1.2
低危

05ecf3df75c6c5175c3a0db12d12a12938c5adb7460a0542b48ab64eb1bf689f

05ecf3df75c6c5175c3a0db12d12a12938c5adb7460a0542b48ab64eb1bf689f.exe

分析耗时

147s

最近分析

391天前

文件大小

22.4MB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN WORM SILLYP2P
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.73
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:SillyP2P-X [Wrm] 20200805 18.4.3895.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200805 2013.8.14.323
McAfee GenericRXII-GG!CA83CFB218EF 20200805 6.0.6.653
Tencent Trojan.Win32.Small.p 20200805 1.0.0.1
静态指标
可执行文件包含未知的 PE 段名称,可能指示打包器(可能是误报) (4 个事件)
section .text\x00U
section .data\x00U
section .rsrc\x00U
section .luczwh
行为判定
动态指标
该二进制文件可能包含加密或压缩数据,表明使用了打包工具 (2 个事件)
section {'name': '.text\\x00U', 'virtual_address': '0x00001000', 'virtual_size': '0x00005b50', 'size_of_data': '0x00006000', 'entropy': 7.716520750193899} entropy 7.716520750193899 description 发现高熵的节
entropy 0.5454545454545454 description 此PE文件的整体熵值较高
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 55 个反病毒引擎识别为恶意 (50 out of 55 个事件)
ALYac GenPack:Generic.Malware.SN!hidprn.030880FE
APEX Malicious
AVG Win32:SillyP2P-X [Wrm]
Acronis suspicious
Ad-Aware GenPack:Generic.Malware.SN!hidprn.030880FE
AhnLab-V3 Worm/Win32.SillyP2P.R3740
Antiy-AVL Worm/Win32.Agent
Avast Win32:SillyP2P-X [Wrm]
Avira TR/Dropper.Gen
BitDefender GenPack:Generic.Malware.SN!hidprn.030880FE
Bkav W32.AIDetectVM.malware1
CAT-QuickHeal Trojan.GenericRI.S7343428
ClamAV Win.Worm.Sillyp2p-7194313-0
Comodo Worm.Win32.Agent.NIQ@8hjo1v
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.218efc
Cylance Unsafe
Cynet Malicious (score: 100)
Cyren W32/S-bc50cc43!Eldorado
DrWeb Win32.HLLW.Xiquit
ESET-NOD32 Win32/Agent.NIQ
Emsisoft GenPack:Generic.Malware.SN!hidprn.030880FE (B)
Endgame malicious (high confidence)
F-Prot W32/S-bc50cc43!Eldorado
F-Secure Trojan.TR/Dropper.Gen
Fortinet W32/Parite.C
GData Win32.Worm.Agent.ASR
Ikarus Worm.Win32.Agent
Invincea heuristic
Jiangmin Trojan.Generic.dztur
K7AntiVirus Trojan ( 005568151 )
K7GW Trojan ( 0000da801 )
Kaspersky HEUR:Trojan-Dropper.Win32.Daws.pef
MAX malware (ai score=87)
Malwarebytes Trojan.Agent
McAfee GenericRXII-GG!CA83CFB218EF
MicroWorld-eScan GenPack:Generic.Malware.SN!hidprn.030880FE
Microsoft Worm:Win32/Ymacco!rfn
NANO-Antivirus Trojan.Win32.Xiquit.fyviqi
Qihoo-360 HEUR/QVM19.1.090E.Malware.Gen
Rising Worm.Agent!1.9D8A (RDMK:cmRtazoUqwuOuqttJ30O2+Zweg3b)
SUPERAntiSpyware Trojan.Agent/Gen-MSFake[All]
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos W32/VB-FFH
Symantec W32.SillyP2P
TACHYON Worm/W32.SillyP2P.Zen
Tencent Trojan.Win32.Small.p
Trapmine malicious.high.ml.score
VBA32 Worm.Small
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2004-05-07 07:02:15

PE Imphash

27f21db1a40f044cb2ea9aa7f88716f6

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text\x00U 0x00001000 0x00005b50 0x00006000 7.716520750193899
.rdata 0x00007000 0x000009ac 0x00001000 3.7370867281067
.data\x00U 0x00008000 0x00003478 0x00002000 3.4292108023403616
.rsrc\x00U 0x0000c000 0x00000958 0x00001000 2.492413503122149
.luczwh 0x0000d000 0x00000400 0x00001000 2.124462985678828

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0000c408 0x00000128 LANG_SPANISH SUBLANG_SPANISH_MODERN None
RT_ICON 0x0000c408 0x00000128 LANG_SPANISH SUBLANG_SPANISH_MODERN None
RT_GROUP_ICON 0x0000c530 0x00000022 LANG_SPANISH SUBLANG_SPANISH_MODERN None
RT_VERSION 0x0000c558 0x000003fc LANG_SPANISH SUBLANG_SPANISH_MODERN None

