Report #5624 check_circle

  • Creation Date: Feb. 11, 2020, 5:57 p.m.
  • Last Update: Feb. 11, 2020, 8:16 p.m.
  • File: eusetup.exe
  • Results:
Binary
DLL
False cancel
Size
451.00KB
trid
72.3% Win64 Executable
11.8% Win32 Executable
5.3% OS/2 Executable
5.2% Generic Win/DOS Executable
5.2% DOS Executable Generic
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
4bd67e127fc59354a98f714a8a24f9df
sha1
1c6294d44f5a095f542c91812f4e8e9612dcbff7
crc32
0x821c9aa
sha224
1159db1e4bc39e939b6a069bce29cdab5bcc153ad724aaf6ec56e051
sha256
679feccba969d0113b64a77652818356823be020b2c66e16735e348785b18ec0
sha384
df6cb644edda1efa141011b933fa96349f55f094512f5ac5fc7ce5b89119c39ca995a00f7af3240baf755e7fbccb1a2c
sha512
a110d7ad2892b9ef85f2c076daff63304f499dfce784eb1868d61e3b8fc8e724c6aab902c6a60efb6b1c46e826cb6f8ff647df895ab666172a608710d4b22d2f
ssdeep
6144:xELu14gG2I2OMOgPI+hAa1i3odh13vLj1jjx32n:xELc4gGHMtPxiYd/Tjtx3
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, anti_dbg, IP, HasDebugData, url, HasRichSignature, contentis_base64, win_registry, Microsoft_Visual_Cpp_v50v60_MFC, maldoc_find_kernel32_base_method_1, network_dropper, network_http, win_files_operation, IsPE32, IsWindowsGUI

