Report #5471 check_circle

  • Creation Date: Feb. 10, 2020, 4:23 p.m.
  • Last Update: Feb. 10, 2020, 5:36 p.m.
  • File: 2RmOSMg.exe
  • Results:
Binary
DLL
False cancel
Size
3.17MB
trid
52.9% Win32 Executable
23.5% Generic Win/DOS Executable
23.5% DOS Executable Generic
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
a1ff336fed837a4243fd0aa173be7725
sha1
cee8011bf3056c90cf38e70eba9e8658820d839c
crc32
0x405f3887
sha224
d677dfe28d267946a39e58fb37763bc70c2364545e17e14308b1e377
sha256
77bebbf30283341dfa8ba615dbb4b5bde346cd149a30287f85fed4c47d8c80e8
sha384
7cfc60f5b4fe57ebb7e6d601e14f9f7b6f3fb5a002369f54862b6786d470fbd367d1def01f3b13f0e52f1f65102e7fb5
sha512
2ecb8e5df7549e5acbb6a600c53b6e5d402cdfe1a73d854723bdc608d81d2582a9790175bb0f28a294e7afe471c3adcc60716e96f7244765a289c29bdc5ed3ff
ssdeep
49152:GlTVmnrRW/vgUDa+vYdfEEdu6MDyaAtE/91D12bIe/4LSmsMSyhtdlbr49ht:GOcvJa6EsEdMDRAOHD08x+MSytdl
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, network_ssl, Armadillo_V6X_Minimum_Protection_Silicon_Realms_Toolworks_20081227, ThreadControl__Context, CRC32_poly_Constant, VC8_Microsoft_Corporation, CRC32_table, TEAN, win_files_operation, IsPacked, contentis_base64, screenshot, win_mutex, keylogger, VirtualPC_Detection, IsPE32, maldoc_find_kernel32_base_method_1, vmdetect, IsWindowsGUI, anti_dbg, DebuggerHiding__Active, Microsoft_Visual_Cpp_8