Imports

Library KERNEL32.dll:
0x407010 FindClose
0x407014 FindNextFileA
0x407018 GetModuleHandleA
0x40701c GetStringTypeW
0x407020 GetStringTypeA
0x407024 GetModuleFileNameA
0x40702c FindFirstFileA
0x407030 Sleep
0x407034 HeapFree
0x407038 HeapAlloc
0x40703c GetStartupInfoA
0x407040 GetCommandLineA
0x407044 GetVersion
0x407048 ExitProcess
0x40704c HeapDestroy
0x407050 HeapCreate
0x407054 VirtualFree
0x407058 VirtualAlloc
0x40705c HeapReAlloc
0x407060 GetLastError
0x407064 CloseHandle
0x407068 WriteFile
0x40706c ReadFile
0x407070 TerminateProcess
0x407074 GetCurrentProcess
0x407084 WideCharToMultiByte
0x407090 SetHandleCount
0x407094 GetStdHandle
0x407098 GetFileType
0x40709c RtlUnwind
0x4070a0 SetStdHandle
0x4070a4 FlushFileBuffers
0x4070a8 CreateFileA
0x4070ac SetFilePointer
0x4070b0 GetCPInfo
0x4070b4 GetACP
0x4070b8 GetOEMCP
0x4070bc GetProcAddress
0x4070c0 LoadLibraryA
0x4070c4 SetEndOfFile
0x4070c8 MultiByteToWideChar
0x4070cc LCMapStringA
0x4070d0 LCMapStringW
0x4070d4 CreateDirectoryA
Library USER32.dll:
0x4070dc MessageBoxA
Library ADVAPI32.dll:
0x407000 RegSetValueExA
0x407004 RegCloseKey
0x407008 RegOpenKeyA

