleExW
0x6893a8 QueueUserWorkItem
0x6893ac GetExitCodeThread
0x6893b0 SwitchToThread
0x6893b4 DuplicateHandle
0x6893bc GetStringTypeW
0x6893c0 LoadLibraryExA
0x6893d4 InitializeSListHead
0x6893d8 EncodePointer
0x6893dc IsDebuggerPresent
0x6893e0 Sleep
0x6893e4 WideCharToMultiByte
0x6893e8 EnumSystemLocalesW
0x6893ec GetSystemTime
0x6893f4 LocalAlloc
0x6893f8 GetComputerNameW
0x6893fc GetSystemDirectoryW
0x68940c TerminateThread
0x689414 MultiByteToWideChar
0x689418 OutputDebugStringW
0x68941c FlushFileBuffers
0x689428 lstrcmpW
0x68942c MulDiv
0x689430 GlobalHandle
0x689438 CreateNamedPipeW
0x68943c DisconnectNamedPipe
0x689440 ConnectNamedPipe
0x689444 UnmapViewOfFile
0x689448 MapViewOfFile
0x68944c CreateFileMappingW
0x689450 VirtualQuery
0x689454 GetCurrentThread
0x689458 lstrcmpiW
0x68945c LoadLibraryW
0x689460 LoadLibraryExW
0x689464 FreeLibrary
0x689468 GetCurrentThreadId
0x68946c GetCurrentProcessId
0x689470 CreateMutexW
0x689474 IsValidLocale
0x689480 MoveFileExW
0x689484 MoveFileW
0x689488 CopyFileW
0x68948c lstrlenW
0x689490 SetLastError
0x689494 SetFileAttributesW
0x689498 RemoveDirectoryW
0x68949c GetFullPathNameW
0x6894a0 GetFileAttributesW
0x6894a4 FindNextFileW
0x6894a8 FindFirstFileW
0x6894ac FindClose
0x6894b0 GetFileTime
0x6894b8 GetLocaleInfoW
0x6894bc LocalFree
0x6894c0 GlobalFree
0x6894c4 GlobalLock
0x6894c8 GlobalUnlock
0x6894cc GlobalAlloc
0x6894d0 FindResourceW
0x6894d4 SizeofResource
0x6894d8 LockResource
0x6894dc LoadResource
0x6894e0 GetModuleFileNameW
0x6894e4 FindResourceExW
0x6894e8 GetVersionExW
0x6894ec OpenProcess
0x6894f0 GetCurrentProcess
0x6894f4 GetTempPathW
0x6894f8 GetTempFileNameW
0x6894fc DeleteFileW
0x689500 GetLongPathNameW
0x689508 GetProcAddress
0x68950c GetModuleHandleW
0x689510 WriteFile
0x689514 SetFilePointer
0x689518 ReadFile
0x68951c GetFileSize
0x689520 CreateFileW
0x689528 CreateDirectoryW
0x68952c lstrcpyW
0x689530 CreateProcessW
0x689534 GetExitCodeProcess
0x689538 WaitForSingleObject
0x68953c CloseHandle
0x68955c GetProcessHeap
0x689560 HeapSize
0x689564 HeapFree
0x689568 HeapReAlloc
0x68956c HeapAlloc
0x689570 HeapDestroy
0x689574 GetLastError
0x689578 RaiseException
0x68957c ReadConsoleW
0x689580 DecodePointer
Library USER32.dll:
0x689628 OpenClipboard
0x68962c CloseClipboard
0x689630 GetWindow
0x689634 ExitWindowsEx
0x689638 GetTopWindow
0x68963c GetClassNameW
0x689640 PostMessageW
0x689644 UnregisterClassW
0x68964c LoadStringW
0x689650 SendMessageW
0x689654 GetCursorPos
0x689658 FindWindowA
0x689660 MonitorFromPoint
0x689664 GetWindowDC
0x689668 SetActiveWindow
0x68966c TrackPopupMenu
0x689670 GetSubMenu
0x689674 DestroyMenu
0x689678 SetTimer
0x68967c SendDlgItemMessageW
0x689680 SetClipboardData
0x689684 EmptyClipboard
0x689688 GetMessageW
0x68968c TranslateMessage
0x689690 DispatchMessageW
0x689694 PeekMessageW
0x689698 PostThreadMessageW
0x68969c PostQuitMessage
0x6896a0 DestroyWindow
0x6896a4 ShowWindow
0x6896a8 BringWindowToTop
0x6896ac CreateDialogParamW
0x6896b0 CharNextW
0x6896b4 GetKeyState
0x6896b8 GetSystemMetrics
0x6896bc GetForegroundWindow
0x6896c0 SetForegroundWindow
0x6896c4 GetClientRect
0x6896c8 GetWindowLongW
0x6896cc SetWindowLongW
0x6896d0 IsWindow
0x6896d4 IsWindowVisible
0x6896d8 DialogBoxParamW
