4.8
中危

0ae7f351aca53f060dfebbe244f77e3fad81278d382f4204d22454256c623433

ee6b4f41a430d2f947d2be76dc62718a.exe

分析耗时

23s

最近分析

文件大小

1.6MB
静态报毒 动态报毒 AI SCORE=99 BG@81BEHT BSCOPE CLASSIC CONFIDENCE ELDORADO FILEREPMETAGEN FWXCXF GENETIC HIGH CONFIDENCE KUAIBA KUAIZIP KUZITUI L3ZOR6 MALICIOUS PE POTENTIALRISK R002C0PI620 R254633 RISKTOOL SCORE UNSAFE 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba Backdoor:Win32/KuaiZip.6c4854bd 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Kingsoft 20200920 2013.8.14.323
McAfee 20200920 6.0.6.653
Tencent 20200920 1.0.0.1
CrowdStrike win/malicious_confidence_60% (D) 20190702 1.0
行为判定
动态指标
HTTP traffic contains suspicious features which may be indicative of malware related traffic (3 个事件)
suspicious_features GET method with no useragent header suspicious_request GET http://kyposition.dftoutiao.com/position/get02
suspicious_features GET method with no useragent header suspicious_request GET http://tpop.kpzip.com/n/tui/tpop/tpop4/kb_nopop.xml
suspicious_features GET method with no useragent header suspicious_request GET http://tpop.kpzip.com/n/tui/tpop/tpop4/tpop4.xml
Performs some HTTP requests (3 个事件)
request GET http://kyposition.dftoutiao.com/position/get02
request GET http://tpop.kpzip.com/n/tui/tpop/tpop4/kb_nopop.xml
request GET http://tpop.kpzip.com/n/tui/tpop/tpop4/tpop4.xml
Allocates read-write-execute memory (usually to unpack itself) (1 个事件)
Time & API Arguments Status Return Repeated
1620809371.619979
NtAllocateVirtualMemory
process_identifier: 2764
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00a90000
success 0 0
Foreign language identified in PE resource (10 个事件)
name MYICON language LANG_CHINESE offset 0x0017e3b0 filetype MS Windows icon resource - 5 icons, 256x256 withPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 48x48, 32 bits/pixel sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00005c18
name ZIPRES language LANG_CHINESE offset 0x00178520 filetype Zip archive data, at least v2.0 to extract sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000272
name RT_ICON language LANG_CHINESE offset 0x0017def8 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x0017def8 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x0017def8 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x0017def8 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_ICON language LANG_CHINESE offset 0x0017def8 filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x00000468
name RT_MENU language LANG_CHINESE offset 0x00178500 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000001c
name RT_GROUP_ICON language LANG_CHINESE offset 0x0017e360 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000004c
name RT_VERSION language LANG_CHINESE offset 0x001782c0 filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED size 0x0000023c
A process created a hidden window (1 个事件)
Time & API Arguments Status Return Repeated
1620809372.603979
ShellExecuteExW
parameters:
filepath: \X86\KZReport.exe
filepath_r: \X86\KZReport.exe
show_type: 0
failed 0 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Attempts to modify browser security settings (15 个事件)
