5.2
中危

581b7a232d3d1bc1452e0a1abe985e16cc6eb018ec12f67e28db4d63872cbb13

bd261aaba73df28e7033a5fd25ada205.exe

分析耗时

96s

最近分析

文件大小

1004.5KB
静态报毒 动态报毒 AI SCORE=87 AIDETECTVM AZORULT BLUTEAL BSCOPE DELF DPIE ELVUA EMPE GDSDA GENCIRC GENERICRXAA GENKRYPTIK HIGH CONFIDENCE INFECTED KCLOUD MALWARE1 MALWARE@#2W08KXOPU55HH PSWTROJ R066C0GIK20 R337874 REMCOS SCORE T4WPHD88DDY UNSAFE WACATAC YBYS ZUSY 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee GenericRXAA-AA!BD261AABA73D 20201211 6.0.6.653
CrowdStrike 20190702 1.0
Alibaba TrojanDownloader:Win32/Bluteal.64d1e14c 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Trojan-gen 20201210 21.1.5827.0
Tencent Malware.Win32.Gencirc.1167aa9a 20201211 1.0.0.1
Kingsoft Win32.PSWTroj.Undef.(kcloud) 20201211 2017.9.26.565
行为判定
动态指标
Allocates read-write-execute memory (usually to unpack itself) (1 个事件)
Time & API Arguments Status Return Repeated
1619874884.538875
NtAllocateVirtualMemory
process_identifier: 1164
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x01e30000
success 0 0
Downloads a file or document from Google Drive (1 个事件)
domain drive.google.com
Checks adapter addresses which can be used to detect virtual network interfaces (1 个事件)
Time & API Arguments Status Return Repeated
1619874905.679875
GetAdaptersAddresses
flags: 0
family: 0
failed 111 0
网络通信
Communicates with host for which no DNS query was performed (2 个事件)
host 113.108.239.196
host 172.217.24.14
Sets or modifies WPAD proxy autoconfiguration file for traffic interception (8 个事件)
Time & API Arguments Status Return Repeated
1619874908.507875
RegSetValueExA
key_handle: 0x000003e4
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionReason
success 0 0
1619874908.507875
RegSetValueExA
key_handle: 0x000003e4
value: Ð@DŒ>×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecisionTime
success 0 0
1619874908.523875
RegSetValueExA
key_handle: 0x000003e4
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadDecision
success 0 0
1619874908.523875
RegSetValueExW
key_handle: 0x000003e4
value: 网络 2
regkey_r: WpadNetworkName
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{40112ABE-63B3-43C3-BE93-1440EE3AF106}\WpadNetworkName
success 0 0
1619874908.523875
RegSetValueExA
key_handle: 0x000003fc
value: 1
regkey_r: WpadDecisionReason
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionReason
success 0 0
1619874908.523875
RegSetValueExA