Suspicious
True check_circle

Strings
List
iplogger.org
badgod3.icu
http://badgod4.icu/eu/2.exe
http://badgod4.icu/eu/1.exe
C:\Users\gerg\source\repos\WindowsProject3\Release\WindowsProject3.pdb
d:\agent\_work\3\s\src\vctools\crt\vcruntime\src\internal\per_thread_data.cpp
d:\agent\_work\3\s\src\vctools\crt\vcruntime\src\eh\std_exception.cpp
d:\agent\_work\3\s\src\vctools\crt\vcruntime\src\internal\winapi_downlevel.cpp
c:\program files (x86)\microsoft visual studio\2017\community\vc\tools\msvc\14.16.27023\include\xutility
c:\program files (x86)\microsoft visual studio\2017\community\vc\tools\msvc\14.16.27023\include\xutility
gc:\program files (x86)\microsoft visual studio\2017\community\vc\tools\msvc\14.16.27023\include\xstring
c:\program files (x86)\microsoft visual studio\2017\community\vc\tools\msvc\14.16.27023\include\xstring
c:\program files (x86)\microsoft visual studio\2017\community\vc\tools\msvc\14.16.27023\include\xmemory0
c:\program files (x86)\microsoft visual studio\2017\community\vc\tools\msvc\14.16.27023\include\xmemory0
1.0.0.1
1.0.0.1
minkernel\crts\ucrt\src\appcrt\heap\debug_heap.cpp
gate1.php?a={bbed3e02-0b41-11e3-8249-8fuckusa06e6f6e69632}id=2
WindowsP.exe
WININET.dll
@kernel32.dll
gate1.php?a=true
urlmon.dll
myile.exe
Debug %ls!
Debug %ls!
Software\softsinn\
minkernel\crts\ucrt\src\appcrt\locale\getstringtypea.cpp
minkernel\crts\ucrt\src\appcrt\locale\lcmapstringa.cpp
minkernel\crts\ucrt\src\appcrt\locale\wsetlocale.cpp
minkernel\crts\ucrt\src\appcrt\locale\locale_refcounting.cpp
fr-ch
fr-ca
fr-be
operator ""
minkernel\crts\ucrt\src\appcrt\stdio\output.cpp
minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp
minkernel\crts\ucrt\src\appcrt\convert\isctype.cpp
minkernel\crts\ucrt\src\appcrt\mbstring\mbctype.cpp
@minkernel\crts\ucrt\src\appcrt\internal\report_runtime_error.cpp
traits::tcsncpy_s( argument_buffer.get() + directory_length, required_count - directory_length, file_name, file_name_count)
minkernel\crts\ucrt\src\appcrt\lowio\isatty.cpp
minkernel\crts\ucrt\src\appcrt\startup\argv_wildcards.cpp
minkernel\crts\ucrt\src\appcrt\startup\argv_parsing.cpp
minkernel\crts\ucrt\src\appcrt\startup\argv_parsing.cpp
minkernel\crts\ucrt\src\appcrt\startup\argv_wildcards.cpp
minkernel\crts\ucrt\src\appcrt\internal\winapi_thunks.cpp
minkernel\crts\ucrt\src\appcrt\internal\win_policies.cpp
minkernel\crts\ucrt\src\appcrt\misc\set_error_mode.cpp
minkernel\crts\ucrt\src\appcrt\stdlib\qsort.cpp
minkernel\crts\ucrt\src\appcrt\misc\dbgrptt.cpp
minkernel\crts\ucrt\src\appcrt\convert\mbtowc.cpp
minkernel\crts\ucrt\src\appcrt\lowio\osfinfo.cpp
minkernel\crts\ucrt\src\appcrt\convert\mbstowcs.cpp
minkernel\crts\ucrt\src\appcrt\lowio\setmode.cpp
minkernel\crts\ucrt\src\appcrt\lowio\osfinfo.cpp
minkernel\crts\ucrt\src\appcrt\convert\mbrtowc.cpp
minkernel\crts\ucrt\src\desktopcrt\env\environment_initialization.cpp
minkernel\crts\ucrt\src\desktopcrt\env\environment_initialization.cpp
Heap validation failed.
minkernel\crts\ucrt\src\appcrt\convert\_fptostr.cpp
minkernel\crts\ucrt\src\appcrt\convert\cfout.cpp
minkernel\crts\ucrt\src\appcrt\convert\wctomb.cpp
minkernel\crts\ucrt\src\appcrt\convert\c32rtomb.cpp
minkernel\crts\ucrt\src\appcrt\convert\wcstombs.cpp
traits::tcscpy_s(variable.get(), required_count, source_it)
minkernel\crts\ucrt\src\appcrt\heap\new_mode.cpp
minkernel\crts\ucrt\src\appcrt\startup\onexit.cpp
minkernel\crts\ucrt\src\appcrt\internal\per_thread_data.cpp
minkernel\crts\ucrt\src\appcrt\lowio\commit.cpp
minkernel\crts\ucrt\src\appcrt\lowio\write.cpp
minkernel\crts\ucrt\src\appcrt\lowio\lseek.cpp
minkernel\crts\ucrt\src\appcrt\lowio\close.cpp
Program: %ls%ls%ls%ls%ls%ls%ls%ls%ls%ls%ls%ls
Program: %hs%ls%ls%hs%ls%hs%ls%hs%ls%ls%hs%ls
minkernel\crts\ucrt\src\appcrt\stdio\_freebuf.cpp
traits::tcsncpy_s(argument_buffer.get(), required_count, directory, directory_length)
minkernel\crts\ucrt\src\appcrt\convert\xtoa.cpp
minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp
minkernel\crts\ucrt\src\appcrt\misc\signal.cpp
minkernel\crts\ucrt\src\appcrt\convert\cvt.cpp
Buffer is too small
minkernel\crts\ucrt\src\appcrt\heap\expand.cpp
minkernel\crts\ucrt\src\appcrt\stdio\fclose.cpp
minkernel\crts\ucrt\src\appcrt\stdio\fileno.cpp
minkernel\crts\ucrt\src\appcrt\stdio\_file.cpp
Client hook re-allocation failure at file %hs line %d.
Client hook allocation failure at file %hs line %d.
%hs(%d) :
%ls(%d) : %ls
Data: <%s> %s
HttpOpenRequestW
HttpSendRequestW
mscoree.dll
<requestedPrivileges>
client block at 0x%p, subtype %x, %Iu bytes long.
HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.
HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.
("Invalid file descriptor. File possibly closed by a different thread",0)
The Block at 0x%p was allocated by aligned routines, use _aligned_realloc()

Foremost
Matches
0.exe, 451 KB, 531.png, 17 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: True check_circle
Allowed: 1.0.0.1, 1, one.one.one.one.
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://badgod4.icu/eu/1.exe, http://badgod4.icu/eu/2.exe
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: mscoree.dll, @kernel32.dll, WININET.dll, ADVAPI32.dll, urlmon.dll, KERNEL32.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 264704
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 4096
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .text, .rdata, .data, .rsrc, .reloc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 6
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 6
Linker
Version: 14.16
Suspicious: False cancel
Subsystem
Version: 6.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 19072
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: mscoree.dll, wininet.dll, advapi32.dll, urlmon.dll, kernel32.dll
hasLibs: True check_circle
Suspicious: @kernel32.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2019-08-18 07:36:40
Future: False cancel

Compilation
Packed: False cancel
Missing: True check_circle
Packers
Compiled: False cancel
Compilers