0x6896dc SwitchToThisWindow
0x6896e0 GetDesktopWindow
0x6896e4 MessageBoxW
0x6896ec DefWindowProcW
0x6896f0 CallWindowProcW
0x6896f4 RegisterClassExW
0x6896f8 GetClassInfoExW
0x6896fc CreateWindowExW
0x689700 IsChild
0x689704 MoveWindow
0x689708 SetWindowPos
0x689710 GetDlgItem
0x689714 SetFocus
0x689718 GetFocus
0x68971c SetCapture
0x689720 ReleaseCapture
0x68972c GetDC
0x689730 ReleaseDC
0x689734 BeginPaint
0x689738 EndPaint
0x68973c InvalidateRect
0x689740 InvalidateRgn
0x689744 RedrawWindow
0x689748 SetWindowTextW
0x68974c GetWindowTextW
0x689754 ClientToScreen
0x689758 ScreenToClient
0x68975c GetSysColor
0x689760 FillRect
0x689764 GetParent
0x689768 LoadCursorW
0x68976c EndDialog
0x689770 wsprintfW
0x689774 GetWindowRect
0x689778 MapWindowPoints
0x68977c MonitorFromWindow
0x689780 GetMonitorInfoW
0x689784 GetActiveWindow
0x68978c LoadImageW
0x689790 MapDialogRect
0x689794 SetParent
0x689798 RegisterClassW
0x68979c UpdateWindow
0x6897a0 FindWindowW
0x6897a4 LoadMenuW
0x6897a8 LoadIconW
0x6897ac GetClassLongW
0x6897b0 SetCursor
0x6897b4 EnableWindow
0x6897b8 GetDlgCtrlID
0x6897bc KillTimer
Library GDI32.dll:
0x689158 CreateSolidBrush
0x689160 BitBlt
0x689164 DeleteObject
0x689168 GetObjectW
0x68916c GetDeviceCaps
0x689170 CreateDIBSection
0x689174 SelectObject
0x689178 CreateCompatibleDC
0x68917c AddFontResourceW
0x689180 DeleteDC
0x689184 GetStockObject
0x689188 CreateFontIndirectW
0x68918c DPtoLP
0x689190 SetBkMode
0x689194 SetTextColor
0x68919c SetBkColor
0x6891a0 SetDIBColorTable
0x6891a4 ExtTextOutW
Library SHELL32.dll:
0x6895fc CommandLineToArgvW
0x689600 ShellExecuteExW
0x689604 SHFileOperationW
0x689608 SHGetFolderPathW
0x68960c SHGetMalloc
0x689610 SHGetDesktopFolder
0x689614 Shell_NotifyIconW
0x689618 ShellExecuteW
Library ole32.dll:
0x6899a4 OleUninitialize
0x6899a8 OleLockRunning
0x6899ac StringFromGUID2
0x6899b0 OleRun
0x6899b8 CoSetProxyBlanket
0x6899bc CoInitializeEx
0x6899c0 StringFromCLSID
0x6899c4 CoCreateGuid
0x6899c8 CoTaskMemFree
0x6899cc CoUninitialize
0x6899d0 CoCreateInstance
0x6899d4 CoInitialize
0x6899dc CoTaskMemAlloc
0x6899e0 CoTaskMemRealloc
0x6899e4 CoGetClassObject
0x6899e8 CLSIDFromString
0x6899ec CLSIDFromProgID
0x6899f0 OleInitialize
Library OLEAUT32.dll:
0x689590 VariantChangeType
0x689598 LoadRegTypeLib
0x68959c LoadTypeLib
0x6895a0 VariantClear
0x6895a8 SysStringByteLen
0x6895ac SysAllocStringLen
0x6895b0 SysAllocString
0x6895b4 VarUI4FromStr
0x6895b8 SysFreeString
0x6895bc VariantInit
0x6895c0 DispCallFunc
0x6895c4 GetErrorInfo
0x6895c8 SetErrorInfo
0x6895cc CreateErrorInfo
0x6895d0 SysStringLen
0x6895d4 VariantCopy
Library ADVAPI32.dll:
0x689000 RegCreateKeyExW
0x689004 AddAce
0x689008 RegSetValueExW
0x68900c RegOpenKeyExW
0x689014 GetTokenInformation
0x689018 DuplicateTokenEx
0x689020 OpenProcessToken
0x689024 RegCloseKey
0x689028 CryptDestroyHash
0x68902c CryptHashData
0x689030 CryptCreateHash
0x689034 CryptGetHashParam
0x689038 CryptReleaseContext
0x689040 MapGenericMask
0x689044 GetFileSecurityW
0x689048 AccessCheck
0x68904c RegDeleteKeyW
0x689050 GetLengthSid
0x689058 GetSidSubAuthority
0x68905c InitializeAcl
0x689060 InitializeSid
0x689064 IsValidSid
0x689074 CloseServiceHandle
0x689078 ControlService
0x68907c CreateServiceW
