2.0
低危

045bbdc2407b1ac69d2902e1291e1b2ec66d517ab3221351683e7c8b92815dd6

045bbdc2407b1ac69d2902e1291e1b2ec66d517ab3221351683e7c8b92815dd6.exe

分析耗时

74s

最近分析

383天前

文件大小

30.6KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER ZBOT
鹰眼引擎
DACN 0.14
FACILE 1.00
IMCLNet 0.67
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Trojan-gen 20200430 18.4.3895.0
Baidu Win32.Trojan-Downloader.Waski.a 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200430 2013.8.14.323
McAfee Downloader-FSH!BD677EFF6D88 20200430 6.0.6.653
Tencent Malware.Win32.Gencirc.10b391b2 20200430 1.0.0.1
行为判定
动态指标
分配可读-可写-可执行内存(通常用于自解压) (33 个事件)
Time & API Arguments Status Return Repeated
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00410000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00420000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00430000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00440000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00450000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00460000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00470000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00480000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00490000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x004a0000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x004b0000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x004c0000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x004d0000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x004e0000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x004f0000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00500000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00510000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00520000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00530000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00540000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00550000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00560000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00570000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00580000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00590000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
failed 3221225496 0
1727545294.156875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x005a0000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
success 0 0
1727545294.171875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00400000
region_size: 24576
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
success 0 0
1727545294.202875
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00401000
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
success 0 0
1727545294.202875
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00403000
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1856
success 0 0
1727545295.390625
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00410000
region_size: 36864
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1640
success 0 0
1727545295.390625
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00400000
region_size: 24576
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1640
success 0 0
1727545295.406625
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00401000
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1640
success 0 0
1727545295.406625
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00403000
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1640
success 0 0
在文件系统上创建可执行文件 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\kdeohw.exe
投放一个二进制文件并执行它 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\kdeohw.exe
将可执行文件投放到用户的 AppData 文件夹 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\kdeohw.exe
一个进程创建了一个隐藏窗口 (1 个事件)
Time & API Arguments Status Return Repeated
1727545294.312875
ShellExecuteExW
filepath: C:\Users\Administrator\AppData\Local\Temp\kdeohw.exe
filepath_r: C:\Users\ADMINI~1\AppData\Local\Temp\kdeohw.exe
parameters:
show_type: 0
success 1 0
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 61 个反病毒引擎识别为恶意 (50 out of 61 个事件)
ALYac Trojan.GenericKD.1697200
APEX Malicious
AVG Win32:Trojan-gen
Acronis suspicious
Ad-Aware Trojan.GenericKD.1697200
AhnLab-V3 Trojan/Win32.Gen.C381686
Antiy-AVL Trojan/Win32.SGeneric
Arcabit Trojan.Generic.D19E5B0
Avast Win32:Trojan-gen
Avira TR/Rogue.AD.245651
Baidu Win32.Trojan-Downloader.Waski.a
BitDefender Trojan.GenericKD.1697200
BitDefenderTheta Gen:NN.ZexaF.34108.bqX@aWjiK6d
Bkav W32.FamVT.GeND.Trojan
CAT-QuickHeal TrojanDownloader.Upatre.AA4
ClamAV Win.Downloader.Upatre-5744087-0
Comodo TrojWare.Win32.TrojanDownloader.Waski.E@5ag7i4
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.f6d88b
Cylance Unsafe
Cyren W32/Trojan.QRPW-3514
DrWeb Trojan.DownLoad3.33216
ESET-NOD32 Win32/TrojanDownloader.Waski.E
Emsisoft Trojan.GenericKD.1697200 (B)
Endgame malicious (high confidence)
F-Prot W32/Trojan3.IMP
F-Secure Trojan.TR/Rogue.AD.245651
FireEye Generic.mg.bd677eff6d88bbec
Fortinet W32/Waski.E!tr
GData Trojan.GenericKD.1697200
Ikarus Trojan-Spy.Win32.Zbot
Invincea heuristic
Jiangmin TrojanSpy.Zbot.eekh
K7AntiVirus Trojan-Downloader ( 0049a3451 )
K7GW Trojan-Downloader ( 0049a3451 )
Kaspersky Trojan-Spy.Win32.Zbot.tblp
MAX malware (ai score=87)
Malwarebytes Trojan.Email.FakeDoc
MaxSecure Trojan.Upatre.Gen
McAfee Downloader-FSH!BD677EFF6D88
MicroWorld-eScan Trojan.GenericKD.1697200
Microsoft TrojanDownloader:Win32/Upatre.AA
NANO-Antivirus Trojan.Win32.Download.dcbulw
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM20.1.E760.Malware.Gen
Rising Spyware.Zbot!8.16B (TFE:dGZlOgQHxmwR/KEqmw)
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos Troj/Agent-AHGF
Tencent Malware.Win32.Gencirc.10b391b2
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2014-05-28 20:51:23

