Report #5817 check_circle

  • Creation Date: Feb. 12, 2020, 6:05 p.m.
  • Last Update: Feb. 12, 2020, 9:37 p.m.
  • File: ext1201181.exe
  • Results:
Binary
DLL
False cancel
Size
914.00KB
trid
53.7% Win32 EXE PECompact compressed
16.9% Windows screen saver
12.9% DOS Borland compiled Executable
5.8% Win32 Executable
2.6% Win16/32 Executable Delphi generic
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
698aad0d1efe4d7931a4a9778430faf2
sha1
15ae671efe11a0a1684ceff149260d253d21e226
crc32
0x51141286
sha224
f771900a76e78689447dd1b1f9fd79464c59d9271422cf15db7f2862
sha256
861873c53ae838137a2506b52eccfdef8caedacf9d22046649cf89596f2fdc01
sha384
01c3b2d6077179c4418e0e9da03f84c7d1da03a9042f7d088eb1fbcd62e1b40694ee51acb7702cf91e2aa836ba636a1d
sha512
61aebe433dd1d862128583d17f2eb14c142a1ddda682c27ec872b4612fb4fa38de3bd22267af8b9d67356ec8a9b441abd06a35e539926c6861992908b09d1304
ssdeep
24576:tdYBrxL/bPoJ6RBOS3FWB+VxJxTDjWEL:tEh/8gESzVxJxT3WE
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, Borland_Delphi_30_, network_dropper, CRC32_poly_Constant, borland_delphi, Delphi_FormShow, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, win_files_operation, IsPE32, win_hook, contentis_base64, screenshot, Borland_Delphi_v40_v50, Borland_Delphi_40_additional, win_mutex, keylogger, Borland_Delphi_40, IsWindowsGUI, anti_dbg, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, win_registry, Borland_Delphi_30_additional, Borland_Delphi_v30, System_Tools

Suspicious
True check_circle

Strings
List
http://monetato.1gb.ru/1/msacm64.jpg
t.Ht
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Name
Font.Style
Font.Style
h.nE
objShell.run(rundll),0
rundll = "PowerShell cd $env:AppData ;Start-Process rundll32.exe " & "
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
Set objShell = CreateObject("WScript.Shell")
B.rsrc
Delphi%.8X
Software\Borland\Locales
Software\Borland\Delphi\Locales
winspool.drv
winspool.drv
msimg32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
version.dll
uxtheme.dll
uxtheme.dll
urlmon.dll
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes
Uh],E
hd,E
ControlOfs%.8X%.8X
WndProcPtr%.8X%.8X
&Delete
name="Microsoft.Windows.Common-Controls"
Thread Error: %s (%d)-Cannot terminate an externally created thread,Cannot wait for an externally created thread2Cannot call Start on a running or suspended thread The specified file was not found
tsUpperTrackVertPressed
tsThumbBtnVertPressed
tsGripperVertPressed
Reserved3
- Dock zone has no control
DefocusControl
Software\CodeGear\Locales
Apartment
HandleAllocated
HandleAllocated
HandleAllocated
HandleAllocated
HandleAllocated
HandleAllocated
FTerminated
tpDownPressed
Sub-menu is not in menu
tpUpPressed
%s,Custom variant type (%s%.4x) is out of range/Custom variant type (%s%.4x) already used by %s*Custom variant type (%s%.4x) is not usable2Too many custom variant types have been registered5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Division by zero
Delete
Delete
Writer
Count
Writer
Delete
Count
Delete
Next
Count
Stage
Next
Count
Next
Count
Count
List
Count
Count
Writer
Stage
List
Count
Delete
Count
Writer
Count
Delete
Next
Next
Count
Next
Writer
Next
Delete
Writer
Count
Delete
Count

Foremost
Matches
1768.bmp, 1 KB, 1772.bmp, 1 KB, 0.exe, 914 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://monetato.1gb.ru/1/msacm64.jpg
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: ole32.dll, USER32.DLL, imm32.dll, kernel32.dll, oleaut32.dll, uxtheme.dll, MAPI32.DLL, comctl32.dll, shell32.dll, gdi32.dll, urlmon.dll, DWMAPI.DLL, advapi32.dll, msimg32.dll, version.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 216064
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .text, .itext, .data, .bss, .idata, .didata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 724600
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: ole32.dll, user32.dll, imm32.dll, kernel32.dll, oleaut32.dll, uxtheme.dll, mapi32.dll, comctl32.dll, shell32.dll, gdi32.dll, urlmon.dll, dwmapi.dll, advapi32.dll, msimg32.dll, version.dll
hasLibs: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2018-01-25 18:02:09
Future: False cancel