key_handle: 0x000003fc
value: Ð@DŒ>×
regkey_r: WpadDecisionTime
reg_type: 3 (REG_BINARY)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecisionTime
success 0 0
1619874908.523875
RegSetValueExA
key_handle: 0x000003fc
value: 3
regkey_r: WpadDecision
reg_type: 4 (REG_DWORD)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-00-27-00-00-00\WpadDecision
success 0 0
1619874908.757875
RegSetValueExW
key_handle: 0x000003e0
value: {40112ABE-63B3-43C3-BE93-1440EE3AF106}
regkey_r: WpadLastNetwork
reg_type: 1 (REG_SZ)
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\WpadLastNetwork
success 0 0
File has been identified by 50 AntiVirus engines on VirusTotal as malicious (50 个事件)
Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.Empe.1.Gen
FireEye Trojan.Empe.1.Gen
McAfee GenericRXAA-AA!BD261AABA73D
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
Sangfor Malware
Alibaba TrojanDownloader:Win32/Bluteal.64d1e14c
K7GW Trojan-Downloader ( 00565f131 )
K7AntiVirus Trojan-Downloader ( 00565f131 )
Arcabit Trojan.Empe.1.Gen
Cyren W32/Delf.YBYS-7948
Symantec Trojan.Gen.MBT
APEX Malicious
Avast Win32:Trojan-gen
Kaspersky HEUR:Trojan-PSW.Win32.Azorult.gen
BitDefender Trojan.Empe.1.Gen
Paloalto generic.ml
Tencent Malware.Win32.Gencirc.1167aa9a
Ad-Aware Trojan.Empe.1.Gen
Emsisoft Trojan.Empe.1.Gen (B)
Comodo Malware@#2w08kxopu55hh
F-Secure Trojan.TR/Dldr.Delf.elvua
Zillya Downloader.Delf.Win32.59056
TrendMicro TROJ_GEN.R066C0GIK20
McAfee-GW-Edition BehavesLike.Win32.Infected.fh
Sophos Mal/Generic-S
Jiangmin Trojan.PSW.Azorult.gut
Avira TR/Dldr.Delf.elvua
Antiy-AVL Trojan/Win32.Wacatac
Kingsoft Win32.PSWTroj.Undef.(kcloud)
Microsoft Trojan:Win32/Bluteal!rfn
AegisLab Trojan.Win32.Zusy.4!c
ZoneAlarm HEUR:Trojan-PSW.Win32.Azorult.gen
GData Trojan.Empe.1.Gen
Cynet Malicious (score: 85)
AhnLab-V3 Trojan/Win32.RL_Remcos.R337874
ALYac Backdoor.Remcos.A
MAX malware (ai score=87)
VBA32 BScope.Backdoor.Remcos
Malwarebytes Trojan.Downloader
ESET-NOD32 Win32/TrojanDownloader.Delf.CXM
TrendMicro-HouseCall TROJ_GEN.R066C0GIK20
Yandex Trojan.DL.Delf!t4WPHd88dDY
Ikarus Trojan.Inject
Fortinet W32/GenKryptik.DPIE!tr
AVG Win32:Trojan-gen
Panda Trj/GdSda.A
Qihoo-360 Win32/Trojan.PSW.ae6
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (2 个事件)
dead_host 172.217.24.14:443
dead_host 172.217.27.142:443
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-06-20 06:22:17