PE Imphash

5bafb291df732bd8895bcff11e861198

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00001c24 0x00001e00 6.272345797889654
.rdata 0x00003000 0x000003a0 0x00000400 4.453036927767144
.data 0x00004000 0x00000128 0x00000200 3.5971300161990216
.rsrc 0x00005000 0x000039b8 0x00003a00 5.3040287151624605

Resources

Name Offset Size Language Sub-language File type
JPEG 0x00005dfc 0x00000600 LANG_NEUTRAL SUBLANG_NEUTRAL None
JPEG 0x00005dfc 0x00000600 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_ICON 0x000063fc 0x000025a8 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_GROUP_ICON 0x000089a4 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL None

Imports

Library kernel32.dll:
0x40301c Sleep
0x403020 VirtualAlloc
0x403024 SizeofResource
0x403028 lstrlenW
0x40302c LockResource
0x403030 LoadResource
0x403034 GetModuleHandleA
0x403038 GetCommandLineA
0x40303c FindResourceA
0x403040 VirtualFree
0x403044 ExitProcess
Library user32.dll:
0x40304c GetMessageA
0x403050 GetSystemMetrics
0x403054 LoadCursorA
0x403058 PostQuitMessage
0x40305c ReleaseDC
0x403060 SendMessageA
0x403064 ShowWindow
0x403068 TranslateMessage
0x40306c UpdateWindow
0x403070 EndPaint
0x403074 DispatchMessageA
0x403078 DefWindowProcA
0x40307c CreateWindowExA
0x403080 BeginPaint
0x403084 RegisterClassExA
0x403088 GetDC
Library gdi32.dll:
0x403004 CreateCompatibleDC
0x403008 DeleteDC
0x40300c DeleteObject
0x403010 SelectObject
0x403014 BitBlt

