3.6
中危

9605c555071f01670aaecc42ca980f07e8224e484de3632af8fc07778fdf34eb

d9e81c389f669dfecc2175a3eb7337b1.exe

分析耗时

82s

最近分析

文件大小

5.5MB
静态报毒 动态报毒 A@84JPND AI SCORE=70 AIKS BUNDLER CMRTAZR4PUMUXYD28H5BAKQTOOMR CONFIDENCE ELDORADO GENERICPMF GENERICRXGM GENETIC GRAYWARE HIGH CONFIDENCE MALICIOUS MULDROP9 PUWADERS R244939 RDM+ S3746634 SUSPICIOUS PE TOOL YOUXUN 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee GenericRXGM-IQ!D9E81C389F66 20190626 6.0.6.653
Baidu 20190318 1.0.0.2
Avast Win32:Malware-gen 20190626 18.4.3895.0
Alibaba RiskWare:Win32/YouXun.3c2fb015 20190527 0.3.0.5
Tencent 20190627 1.0.0.1
Kingsoft 20190627 2013.8.14.323
CrowdStrike win/malicious_confidence_90% (D) 20190212 1.0
静态指标
This executable has a PDB path (1 个事件)
pdb_path d:\work\yxbox\trunk\bin\Win32\Release\build\GameGuide\点此安装.pdb
The file contains an unknown PE resource name possibly indicative of a packer (3 个事件)
resource name DLL
resource name FILE
resource name PNG
行为判定
动态指标
Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation (2 个事件)
Time & API Arguments Status Return Repeated
1620809370.405524
GetDiskFreeSpaceExW
root_path: C:
free_bytes_available: 19605716992
total_number_of_free_bytes: 19605716992
total_number_of_bytes: 34252779520
success 1 0
1620809370.405524
GetDiskFreeSpaceExW
root_path: C:
free_bytes_available: 19605716992
total_number_of_free_bytes: 19605716992
total_number_of_bytes: 34252779520
success 1 0
Foreign language identified in PE resource (30 个事件)
name DLL language LANG_CHINESE offset 0x0009c6bc filetype PE32 executable (DLL) (GUI) Intel 80386, for MS Windows sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000df200
name FILE language LANG_CHINESE offset 0x0017b8bc filetype ASCII text, with no line terminators sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x003cb33f
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name PNG language LANG_CHINESE offset 0x00563040 filetype PNG image data, 20 x 40, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x000047dc
name RT_ICON language LANG_CHINESE offset 0x0056781c filetype dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 9605827, next used block 7632027 sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00004228
name RT_DIALOG language LANG_CHINESE offset 0x0056ba84 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000040
name RT_DIALOG language LANG_CHINESE offset 0x0056ba84 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000040
name RT_GROUP_ICON language LANG_CHINESE offset 0x0056bac4 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000014
name RT_VERSION language LANG_CHINESE offset 0x0056bad8 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000150
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Generates some ICMP traffic
File has been identified by 37 AntiVirus engines on VirusTotal as malicious (37 个事件)
MicroWorld-eScan Application.Bundler.BHM
FireEye Application.Bundler.BHM
CAT-QuickHeal Trojan.GenericPMF.S3746634
McAfee GenericRXGM-IQ!D9E81C389F66
BitDefender Application.Bundler.BHM
Invincea heuristic
Cyren W32/S-8630a945!Eldorado
Symantec Trojan.Gen.MBT
APEX Malicious
Avast Win32:Malware-gen
Alibaba RiskWare:Win32/YouXun.3c2fb015
Ad-Aware Application.Bundler.BHM
Comodo Application.Win32.RiskWare.YouXun.A@84jpnd
DrWeb Trojan.MulDrop9.6277
Zillya Tool.YouXun.Win32.346
McAfee-GW-Edition BehavesLike.Win32.Dropper.tz
Fortinet W32/GenericRXGM.IQ!tr
Emsisoft Application.Bundler.BHM (B)
Ikarus PUA.RiskWare.Youxun
F-Prot W32/S-8630a945!Eldorado
Jiangmin Adware.Agent.aiks
MAX malware (ai score=70)
Antiy-AVL GrayWare/Win32.Puwaders
Endgame malicious (high confidence)
Arcabit Application.Bundler.BHM
Microsoft PUA:Win32/Puwaders.B!ml
AhnLab-V3 PUP/Win32.Bundler.R244939
Malwarebytes RiskWare.YouXun
Panda Trj/Genetic.gen
ESET-NOD32 a variant of Win32/RiskWare.YouXun.A
Rising PUA.Puwaders!8.F98B (RDM+:cmRtazr4pumuxYd28h5bakQtoOmR)
Yandex RiskWare.YouXun!
SentinelOne DFI - Suspicious PE
GData Application.Bundler.BHM
AVG Win32:Malware-gen
Cybereason malicious.89f669
CrowdStrike win/malicious_confidence_90% (D)
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2018-09-07 10:42:34