Suspicious
True check_circle

Strings
List
Vcl.Graphics
Winapi.Windows
ip.eT
System.Net.HttpClient.Win
h.Ec
8.PIN
Font.Name
Font.Style
}System.Net.HttpClient
ts.AL
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
Converter ID must be specified1No converter with the name %s has been registeredfThe converter named "%s" with an identical input type (%s) and output type (%s) has already been added$A method with name %s already exists.No method with the name %s has been registered)Wrong number of args: expected %d, got %d#Don't know how to add "%s" and "%s"(Don't know how to subtract "%s" and "%s"(Don't know how to multiply "%s" and "%s"
J.Na
Y.gr
vd.Pk
o.My
u.Yt
_.gp
y.ru
The credentials supplied were not complete, and could not be verified. Additional information can be returned from the context.4The context data must be renegotiated with the peer.'The target principal name is incorrect.:There is no LSA mode context associated with this context.8The clocks on the client and server machines are skewed.;The certificate chain was issued by an untrusted authority.7The message received was unexpected or badly formatted.;An unknown error occurred while processing the certificate.%The received certificate has expired.*The specified data could not be encrypted.*The specified data could not be decrypted.YThe client and server cannot communicate, because they do not possess a common algorithm.BThe security package failed to initialize, and cannot be installed-The token supplied to the function is invalid^The security package is not able to marshall the logon buffer, so the logon attempt has failedNThe per-message Quality of Protection is not supported by the security package?The security context does not allow impersonation of the client
System.Win.Registry
j.PT
Unable to create Peer for: %s using the implementation %s. Check to make sure the peer class is registered and that it implements the correct interface-Cannot use the reserved implementationID "%s"2AByteEncoding must be an IIdTextEncoding interface,Key generation functions could not be loaded.SSL Certificate could not be loaded, error: %s(Public Key not Obtained from Certificate
Error getting SSL method.%Error setting File Descriptor for SSL!Error binding data to SSL socket.+EOF was observed that violates the protocol
V.KH
M.AX
0.Lr
Q.Mh
4.JO
X.Gm
u.Tt
Z.tr
+[R.Me
H(A.Lt
p.vn#a
System.Net.Mime
System.Win.Crtl
System.Win.ComConst
]Xml.Win.msxmldom
SSL status: "%s"
AW.ovk#
Unable to save settings%Cannot remove shell notification icon"%s requires Windows Vista or later
Network is down.
Host is down.
Host field is empty
Socket Error # %d
%s class already registered
Unknown driver: %s
Error connecting to server: %s
No close token for type %s
The security context could not be established due to a failure in the requested quality of service (e.g. mutual authentication or delegation).dA security context was deleted before the context was completed. This is considered a logon failure.mThe client is trying to negotiate a context and the server requires user-to-user but didn't send a TGT reply.aUnable to accomplish the requested task because the local machine does not have any IP addresses.bThe supplied credential handle does not match the credential associated with the security context.]The crypto system or checksum function is invalid because a required function is unavailable.9The number of maximum ticket referrals has been exceeded.KThe local machine must be a Kerberos KDC (domain controller) and it is not.qThe other end of the security negotiation is requires strong crypto but it is not supported on the local machine.5The KDC reply contained more than one principal name.OExpected to find PA data for a hint of what etype to use, but it was not found.
No credential handle acquired:The encryption type requested is not supported by the KDC.QAn unsupported preauthentication mechanism was presented to the Kerberos package.
`027
GmE-3A
*.E/H
+IdTCPServer
The domain controller certificate used for smartcard logon has been revoked. Please contact your system administrator with the contents of your system event log.IA signature operation must be performed before the user can authenticate.AOne or more of the parameters passed to the function was invalid.DClient policy does not allow credential delegation to target server.bClient policy does not allow credential delegation to target server with NLTM only authentication.1The recipient rejected the renegotiation request.-The required security context does not exist.`The PKU2U protocol encountered an error while attempting to utilize the associated certificates.:The identity of the server computer could not be verified.
System.Win.ComObj
'CEO
GO,E
|DFA
,NEP
Parameter count mismatch<Type '%s' is not declared in the interface section of a unit7VAR and OUT arguments must match parameter type exactly,Specified Login Credential Service not found"%s (Version %d.%d, Build %d, %5:s):%s Service Pack %4:d (Version %1:d.%2:d, Build %3:d, %5:s)
Could not load SSL library.
RdEi(
OUe+B
I'tcs
8Vcl.ToolWin
Spanish (Spain)
System.Net.URLClient
u&apFh
NSystem.Win.TaskbarCore
XMLDataFile must be specified$TransformationFile must be specified,Version of Transformation File not supported$Unable to add IStylusAsyncPlugin: %s#Unable to add IStylusSyncPlugin: %s'Unable to remove IStylusAsyncPlugin: %s&Unable to remove IStylusSyncPlugin: %s&Unable to get or set window handle: %s/Unable to enable or disable IRealTimeStylus: %s
Unrecognized command type.9Schema or user name separated by a '.' must be specified.
Parameter "%s" not found,Maximum number of redirections (%d) exceeded Error getting Server Certificate)Server Certificate Invalid or not present
8=%cDPn>
Connection Closed Gracefully.;Could not bind socket. Address and port are already in use.
2{?%oR)
Error parsing undefined valueDAdditional text encountered after finished reading JSON content: %s..The reader's MaxDepth of %s has been exceeded.<Token %s in state %s would result in an invalid JSON object.AAfter parsing a value an unexpected character was encountered: %s"Unexpected end when reading bytes.2Unexpected character while parsing constructor: %s9Unexpected character encountered while parsing number: %s9Unexpected character encountered while parsing value: %s.$Unexpected end while parsing comment)Unexpected end while parsing constructor.
\t`4%s
7!%hn
%E+;l5
n]%1E
l%-c9I
, line %d, position %d Path '%s'(Indentation value must be greater than 0KUTF8: A start byte not followed by enough continuation bytes in position %sDUTF8: An unexpected continuation byte in %s-byte UTF8 in position %sAUTF8: Type cannot be determined out of header byte at position %s*Internal: Field %s has no serialized value+Internal: Field %s conversion is incomplete&Internal: Array expected instead of %s+Internal: JSON value expected instead of %s'Internal: Array expected instead of nil/Internal: Current context cannot accept a value8Internal: Object context expected when processing a pair.Internal: Current context cannot accept a pair-Internal: No conversion possible for type: %sGInternal: Conversion failed, converted object is most likely incomplete,Internal: Type %s is not currently supportedTField attribute should provide a field interceptor instead of a type one on field %s$Internal: Cannot instantiate type %sBCan not change credentials after handle aquired. Use Release first
f4%AD
N1aeM
Socks server did not respond.$Invalid socks authentication method.%Authentication error to socks server.
Connected.
T%6ii
[%dOH
Unknown error#SSPI %s returns error #%d(0x%x): %s0SSPI interface has failed to initialise properly
hSystem.Win.Taskbar
Response content is emptyFResponse RootElement, "%s", is not a valid path for the response JSON
%L%hP\d
An ObjectId must be 12 bytes)Invalid property identifier character: %s
Writer not available)"%s" DOMImplementation already registered
,h%em
au%s#/
]o%nt

Foremost
Matches
0.exe, 3 MB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: False cancel
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