Imports

Library oleaut32.dll:
0x4b091c SysFreeString
0x4b0920 SysReAllocStringLen
0x4b0924 SysAllocStringLen
Library advapi32.dll:
0x4b092c RegQueryValueExA
0x4b0930 RegOpenKeyExA
0x4b0934 RegCloseKey
Library user32.dll:
0x4b093c GetKeyboardType
0x4b0940 DestroyWindow
0x4b0944 LoadStringA
0x4b0948 MessageBoxA
0x4b094c CharNextA
Library kernel32.dll:
0x4b0954 GetACP
0x4b0958 Sleep
0x4b095c VirtualFree
0x4b0960 VirtualAlloc
0x4b0964 GetCurrentThreadId
0x4b0970 VirtualQuery
0x4b0974 WideCharToMultiByte
0x4b097c MultiByteToWideChar
0x4b0980 lstrlenA
0x4b0984 lstrcpynA
0x4b0988 LoadLibraryExA
0x4b098c GetThreadLocale
0x4b0990 GetStartupInfoA
0x4b0994 GetProcAddress
0x4b0998 GetModuleHandleA
0x4b099c GetModuleFileNameA
0x4b09a0 GetLocaleInfoA
0x4b09a4 GetLastError
0x4b09ac GetCommandLineA
0x4b09b0 FreeLibrary
0x4b09b4 FindFirstFileA
0x4b09b8 FindClose
0x4b09bc ExitProcess
0x4b09c0 CompareStringA
0x4b09c4 WriteFile
0x4b09cc RtlUnwind
0x4b09d0 RaiseException
0x4b09d4 GetStdHandle
Library kernel32.dll:
0x4b09dc TlsSetValue
0x4b09e0 TlsGetValue
0x4b09e4 LocalAlloc
0x4b09e8 GetModuleHandleA
Library user32.dll:
0x4b09f0 CreateWindowExA
0x4b09f4 WindowFromPoint
0x4b09f8 WaitMessage
0x4b09fc UpdateWindow
0x4b0a00 UnregisterClassA
0x4b0a04 UnhookWindowsHookEx
0x4b0a08 TranslateMessage
0x4b0a10 TrackPopupMenu
0x4b0a18 ShowWindow
0x4b0a1c ShowScrollBar
0x4b0a20 ShowOwnedPopups
0x4b0a24 SetWindowsHookExA
0x4b0a28 SetWindowTextA
0x4b0a2c SetWindowPos
0x4b0a30 SetWindowPlacement
0x4b0a34 SetWindowLongW
0x4b0a38 SetWindowLongA
0x4b0a3c SetTimer
0x4b0a40 SetScrollRange
0x4b0a44 SetScrollPos
0x4b0a48 SetScrollInfo
0x4b0a4c SetRect
0x4b0a50 SetPropA
0x4b0a54 SetParent
0x4b0a58 SetMenuItemInfoA
0x4b0a5c SetMenu
0x4b0a60 SetForegroundWindow
0x4b0a64 SetFocus
0x4b0a68 SetCursor
0x4b0a6c SetClassLongA
0x4b0a70 SetCapture
0x4b0a74 SetActiveWindow
0x4b0a78 SendMessageW
0x4b0a7c SendMessageA
0x4b0a80 ScrollWindow
0x4b0a84 ScreenToClient
0x4b0a88 RemovePropA
0x4b0a8c RemoveMenu
0x4b0a90 ReleaseDC
0x4b0a94 ReleaseCapture
0x4b0aa0 RegisterClassA
0x4b0aa4 RedrawWindow
0x4b0aa8 PtInRect
0x4b0aac PostQuitMessage
0x4b0ab0 PostMessageA
0x4b0ab4 PeekMessageW
0x4b0ab8 PeekMessageA
0x4b0abc OffsetRect
0x4b0ac0 OemToCharA
0x4b0ac4 MessageBoxA
0x4b0ac8 MapWindowPoints
0x4b0acc MapVirtualKeyA
0x4b0ad0 LoadStringA
0x4b0ad4 LoadKeyboardLayoutA
0x4b0ad8 LoadIconA
0x4b0adc LoadCursorA
0x4b0ae0 LoadBitmapA
0x4b0ae4 KillTimer
0x4b0ae8 IsZoomed
0x4b0aec IsWindowVisible
0x4b0af0 IsWindowUnicode
0x4b0af4 IsWindowEnabled
0x4b0af8 IsWindow
0x4b0afc IsRectEmpty
0x4b0b00 IsIconic
0x4b0b04 IsDialogMessageW
0x4b0b08 IsDialogMessageA
0x4b0b0c IsChild