Imports

Library VERSION.dll:
0x4755c4 GetFileVersionInfoW
0x4755c8 VerQueryValueW
Library dbghelp.dll:
0x4755e4 MiniDumpWriteDump
Library KERNEL32.dll:
0x4750e0 GlobalAddAtomW
0x4750e4 MulDiv
0x4750e8 GetVersionExA
0x4750ec LoadLibraryA
0x4750f0 CompareStringW
0x4750f4 GlobalFindAtomW
0x4750fc GetModuleHandleA
0x475100 LocalAlloc
0x475104 GetThreadLocale
0x475108 FlushFileBuffers
0x47510c LockFile
0x475110 UnlockFile
0x475114 DuplicateHandle
0x47511c GlobalFlags
0x475120 TlsGetValue
0x475124 GlobalReAlloc
0x475128 GlobalHandle
0x47512c TlsAlloc
0x475130 TlsSetValue
0x475134 LocalReAlloc
0x475138 TlsFree
0x475140 GetFileSizeEx
0x475144 GetFileTime
0x475148 HeapFree
0x47514c HeapAlloc
0x475154 IsDebuggerPresent
0x475158 GetFileAttributesA
0x47515c ExitThread
0x475164 GetConsoleCP
0x475168 GetConsoleMode
0x47516c GetFileType
0x475170 GetProcessHeap
0x475174 SetStdHandle
0x475178 RtlUnwind
0x47517c ExitProcess
0x475180 RaiseException
0x475184 HeapSize
0x475188 VirtualProtect
0x47518c VirtualAlloc
0x475190 GetSystemInfo
0x475194 VirtualQuery
0x475198 GetModuleFileNameA
0x4751a4 SetHandleCount
0x4751a8 GetStartupInfoA
0x4751ac HeapCreate
0x4751b0 VirtualFree
0x4751b8 GetCPInfo
0x4751bc GetACP
0x4751c0 GetOEMCP
0x4751c4 IsValidCodePage
0x4751c8 LCMapStringW
0x4751cc WriteConsoleA
0x4751d0 GetConsoleOutputCP
0x4751d4 WriteConsoleW
0x4751e0 LCMapStringA
0x4751e4 GetStringTypeA
0x4751e8 GetStringTypeW
0x4751ec GetTimeFormatA
0x4751f0 GetDateFormatA
0x4751f4 GetUserDefaultLCID
0x4751f8 GetLocaleInfoA
0x4751fc EnumSystemLocalesA
0x475200 IsValidLocale
0x475204 CreateFileA
0x47520c GetDriveTypeA
0x475218 lstrcmpA
0x47521c SetLastError
0x475220 CompareStringA
0x475224 InterlockedExchange
0x475228 lstrcmpW
0x47522c LocalFree
0x475230 FormatMessageW
0x475234 TerminateProcess
0x475238 GetStdHandle
0x47523c FindNextFileW
0x475240 SetEndOfFile
0x475244 GetFullPathNameW
0x475248 SetFileTime
0x47524c ResumeThread
0x475250 Sleep
0x475254 SetFileAttributesW
0x475258 GlobalFree
0x47525c CreateDirectoryA
0x47527c SetFilePointer
0x475280 GetFileSize
0x475284 FindClose
0x475288 FindFirstFileW
0x47528c FreeLibrary
0x475290 SetErrorMode
0x475294 WideCharToMultiByte
0x475298 GetStartupInfoW
0x47529c ReadFile
0x4752a0 LoadLibraryW
0x4752a4 GetTickCount
0x4752a8 lstrlenA
0x4752ac GetShortPathNameW
0x4752b0 GetProcAddress
0x4752b4 GetLastError
0x4752b8 GetModuleFileNameW
0x4752bc GetFileAttributesW
0x4752c0 GetVersionExW
0x4752c4 GetModuleHandleW
0x4752c8 FreeResource
0x4752cc CreateThread
0x4752d0 DeleteFileW
0x4752d4 GetDiskFreeSpaceExW
0x4752d8 GlobalUnlock
0x4752e0 lstrlenW
0x4752e4 MultiByteToWideChar
0x4752e8 lstrcpynW
0x4752ec CopyFileW
0x4752f0 GlobalAlloc
0x4752f4 WriteFile
0x4752fc WaitForSingleObject
0x475300 GlobalLock
0x475304 CreateDirectoryW
0x47530c GetDriveTypeW
0x475310 GetCurrentProcessId
0x475314 CloseHandle
0x475318 GetCurrentThreadId
0x47531c LockResource
0x475320 CreateFileW
0x475324 SizeofResource
0x475328 GetCurrentProcess
0x475330 LoadResource
0x475334 FindResourceW
0x475338 GetCommandLineW