Compilation
Packed: False cancel
Missing: False cancel
Packers
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v6.0 - v7.0

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.data: 6
.text: 29
.itext: 4

nopsequence
.itext: 1

pushpopmath
.data: 4
.rsrc: 23
.text: 10
.reloc: 50

garbagebytes
.data: 4
.text: 29
.itext: 4

hookdetection
.text: 2
.reloc: 2

software breakpoint
.text: 2
.reloc: 13

fakeconditionaljumps
.data: 1
.text: 1

programcontrolflowchange
.data: 3
.text: 28
.itext: 4

cpuinstructionsresultscomparison
.data: 5
.rsrc: 8
.text: 10

AVclass
banload
1
VirusTotal
md5
698aad0d1efe4d7931a4a9778430faf2
sha1
15ae671efe11a0a1684ceff149260d253d21e226
SCANS (DETECTION RATE = 55.88%)
AVG
result: Win32:Malware-gen
update: 20180215
version: 18.1.3800.0
detected: True check_circle

CMC
update: 20180215
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=89)
update: 20180215
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180212
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan-Downloader ( 0051549b1 )
update: 20180215
version: 10.40.26220
detected: True check_circle

ALYac
result: Trojan.GenericKD.3005207
update: 20180215
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Malware-gen
update: 20180215
version: 18.1.3800.0
detected: True check_circle

Avira
result: TR/Dldr.Banload.vkmra
update: 20180215
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180208
version: 1.0.0.2
detected: False cancel

Cyren
update: 20180215
version: 5.4.30.7
detected: False cancel

DrWeb
update: 20180215
version: 7.0.28.2020
detected: False cancel

GData
result: Trojan.GenericKD.3005207
update: 20180215
version: A:25.16039B:25.11590
detected: True check_circle

Panda
result: Trj/GdSda.A
update: 20180215
version: 4.6.4.2
detected: True check_circle

VBA32
result: suspected of Trojan.Downloader.gen.h
update: 20180215
version: 3.12.28.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180215
version: 64616
detected: True check_circle

Zoner
update: 20180215
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180215
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180215
version: 0.99.2.0
detected: False cancel

Comodo
update: 20180215
detected: False cancel

F-Prot
update: 20180215
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180215
version: 0.1.5.2
detected: True check_circle

McAfee
result: GenericRXCR-WG!698AAD0D1EFE
update: 20180215
version: 6.0.6.653
detected: True check_circle

Rising
result: Spyware.Banker!8.8D (TFE:4:TGEM7PPzkHN)
update: 20180215
version: 25.0.0.1
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20180215
version: 4.98.0
detected: True check_circle

Yandex
update: 20180214
version: 5.5.1.3
detected: False cancel

Zillya
update: 20180214
version: 2.0.0.3491
detected: False cancel

Arcabit
result: Trojan.Generic.D2DDB17
update: 20180215
version: 1.0.0.830
detected: True check_circle

Cylance
update: 20180215
version: 2.3.1.101
detected: False cancel

Endgame
result: malicious (high confidence)
update: 20180214
version: 1.2.0
detected: True check_circle

Tencent
result: Win32.Trojan-spy.Lurk.Wqdm
update: 20180215
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180215
version: 2014.3.20.0
detected: False cancel

Webroot
update: 20180215
version: 1.0.0.207
detected: False cancel

eGambit
update: 20180215
version: v4.3.4
detected: False cancel

Ad-Aware
update: 20180215
version: 3.0.3.1010
detected: False cancel

AegisLab
update: 20180215
version: 4.2
detected: False cancel

Emsisoft
result: Trojan.GenericKD.3005207 (B)
update: 20180215
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Trojan.GenericKD.3005207
update: 20180215
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.WYI!tr
update: 20180215
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Jiangmin
result: TrojanDownloader.Banload.bnom
update: 20180215
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20180215
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180215
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen.2
update: 20180215
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180215
version: 2018-02-15.02
detected: False cancel

AhnLab-V3
update: 20180215
version: 3.11.3.19504
detected: False cancel

Antiy-AVL
result: Trojan[Spy]/Win32.Lurk
update: 20180215
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan-Spy.Win32.Lurk.vzi
update: 20180215
version: 15.0.1.13
detected: True check_circle

Microsoft
result: Trojan:Win32/Dynamer!rfn
update: 20180215
version: 1.1.14500.5
detected: True check_circle