0x4b0b10 InvalidateRect
0x4b0b14 IntersectRect
0x4b0b18 InsertMenuItemA
0x4b0b1c InsertMenuA
0x4b0b20 InflateRect
0x4b0b28 GetWindowTextA
0x4b0b2c GetWindowRect
0x4b0b30 GetWindowPlacement
0x4b0b34 GetWindowLongW
0x4b0b38 GetWindowLongA
0x4b0b3c GetWindowDC
0x4b0b40 GetUpdateRect
0x4b0b44 GetTopWindow
0x4b0b48 GetSystemMetrics
0x4b0b4c GetSystemMenu
0x4b0b50 GetSysColorBrush
0x4b0b54 GetSysColor
0x4b0b58 GetSubMenu
0x4b0b5c GetScrollRange
0x4b0b60 GetScrollPos
0x4b0b64 GetScrollInfo
0x4b0b68 GetPropA
0x4b0b6c GetParent
0x4b0b70 GetWindow
0x4b0b74 GetMessageTime
0x4b0b78 GetMessagePos
0x4b0b7c GetMenuStringA
0x4b0b80 GetMenuState
0x4b0b84 GetMenuItemInfoA
0x4b0b88 GetMenuItemID
0x4b0b8c GetMenuItemCount
0x4b0b90 GetMenu
0x4b0b94 GetLastActivePopup
0x4b0b98 GetKeyboardState
0x4b0ba4 GetKeyboardLayout
0x4b0ba8 GetKeyState
0x4b0bac GetKeyNameTextA
0x4b0bb0 GetIconInfo
0x4b0bb4 GetForegroundWindow
0x4b0bb8 GetFocus
0x4b0bbc GetDlgItem
0x4b0bc0 GetDesktopWindow
0x4b0bc4 GetDCEx
0x4b0bc8 GetDC
0x4b0bcc GetCursorPos
0x4b0bd0 GetCursor
0x4b0bd4 GetClipboardData
0x4b0bd8 GetClientRect
0x4b0bdc GetClassNameA
0x4b0be0 GetClassLongA
0x4b0be4 GetClassInfoA
0x4b0be8 GetCapture
0x4b0bec GetActiveWindow
0x4b0bf0 FrameRect
0x4b0bf4 FindWindowA
0x4b0bf8 FillRect
0x4b0bfc EqualRect
0x4b0c00 EnumWindows
0x4b0c04 EnumThreadWindows
0x4b0c08 EnumChildWindows
0x4b0c0c EndPaint
0x4b0c10 EnableWindow
0x4b0c14 EnableScrollBar
0x4b0c18 EnableMenuItem
0x4b0c1c DrawTextA
0x4b0c20 DrawMenuBar
0x4b0c24 DrawIconEx
0x4b0c28 DrawIcon
0x4b0c2c DrawFrameControl
0x4b0c30 DrawFocusRect
0x4b0c34 DrawEdge
0x4b0c38 DispatchMessageW
0x4b0c3c DispatchMessageA
0x4b0c40 DestroyWindow
0x4b0c44 DestroyMenu
0x4b0c48 DestroyIcon
0x4b0c4c DestroyCursor
0x4b0c50 DeleteMenu
0x4b0c54 DefWindowProcA
0x4b0c58 DefMDIChildProcA
0x4b0c5c DefFrameProcA
0x4b0c60 CreatePopupMenu
0x4b0c64 CreateMenu
0x4b0c68 CreateIcon
0x4b0c6c ClientToScreen
0x4b0c74 CheckMenuItem
0x4b0c78 CallWindowProcA
0x4b0c7c CallNextHookEx
0x4b0c80 BeginPaint
0x4b0c84 CharNextA
0x4b0c88 CharLowerBuffA
0x4b0c8c CharLowerA
0x4b0c90 CharUpperBuffA
0x4b0c94 CharToOemA
0x4b0c98 AdjustWindowRectEx
Library gdi32.dll:
0x4b0ca4 UnrealizeObject
0x4b0ca8 StretchBlt
0x4b0cac StartPage
0x4b0cb0 StartDocA
0x4b0cb4 SetWindowOrgEx
0x4b0cb8 SetWinMetaFileBits
0x4b0cbc SetViewportOrgEx
0x4b0cc0 SetTextColor
0x4b0cc4 SetStretchBltMode
0x4b0cc8 SetROP2
0x4b0ccc SetPixel
0x4b0cd0 SetMapMode
0x4b0cd4 SetEnhMetaFileBits
0x4b0cd8 SetDIBColorTable
0x4b0cdc SetBrushOrgEx
0x4b0ce0 SetBkMode
0x4b0ce4 SetBkColor
0x4b0ce8 SetAbortProc
0x4b0cec SelectPalette
0x4b0cf0 SelectObject
0x4b0cf4 SaveDC
0x4b0cf8 RestoreDC