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION\ee6b4f41a430d2f947d2be76dc62718a.exe
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_DOCUMENT_ZOOM\ee6b4f41a430d2f947d2be76dc62718a.exe
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_NINPUT_LEGACYMODE\ee6b4f41a430d2f947d2be76dc62718a.exe
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL\ee6b4f41a430d2f947d2be76dc62718a.exe
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\ee6b4f41a430d2f947d2be76dc62718a.exe
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_STATUS_BAR_THROTTLING\ee6b4f41a430d2f947d2be76dc62718a.exe
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBSOCKET\ee6b4f41a430d2f947d2be76dc62718a.exe
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING \ee6b4f41a430d2f947d2be76dc62718a.exe
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SPELLCHECKING\ee6b4f41a430d2f947d2be76dc62718a.exe
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\ee6b4f41a430d2f947d2be76dc62718a.exe
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT\ee6b4f41a430d2f947d2be76dc62718a.exe
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT\ee6b4f41a430d2f947d2be76dc62718a.exe
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_IVIEWOBJECTDRAW_DMLT9_WITH_GDI \ee6b4f41a430d2f947d2be76dc62718a.exe
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS\ee6b4f41a430d2f947d2be76dc62718a.exe
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS\ee6b4f41a430d2f947d2be76dc62718a.exe
File has been identified by 44 AntiVirus engines on VirusTotal as malicious (44 个事件)
Elastic malicious (high confidence)
FireEye Generic.mg.ee6b4f41a430d2f9
Malwarebytes Adware.Kuaiba
Zillya Adware.KuaiZip.Win32.334
SUPERAntiSpyware Adware.KuaiZip/Variant
K7AntiVirus Adware ( 004f7e1c1 )
Alibaba Backdoor:Win32/KuaiZip.6c4854bd
K7GW Adware ( 004f7e1c1 )
Cybereason malicious.1a430d
Invincea KuaiZip (PUA)
Cyren W32/S-0bbf5fa1!Eldorado
Symantec Trojan.Gen.2
APEX Malicious
Cynet Malicious (score: 100)
Kaspersky not-a-virus:HEUR:AdWare.Win32.KuziTui.gen
NANO-Antivirus Riskware.Win32.KuaiZip.fwxcxf
ViRobot Adware.Kuaizip.1665432.E
Rising Adware.KuaiZip!1.B92F (CLASSIC)
Comodo Application.Win32.KuaiZip.BG@81beht
F-Secure PotentialRisk.PUA/KuaiZip.Gen
DrWeb Program.Kuaizip.1
VIPRE Trojan.Win32.Generic!BT
TrendMicro TROJ_GEN.R002C0PI620
Sophos KuaiZip (PUA)
Jiangmin AdWare.KuaiZip.dx
eGambit Unsafe.AI_Score_99%
Avira PUA/KuaiZip.Gen
Antiy-AVL RiskWare[RiskTool]/Win32.KuaiZip
Microsoft PUA:Win32/KuaiZip
AegisLab Adware.Win32.KuaiZip.2!c
ZoneAlarm not-a-virus:HEUR:AdWare.Win32.KuziTui.gen
GData Win32.Trojan.Agent.L3ZOR6
AhnLab-V3 PUP/Win32.KuaiZip.R254633
MAX malware (ai score=99)
VBA32 BScope.Adware.KuziTui
ESET-NOD32 a variant of Win32/KuaiZip.N potentially unwanted
TrendMicro-HouseCall TROJ_GEN.R002C0PI620
Yandex PUA.KuaiZip!
SentinelOne DFI - Malicious PE
Fortinet Riskware/KuaiZip
Webroot W32.Adware.Gen
AVG FileRepMetagen [PUP]
Panda Trj/Genetic.gen
CrowdStrike win/malicious_confidence_60% (D)
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2019-04-01 19:57:44