Qihoo-360
update: 20180215
version: 1.0.0.1120
detected: False cancel

TheHacker
update: 20180213
version: 6.8.0.5.2403
detected: False cancel

ZoneAlarm
result: Trojan-Spy.Win32.Lurk.vzi
update: 20180215
version: 1.0
detected: True check_circle

Cybereason
result: malicious.d1efe4
update: 20180205
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.YBK
update: 20180215
version: 16909
detected: True check_circle

TrendMicro
result: TROJ_GEN.R00EC0PAR18
update: 20180215
version: 9.862.0.1074
detected: True check_circle

WhiteArmor
update: 20180205
detected: False cancel

BitDefender
result: Trojan.GenericKD.3005207
update: 20180215
version: 7.2
detected: True check_circle

CrowdStrike
update: 20170201
version: 1.0
detected: False cancel

K7AntiVirus
result: Trojan-Downloader ( 0051549b1 )
update: 20180215
version: 10.40.26222
detected: True check_circle

SentinelOne
update: 20180115
version: 1.0.12.202
detected: False cancel

Avast-Mobile
update: 20180215
version: 180215-02
detected: False cancel

Malwarebytes
update: 20180215
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20180215
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: Trojan.IGENERIC
update: 20180215
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Lurk.exjdrh
update: 20180215
version: 1.0.100.21498
detected: True check_circle

MicroWorld-eScan
result: Trojan.GenericKD.3005207
update: 20180215
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180215
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: GenericRXCR-WG!698AAD0D1EFE
update: 20180215
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R00EC0PAR18
update: 20180215
version: 9.950.0.1006
detected: True check_circle