Files
Allowed: USER32.DLL, kernel32.dll, COMCTL32.DLL, mscoree.dll, GDI32.dll
hasFiles: True check_circle
Suspicious: x{.dB
hasAllowed: True check_circle
hasSuspicious: True check_circle

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 3010560
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 4096
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 3373161
Suspicous: False cancel

Sections
Allowed: .text, .itext, .data, .bss, .idata, .didata, .edata, .tls, .rdata, .reloc, .text1, .adata, .data1, .reloc1, .pdata, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 83.82
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 6731042
Suspicious: False cancel

Anomalies
Anomalies
hasAnomalies: False cancel

Libraries
Allowed: user32.dll, kernel32.dll, comctl32.dll, mscoree.dll, gdi32.dll
hasLibs: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2019-01-28 16:53:39
Future: False cancel

Compilation
Packed: False cancel
Missing: False cancel
Packers
Compiled: True check_circle
Compilers: Microsoft Visual C++ 8, VC8 -> Microsoft Corporation

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
ldr
.rdata: 1

pushret
.adata: 6
.pdata: 1501
.rdata: 2

pushpopmath
.rsrc: 2
.adata: 23
.pdata: 864
.rdata: 4

sizeofimage
.rdata: 1

ss register
.pdata: 34

garbagebytes
.adata: 4
.pdata: 610
.rdata: 1

hookdetection
.adata: 1
.pdata: 50

stealthimport
.adata: 1

peb ntglobalflag
.rdata: 1

isdebbugerpresent
.rdata: 1

software breakpoint
.adata: 2
.pdata: 57

fakeconditionaljumps
.adata: 1
.pdata: 55
.rdata: 45

programcontrolflowchange
.adata: 3
.pdata: 558
.rdata: 1

cpuinstructionsresultscomparison
.rsrc: 20
.adata: 6
.pdata: 3

AVclass
ursu
1
VirusTotal
md5
a1ff336fed837a4243fd0aa173be7725
sha1
cee8011bf3056c90cf38e70eba9e8658820d839c
SCANS (DETECTION RATE = 60.87%)
AVG
result: Win32:Trojan-gen
update: 20190216
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20190217
version: 1.1.0.977
detected: False cancel

Bkav
update: 20190215
version: 1.3.0.9899
detected: False cancel

K7GW
result: Trojan-Downloader ( 0054698d1 )
update: 20190216
version: 11.29.30017
detected: True check_circle

Avast
result: Win32:Trojan-gen
update: 20190216
version: 18.4.3895.0
detected: True check_circle

Avira
result: TR/Spy.Banker.Gen
update: 20190216
version: 8.3.3.8
detected: True check_circle

Baidu
update: 20190214
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.JOCQ-3234
update: 20190217
version: 6.2.0.1
detected: True check_circle

DrWeb
update: 20190216
version: 7.0.34.11020
detected: False cancel

GData
result: Gen:Variant.Ursu.312572
update: 20190216
version: A:25.20695B:25.14402
detected: True check_circle

Panda
result: Trj/GdSda.A
update: 20190217
version: 4.6.4.2
detected: True check_circle

VBA32
update: 20190215
version: 3.35.1
detected: False cancel

VIPRE
result: Trojan.Win32.Generic!BT
update: 20190216
version: 73120
detected: True check_circle

Zoner
update: 20190216
version: 1.0
detected: False cancel

ClamAV
update: 20190216
version: 0.101.1.0
detected: False cancel

Comodo
result: Malware@#36w9nievup4wc
update: 20190216
version: 30442
detected: True check_circle

F-Prot
update: 20190217
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Delf
update: 20190217
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!A1FF336FED83
update: 20190216
version: 6.0.6.653
detected: True check_circle

Rising
result: Downloader.Delf!8.16F (CLOUD)
update: 20190216
version: 25.0.0.24
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20190217
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.Agent!B1tfLODFzSc
update: 20190215
version: 5.5.1.3
detected: True check_circle

Zillya
result: Trojan.Agent.Win32.1023365
update: 20190215
version: 2.0.0.3755
detected: True check_circle

Acronis
update: 20190213
version: 1.0.1.40
detected: False cancel

Alibaba
update: 20180921
version: 0.1.0.2
detected: False cancel

Arcabit
result: Trojan.Ursu.D4C4FC
update: 20190216
version: 1.0.0.837
detected: True check_circle

Babable
update: 20180917
version: 9107201
detected: False cancel

Cylance
result: Unsafe
update: 20190217
version: 2.3.1.101
detected: True check_circle

Endgame
update: 20190215
version: 3.0.3
detected: False cancel

TACHYON
update: 20190216
version: 2019-02-17.02
detected: False cancel

Tencent
result: Win32.Trojan.Agent.Lnoh
update: 20190217
version: 1.0.0.1
detected: True check_circle