0x689080 DeleteService
0x689084 OpenSCManagerW
0x689088 OpenServiceW
0x68908c RegDeleteValueW
0x689090 RegEnumKeyExW
0x689094 RegQueryInfoKeyW
0x68909c RegQueryValueExW
0x6890a8 SetTokenInformation
0x6890b0 SetServiceStatus
0x6890b8 LookupAccountNameW
0x6890bc SystemFunction036
0x6890c0 GetAclInformation
0x6890dc MakeAbsoluteSD
0x6890e4 RegEnumValueW
0x6890e8 SetSecurityInfo
0x6890ec GetAce
0x6890f8 QueryServiceConfigW
0x689100 FreeSid
0x689108 RegEnumKeyA
0x68910c RegOpenKeyExA
0x689110 RegQueryValueExA
0x689114 EnumServicesStatusW
0x68911c StartServiceW
0x689120 CopySid
0x689128 QueryServiceStatus
0x68912c EqualSid
0x689130 LookupAccountSidW
Library COMCTL32.dll:
0x689138 _TrackMouseEvent
Library UxTheme.dll:
0x6897d0 SetWindowTheme
Library gdiplus.dll:
0x689884 GdipAlloc
0x689888 GdipFree
0x68988c GdiplusStartup
0x689890 GdipCloneImage
0x689894 GdipDisposeImage
0x68989c GdipGetImageWidth
0x6898a0 GdipGetImageHeight
0x6898a8 GdipStartPathFigure
0x6898ac GdipGetImagePalette
0x6898c8 GdipMeasureString
0x6898cc GdipDrawString
0x6898d0 GdipGetFontSize
0x6898d4 GdipGetFontStyle
0x6898d8 GdipGetFamily
0x6898dc GdipDeleteFont
0x6898e0 GdipCreateFont
0x6898e4 GdipGetFamilyName
0x6898f4 GdipFillPath
0x6898f8 GdipFillRectangleI
0x6898fc GdipGraphicsClear
0x689900 GdipDrawPath
0x689904 GdipDrawRectangleI
0x689914 GdipSetPenColor
0x689918 GdipDeletePen
0x68991c GdipCreatePen1
0x689928 GdipCreateSolidFill
0x68992c GdipDeleteBrush
0x689930 GdipCloneBrush
0x689934 GdipAddPathArcI
0x689938 GdipClosePathFigure
0x689940 GdipDeletePath
0x689944 GdipCreatePath
0x689948 GdipDrawImageRectI
0x68994c GdipCreateFromHDC
0x689950 GdipGetPropertyItem
0x689974 GdipDrawImageI
0x689978 GdipDeleteGraphics
0x689980 GdipBitmapLockBits
0x689990 GdiplusShutdown
Library VERSION.dll:
0x6897dc VerQueryValueW
0x6897e0 GetFileVersionInfoW
Library WININET.dll:
0x689824 InternetGetCookieW
0x689828 InternetSetCookieW
Library USERENV.dll:
0x6897c8 UnloadUserProfile
Library dbghelp.dll:
0x68985c SymGetOptions
0x689860 SymCleanup
0x689868 SymGetModuleBase64
0x68986c SymInitialize
0x689870 SymSetOptions
0x689878 StackWalk64
0x68987c ImageNtHeader
Library RPCRT4.dll:
0x6895ec UuidToStringW
0x6895f0 UuidCreate
0x6895f4 RpcStringFreeW
Library CRYPT32.dll:
0x689144 CryptMsgClose
0x689148 CryptMsgGetParam
0x68914c CertCloseStore
0x689150 CryptQueryObject
Library imagehlp.dll:
0x689998 UnMapAndLoad
0x68999c MapAndLoad
Library WINHTTP.dll:
0x6897e8 WinHttpQueryHeaders
0x6897ec WinHttpWriteData
0x6897f0 WinHttpSetTimeouts
0x6897f4 WinHttpReadData
0x6897fc WinHttpSendRequest
0x689800 WinHttpCrackUrl
0x689804 WinHttpOpenRequest
0x689808 WinHttpSetOption
0x689814 WinHttpOpen
0x689818 WinHttpCloseHandle
0x68981c WinHttpConnect
Library WS2_32.dll:
0x689830 socket
0x689834 send
0x689838 recv
0x68983c inet_addr
0x689840 htons
0x689844 connect
0x689848 gethostbyname
0x68984c inet_ntoa
0x689850 closesocket
0x689854 WSAStartup
Library IPHLPAPI.DLL:
0x6891ac GetAdaptersInfo

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 63429 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 53658 216.239.35.8 time.google.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58368 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.