L!This program cannot be run in DOS mode.
/<kRkRkR
^iRYjR\gRXWR
AlRkS\RDiRTjRRichkR
.rdata
@.data
@.luczwh
KJ/Odk
HYo0Y!jV1C
?ej#dU
HAwiL-BMA
17KeCs5
??lP!V1CCCqV
L,FZG/
a"&C0'n
;=iqC:
kV73iT=
8xxd"?
~[)JdI:aC
@obuSU
Cfkc"1U
a"&C<>'n
JnC"S<]
)33Pbq?otUk
"K<g{?&Jv
"S<]y[Ut8a
6lX)77b
5m&Qjlmm`
HYw<}bwoN{
k{c"{'
[;-iqi!C
~/3Hq?o`
Ci!C_N
cA@^7)
EN~k"U
?~[O
a"&C4'n-
6K<G?/'kA:Y
yk!C]H
n7xxw>K<
~[#5Pvq?
!bxI:a
ft(o&z
~[)77@jq?
(c[X</jqSU
~[y@bq?
v[Ut^L
~-'kA:uL
g).W94ZiSU
E"C@{2
#/?kA:
?O|FF\B
*dC#d=fF
}O!j5f(G
|&Qjlmm`
ksUk8'nPC
Rg>U_+0t?
`|JNfO(cH]
Kb9Vg2
>nX!->F
C,jDDj
)?cWoCK
6lP)67j<
A0Y!x5n@(9c!T
ECkvo.B+
g|p=)0
+UH]su'
?lP!5j
g).WHA
sKw&7J777n
HI}-u:a
nC<b$/FvpC/
|??d<V
ic!CL(
}[U6@q?9w
]EU_}[U
<xxy;Jj)O
Or?xq!
j7!rB:a
>:Kk4b
r!bB:a
zK{oCo&
g""Cj?
~~@<*?!
a."C9:'n
kDqwc(+8/7
ZHC:??
aqCC9
BDG-h"
?/Mc@;@^Cwxo&w
lX.7Az7i
MMyqOo
\l3Ld@
5<jX!2_@*
C/t]lBAf~
Vrc7Q:!k"7zjy
Ny~kV7
/lF:7?
?xxqF4|u@BslXA
|NQqI{sN
=lyUVjC}j
q/mNlb6
q?x|"?2lq
k"@p[;
6PGDO*
@i[(aV
?mb|X;
_Nr)qo
KSBF=k
J"5J_:@j.)x=
gc5B[\.
}Nqoc
~JizAGf
?[A3D:iRfg
$NC76
k??Cy|
/d|BWGs~
oHPJAs
(#5GKg&.]E/
o{d74
|;$!yf@`lX)
~M~qJh7B3sn
?gRK's,z
EG~k"USwL
R$$/Ftpd
-&?qq)~wDtF:
%7JV=C
c3R?yY=|#
8ydzG=/rrG77o]
</d[~,A
Gk"WH@{O
"KlP!eNh0
C]C/'?$!8OUN
5f0VwM(W=?
l!czL6NC
tqCK{s
x;vfW#
oX+"xN
27!5pUEG
cALGI@o
pa|[52_Cawi+%
Z+@[?O\U
Rd$d4Ng\qE]]
MuCy<'ny/
?BHEpqIC
'jWdy[.
Ln\#`4
AwFPBe>
L=-7Codr
@yJwaj>
?CcA:hN(!<Cn
MKIC8wLT
ClqK9q
R"d$/F5
'7AycC
Dq-']]
COxXwUP/
yzk"U}2
G[~?[7f0
^7J?':3
zj8UVWClq
:3gsQ@:a
k"WG\L
=@Gs+"
KK~!'mG}exo+"NI
8@MG}exo+"S
,4??;#R{C
osGc2JHl*Z~15
ug/&5KL{i}-x`3
pEe7JR $
HpEe7JR $
wy@![5??
Rb6I/k
FgKvzt_
IJ}.]W
kQb7KM
2JH/l*~1
k6??_;
N9f-!V
HIwaHg'4
GC_+"S(
3_KqBvd
p_o2]|Js)?c
hq8Kv3xi,|38
/#OA>'R^r"
:UG5'UXD
:/j[5aw?C
17Kq3#V6J<0uKG|Mr+
8jA:KfC(gC
.sk>?0Y
<()lAL
6k"]S9$QHS(r
)u_+y?
0YJ)L7n6
8xgY*~,F
ZtbAq?xwF;B
?B?L_|[UV7fL
{*SxD
5J7BFruj
sWJI]WpCC[-a`
j&5B{?n
s?xwFT;d
</e?>>6Eqi!C_<
*J$C:an
W9CCo=k"?
#CDpVtt
zJ)<{n @M
K{iHAYnO|RL
r^|6{{rd
?jDBhp\6{ws
Lv|)%55i
o.75I'M5>
FM;M0F
!d>6EGbU
Ou'/@jC
/+VJxykAj}EHm
_e5~h$
/gW1J/\J
yP_<ywiLOFZS
J7j'p:Kqsx
rk"]xHqs q~
s`g!FG
eT dBj_=Gqwg
%)Vj[Uw+
c"HH[3
#2O??[
A3xs+"]+
>Ziy(w
;~k"U\L
p!)@_M
a_km'x6yK
uugO:v'+O
fk"C:??[y
;v:uJqx{+"HX[;l=&?BkV1;K_
"|S{??@
MCNCkWT
IW0_I$DONu
+s+"C6K-
c55x}IeC
6JC3BKL+cA]
Y[Ux@s3^
W??:g&k
>@Gf;#<xV5ANHG
(^F/3)xL
;wO-q?
x5f&"(}
oe?7C]
O|_2FXNCGrR;U
k?yyAFI
bCkU>U
&JYT~%NO
*T=#)-@q?
agTU(?
Kb9Vg'
7&HMcol@:aJE
/7:N+q
??dyst
?f{XAoC
CU'r@:a
fy({[<
vd^?xxL_{+"S9o<o
3xk+"u
>SmWO)
o*f[|[
o!t_l[z
_??gM4
KK}!'mG}exo
qGb3HHn+B|0)
te/.7KM{hu/yd7
9!cY??l~Ss
3da?c@6
HH+n+|0
hDj/UG&
0>b7JR $
=Dg@Gs+"
#[|V?:5
FvCKxqH_
slSe5j!apN+
H@]|3-
ywUi$e
>cCUN;
07=<X
w@V66B
~?lU7H
?<F{m"
[=Cl=F
<zf~aO
 Kxw)wm7AI
?~RzZa6~?s
iW<B<L6dy
g!03@]tzMH
E7xmiH!A
c7n6AeC"
M?'nF:O(R
xxO&[|
FGIDqGo
<Ag!?^_K
>k"iHAsYfx[
*eJ?xz
"+Mhf;Pr
7HP[+l
Vm+W*KH[
(k4'!NgUp
vW!?ky
d[5)?k"?p A
pG6Tc6x
Cvx>P;
-$'*k"1
b?>yo)
!^r!CO
mVlrp@:ac
rq??#K
+y?'rpC:a$'U2B<Z/i
R?aKq8
cA.}.&
*cz}|6
'?==1C
&,"=u\
BwS8vor?x=
YL+"!jw??F1
:~t!/c
d5OENUU+<
"fmdVHxZ']1
<AlztlA\
]5:77E
/[Jzf~adG)
nz+"\+2
\rc)?NC7O
X/X5DYf|
5LsB) A:
1L<KcAd
lF45)&Co
U(C@s~-:.C
zz{xFPq
dk"qAU~
|??lqStjI
!yc&SZCgX<yk/kf^n
dXU|Zx
v0WCzj!
CMyO6<Z
x#|=be
WCzZ,W
UV<7xw
~Vd~\UX_
g1J'\)Ws
,A'J:[qO
{"j!0~
*5z[,i
zuHDqf
U|:Sqst
H@[;bS\4KK~
CCOx
BwA:F?D:
G{[f\~[47b7
WTLtf~Vf
`h````
ppxxxx
(null)
runtime error
TLOSS error
SING error
DOMAIN error
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
abnormal program termination
- not enough space for environment
- not enough space for arguments
- floating point not loaded
Microsoft Visual C++ Runtime Library
Runtime Error!
Program:
<program name unknown>
GetLastActivePopup
GetActiveWindow
MessageBoxA
user32.dll