0x47533c GlobalDeleteAtom
0x475340 GetLocaleInfoW
0x475344 GetCurrentThread
0x47534c HeapReAlloc
Library USER32.dll:
0x4753bc CharNextW
0x4753c0 GetSysColorBrush
0x4753c8 GetNextDlgTabItem
0x4753cc EndDialog
0x4753d0 CharUpperW
0x4753d4 EndPaint
0x4753d8 BeginPaint
0x4753dc GetWindowDC
0x4753e0 ReleaseDC
0x4753e4 GetDC
0x4753e8 ClientToScreen
0x4753ec GrayStringW
0x4753f0 DrawTextExW
0x4753f4 DrawTextW
0x4753f8 TabbedTextOutW
0x475400 SendDlgItemMessageA
0x475404 WinHelpW
0x475408 IsChild
0x47540c GetCapture
0x475410 GetClassLongW
0x475414 GetClassNameW
0x475418 SetPropW
0x47541c GetPropW
0x475420 RemovePropW
0x475424 GetForegroundWindow
0x475428 SetActiveWindow
0x47542c GetTopWindow
0x475430 DestroyWindow
0x475434 GetMessageTime
0x475438 GetMessagePos
0x47543c MapWindowPoints
0x475440 SetMenu
0x475444 SetForegroundWindow
0x475448 CreateWindowExW
0x47544c GetClassInfoExW
0x475450 GetClassInfoW
0x475454 RegisterClassW
0x475458 GetSysColor
0x47545c AdjustWindowRectEx
0x475460 EqualRect
0x475464 GetMenu
0x475468 OffsetRect
0x47546c IntersectRect
0x475474 IsIconic
0x475478 GetWindowPlacement
0x475480 GetWindowTextW
0x475484 ShowWindow
0x475488 MoveWindow
0x47548c GetDlgCtrlID
0x475490 SetWindowTextW
0x475494 IsDialogMessageW
0x475498 UnregisterClassW
0x47549c SendDlgItemMessageW
0x4754a4 GetMenuItemID
0x4754a8 GetMenuItemCount
0x4754ac GetSubMenu
0x4754b0 UnhookWindowsHookEx
0x4754b4 SetWindowsHookExW
0x4754b8 CallNextHookEx
0x4754bc GetMessageW
0x4754c0 TranslateMessage
0x4754c4 DispatchMessageW
0x4754c8 GetActiveWindow
0x4754cc GetKeyState
0x4754d0 PeekMessageW
0x4754d4 ValidateRect
0x4754d8 GetWindow
0x4754e0 MapDialogRect
0x4754e4 SetWindowPos
0x4754e8 GetLastActivePopup
0x4754ec IsWindowEnabled
0x4754f0 MessageBoxW
0x4754f4 PostQuitMessage
0x4754f8 SetMenuItemBitmaps
0x475500 LoadBitmapW
0x475504 GetFocus
0x475508 GetParent
0x47550c ModifyMenuW
0x475510 GetMenuState
0x475514 EnableMenuItem
0x475518 CheckMenuItem
0x47551c SetCapture
0x475520 SetFocus
0x475524 GetWindowLongW
0x475528 DestroyMenu
0x47552c PostThreadMessageW
0x475530 SetWindowLongW
0x475534 ReleaseCapture
0x475538 CallWindowProcW
0x47553c DefWindowProcW
0x475540 PtInRect
0x475544 SetRectEmpty
0x475548 IsRectEmpty
0x47554c IsWindow
0x475554 GetDesktopWindow
0x475558 wsprintfW
0x47555c SetWindowRgn
0x475560 GetWindowRect
0x475564 CopyRect
0x475568 SetRect
0x47556c IsWindowVisible
0x475570 SetCursor
0x475574 SetTimer
0x475578 ScreenToClient
0x47557c PostMessageW
0x475580 KillTimer
0x475584 LoadCursorW
0x475588 GetClientRect
0x47558c LoadIconW
0x475590 InvalidateRect
0x475594 GetCursorPos
0x475598 GetSystemMetrics
0x47559c SendMessageW
0x4755a0 EnableWindow
0x4755a4 UpdateWindow
0x4755a8 MessageBeep
0x4755ac GetNextDlgGroupItem
0x4755b0 InvalidateRgn
0x4755b8 GetDlgItem
Library GDI32.dll:
0x475044 GetStockObject
0x475048 CreateFontIndirectW
0x475050 ExtSelectClipRgn
0x475054 Escape
0x475058 DPtoLP
0x47505c GetBkColor
0x475060 GetTextColor
0x475064 GetRgnBox
0x475068 DeleteDC
0x47506c ExtTextOutW
0x475070 TextOutW
0x475074 RectVisible