Imports

Library KERNEL32.dll:
0x50f150 FreeConsole
0x50f154 LocalAlloc
0x50f158 CreateThread
0x50f15c LoadLibraryA
0x50f160 GetModuleHandleA
0x50f164 lstrcpynW
0x50f16c GetFileTime
0x50f170 DeviceIoControl
0x50f174 VerSetConditionMask
0x50f178 FormatMessageW
0x50f17c LocalFree
0x50f180 FindClose
0x50f184 lstrcmpiW
0x50f188 GlobalLock
0x50f18c GlobalUnlock
0x50f190 LoadLibraryW
0x50f194 GetProcAddress
0x50f198 GetCurrentThreadId
0x50f19c CreateFileW
0x50f1a0 GetFileSize
0x50f1a4 ReadFile
0x50f1a8 MoveFileExW
0x50f1ac DeleteFileW
0x50f1b0 GetCommandLineW
0x50f1b4 OpenProcess
0x50f1b8 GlobalAlloc
0x50f1c0 Process32FirstW
0x50f1c4 Process32NextW
0x50f1c8 WideCharToMultiByte
0x50f1cc MultiByteToWideChar
0x50f1d0 CreateDirectoryW
0x50f1d4 GetModuleFileNameW
0x50f1dc CopyFileW
0x50f1e0 CreateProcessW
0x50f1e4 WaitForSingleObject
0x50f1e8 FindResourceW
0x50f1ec LoadResource
0x50f1f0 FreeResource
0x50f1f4 SizeofResource
0x50f1f8 LockResource
0x50f200 CloseHandle
0x50f204 CreateMutexW
0x50f208 GetLastError
0x50f20c ExitProcess
0x50f210 Sleep
0x50f214 GetTickCount
0x50f218 GetModuleHandleW
0x50f21c lstrcpyW
0x50f220 GetLocalTime
0x50f224 SetEndOfFile
0x50f22c CompareStringW
0x50f230 CompareStringA
0x50f234 CreateFileA
0x50f238 WriteConsoleW
0x50f23c GetConsoleOutputCP
0x50f240 WriteConsoleA
0x50f244 GetLocaleInfoW
0x50f248 SetStdHandle
0x50f250 GetFullPathNameA
0x50f25c FlushFileBuffers
0x50f264 GetStartupInfoA
0x50f268 SetHandleCount
0x50f274 GetConsoleMode
0x50f278 GetConsoleCP
0x50f27c GetStringTypeW
0x50f280 GetStringTypeA
0x50f284 IsValidLocale
0x50f288 EnumSystemLocalesA
0x50f28c GetLocaleInfoA
0x50f290 GetUserDefaultLCID
0x50f294 IsValidCodePage
0x50f298 GetOEMCP
0x50f2a0 HeapCreate
0x50f2a4 TlsFree
0x50f2a8 TlsSetValue
0x50f2ac TlsAlloc
0x50f2b0 TlsGetValue
0x50f2b8 ExitThread
0x50f2bc FindFirstFileA
0x50f2c0 GetDriveTypeA
0x50f2cc GetCPInfo
0x50f2d0 LCMapStringW
0x50f2d4 LCMapStringA
0x50f2d8 GetStartupInfoW
0x50f2dc MoveFileW
0x50f2e8 GetProcessTimes
0x50f2ec GetCurrentProcess
0x50f2f0 GetMailslotInfo
0x50f2f4 CreateMailslotW
0x50f2f8 CreateEventW
0x50f2fc SetEvent
0x50f300 WriteFile
0x50f304 GetNativeSystemInfo
0x50f308 FindResourceExW
0x50f30c AreFileApisANSI
0x50f310 GetCurrentProcessId
0x50f314 TerminateProcess
0x50f318 RaiseException
0x50f328 SetLastError
0x50f32c GetModuleHandleExW
0x50f330 GetModuleFileNameA
0x50f334 lstrlenW
0x50f338 lstrcmpiA
0x50f340 QueryDosDeviceW
0x50f344 lstrcatW
0x50f348 FreeLibrary
0x50f354 HeapDestroy
0x50f358 HeapAlloc
0x50f35c HeapFree
0x50f360 HeapReAlloc
0x50f364 HeapSize
0x50f368 GetProcessHeap
0x50f374 VirtualFree
0x50f378 VirtualAlloc
0x50f384 InterlockedExchange
0x50f388 GetACP
0x50f390 SetFilePointer
0x50f394 GetFileType
0x50f398 DuplicateHandle
0x50f3a4 SetFileTime
0x50f3a8 MulDiv
0x50f3ac FormatMessageA
0x50f3b0 VerifyVersionInfoA
0x50f3b4 SleepEx
0x50f3b8 PeekNamedPipe
0x50f3c0 GetStdHandle
0x50f3c4 RtlUnwind
0x50f3cc IsDebuggerPresent
Library USER32.dll:
0x50f440 DrawTextW
0x50f444 TranslateMessage
0x50f448 PeekMessageW
0x50f44c SetPropA
0x50f450 SetWindowPos
0x50f454 GetWindowRect
0x50f458 MoveWindow
0x50f45c IsWindow
0x50f460 ShowWindow
0x50f464 PostMessageW
0x50f46c CharUpperA
0x50f470 SetWindowLongW
0x50f474 PostQuitMessage
0x50f478 DestroyWindow
0x50f47c GetPropA
0x50f480 EnumWindows
0x50f484 GetMessageW