GetWindowsDirectoryA
GetModuleFileNameA
GetModuleHandleA
FindClose
FindNextFileA
FindFirstFileA
KERNEL32.dll
MessageBoxA
USER32.dll
RegCloseKey
RegSetValueExA
RegOpenKeyA
ADVAPI32.dll
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetLastError
CloseHandle
WriteFile
ReadFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
SetStdHandle
FlushFileBuffers
CreateFileA
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetEndOfFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateDirectoryA
Winamp 5.0 (full version).exe
Winamp 3 (full version).exe
Winamp 3.5 (full version).exe
Update Photoshop 7.0 to Photoshop 9.16 (Its Work!).exe
Update Photoshop 8.0 to Photoshop 9.5 (Its Work!).exe
WinAce 3.85 (with Serial).exe
Download Accelerator Plus (DAP) (full version with serial).exe
RealOne Player (Full version).exe
BsPlayer v3.exe
WinRar v6.11 (with crack).exe
WinRar 4 (with crack).exe
ContaWin 2000 (full version).exe
WinZip 9.exe
DivX 7.2 freeware.exe
3D Studio R8 (It's Work!!).exe
VirtualDub 2.1.4.exe
MSN messenger 6.3.exe
Hacha Profesional Edition.exe
Simpsons pack guiones (Temporada 2004).exe
Mazinkaiser pack fondos de escritorio.exe
Mazinkaiser comics pack.exe
Juegos JAVA para NOKIA.exe
Capitulos ineditos de DragonBall Z jamas emitidos.exe
Pack Tonos y Logos para Nokia.exe
Nero 7.5.1.0 (cracked!).exe
Pack Photoshop CS 8 plugins.exe
3D Movie Maker.exe
Silent Hill.exe
PSEmu.exe
RM2GBA.exe
WAV2MP3.exe
GBAEmu.exe
GameCube Emulator.exe
Pack 50 Juegos PS2.exe
Pack 25 Juegos GameCube.exe
Resident Evil for GameCube.exe
Visual Basic 6.exe
Visual C.exe
Visual Studio (full).exe
mugen (full).exe
Fuck my fat ass.avi.exe
German extreme violation.mpg.exe
Sexo con una menor.exe
Pedofilia pack 37 pics.exe
Follada brutal coo roto.exe
Lolita Pack 20 Pics.exe
Puta come mierda.exe
Solo para Maricas.exe
No lo Descargues.exe
Dont Download.exe
humor.exe
Dont Touch.exe
Hentai.exe
Matrix Wallpapers.exe
Terminator 3 Wallpapers.exe
Hentai Evangelion Poker.exe
Shinchan screen saver.scr
Hentai Shizuka clit.exe
a pelo.exe
Chenoa en cueros.exe
WinAmp skings and plugins.exe
FlashGet Max acceleration (Experimental).exe
VMIntel386.exe
C:\Gusanillo QueBonito@Compartir.es
Hola tio! soy el gusanillo
como va eso?
Error in zip file
El archivo tiene un formato desconocido o est daado
Zip message
El archivo zip no ha podido ser abierto
probablemente este daado
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
256mb 32bit
VMIntel386
/Intelx386
/VMIntel386.exe
Pack sex very hot nude young girl porn erotic private pussy rape clitoris suck chicas fotos culos tetas coos mamadas corridas sister hermana amigas friends lesbianas mujeres desnudas putas guarras hentai.exe
EMULE.EXE
config/shareddir.dat
012345: :
SOFTWARE\Kazaa\LocalContent
012345:%s
DisableSharing
SOFTWARE\Kazaa\UserDetails
QueBonito@Compartir.es
012345: :
SOFTWARE\IMesh\Client\LocalContent
012345:%s
DisableSharing
SOFTWARE\IMesh\Client\UserDetails
QueBonito@Compartir.es
33333330
{{{{{{{3
{{{{{{{33
{{{{{{{330
{{{{{{{330
{{{{{{{330
3333333
33?030
33333333
wwwwwwwwwww
DDDDDD@
DDDDDDGpw
DDDDDDGpw
DDDDDDDDDDD
wwwwwwwwwww
DDDpp@
KJ/Odk
HYo0Y!jV1C
?ej#dU
HAwiL-BMA
17KeCs5
??lP!V1CCCqV
L,FZG/
KJIOk@
KIhR'@
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUk
(null)
((((( H
VS_VERSION_INFO
StringFileInfo
0c0a04b0
Comments
Microsoft
CompanyName
Microsoft
FileDescription
Microsoft
FileVersion
1, 0, 0, 1
InternalName
Microsoft
LegalCopyright
Copyright
LegalTrademarks
Debido a que es un Gusano, no creo oportuno rellenar este cuadro. jejeje
OriginalFilename
Microsoft
PrivateBuild
Microsoft
ProductName
Microsoft
ProductVersion
1, 0, 0, 1
SpecialBuild
Microsoft
VarFileInfo
Translation