ViRobot
result: Trojan.Win32.Z.Ursu.3321856.G
update: 20190216
version: 2014.3.20.0
detected: True check_circle

Webroot
update: 20190217
version: 1.0.0.403
detected: False cancel

eGambit
update: 20190217
version: v4.3.6
detected: False cancel

Ad-Aware
result: Gen:Variant.Ursu.312572
update: 20190216
version: 3.0.5.370
detected: True check_circle

AegisLab
update: 20190216
version: 4.2
detected: False cancel

Emsisoft
result: Gen:Variant.Ursu.312572 (B)
update: 20190216
version: 2018.4.0.1029
detected: True check_circle

F-Secure
result: Trojan.TR/Spy.Banker.Gen
update: 20190216
version: 12.0.86.52
detected: True check_circle

Fortinet
result: W32/Delf.CNQ!tr.dldr
update: 20190217
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20181128
version: 6.3.6.26157
detected: False cancel

Jiangmin
result: Trojan.Agent.brzl
update: 20190216
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20190217
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20190217
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen.2
update: 20190216
version: 1.8.0.0
detected: True check_circle

Trapmine
update: 20190123
version: 3.1.40.719
detected: False cancel

AhnLab-V3
result: Trojan/Win32.Midgare.C2837168
update: 20190216
version: 3.14.1.22785
detected: True check_circle

Antiy-AVL
result: Trojan/Win32.Tiggre
update: 20190217
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan.Win32.Agent.qwhzeh
update: 20190216
version: 15.0.1.13
detected: True check_circle

Microsoft
result: Trojan:Win32/Occamy.C
update: 20190216
version: 1.1.15700.8
detected: True check_circle

Qihoo-360
result: Win32/Trojan.df4
update: 20190217
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20190215
version: 6.8.0.5.4019
detected: False cancel

Trustlook
update: 20190217
version: 1.0
detected: False cancel

ZoneAlarm
result: Trojan.Win32.Agent.qwhzeh
update: 20190216
version: 1.0
detected: True check_circle

Cybereason
result: malicious.fed837
update: 20190109
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Delf.CNQ
update: 20190217
version: 18888
detected: True check_circle

TrendMicro
result: TROJ_GEN.R011C0GAV19
update: 20190216
version: 10.0.0.1040
detected: True check_circle

BitDefender
result: Gen:Variant.Ursu.312572
update: 20190217
version: 7.2
detected: True check_circle

CrowdStrike
update: 20181023
version: 1.0
detected: False cancel

K7AntiVirus
result: Trojan-Downloader ( 0054698d1 )
update: 20190216
version: 11.29.30017
detected: True check_circle

SentinelOne
update: 20190203
version: 1.0.23.276
detected: False cancel

Avast-Mobile
update: 20190217
version: 190217-00
detected: False cancel

Malwarebytes
update: 20190217
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20190216
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: Trojan.Ursu
update: 20190216
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Banker.flbsbc
update: 20190216
version: 1.0.134.24576
detected: True check_circle

MicroWorld-eScan
result: Gen:Variant.Ursu.312572
update: 20190216
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20190213
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Generic.wc
update: 20190216
version: v2017.3010
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R011C0GAV19
update: 20190216
version: 10.0.0.1040
detected: True check_circle

total
69
sha256
77bebbf30283341dfa8ba615dbb4b5bde346cd149a30287f85fed4c47d8c80e8
scan_id
77bebbf30283341dfa8ba615dbb4b5bde346cd149a30287f85fed4c47d8c80e8-1550394552
resource
a1ff336fed837a4243fd0aa173be7725
positives
42
scan_date
2019-02-17 09:09:12
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace

Process
Trace

Analysis
Reason
Blue Screen

Status
Machine Crashed

Results
0

Registry
Trace

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: False cancel

Deleted
Identified: False cancel

Browsers
Identified: False cancel

Internet
Identified: False cancel

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code raw.githubusercontent.com.
computer localhost arrow_forward computer gateway:DNS code raw.githubusercontent.com.

Response
computer gateway:DNS arrow_forward computer localhost code raw.githubusercontent.com. reply_all 151.101.252.133


TCP
Info
151.101.252.133:443 arrow_forward computer localhost:65191
computer localhost:65191 arrow_forward 151.101.252.133:443

UDP
Info
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:50273

HTTP
Info

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 74.73%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 54.85%
suspicious: False cancel

Random Forest (100 estimators, NFS-BRMalware)
confidence: 73.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 72.43%
suspicious: False cancel

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 99.93%
suspicious: True check_circle

Add to Collection
Download