total
68
sha256
861873c53ae838137a2506b52eccfdef8caedacf9d22046649cf89596f2fdc01
scan_id
861873c53ae838137a2506b52eccfdef8caedacf9d22046649cf89596f2fdc01-1518711796
resource
698aad0d1efe4d7931a4a9778430faf2
positives
38
scan_date
2018-02-15 16:23:16
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
12/2/2020 - 20:45:43.122Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
12/2/2020 - 20:45:43.122Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
12/2/2020 - 20:45:43.122Open1480C:\malware.exeC:\
12/2/2020 - 20:45:43.122Unknown1480C:\malware.exeC:\
12/2/2020 - 20:45:43.122Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
12/2/2020 - 20:45:43.122Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
12/2/2020 - 20:45:43.122Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
12/2/2020 - 20:45:43.122Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
12/2/2020 - 20:45:43.122Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
12/2/2020 - 20:45:43.122Open1480C:\malware.exeC:\Secur32.dll
12/2/2020 - 20:45:43.122Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
12/2/2020 - 20:45:43.122Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
12/2/2020 - 20:45:43.122Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
12/2/2020 - 20:45:43.122Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
12/2/2020 - 20:45:43.122Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
12/2/2020 - 20:45:43.122Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
12/2/2020 - 20:45:43.122Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
12/2/2020 - 20:45:43.122Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
12/2/2020 - 20:45:43.122Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
12/2/2020 - 20:45:43.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
12/2/2020 - 20:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
12/2/2020 - 20:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
12/2/2020 - 20:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
12/2/2020 - 20:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
12/2/2020 - 20:45:43.168Open1480C:\malware.exeC:\IPHLPAPI.DLL
12/2/2020 - 20:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
12/2/2020 - 20:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
12/2/2020 - 20:45:43.168Open1480C:\malware.exeC:\WINNSI.DLL
12/2/2020 - 20:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
12/2/2020 - 20:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
12/2/2020 - 20:45:43.168Open1480C:\malware.exeC:\DNSAPI.dll
12/2/2020 - 20:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
12/2/2020 - 20:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot
12/2/2020 - 20:45:43.231Unknown1480C:\malware.exeC:\Users\Behemot
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
12/2/2020 - 20:45:43.231Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
12/2/2020 - 20:45:43.231Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
12/2/2020 - 20:45:43.231Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot
12/2/2020 - 20:45:43.231Unknown1480C:\malware.exeC:\Users\Behemot
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
12/2/2020 - 20:45:43.231Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
12/2/2020 - 20:45:43.231Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
12/2/2020 - 20:45:43.231Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot
12/2/2020 - 20:45:43.231Unknown1480C:\malware.exeC:\Users\Behemot
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
12/2/2020 - 20:45:43.231Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
12/2/2020 - 20:45:43.231Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
12/2/2020 - 20:45:43.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
12/2/2020 - 20:45:43.231Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
12/2/2020 - 20:45:43.340Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
12/2/2020 - 20:45:43.340Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
12/2/2020 - 20:45:43.340Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
12/2/2020 - 20:45:43.340Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
12/2/2020 - 20:45:43.387Open1480C:\malware.exeC:\dhcpcsvc6.DLL
12/2/2020 - 20:45:43.387Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
12/2/2020 - 20:45:43.387Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
12/2/2020 - 20:45:43.387Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
12/2/2020 - 20:45:43.387Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\dhcpcsvc.DLL
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\CRYPTSP.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\RpcRtRemote.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
12/2/2020 - 20:45:43.434Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
12/2/2020 - 20:45:43.434Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
12/2/2020 - 20:45:43.434Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
12/2/2020 - 20:45:43.497Open1480C:\malware.exeC:\rasadhlp.dll
12/2/2020 - 20:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
12/2/2020 - 20:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
12/2/2020 - 20:45:43.543Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
12/2/2020 - 20:45:43.543Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
12/2/2020 - 20:45:44.606Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
12/2/2020 - 20:45:44.606Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
12/2/2020 - 20:45:47.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\msacm64cssEEEB3BEDb.hlp
12/2/2020 - 20:45:47.75Open1480C:\malware.exeC:\Windows\SysWOW64\pt-BR\KernelBase.dll.mui
12/2/2020 - 20:45:47.75Open1480C:\malware.exeC:\imageres.dll
12/2/2020 - 20:45:47.75Open1480C:\malware.exeC:\Windows\SysWOW64\imageres.dll
12/2/2020 - 20:45:47.75Open1480C:\malware.exeC:\Windows\SysWOW64\imageres.dll
12/2/2020 - 20:45:47.75Open1480C:\malware.exeC:\Windows\SysWOW64\pt-BR\imageres.dll.mui
12/2/2020 - 20:45:47.75Open1480C:\malware.exeC:\Windows\System32\pt-BR\imageres.dll.mui
12/2/2020 - 20:45:47.75Open1480C:\malware.exeC:\Windows\SysWOW64\pt\imageres.dll.mui
12/2/2020 - 20:45:47.75Open1480C:\malware.exeC:\Windows\SysWOW64\en-US\imageres.dll.mui
12/2/2020 - 20:45:47.75Read1480C:\malware.exeC:\Windows\SysWOW64\en-US\imageres.dll.muiimageres.dll.mui
12/2/2020 - 20:45:47.75Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll
12/2/2020 - 20:45:47.75Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
12/2/2020 - 20:45:43.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
12/2/2020 - 20:45:43.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
12/2/2020 - 20:45:43.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
12/2/2020 - 20:45:43.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
12/2/2020 - 20:45:43.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
12/2/2020 - 20:45:43.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
12/2/2020 - 20:45:43.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
12/2/2020 - 20:45:43.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
12/2/2020 - 20:45:43.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
12/2/2020 - 20:45:43.168Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
12/2/2020 - 20:45:43.168Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
12/2/2020 - 20:45:43.168Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
12/2/2020 - 20:45:43.168Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
12/2/2020 - 20:45:43.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
12/2/2020 - 20:45:43.231Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
12/2/2020 - 20:45:43.231Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
12/2/2020 - 20:45:43.231Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
12/2/2020 - 20:45:43.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
12/2/2020 - 20:45:43.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
12/2/2020 - 20:45:43.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
12/2/2020 - 20:45:43.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
12/2/2020 - 20:45:44.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
12/2/2020 - 20:45:44.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
12/2/2020 - 20:45:44.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
12/2/2020 - 20:45:44.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
12/2/2020 - 20:45:44.825Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
12/2/2020 - 20:45:44.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
12/2/2020 - 20:45:44.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
12/2/2020 - 20:45:44.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
12/2/2020 - 20:45:44.825Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
12/2/2020 - 20:45:44.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
12/2/2020 - 20:45:44.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
12/2/2020 - 20:45:44.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
12/2/2020 - 20:45:44.825Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:DNS code monetato.1gb.ru.
computer localhost arrow_forward computer gateway:50273 code monetato.1gb.ru.

Response

TCP
Info

UDP
Info
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:67 arrow_forward computer localhost:68
computer localhost:68 arrow_forward help_outline 255.255.255.255:67

HTTP
Info

Summary
DNS
True check_circle

TCP
False cancel

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 45.55%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 90.70%
suspicious: False cancel

Random Forest (100 estimators, NFS-BRMalware)
confidence: 67.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 71.22%
suspicious: False cancel

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 67.79%
suspicious: False cancel

Add to Collection
Download