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
ldr
.text: 2

pushret
.rsrc: 236
.rdata: 4

nopsequence
.rsrc: 8

pushpopmath
.rsrc: 1
.text: 1
.rdata: 7
.reloc: 5

sizeofimage
.text: 2

garbagebytes
.rsrc: 120
.rdata: 2

hookdetection
.text: 7

stealthimport
.rsrc: 1
.text: 1

peb ntglobalflag
.text: 1

isdebbugerpresent
.text: 1

software breakpoint
.text: 1
.reloc: 3

fakeconditionaljumps
.text: 8

programcontrolflowchange
.rsrc: 120
.rdata: 2

cpuinstructionsresultscomparison
.rsrc: 4
.rdata: 1

AVclass
agentb
1
VirusTotal
md5
4bd67e127fc59354a98f714a8a24f9df
sha1
1c6294d44f5a095f542c91812f4e8e9612dcbff7
SCANS (DETECTION RATE = 76.12%)
AVG
result: Win32:DropperX-gen [Drp]
update: 20190902
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20190321
version: 1.1.0.977
detected: False cancel

MAX
update: 20190903
version: 2018.9.12.1
detected: False cancel

APEX
result: Malicious
update: 20190901
version: 5.58
detected: True check_circle

Bkav
update: 20190829
version: 1.3.0.10239
detected: False cancel

K7GW
result: Trojan-Downloader ( 005561e31 )
update: 20190902
version: 11.64.31878
detected: True check_circle

ALYac
result: Trojan.Agent.Occamy.A
update: 20190902
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:DropperX-gen [Drp]
update: 20190902
version: 18.4.3895.0
detected: True check_circle

Avira
result: TR/Dldr.Agent.ekhaq
update: 20190902
version: 8.3.3.8
detected: True check_circle

Baidu
update: 20190318
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.ZJKV-2856
update: 20190902
version: 6.2.0.1
detected: True check_circle

DrWeb
result: Trojan.DownLoader30.10739
update: 20190902
version: 7.0.41.7240
detected: True check_circle

GData
result: Trojan.GenericKD.32280728
update: 20190902
version: A:25.23257B:26.15931
detected: True check_circle

Panda
result: Trj/GdSda.A
update: 20190901
version: 4.6.4.2
detected: True check_circle

VBA32
result: suspected of Trojan.Downloader.gen.h
update: 20190902
version: 4.0.0
detected: True check_circle

Zoner
update: 20190902
version: 1.0.0.1
detected: False cancel

ClamAV
update: 20190902
version: 0.101.4.0
detected: False cancel

Comodo
result: Malware@#14jcpuv336rxe
update: 20190902
version: 31413
detected: True check_circle

F-Prot
update: 20190902
version: 4.7.1.166
detected: False cancel

McAfee
result: RDN/Generic Downloader.x
update: 20190902
version: 6.0.6.653
detected: True check_circle

Rising
result: Downloader.Agent!1.BB58 (CLASSIC)
update: 20190902
version: 25.0.0.24
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20190902
version: 4.98.0
detected: True check_circle

Yandex
update: 20190822
version: 5.5.2.24
detected: False cancel

Zillya
update: 20190830
version: 2.0.0.3889
detected: False cancel

Acronis
result: suspicious
update: 20190829
version: 1.0.1.51
detected: True check_circle

Alibaba
result: TrojanDownloader:Win32/Agentb.ab66f16d
update: 20190527
version: 0.3.0.5
detected: True check_circle

Arcabit
result: Trojan.Generic.D1EC9098
update: 20190902
version: 1.0.0.856
detected: True check_circle

Cylance
result: Unsafe
update: 20190903
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20190819
version: 3.0.14
detected: True check_circle

TACHYON
update: 20190902
version: 2019-09-02.02
detected: False cancel

Tencent
result: Win32.Trojan-downloader.Agentb.Pgxa
update: 20190903
version: 1.0.0.1
detected: True check_circle

ViRobot
result: Trojan.Win32.Z.Agent.461824.GW
update: 20190902
version: 2014.3.20.0
detected: True check_circle

Webroot
result: W32.Malware.Gen
update: 20190903
version: 1.0.0.403
detected: True check_circle

eGambit
result: Unsafe.AI_Score_69%
update: 20190903
version: v4.3.6
detected: True check_circle

Ad-Aware
result: Trojan.GenericKD.32280728
update: 20190902
version: 3.0.5.370
detected: True check_circle

AegisLab
result: Trojan.Win32.Agentb.a!c
update: 20190902
version: 4.2
detected: True check_circle