Process Tree


DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name e24d75dd29f6976c_capitulos ineditos de dragonball z jamas emitidos.exe
Filepath C:\Windows\Intelx386\Capitulos ineditos de DragonBall Z jamas emitidos.exe
Size 27.3MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 5b0f11a8a4cfba2e5e0dfc256497e074
SHA1 d6e6232e20818d778fa15f7541ceafcb88d76318
SHA256 e24d75dd29f6976cc46c46969c4feb82eda970b91448c6ed10b196efd5ca2e90
CRC32 841D2870
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 23f345d679ca3c79_pack tonos y logos para nokia.exe
Filepath C:\Windows\Intelx386\Pack Tonos y Logos para Nokia.exe
Size 14.5MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 4e48a99f04a5c0cf65e6625d25c434ab
SHA1 d74ac0b81d05fef3ac6bc55f2a0a267dfd942ba0
SHA256 3a495b30cbe15c3d2e0be8e48c34919ab4d2ad7ef600ae3a12856efe441dcc0f
CRC32 5DE4065E
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name cdc3d3bbe7fb2f22_pack tonos y logos para nokia.exe
Filepath C:\Windows\Intelx386\Pack Tonos y Logos para Nokia.exe
Size 24.0MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 56950b19a0e322e9156ea3a18aaca499
SHA1 50bc9bd46f2c6148b3e5ecb1979a66312c2e5122
SHA256 98010523a420d3c065ecc522e5785577d38d0bb4197d5b0aecb9d2f27e7df2e1
CRC32 90C566FE
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 507a7b629c49295c_mazinkaiser comics pack.exe
Filepath C:\Windows\Intelx386\Mazinkaiser comics pack.exe
Size 22.7MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c9147f06a35f4227ee01305d74eb09a8
SHA1 809219de65752289f01ac8da97ea872c8d79ffca
SHA256 507a7b629c49295c3c88c6c093fbad6c9dbc42704090b75e1d5586c548176728
CRC32 58375752
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name b99d1363f4e561eb_capitulos ineditos de dragonball z jamas emitidos.exe
Filepath C:\Windows\Intelx386\Capitulos ineditos de DragonBall Z jamas emitidos.exe
Size 11.5MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 2aaa733520a5dc3a3c0057573a103e71
SHA1 f602bcdef3dd54b0fff80d9f18211d24a4981a9b
SHA256 70f753a497957792a5b37ce9677dd4f568fe2265e93de6ad4bba08f4d63e383b
CRC32 C334BF63
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 57cad40dc94774ec_pack tonos y logos para nokia.exe
Filepath C:\Windows\Intelx386\Pack Tonos y Logos para Nokia.exe
Size 20.6MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 0b6942a3feac06ad18b5cbd0585383a0
SHA1 7fb7f349b6cee1f8ffeb5e5505e1ecd540fd7c81
SHA256 6a4c9fac8144745900378191e5ee8ca62c30289bfe0d069f8389cb8f4a38e0b9
CRC32 F7B7A568
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name c7f0eabde5c60422_divx 7.2 freeware.exe
Filepath C:\Windows\Intelx386\DivX 7.2 freeware.exe
Size 23.3MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 a33b19dd763c104d684d210169a333ee
SHA1 adb9ebb9c462ca382aceb1a3d7151bee03e3ce4c
SHA256 c7f0eabde5c604226e05b82c4c19b1cb73116cdb71a088daa9a43669551c985a
CRC32 1CF96E70
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 35cb9e90fdbc948c_winrar v6.11 (with crack).exe
Filepath C:\Windows\Intelx386\WinRar v6.11 (with crack).exe
Size 24.7MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 9deb5906512bf513b147aa4db73aff1a
SHA1 6ea86b60ed5485b675c77fabcae8228d55cd62f2
SHA256 35cb9e90fdbc948cad9a49739604c7656bc5815594107c21fc4158d0d55c4811
CRC32 563B8101
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 25afbb97410c0f00_pack tonos y logos para nokia.exe
Filepath C:\Windows\Intelx386\Pack Tonos y Logos para Nokia.exe
Size 5.5MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 111ee38fdc14d05d7e333d28f8191510
SHA1 bc857343d9e8b9230557f2183bccf895cfe290a9
SHA256 1426ac6d8e31df1cb5f01b80ebc2b2a82626a08e6858920e5dd6428a5fa55a3d
CRC32 951EC441
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 222a5fa321dddc41_update photoshop 7.0 to photoshop 9.16 (it磗 work!).exe
Filepath C:\Windows\Intelx386\Update Photoshop 7.0 to Photoshop 9.16 (It磗 Work!).exe
Size 24.0MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 4a7fa3ec3996a33c6938ff3b08d1c290
SHA1 b471d67a55809a8ea6046130caf323b387c1b4a2
SHA256 222a5fa321dddc4128fb1b33feba7c37e9b464c1420d9fc666f00665ed97434b
CRC32 3715853D
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 24d97b925c7d0024_update photoshop 8.0 to photoshop 9.5 (it磗 work!).exe