L!This program cannot be run in DOS mode.
`.rdata
@.data
<U`v@@
$!0EZ1
+]]]Sh
3uI=Q0
PZ01`5k0Fj`pE48
EI8&2p
%uMwUSi3
Z07`5q0Fv`pE$8
EI8&pp
+uM}USo3
f0-`5Ec0Fj`pE,8
1uMUSu3
Z0/`5xi0Ff`pE,8
+lE%0E
;0E.0E/-EM.0E3mDB0E#
G100E7c0E
'0eUe+0
0E#mE_0E'
1*UpE1k0
83,fxU<FeZE{
F$I'IfuM ~uFF f35GfMU4<1en(V70Fj
4-'0E/+U
?Iq0Fvuq
D030CfFbH0pE$ .
0"pE$
Nj0FjU=
5uUsU<
4pE, =
-/0EK0U0
3Ie0Fjuq
UXE!0f0U
5Ig0Ffuq
,pE, ;
|pE$ `c]PU,
EIc0Fjuq
0E#mDR
0Ez@4pE, ?
`5Nb0FjU
EZPj?-?Z
MpE#0Z
Eg0Ff`/pE, U;
Nn0FvUz
`bpE$
pE, m,t3
5Ig0Ffuq
+dDa!dDa
taCnLaENKMZO
UyZFwZ
E!0g|J
29nG0i
n1:`ta
e@euV2
ta?nLaAL
EO10iE%
+-3)$s7
@dcPqpE
i~nxnA1
Sm0E-2
UXE1ppE
`-/0E8eseyx
%PpE)
10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E0E0E
0EC0E'0E
0E'0Ew0E0EI0EW0E0E0E0E0E0E0E
0E0E#0EU0E'0E0E+0E
0E0E0E50E0E0E%0E
REJ^EQUE[E
EcEY@E
JEN@E'0E
E&eETEe
E]YEU0EF\EP[ERDENRE
QE[0EJ@Ec_EOYELUE
SEP]E+0ETTEJ_EIGE
UE]UE#0E
CE)0EP@EJ^E/0Ep@EVBEV
0EYUE_DE
E+0EN@E_\EJSERDEN_EQE
0EQDEE\EO
EI\ES0E\
V_(eU6TE#GBEW_EFBEW^E
UEgUE10E
ET0E0E'0E)0E90EI0E
0E10E30Ek0E#0Ea0E'0E)0EG0E0E[0E10E30E0Ew0E%0E'0E)0E+0E-0E0E0E%0E
0E;0E'0E
0Eg0E}0EI0Eg0E0E0E0E0E0E0E0E0E/0Ea0E30E}0E#0E0E0E0E-0E0E0E10Ey+iB+F
5JgELy+UB+Fs)PU
NT)VBEjD cU1d^+JD
'hEqD5pU+{A0JD
1nEkD5^!uA0JD
'ErD ]U1{Q!i\ 1g
T)O(GhD
PE)FQ+GU
-GwQ5tU$g0Ex Bq)QSE;w U_!VU
%EdU$Uv,OgEw [Y)VY?V~@QD7O^
%)DjY1y_&FCEb Nv,M0Eu\6iS(S0E
RUE}s)PU
NT)VEw\ iv,OgEc)J@
FoQ!qR7NI
GB T0EEv7F|,MQ7fGwQ5wU 3DxD
VB Ot,US1PI
!M0E$G6eY+WgEzu
gS0egEu
kG\E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0EpEpEpEpE
^#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E'0E-1EG0E9030E50E'0E%1E&0E
0+0E-0E+0E11E*0Em0E{0EJ0E0E)0EC6JR)fH(MCx
Y&UC*G
(RY#VD
O_eg\+d
(NB*TV1
ydS0cD<!:e
B ZU6WT
[F,SW d=O
eU4ZC1Ju=FE1R^
geA0NU
GY+ND7F_7
E,jS \
U4jC1Fu=JE1N^
FU)!:e
7VE dU!Y3JU"J
6FE7VI{2
jFC R\<q
#0Ea0E
tus_ud
u7t0.thQtZOt
ttt4wB
pqxnqV_q
q0E%0E70E)4u3<u-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E%D0@
ExitProcess
FindResourceA
GetCommandLineA
GetModuleHandleA
LoadResource
LockResource
SizeofResource
VirtualAlloc
VirtualFree
lstrlenW
kernel32.dll
RegisterClassExA
BeginPaint
CreateWindowExA
DefWindowProcA
DispatchMessageA
EndPaint
GetMessageA
GetSystemMetrics
LoadCursorA
PostQuitMessage
ReleaseDC
SendMessageA
ShowWindow
TranslateMessage
UpdateWindow
user32.dll
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
SelectObject
gdi32.dll
GetProcAddress
PE)JQ+EU
Leaders agree to review EU policies
GetLastError
LastViewCtrl
v]$UY XV
French police move into Calais camps
oQ!qR7FI
fY1u_&ess
Lose a little advice on obesity
+<a_"m7
r:}*4HUC]=
J/dkMuF2s
d$20 "
ZJ2\L$a[
>uwcw\mn.