Emsisoft
result: Trojan.GenericKD.32280728 (B)
update: 20190902
version: 2018.12.0.1641
detected: True check_circle

F-Secure
result: Trojan.TR/Dldr.Agent.ekhaq
update: 20190902
version: 12.0.86.52
detected: True check_circle

Fortinet
result: W32/Agentb.DG!tr.dldr
update: 20190902
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20190717
version: 6.3.6.26157
detected: False cancel

Jiangmin
result: TrojanDownloader.Agentb.u
update: 20190902
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20190903
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20190903
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen.MBT
update: 20190901
version: 1.10.0.0
detected: True check_circle

Trapmine
update: 20190826
version: 3.1.81.800
detected: False cancel

AhnLab-V3
result: Malware/Win32.RL_Generic.R288271
update: 20190902
version: 3.16.1.25089
detected: True check_circle

Antiy-AVL
result: Trojan[Downloader]/Win32.Agentb
update: 20190902
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan-Downloader.Win32.Agentb.dg
update: 20190902
version: 15.0.1.13
detected: True check_circle

Microsoft
result: Trojan:Win32/Occamy.C
update: 20190902
version: 1.1.16300.1
detected: True check_circle

Qihoo-360
result: Win32/Trojan.Downloader.c19
update: 20190903
version: 1.0.0.1120
detected: True check_circle

ZoneAlarm
result: Trojan-Downloader.Win32.Agentb.dg
update: 20190902
version: 1.0
detected: True check_circle

Cybereason
result: malicious.44f5a0
update: 20190616
version: 1.2.449
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Agent.ERS
update: 20190902
version: 19953
detected: True check_circle

TrendMicro
result: TROJ_FRS.VSNW14H19
update: 20190902
version: 11.0.0.1006
detected: True check_circle

BitDefender
result: Trojan.GenericKD.32280728
update: 20190902
version: 7.2
detected: True check_circle

CrowdStrike
result: win/malicious_confidence_100% (W)
update: 20190702
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan-Downloader ( 005561e31 )
update: 20190902
version: 11.64.31878
detected: True check_circle

SentinelOne
update: 20190807
version: 1.0.31.22
detected: False cancel

Avast-Mobile
update: 20190901
version: 190901-00
detected: False cancel

Malwarebytes
result: Trojan.Downloader.LVL
update: 20190902
version: 2.1.1.1115
detected: True check_circle

TotalDefense
update: 20190902
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: Trojandownloader.Agentb
update: 20190901
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Dwn.fwaogu
update: 20190902
version: 1.0.134.24859
detected: True check_circle

MicroWorld-eScan
result: Trojan.GenericKD.32280728
update: 20190902
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
result: Trojan.Agent/Gen-Faldesc
update: 20190830
version: 5.6.0.1032
detected: True check_circle

McAfee-GW-Edition
result: BehavesLike.Win32.PWSZbot.gh
update: 20190902
version: v2017.3010
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_FRS.VSNW14H19
update: 20190902
version: 10.0.0.1040
detected: True check_circle