0x4b0cfc Rectangle
0x4b0d00 RectVisible
0x4b0d04 RealizePalette
0x4b0d08 Polyline
0x4b0d0c PlayEnhMetaFile
0x4b0d10 PatBlt
0x4b0d14 MoveToEx
0x4b0d18 MaskBlt
0x4b0d1c LineTo
0x4b0d20 LPtoDP
0x4b0d24 IntersectClipRect
0x4b0d28 GetWindowOrgEx
0x4b0d2c GetWinMetaFileBits
0x4b0d30 GetTextMetricsA
0x4b0d3c GetStockObject
0x4b0d40 GetRgnBox
0x4b0d44 GetPixel
0x4b0d48 GetPaletteEntries
0x4b0d4c GetObjectA
0x4b0d5c GetEnhMetaFileBits
0x4b0d60 GetDeviceCaps
0x4b0d64 GetDIBits
0x4b0d68 GetDIBColorTable
0x4b0d6c GetDCOrgEx
0x4b0d74 GetClipBox
0x4b0d78 GetBrushOrgEx
0x4b0d7c GetBitmapBits
0x4b0d80 ExtTextOutA
0x4b0d84 ExcludeClipRect
0x4b0d88 EndPage
0x4b0d8c EndDoc
0x4b0d90 DeleteObject
0x4b0d94 DeleteEnhMetaFile
0x4b0d98 DeleteDC
0x4b0d9c CreateSolidBrush
0x4b0da0 CreatePenIndirect
0x4b0da4 CreatePalette
0x4b0da8 CreateICA
0x4b0db0 CreateFontIndirectA
0x4b0db4 CreateEnhMetaFileA
0x4b0db8 CreateDIBitmap
0x4b0dbc CreateDIBSection
0x4b0dc0 CreateDCA
0x4b0dc4 CreateCompatibleDC
0x4b0dcc CreateBrushIndirect
0x4b0dd0 CreateBitmap
0x4b0dd4 CopyEnhMetaFileA
0x4b0dd8 CloseEnhMetaFile
0x4b0ddc BitBlt
Library version.dll:
0x4b0de4 VerQueryValueA
0x4b0dec GetFileVersionInfoA
Library mpr.dll:
0x4b0df4 WNetGetConnectionA
Library kernel32.dll:
0x4b0dfc lstrcpyA
0x4b0e00 lstrcmpA
0x4b0e08 WriteFile
0x4b0e0c WinExec
0x4b0e10 WaitForSingleObject
0x4b0e14 VirtualQuery
0x4b0e18 VirtualProtect
0x4b0e1c VirtualAlloc
0x4b0e20 SizeofResource
0x4b0e24 SetThreadLocale
0x4b0e28 SetFilePointer
0x4b0e2c SetEvent
0x4b0e30 SetErrorMode
0x4b0e34 SetEndOfFile
0x4b0e38 ResetEvent
0x4b0e3c ReadFile
0x4b0e40 MultiByteToWideChar
0x4b0e44 MulDiv
0x4b0e48 LockResource
0x4b0e4c LoadResource
0x4b0e50 LoadLibraryA
0x4b0e5c GlobalUnlock
0x4b0e60 GlobalSize
0x4b0e64 GlobalLock
0x4b0e68 GlobalFree
0x4b0e6c GlobalFindAtomA
0x4b0e70 GlobalDeleteAtom
0x4b0e74 GlobalAlloc
0x4b0e78 GlobalAddAtomA
0x4b0e80 GetVersionExA
0x4b0e84 GetVersion
0x4b0e88 GetUserDefaultLCID
0x4b0e8c GetTickCount
0x4b0e90 GetThreadLocale
0x4b0e94 GetStdHandle
0x4b0e98 GetProfileStringA
0x4b0e9c GetProcAddress
0x4b0ea4 GetModuleHandleA
0x4b0ea8 GetModuleFileNameA
0x4b0eac GetLogicalDrives
0x4b0eb0 GetLocaleInfoA
0x4b0eb4 GetLocalTime
0x4b0eb8 GetLastError
0x4b0ebc GetFullPathNameA
0x4b0ec0 GetFileAttributesA
0x4b0ec4 GetDriveTypeA
0x4b0ec8 GetDiskFreeSpaceA
0x4b0ecc GetDateFormatA
0x4b0ed0 GetCurrentThreadId
0x4b0ed4 GetCurrentProcessId
0x4b0ed8 GetCPInfo
0x4b0edc FreeResource
0x4b0ee0 InterlockedExchange
0x4b0ee4 FreeLibrary
0x4b0ee8 FormatMessageA
0x4b0eec FindResourceA
0x4b0ef0 FindNextFileA
0x4b0ef4 FindFirstFileA
0x4b0ef8 FindClose
0x4b0f04 EnumCalendarInfoA
0x4b0f10 CreateThread