;APFp9(KH
&oVP@'<O
i~j4{Y
:A85j/
tz}nx!Px5&Zk
UU>]iC"&<
+B;"cr/A
<ga]^Q^t
(QGq}+8;3J<i
vs(;#w:uuP/sk
B#^`4m%1
GTPOl";Dll
U p=qn:tvs{_
Pw.~E<nj0dd
TGBWeo'
u:$$c=
\TetCXG}Ygu?
5!Ltko
_P\#tf^pFt
tm:v5Z.c9X2
"*<Gp$0[
?j<mq$r
U#Di9l\F;)3L?
j=q7f[
PAnE$0E+0E
0E0E-0Eo0E10E30E50E#0E%0E'0E)0E+0E0E1K1Y9
&J^*WR
^euceNT
/0E10E0Eq5Ep4
%0E'0E2D4:E-0E/0E10E
0E50E#0E%pE'0E)0E&1E-0E*1E10E30E50Ed0E#0' E)0E+ E-0E/0EA0E30E50E0EI0E'0E0E+0E-0E/0E10E30E0E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E0E+0E-0E/0E10E30E50E
U=Y0E0E)0E+0E-0E/0E10E30E
T$Y0E0E)0E+0E-0E/0E10E30Eu0
0E)0E+0E-0E/0E10E30Eu0
C7D0E0E)0E+0E-0E/0E10E30Eu0
U)P0E0E)0E+0E-0E/0E10E30Eu0
#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E/0E10E30E50E#0E%0E'0E)0E+0E-0E
M8w41p~k<7/<E
dDa?dDa
M0U'P=pE
0-7pE,dce:
'nUwE+ZFw1-/0
k8E+.f
eodla;
wE+ZGw2-/0
-f|aC`t
U,.?w[
0E$F[3xegX
ZDUP5pE
Y0E`gh1
yyyzzz2
--------:------bW-------)
. . . . . . . . . G;. . TI. . . . . . . . . . . . +
-/!/!/!/!/!/!/!/!G;/!G;/!/!--.!/!/!/!/!/!/!/!-
/!1"1"1"1"1"1"1"1"
u1"XL1"1"eY1"1"1"1"1"1"1"/!
1"2#2#2#2#2#2#2#2#2#2#2#2#2#2#2#2#2#2#2#2#2#2#2#2#2#2#2#2#2#2#1"
3$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$3$zzz
5%J<J<J<J<J<J<J<J<J<J<J<J<J<J<J<J<J<J<J<J<J<J<J<J<J<J<J<J<J<J<5%3
PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXC
C:\Users\tweller\AppData\Local\Temp\wzc66c\Report.scr
C:\JKZRlSDZ.exe
C:\RYeeJa3Y.exe
C:\z_SRbIoZ.exe
C:\A40iTe2W.exe
C:\6XU58w_1.exe
C:\B4wNHhPh.exe
C:\r9H4xMg2.exe
C:\Bkmpfp39.exe
C:\tIygPVhg.exe
C:\iJDJFyip.exe
C:\19uXPmVh.exe
C:\WcraD5DL.exe
C:\OPiF0xnH.exe
C:\f8pskT0B.exe
C:\eyDydpmE.exe
C:\eLLe4uiq.exe
C:\Hoq3a_gC.exe
C:\TkORDdCI.exe
C:\Qw7KhDpK.exe
C:\rpwyGTvj.exe
C:\339DdKiU.exe
C:\FAHDKfte.exe
C:\ciIv4ctX.exe
C:\lF9pn8rH.exe
C:\SHr_K1zW.exe
C:\5mzHXk_W.exe
C:\YNyCeDKy.exe
C:\tWN3SxyA.exe
C:\iyoddxmJ.exe
C:\SJbczahW.exe
C:\RHgqCxIL.exe
C:\lF6lq5iq.exe
C:\Ps1WP5ro.exe
C:\rX32fuMj.exe
C:\yS4pdiN_.exe
C:\cYzsOHxg.exe
C:\NBMosjxL.exe
C:\1pQ5Md4o.exe
C:\aP7jbfsV.exe
C:\Sz2OcM3S.exe
C:\QbobOtnc.exe
C:\mw6HYBdN.exe
C:\XCPFr0mC.exe
C:\oQ_rNi6A.exe
C:\Users\John\AppData\Local\Temp\eCmkvotajiai.exe
C:\Users\admin\Downloads\0e7d34443afff07ee5b9fb2c3e32026e.exe
C:\bafa47c33c02e7990eea27c399dfceb047354483e13c71533d57dd11151fe7fd
C:\f47245dc0181ec3fb995df6f36417f52711c0257e590a4c78856e1ad9ae1e6aa
C:\eae696826bfbb49bf12dc9e0f5b5639434d42394a963eaeb5d1e39beb8978c36
C:\Users\admin\Downloads\kdeohw.exe
C:\d315a2e8fb495f08f19e76450f37b9d0df6139f079ec34d27fd1ec57788728bd
C:\b6740f94204fb82abeaf238025be021840fe93332ff95f210adf8a77d36aca02
C:\d61a34d869c64ac5a6c6b53b20761e60b687da00250a0286155300dc9a318b5e