Filepath C:\Windows\Intelx386\Update Photoshop 8.0 to Photoshop 9.5 (It磗 Work!).exe
Size 24.2MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 afac1e4372ab7148d9354ce33b90ed85
SHA1 81b969b4d004739d401e76bc7c357456a92bf716
SHA256 24d97b925c7d0024aa495f9039e4d58cc8a7a0f8c4677945df10933fe4b412d2
CRC32 296FBEBB
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 3cdb05880a95cc63_pack tonos y logos para nokia.exe
Filepath C:\Windows\Intelx386\Pack Tonos y Logos para Nokia.exe
Size 9.7MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 71fa2fccd856db03885e749be624412c
SHA1 32d1c0023f51a83992a45051677101837b2b752c
SHA256 5bb53569abee27c710a050baa41d79e1bbfa05b18bed6fb7e26d0cc4c9885051
CRC32 4D2778F2
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name c1130a91c47c3a86_capitulos ineditos de dragonball z jamas emitidos.exe
Filepath C:\Windows\Intelx386\Capitulos ineditos de DragonBall Z jamas emitidos.exe
Size 14.7MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ff30bf6b36670a1646c7bf5459c25dea
SHA1 dbba424ec67a56e32af6ac233f8de8bc690e80c3
SHA256 9cf4d7183c0262869b5eaf5f4d66108fb78965143faf6472b191423172dd6767
CRC32 1ADEDFB1
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 9b2abcd270020234_nero 7.5.1.0 (cracked!).exe
Filepath C:\Windows\Intelx386\Nero 7.5.1.0 (cracked!).exe
Size 10.6MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 235dbce3d9f1574b3153001ae63f5e31
SHA1 45b07a642736d22de1e53c05ff9a7291700c1f88
SHA256 8e1b48d8c59040ae6f4bc9382b3915a8406b1d745d32de4673b033eb18979e99
CRC32 65DBEBD9
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name faefb3f3f92ab796_3d studio r8 (it's work!!).exe
Filepath C:\Windows\Intelx386\3D Studio R8 (It's Work!!).exe
Size 31.1MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 99f01837130cac302ae1ad2c23ede557
SHA1 3829b6a556ab41779af228bbd307016ec6f51bee
SHA256 faefb3f3f92ab796abb6d280831193e8fe3d1fde3a3688d4ac44dceae046152a
CRC32 41D45F45
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name affc56a090174f68_pack tonos y logos para nokia.exe
Filepath C:\Windows\Intelx386\Pack Tonos y Logos para Nokia.exe
Size 7.5MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 671c64e9e31073d531803c137314d5c7
SHA1 9e91582ef3e2faa8e7ea3d37307fc35e77df4cde
SHA256 7470de13d62717ffef4c41d79b121a7ff5fa5aad1f65be074c60c824a4d3e3ff
CRC32 659FDB96
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 08c888783a3aa544_pack tonos y logos para nokia.exe
Filepath C:\Windows\Intelx386\Pack Tonos y Logos para Nokia.exe
Size 17.4MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 9d84242609aef453a83033c513b8ae1c
SHA1 935679bc174a3ac973375f03c10d95b3ce35825b
SHA256 c1e30e9f774ca26c5c35798186146e1a9b94b133be62106e170434cbd2d06248
CRC32 D44A6B48
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 5cb77bb9c28fdbde_winace 3.85 (with serial).exe
Filepath C:\Windows\Intelx386\WinAce 3.85 (with Serial).exe
Size 26.1MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 7b4de22f812362447ff460de6cfc9fca
SHA1 8700458e58097af508a93df530e773a7ab76885e
SHA256 5cb77bb9c28fdbde2b1793ff32fa8fcfacfc0290d0d09ca34275440376c8db6a
CRC32 A8C52433
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 28a87d02c6aaa79c_pack tonos y logos para nokia.exe
Filepath C:\Windows\Intelx386\Pack Tonos y Logos para Nokia.exe
Size 12.4MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 a424b8288a1da25eeff52a2b962a96c2
SHA1 561c7704115e87ca7c105e0791d05d1c1d5a6fcf
SHA256 5e1c2c9aa4d4d92d03d40716e08cf294ce72344fc353e899a73f06a9ed2131de
CRC32 240CC4FE
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name fcf8201ffa61d309_contawin 2000 (full version).exe
Filepath C:\Windows\Intelx386\ContaWin 2000 (full version).exe
Size 23.4MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 e870b6550019b10552c035abf5b58c14
SHA1 15da81aabf36c129ce976d72199d26760c731bc0
SHA256 fcf8201ffa61d30981e4c3f9e6f062f361effa3d698c2ada5520a1b9ea46329d
CRC32 78122728
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 54bb3f89fbac4389_virtualdub 2.1.4.exe
Filepath C:\Windows\Intelx386\VirtualDub 2.1.4.exe