0x4b0f14 CreateFileA
0x4b0f18 CreateEventA
0x4b0f1c CompareStringA
0x4b0f20 CloseHandle
Library advapi32.dll:
0x4b0f28 RegQueryValueExA
0x4b0f2c RegOpenKeyExA
0x4b0f30 RegFlushKey
0x4b0f34 RegCloseKey
Library oleaut32.dll:
0x4b0f3c GetErrorInfo
0x4b0f40 SysFreeString
Library ole32.dll:
0x4b0f4c IsAccelerator
0x4b0f50 OleDraw
0x4b0f58 CoTaskMemAlloc
0x4b0f5c CoCreateInstance
0x4b0f60 CoGetClassObject
0x4b0f64 CoUninitialize
0x4b0f68 CoInitialize
0x4b0f6c IsEqualGUID
Library kernel32.dll:
0x4b0f74 Sleep
Library oleaut32.dll:
0x4b0f7c SafeArrayPtrOfIndex
0x4b0f80 SafeArrayGetUBound
0x4b0f84 SafeArrayGetLBound
0x4b0f88 SafeArrayCreate
0x4b0f8c VariantChangeType
0x4b0f90 VariantCopy
0x4b0f94 VariantClear
0x4b0f98 VariantInit
Library comctl32.dll:
0x4b0fa0 _TrackMouseEvent
0x4b0fac ImageList_Write
0x4b0fb0 ImageList_Read
0x4b0fbc ImageList_DragMove
0x4b0fc0 ImageList_DragLeave
0x4b0fc4 ImageList_DragEnter
0x4b0fc8 ImageList_EndDrag
0x4b0fcc ImageList_BeginDrag
0x4b0fd0 ImageList_Remove
0x4b0fd4 ImageList_DrawEx
0x4b0fd8 ImageList_Replace
0x4b0fdc ImageList_Draw
0x4b0fe8 ImageList_Add
0x4b0ff0 ImageList_Destroy
0x4b0ff4 ImageList_Create
0x4b0ff8 InitCommonControls
Library shell32.dll:
0x4b1000 ShellExecuteA
Library winspool.drv:
0x4b1008 OpenPrinterA
0x4b100c EnumPrintersA
0x4b1010 DocumentPropertiesA
0x4b1014 ClosePrinter
Library comdlg32.dll:
0x4b101c PrintDlgA
0x4b1020 ChooseColorA
0x4b1024 GetOpenFileNameA
Library user32.dll:
0x4b102c DdeCmpStringHandles
0x4b1030 DdeFreeStringHandle
0x4b1034 DdeQueryStringA
0x4b103c DdeGetLastError
0x4b1040 DdeFreeDataHandle
0x4b1044 DdeUnaccessData
0x4b1048 DdeAccessData
0x4b104c DdeCreateDataHandle
0x4b1054 DdeNameService
0x4b1058 DdePostAdvise
0x4b105c DdeSetUserHandle
0x4b1060 DdeQueryConvInfo
0x4b1064 DdeDisconnect
0x4b1068 DdeConnect
0x4b106c DdeUninitialize
0x4b1070 DdeInitializeA

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49179 31.13.82.52 drive.google.com 443

UDP

Source Source Port Destination Destination Port
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 55368 114.114.114.114 53
192.168.56.101 60215 114.114.114.114 53
192.168.56.101 60384 114.114.114.114 53
192.168.56.101 62912 114.114.114.114 53
192.168.56.101 63429 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49713 224.0.0.252 5355
192.168.56.101 51378 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 53210 224.0.0.252 5355
192.168.56.101 53237 224.0.0.252 5355
192.168.56.101 56539 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 58367 224.0.0.252 5355
192.168.56.101 61680 224.0.0.252 5355
192.168.56.101 62318 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.