C:\d9af88bc45c9bf09aa2784c8473e247bb9e24ec83587f4a1ccbfe1c42c4bb344
C:\Users\admin\Downloads\kdeohw.exe
C:\Users\Petra\AppData\Local\Temp\kdeohw.pe32
C:\Users\RA491~1.VUL\AppData\Local\Temp\512258021226a79de7bd7020b15ae8da.exe
C:\05bfb5afd9d7bd95919d9caed0d07d11bfd6a42b54ef909f980fe9a7eb532979
C:\41250c2bf85617c606bbe7b4c7967e0bfcaa208caf0b691cdd094364cfbfa748
C:\c33dc65d6d8a35326071f7c972d8de8ed2b875ab0d8c1fd2e8adddb71abc8e9b
C:\e9437122ba3df0d280b48c706e56a9a58a175a080a7d57af9fc7e564b85cba38
C:\0b9679dd57c2c8a52c41e746b2d166b6918a2f4ce598abbb158467e09f117ff9
c:\task\90897A8E872609A9B05200218D1E6C6B.exe
C:\Users\admin\Downloads\d471566fae81733ce6a64056ccacde23.virus.exe
C:\Users\Petra\AppData\Local\Temp\kdeohw.pe32
C:\Users\RA491~1.VUL\AppData\Local\Temp\293dcf32976d6163f171421bd65b04c6.exe
C:\Users\admin\Downloads\kdeohw.exe
C:\f3eb94ed94b40d5789fb36168dc83b5b8eeacc3cd772eb48fc2d11f4e7102509
C:\2ae9c30c67edbc2bde798ddd630a70c087acc8044646ee13c3f9b9827c23edc9
C:\6eae091cd9a5bf1914570421f5815ad59946ae80d82b6b918eacc41a39bcf4cf
C:\5cfbfe72b4fdd2197a6ccac217f919bbf56f663c6183776e30a76af5fe99c72a
C:\cb2084de1aae0284952a267c6f7e9ecdb98e02dbc01104c51eb2425d379e9d51
C:\Users\admin\Downloads\kdeohw.exe
C:\1fc10a75f2da8b1a23d8f2e0733214466302987882e8d851809e50ec5573c9dd
C:\Users\admin\Downloads\kdeohw.exe
C:\Users\admin\Downloads\8737543e6b41bff61c2067488680a0ff223705387ff3e9121891a2ff8a784419.exe
C:\28a834ec9a53bc7006f35fb6c261dc7e59529eae8d0039a40d395055c3eca231
C:\Users\Petra\AppData\Local\Temp\kdeohw.pe32
C:\de2487d38e53ee38d3b2caa6d2c4c307be4c61d647116f46a705cac30e05d37b
C:\Users\Petra\AppData\Local\Temp\kdeohw.pe32
C:\31cee2bed9b006f9f365c3c96e703a13dbc684845ce96419a33773d9d5a19920

Process Tree


045bbdc2407b1ac69d2902e1291e1b2ec66d517ab3221351683e7c8b92815dd6.exe, PID: 1856, Parent PID: 1784

default registry file network process services synchronisation iexplore office pdf

kdeohw.exe, PID: 1640, Parent PID: 1856

default registry file network process services synchronisation iexplore office pdf

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name 5479aeedad971f08_kdeohw.exe
Filepath C:\Users\Administrator\AppData\Local\Temp\kdeohw.exe
Size 30.8KB
Processes 1856 (045bbdc2407b1ac69d2902e1291e1b2ec66d517ab3221351683e7c8b92815dd6.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 8740722871170dc0873717e8950d49d5
SHA1 6a0cee3c04b98c91dd0dc9a34ae1c6c54d116f74
SHA256 5479aeedad971f08d6387ae804f5c1d5f478c352585816d4f85cd84238bbc15b
CRC32 CD82F52D
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.