Size 24.6MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 11ef1a6b4db7018d69c256b5cd793156
SHA1 11c005436a81bf95556f6df4fbfba112abe1950f
SHA256 54bb3f89fbac43895375b7ad1d12f0023328df4530678b03b913b5d4f592c950
CRC32 60156547
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 92535220b462f4f4_juegos java para nokia.exe
Filepath C:\Windows\Intelx386\Juegos JAVA para NOKIA.exe
Size 23.1MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ba70463335770d5b47522df2fe96f427
SHA1 d0966d2966450ea8fd09df1a4eb6249c49f835bf
SHA256 92535220b462f4f47cfe6619965db7f875a38c6f540875b218b95dc1e63dc990
CRC32 8034C004
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 7dc9b71838118833_pack tonos y logos para nokia.exe
Filepath C:\Windows\Intelx386\Pack Tonos y Logos para Nokia.exe
Size 1.2MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 004ca4a33bbf66b9b25fa85afdcfcbed
SHA1 f9620f503c5e9935907ef9202c02db8bd59a21ce
SHA256 9a94236984333c5d29317ac22711687edb37eae03e4fbe1b3d5448346eedc617
CRC32 B69A7102
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name a9e3c6e3c795fe78_bsplayer v3.exe
Filepath C:\Windows\Intelx386\BsPlayer v3.exe
Size 24.6MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 1ae49c9f1d6850163e1e3e262bdbba2d
SHA1 2dd616dfbfb9b7ca8d1564adc42e89bb15ec5fce
SHA256 a9e3c6e3c795fe7887be0fadc7e1d15ddb82332dead3274e8215dc0a62db3d56
CRC32 0A6F2208
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 2bd9d8396fcafbd7_download accelerator plus (dap) (full version with serial).exe
Filepath C:\Windows\Intelx386\Download Accelerator Plus (DAP) (full version with serial).exe
Size 23.6MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 061e700ed42c1f49136f29d466c9a176
SHA1 e0ad1520673ea7502fc0423ae51223df5335fc7b
SHA256 2bd9d8396fcafbd7b331ca218963713d6be42b768be965404b7bc257b5a825a2
CRC32 472459AD
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name f6493866c0dc791e_nero 7.5.1.0 (cracked!).exe
Filepath C:\Windows\Intelx386\Nero 7.5.1.0 (cracked!).exe
Size 13.2MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 b2c6fc1e63033259d225923d1e7ee49e
SHA1 ad02c212ef7d360dff7df4c22c46cfc3e41f2e71
SHA256 759c7c8f1c3a59b4e2b4d763bf7cd5a51dd13d9571fda14735c78943da28e20d
CRC32 4364B90B
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 41d8f176b2eea64d_capitulos ineditos de dragonball z jamas emitidos.exe
Filepath C:\Windows\Intelx386\Capitulos ineditos de DragonBall Z jamas emitidos.exe
Size 18.2MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 59cd438ca173995fc5077531e72536a7
SHA1 b24adf4e79bd06f437820cd8c4cf39f53184e968
SHA256 e74d37c6380eacf34d00c5b9c47a3f58748cbec6fd41a292357ccfa53e07b298
CRC32 D32A8075
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name d8632a457ad48fa1_realone player (full version).exe
Filepath C:\Windows\Intelx386\RealOne Player (Full version).exe
Size 23.6MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 5f7e877a2b4a2c6de55c5d577ca09758
SHA1 90c60eb6b563cc9cecdc10e0ecfae6bddd9e0efb
SHA256 d8632a457ad48fa1070ff0bea3ec479b266e2a1b528bc5e406a968e0366fcba8
CRC32 91985BB6
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 68c531427ed5dc67_pack tonos y logos para nokia.exe
Filepath C:\Windows\Intelx386\Pack Tonos y Logos para Nokia.exe
Size 3.5MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 302fd7ac58e5ae3eee777ddd477c23b2
SHA1 640ae19135b5a2a78e6f3924fe618a8120df4c8a
SHA256 f174c172e953a6715e53f0012ca612b0abd4887c1888b1ed31a7debb1723e3d3
CRC32 26F1A2F3
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 3c0e978d4a0eed4a_winamp 5.0 (full version).exe
Filepath C:\Windows\Intelx386\Winamp 5.0 (full version).exe
Size 25.7MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 2a1aff3c161f4c55958ffc1f1f6d336c
SHA1 afafc3ec546695dac98fde32f3b70a751f5a8214
SHA256 3c0e978d4a0eed4aa758546141151b52f7d68da68712e6d34105d9e861deec0e
CRC32 35F56BBE
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 0543c696d8e3a0c6_winrar 4 (with crack).exe
Filepath C:\Windows\Intelx386\WinRar 4 (with crack).exe
Size 24.6MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 845e8b96764404cf9992aae076fbb5f9
SHA1 68f09886d6a65d46ab2e7eaff1bffcb4f5c458f4