0x475078 PtVisible
0x47507c ScaleWindowExtEx
0x475080 SetWindowExtEx
0x475084 ScaleViewportExtEx
0x475088 SetViewportExtEx
0x47508c GetClipBox
0x475090 OffsetViewportOrgEx
0x475094 GetDeviceCaps
0x475098 CreateBitmap
0x47509c CreateRoundRectRgn
0x4750a0 SetViewportOrgEx
0x4750a4 BitBlt
0x4750a8 CreateCompatibleDC
0x4750ac GetMapMode
0x4750b4 GetWindowExtEx
0x4750b8 GetViewportExtEx
0x4750bc DeleteObject
0x4750c0 SetMapMode
0x4750c4 RestoreDC
0x4750c8 SaveDC
0x4750cc GetObjectW
0x4750d0 SetBkColor
0x4750d4 SetTextColor
0x4750d8 SelectObject
Library COMDLG32.dll:
0x47503c GetFileTitleW
Library WINSPOOL.DRV:
0x4755d4 DocumentPropertiesW
0x4755d8 OpenPrinterW
0x4755dc ClosePrinter
Library ADVAPI32.dll:
0x475004 RegQueryValueW
0x475008 RegEnumKeyW
0x47500c RegDeleteKeyW
0x475010 RegCreateKeyExW
0x475014 RegSetValueExW
0x475018 RegCloseKey
0x47501c RegEnumKeyExW
0x475020 RegOpenKeyExW
0x475024 RegQueryInfoKeyW
0x475028 RegOpenKeyW
0x47502c RegQueryValueExW
Library SHELL32.dll:
0x475388 SHBrowseForFolderW
0x47538c ShellExecuteExW
0x475390 ShellExecuteW
0x47539c CommandLineToArgvW
Library COMCTL32.dll:
0x475034 _TrackMouseEvent
Library SHLWAPI.dll:
0x4753a4
0x4753a8 PathFindExtensionW
0x4753ac PathFindFileNameW
0x4753b0 PathStripToRootW
0x4753b4 PathIsUNCW
Library oledlg.dll:
0x4756e8 OleUIBusyW
Library ole32.dll:
0x475698 CoTaskMemAlloc
0x4756a0 OleFlushClipboard
0x4756a8 CoCreateInstance
0x4756ac CoUninitialize
0x4756b4 CoInitialize
0x4756b8 CoTaskMemFree
0x4756bc CLSIDFromProgID
0x4756c0 CLSIDFromString
0x4756c4 OleUninitialize
0x4756cc OleInitialize
0x4756d0 CoGetClassObject
0x4756e0 CoRevokeClassObject
Library OLEAUT32.dll:
0x475360 SafeArrayDestroy
0x475364 VariantChangeType
0x475368 SysStringLen
0x47536c VariantCopy
0x475370 VariantClear
0x475374 SysAllocString
0x475378 SysFreeString
0x47537c SysAllocStringLen
0x475380 VariantInit
Library gdiplus.dll:
0x4755ec GdipDeleteBrush
0x4755f0 GdipCloneBrush
0x4755f4 GdipDeleteFont
0x4755fc GdipCreateSolidFill
0x475600 GdipCreateFont
0x475604 GdipDrawString
0x475608 GdipFillRectangle
0x475610 GdipFillRectangleI
0x475618 GdipDeletePen
0x475620 GdipGetImageHeight
0x47562c GdipCloneImage
0x475644 GdipGetImageWidth
0x475648 GdipCreatePen1
0x475650 GdipDrawRectangleI
0x475658 GdipGetFontStyle
0x47565c GdipGetFamily
0x475660 GdipAddPathString
0x475664 GdipGetFontSize
0x475668 GdipDeletePath
0x47566c GdipCreatePath
0x475674 GdipCreateFromHDC
0x475678 GdipDisposeImage
0x47567c GdipDeleteGraphics
0x475680 GdipFree
0x475688 GdiplusStartup
0x47568c GdiplusShutdown
0x475690 GdipAlloc

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 49713 114.114.114.114 53
192.168.56.101 50002 114.114.114.114 53
192.168.56.101 53657 114.114.114.114 53
192.168.56.101 62318 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57756 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 49714 239.255.255.250 3702
192.168.56.101 49716 239.255.255.250 3702
192.168.56.101 50537 239.255.255.250 1900
192.168.56.101 53658 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.