total
67
sha256
679feccba969d0113b64a77652818356823be020b2c66e16735e348785b18ec0
scan_id
679feccba969d0113b64a77652818356823be020b2c66e16735e348785b18ec0-1567467088
resource
4bd67e127fc59354a98f714a8a24f9df
positives
51
scan_date
2019-09-02 23:31:28
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
11/2/2020 - 19:45:44.418Open1480C:\malware.exeC:\Secur32.dll
11/2/2020 - 19:45:44.418Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
11/2/2020 - 19:45:44.418Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
11/2/2020 - 19:45:44.418Open1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nls
11/2/2020 - 19:45:44.418Unknown1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nlsSortDefault.nls
11/2/2020 - 19:45:44.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
11/2/2020 - 19:45:44.418Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
11/2/2020 - 19:45:44.418Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
11/2/2020 - 19:45:44.418Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
11/2/2020 - 19:45:44.418Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
11/2/2020 - 19:45:44.418Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
11/2/2020 - 19:45:44.418Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot
11/2/2020 - 19:45:44.465Unknown1480C:\malware.exeC:\Users\Behemot
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
11/2/2020 - 19:45:44.465Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
11/2/2020 - 19:45:44.465Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
11/2/2020 - 19:45:44.465Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot
11/2/2020 - 19:45:44.465Unknown1480C:\malware.exeC:\Users\Behemot
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
11/2/2020 - 19:45:44.465Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
11/2/2020 - 19:45:44.465Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
11/2/2020 - 19:45:44.465Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot
11/2/2020 - 19:45:44.465Unknown1480C:\malware.exeC:\Users\Behemot
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
11/2/2020 - 19:45:44.465Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
11/2/2020 - 19:45:44.465Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
11/2/2020 - 19:45:44.465Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
11/2/2020 - 19:45:44.465Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
11/2/2020 - 19:45:44.543Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
11/2/2020 - 19:45:44.543Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
11/2/2020 - 19:45:44.543Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
11/2/2020 - 19:45:44.543Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
11/2/2020 - 19:45:44.543Open1480C:\malware.exeC:\IPHLPAPI.DLL
11/2/2020 - 19:45:44.543Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
11/2/2020 - 19:45:44.543Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
11/2/2020 - 19:45:44.543Open1480C:\malware.exeC:\WINNSI.DLL
11/2/2020 - 19:45:44.543Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
11/2/2020 - 19:45:44.543Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
11/2/2020 - 19:45:44.653Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
11/2/2020 - 19:45:44.653Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
11/2/2020 - 19:45:44.653Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
11/2/2020 - 19:45:44.653Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
11/2/2020 - 19:45:44.653Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
11/2/2020 - 19:45:44.653Open1480C:\malware.exeC:\DNSAPI.dll
11/2/2020 - 19:45:44.653Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
11/2/2020 - 19:45:44.653Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
11/2/2020 - 19:45:44.747Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
11/2/2020 - 19:45:44.747Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
11/2/2020 - 19:45:44.747Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
11/2/2020 - 19:45:44.747Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
11/2/2020 - 19:45:44.747Open1480C:\malware.exeC:\rasadhlp.dll
11/2/2020 - 19:45:44.747Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
11/2/2020 - 19:45:44.747Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
11/2/2020 - 19:45:44.793Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
11/2/2020 - 19:45:44.793Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
11/2/2020 - 19:45:44.793Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
11/2/2020 - 19:45:44.793Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
11/2/2020 - 19:45:44.840Open1480C:\malware.exeC:\dhcpcsvc6.DLL
11/2/2020 - 19:45:44.840Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
11/2/2020 - 19:45:44.840Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
11/2/2020 - 19:45:44.840Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
11/2/2020 - 19:45:44.840Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\dhcpcsvc.DLL
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\CRYPTSP.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\RpcRtRemote.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
11/2/2020 - 19:45:44.887Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
11/2/2020 - 19:45:44.887Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
11/2/2020 - 19:45:44.887Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
11/2/2020 - 19:45:44.997Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
11/2/2020 - 19:45:44.997Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
11/2/2020 - 19:45:46.200Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
11/2/2020 - 19:45:46.200Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
11/2/2020 - 19:45:44.418Write1480C:\malware.exeHKCU\Software\softsinnsoftsinn
11/2/2020 - 19:45:44.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
11/2/2020 - 19:45:44.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
11/2/2020 - 19:45:44.465Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
11/2/2020 - 19:45:44.653Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
11/2/2020 - 19:45:44.653Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
11/2/2020 - 19:45:44.653Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
11/2/2020 - 19:45:44.653Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
11/2/2020 - 19:45:44.653Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
11/2/2020 - 19:45:44.653Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
11/2/2020 - 19:45:44.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
11/2/2020 - 19:45:44.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
11/2/2020 - 19:45:44.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
11/2/2020 - 19:45:44.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
11/2/2020 - 19:45:44.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
11/2/2020 - 19:45:44.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
11/2/2020 - 19:45:44.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
11/2/2020 - 19:45:44.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
11/2/2020 - 19:45:45.43Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
11/2/2020 - 19:45:45.43Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
11/2/2020 - 19:45:45.43Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
11/2/2020 - 19:45:45.43Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
11/2/2020 - 19:45:46.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
11/2/2020 - 19:45:46.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
11/2/2020 - 19:45:46.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
11/2/2020 - 19:45:46.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
11/2/2020 - 19:45:46.450Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
11/2/2020 - 19:45:46.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
11/2/2020 - 19:45:46.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
11/2/2020 - 19:45:46.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
11/2/2020 - 19:45:46.450Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
11/2/2020 - 19:45:46.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
11/2/2020 - 19:45:46.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
11/2/2020 - 19:45:46.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
11/2/2020 - 19:45:46.450Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:DNS code badgod3.icu.
computer localhost arrow_forward computer gateway:50273 code badgod3.icu.

Response

TCP
Info

UDP
Info
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:67 arrow_forward computer localhost:68
computer localhost:68 arrow_forward help_outline 255.255.255.255:67

HTTP
Info

Summary
DNS
True check_circle

TCP
False cancel

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 66.67%
suspicious: False cancel

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 98.65%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 99.23%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 54.50%
suspicious: False cancel

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 58.89%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 72.59%
suspicious: False cancel

Add to Collection
Download