SHA256 0543c696d8e3a0c69221805621f76dcfc2cfd4eff0b8e0d12f565e95ac0231e4
CRC32 73B1BA28
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name d48d7a59195794ca_mazinkaiser pack fondos de escritorio.exe
Filepath C:\Windows\Intelx386\Mazinkaiser pack fondos de escritorio.exe
Size 22.8MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 3853b62ea55b812dc361530de7a68d76
SHA1 4c66c171681b89d2ddde7689bf4263688eb2a7e3
SHA256 d48d7a59195794ca13f98e4a9a921f04b4962c5895b3dfae3a52584eee7a9076
CRC32 841946F1
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name eaf701c73d0860e9_winamp 3.5 (full version).exe
Filepath C:\Windows\Intelx386\Winamp 3.5 (full version).exe
Size 24.8MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c1ff6d475d59772987df7de8301c364c
SHA1 c65585ab796a8782470e3a62d137943201fa8515
SHA256 eaf701c73d0860e97d99282163da2f2afde6df9bd9b4469da3089f267d7778b7
CRC32 6C7C5C77
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name dfff0b9f3f69f2eb_simpsons pack guiones (temporada 2004).exe
Filepath C:\Windows\Intelx386\Simpsons pack guiones (Temporada 2004).exe
Size 22.9MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 f2e3ff516d04dbbfc93b0144967cb1a5
SHA1 1b6fd1bae865929c995892789e1aa65c4f63e9b1
SHA256 dfff0b9f3f69f2eb28389d1c846df3bee20c3251343d9288e9d06db309630cbd
CRC32 3F8DD597
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 7ae13952705eeac8_msn messenger 6.3.exe
Filepath C:\Windows\Intelx386\MSN messenger 6.3.exe
Size 24.3MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 8f4341aeffa57cde67ad290e06477522
SHA1 805d25fda234e249f5c14bea76548233189e4388
SHA256 7ae13952705eeac88fd7ac155eb0f927f66415af95cb642cc3a7245f0cc27169
CRC32 95332EBC
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name cc8f99f0b40c05df_winzip 9.exe
Filepath C:\Windows\Intelx386\WinZip 9.exe
Size 24.3MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 cbaec0523d6eea1ab5c23e7f0951ef16
SHA1 5bcd772071d5648b666d41076545886a8ecbccd8
SHA256 cc8f99f0b40c05df5a0afcd3424dc973c4481e3db69060a30eadec8986de3da4
CRC32 1E7DE495
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name e87fc61c2f0c9c37_capitulos ineditos de dragonball z jamas emitidos.exe
Filepath C:\Windows\Intelx386\Capitulos ineditos de DragonBall Z jamas emitidos.exe
Size 24.2MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 29c189a6953fafe948d2a639d8e28636
SHA1 8923b26f848597aeeb08fdbab4c1730bf6dd11af
SHA256 8edf1f1082bd630e535884f33ecad1d5c5db84b572ab31ea726cd0efb1a9512c
CRC32 3C888798
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 1c00d296f44324a7_capitulos ineditos de dragonball z jamas emitidos.exe
Filepath C:\Windows\Intelx386\Capitulos ineditos de DragonBall Z jamas emitidos.exe
Size 21.6MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 cc5a586c08d0ba943a42f673b5312c8e
SHA1 b667fe77d489722887a0af6406c45054d67c5f15
SHA256 bcc79bd2933514bff828cf5d9e39cea11a259b4f951861be630c31bce7c6f6c2
CRC32 7427C276
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name a70e92c35326ccb4_winamp 3 (full version).exe
Filepath C:\Windows\Intelx386\Winamp 3 (full version).exe
Size 24.4MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 320f53f31d7e447d77a9929af514a9be
SHA1 6e5fcd4beb500edb8b208557f6afb433bb2307d0
SHA256 a70e92c35326ccb4c4854de7cc3e62ba8ed6a448c2c0f6f552c112b53ca9bac7
CRC32 F43D0C1B
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name ab782f7ed8eee35c_hacha profesional edition.exe
Filepath C:\Windows\Intelx386\Hacha Profesional Edition.exe
Size 22.9MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 67c3cc317117f4c901053973e8957693
SHA1 605d1161b6653c9c337d7a79452a30a0f9a20b04
SHA256 ab782f7ed8eee35c87758c0f3a693afb777361ae793e30022ff00301a11f16e1
CRC32 C61A5465
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name cb0e98db48090d42_nero 7.5.1.0 (cracked!).exe
Filepath C:\Windows\Intelx386\Nero 7.5.1.0 (cracked!).exe
Size 15.9MB
Processes 2060 (None)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 37e4525445b5149ed73ba9e14308495a
SHA1 3151ddc9d7947514d75a202cb46b17f40675dc68
SHA256 b11454dc22c0bb3ea159ca6d3bca9e90b529e46622d0a037619a691446c99715
CRC32 B49B9C05
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.