0x50f488 GetWindowLongW
0x50f48c GetClassInfoExW
0x50f494 SendMessageTimeoutW
0x50f498 CallWindowProcW
0x50f49c UnregisterClassA
0x50f4a0 IsIconic
0x50f4a4 OffsetRect
0x50f4a8 SetWindowRgn
0x50f4ac IsZoomed
0x50f4b4 MessageBoxW
0x50f4b8 GetClientRect
0x50f4bc ScreenToClient
0x50f4c0 InflateRect
0x50f4c4 UnionRect
0x50f4c8 SetCursor
0x50f4cc SetFocus
0x50f4d0 EnableWindow
0x50f4d4 GetWindow
0x50f4d8 GetPropW
0x50f4dc SetPropW
0x50f4e0 RegisterClassW
0x50f4e4 GetKeyState
0x50f4e8 CreateCaret
0x50f4ec InvalidateRect
0x50f4f0 SetCapture
0x50f4f4 ReleaseCapture
0x50f4f8 PtInRect
0x50f4fc ReleaseDC
0x50f500 GetDC
0x50f504 CharNextW
0x50f508 GetCaretBlinkTime
0x50f50c SetCaretPos
0x50f510 IntersectRect
0x50f514 GetFocus
0x50f518 MapWindowPoints
0x50f51c GetSysColor
0x50f520 IsWindowVisible
0x50f524 IsRectEmpty
0x50f528 EndPaint
0x50f52c BeginPaint
0x50f530 GetUpdateRect
0x50f534 GetActiveWindow
0x50f538 GetWindowRgn
0x50f53c UpdateLayeredWindow
0x50f540 DispatchMessageW
0x50f544 FillRect
0x50f548 CharPrevW
0x50f54c SetRect
0x50f550 ClientToScreen
0x50f554 GetCaretPos
0x50f558 HideCaret
0x50f55c ShowCaret
0x50f560 InvalidateRgn
0x50f564 GetGUIThreadInfo
0x50f56c GetKeyNameTextW
0x50f570 MapVirtualKeyExW
0x50f574 GetKeyboardLayout
0x50f578 SetWindowTextW
0x50f580 IsWindowEnabled
0x50f584 AnimateWindow
0x50f588 SetForegroundWindow
0x50f58c KillTimer
0x50f590 GetParent
0x50f594 WindowFromPoint
0x50f598 DefWindowProcW
0x50f59c SetTimer
0x50f5a0 UpdateWindow
0x50f5a4 CreateWindowExW
0x50f5a8 RegisterClassExW
0x50f5ac LoadCursorW
0x50f5b0 GetMonitorInfoW
0x50f5b4 MonitorFromWindow
0x50f5b8 LoadImageW
0x50f5bc DestroyMenu
0x50f5c0 TrackPopupMenu
0x50f5c4 SetMenuDefaultItem
0x50f5c8 GetCursorPos
0x50f5cc GetSubMenu
0x50f5d0 LoadMenuW
0x50f5d4 GetWindowTextW
0x50f5d8 wsprintfW
0x50f5dc SendMessageW
Library ADVAPI32.dll:
0x50f004 CryptGetHashParam
0x50f008 CryptHashData
0x50f00c CryptCreateHash
0x50f014 CryptGenRandom
0x50f018 CryptDestroyKey
0x50f01c CryptEncrypt
0x50f020 CryptImportKey
0x50f024 CryptReleaseContext
0x50f028 RegOpenCurrentUser
0x50f02c RegOpenKeyA
0x50f030 RegDeleteValueA
0x50f034 RegCreateKeyA
0x50f038 RegSetValueExA
0x50f044 RegQueryValueExA
0x50f048 RegCloseKey
0x50f04c RegSetValueExW
0x50f050 RegCreateKeyExW
0x50f054 RegOpenKeyExA
0x50f058 RegQueryValueExW
0x50f05c RegOpenKeyExW
0x50f060 RegCreateKeyExA
0x50f064 CryptDestroyHash
Library SHELL32.dll:
0x50f3f0 Shell_NotifyIconW
0x50f3f8
0x50f3fc ShellExecuteW
0x50f400 SHGetFolderPathW
0x50f404 DragQueryFileW
0x50f408 ShellExecuteA
Library ole32.dll:
0x50f758 CLSIDFromProgID
0x50f75c ReleaseStgMedium
0x50f760 RegisterDragDrop
0x50f764 OleDuplicateData
0x50f768 DoDragDrop
0x50f76c CoTaskMemFree
0x50f770 OleLockRunning
0x50f778 StringFromCLSID
0x50f77c CoCreateGuid
0x50f784 CoSetProxyBlanket
0x50f788 CoCreateInstance
0x50f78c CoInitializeEx
0x50f790 CoUninitialize
0x50f794 CLSIDFromString
Library OLEAUT32.dll:
0x50f3d4 VariantClear
0x50f3d8 SysAllocString
0x50f3dc SysFreeString
0x50f3e0 VariantInit
Library SHLWAPI.dll:
0x50f410 StrStrW
0x50f414 PathFileExistsA
0x50f418 PathFindFileNameA
0x50f41c PathAppendA
0x50f420 PathRemoveFileSpecW
0x50f424 StrCpyW
0x50f428 PathFindFileNameW
0x50f42c StrIsIntlEqualW
0x50f430 PathCombineW
0x50f434 StrStrIA
0x50f438 PathFileExistsW
Library dbghelp.dll:
Library IPHLPAPI.DLL:
0x50f148 GetAdaptersInfo
Library PSAPI.DLL:
Library WS2_32.dll:
0x50f628 ioctlsocket
0x50f62c WSASetLastError
0x50f630 WSACleanup
0x50f634 WSAStartup
0x50f638 gethostname
0x50f63c gethostbyname
0x50f640 ntohl
0x50f644 htonl
0x50f648 WSAGetLastError
0x50f64c listen
0x50f650 accept
0x50f654 recvfrom
0x50f658 sendto
0x50f65c getaddrinfo
0x50f660 freeaddrinfo
0x50f664 connect
0x50f668 select
0x50f66c recv
0x50f670 send
0x50f674 WSAIoctl
0x50f678 setsockopt
0x50f67c getsockname
0x50f680 ntohs
0x50f684 bind
0x50f688 htons
0x50f68c getsockopt
0x50f690 socket
0x50f694 closesocket
0x50f698 getpeername
0x50f69c __WSAFDIsSet
Library WLDAP32.dll:
0x50f5e4
0x50f5e8
0x50f5ec
0x50f5f0
0x50f5f4
0x50f5f8
0x50f5fc
0x50f600
0x50f604
0x50f608
0x50f60c
0x50f610
0x50f614
0x50f618
0x50f61c
0x50f620
Library GDI32.dll:
0x50f07c GetClipBox
0x50f084 ExtSelectClipRgn
0x50f088 SelectClipRgn
0x50f08c CreateDIBSection
0x50f090 CreateRectRgn
0x50f094 PtInRegion
0x50f098 SaveDC
0x50f09c BitBlt
0x50f0a0 SetStretchBltMode
0x50f0a4 CreateSolidBrush
0x50f0a8 LineTo
0x50f0ac MoveToEx
0x50f0b0 CreatePenIndirect
0x50f0b4 RoundRect
0x50f0b8 TextOutW
0x50f0c0 CombineRgn
0x50f0c4 GdiFlush
0x50f0c8 GetObjectA
0x50f0cc GetBitmapBits
0x50f0d0 SetBitmapBits
0x50f0d4 RestoreDC
0x50f0d8 CreateEnhMetaFileW
0x50f0dc CloseEnhMetaFile
0x50f0e0 SetWindowOrgEx
0x50f0e4 CreatePen
0x50f0e8 CreateDIBitmap
0x50f0f0 GetDeviceCaps
0x50f0f4 CreateCompatibleDC
0x50f0fc PlayEnhMetaFile
0x50f100 DeleteDC
0x50f104 StretchBlt
0x50f108 SetTextColor
0x50f10c SetBkColor
0x50f110 GetCharABCWidthsW
0x50f114 DeleteObject
0x50f118 CreateRoundRectRgn
0x50f11c GetTextMetricsW
0x50f120 SelectObject
0x50f124 GetStockObject
0x50f128 GetObjectW
0x50f12c CreateFontIndirectW
0x50f130 SetBkMode
Library gdiplus.dll:
0x50f6ac GdipFree
0x50f6b0 GdipAlloc
0x50f6b4 GdipCreatePen1
0x50f6b8 GdipDeletePen
0x50f6c8 GdipDeleteGraphics
0x50f6cc GdipDeleteFont
0x50f6d0 GdipCreateSolidFill
0x50f6d4 GdipSetPenMode
0x50f6e4 GdiplusStartup
0x50f6e8 GdipCreateFromHDC
0x50f6f8 GdipDeleteBrush
0x50f6fc GdipFillRectangleI
0x50f700 GdipDrawString
0x50f704 GdipMeasureString
0x50f710 GdipCloneBrush
0x50f71c GdipDisposeImage
0x50f720 GdipGetImageWidth
0x50f724 GdipGetImageHeight
0x50f73c GdipGetPropertyItem
0x50f740 GdipDrawImageRectI
0x50f744 GdipCloneImage
0x50f748 GdipDrawRectangleI
0x50f74c GdiplusShutdown
Library IMM32.dll:
0x50f13c ImmGetContext
0x50f140 ImmReleaseContext
Library COMCTL32.dll:
0x50f06c _TrackMouseEvent
0x50f074

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49173 106.75.70.48 kyposition.dftoutiao.com 80
192.168.56.101 49176 110.185.114.202 tpop.kpzip.com 80
192.168.56.101 49177 110.185.114.202 tpop.kpzip.com 80

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 51809 239.255.255.250 3702
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58368 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

URI Data
http://kyposition.dftoutiao.com/position/get02
GET /position/get02 HTTP/1.1
Host: kyposition.dftoutiao.com
Accept: */*

http://tpop.kpzip.com/n/tui/tpop/tpop4/kb_nopop.xml
GET /n/tui/tpop/tpop4/kb_nopop.xml HTTP/1.1
Host: tpop.kpzip.com
Accept: */*

http://tpop.kpzip.com/n/tui/tpop/tpop4/tpop4.xml
GET /n/tui/tpop/tpop4/tpop4.xml HTTP/1.1
Host: tpop.kpzip.com
Accept: */*

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.