Report #6167 check_circle

Binary
DLL
False cancel
Size
916.50KB
trid
37.1% UPX compressed Win32 Executable
36.4% Win32 EXE Yoda's Crypter
9.0% Win32 Dynamic Link Library
6.1% Win32 Executable
2.8% Win16/32 Executable Delphi generic
type
PE
wordsize
0
Subsystem
unknown
Hashes
md5
f6e85492198a2da9fbb2bcbca63edd5b
sha1
090a5a34e12692895aaf413318ab096fc3b614d8
crc32
0xdad58c7d
sha224
9cec5138c7fee15429c10723aa318a6a15d763390bed9f877deb33f8
sha256
44e7400fd24fa9bb73add9ce78f16f18bd4c5196171d2e27b5540ccd5faa3979
sha384
d8595d03f90d66e18873952e3d55d6a0a63b56bbb9f3130376c4db3b6664e8929bae989b16642bdc1e95b831a7a08abc
sha512
18e3a66b4fa481c2d66303e14d4bc1cc702686c415c121bf60c0deedeafec63d979976e15e7d79b71f4f6f9a224b8f45ed22f624ea4a4fc0284cc9cfbd576bca
ssdeep
24576:hv/1hg+lR5KC559BSUOWbs2VY8A3+mbVJa:hv/1KaRzeUOTmLM+mB
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
MSLRH_V031_emadicius, UPXProtectorv10x2, UPX_v0896_v102_v105_v122_Delphi_stub, UPX_wwwupxsourceforgenet, UPX20030XMarkusOberhumerLaszloMolnarJohnReiser, UPX_v0896_v102_v105_v122_Delphi_stub_Laszlo_Markus, screenshot, IsWindowsGUI, contentis_base64, domain, yodas_Protector_v1033_dllocx_Ashkbiz_Danehkar_h, UPXv20MarkusLaszloReiser, win_registry, UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser, url, UPX, IsPE32, UPX_wwwupxsourceforgenet_additional, UPX_v0896_v102_v105_v122_Delphi_stub_additional, IsPacked

Suspicious
True check_circle

Strings
List
T.hT
G.aI
MTl.Tn
IED_SINCE.Th
.LozH.com">@
Z.net>V]
F.GF
N.BN
F.GF
F.GF
Li.Mx
F.GF
F.GF
F.GF
F.Gf
F.GF
K.tt
https://oF
g.US
I.dZ
i.Tz
z.bg
winspool.drv
W.cens
!<hs.tubu
t.gif
msimg32.dll
comctl32.dll
version.dll
_.saa
winmm.dll
mpr.dll
KEY_BACKSP
SE@8,Fh
UctOc:w4
F"eS
WL,E
is:w
Fh t=
kgO,E
#4bSt*%dH
%9GUI(a
5A+yn%p
Rn:%5a
E%0sy
MA%i5
U%Eh0
:p%FgE\
m<a%d
%cNS+}
%att#
"H%a<
O%a+A
)M%iS'
Lt%i.
DER%A^
NW%Ei1
Ks%4Lo
v%dHtI
IWIC%u"
HC'%cIww
TITLE>{%APPNA
wifBmp
rOtps
Tqd%EC
E%AATL
%gIuye
IW_JS_IWEXPLORER
U %nv\t
IW_GFX_DBNAV_DELETE
7xmlHttp
[aI]w
"fShellI
GetProcAddress
DSSLKy
ExitProcess
This program must be run under Win32
IW_JS_IWCOMMON
IW_GFX_SB_HLEFT
IW_GFX_COMBOBOXDOWNARROW
e80d
VirtualProtect
CL_MPBACK
IW_GFX_SB_VDOWN
LoadLibraryA
CAD3
IW_JS_RICO
IW_GFX_SB_HBG
IW_GFX_SB_VBG
IW_GFX_SB_VTHUMB
IW_JS_IWCL
IW_JS_PROTOTYPE
IW_JS_IWPRESCRIPT
IW_GFX_ERROR
Dea9
EdA9
IW_GFX_SB_HTHUMB
IW_GFX_DBNAV_EDIT
IW_JS_IWCHART
IW_JS_IWCSDATA

Foremost
Matches
0.exe, 916 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: True check_circle
Suspicious: https://of
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: user32.dll, winmm.dll, comctl32.dll, ole32.dll, advapi32.dll, msimg32.dll, comdlg32.dll, KERNEL32.DLL, gdi32.dll, oleaut32.dll, Shell32.dll, version.dll, mpr.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 16384
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 4096
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .rsrc
Suspicious: upx0, upx1
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: True check_circle

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 3098192
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, winmm.dll, comctl32.dll, ole32.dll, advapi32.dll, msimg32.dll, comdlg32.dll, kernel32.dll, gdi32.dll, oleaut32.dll, shell32.dll, version.dll, mpr.dll
hasLibs: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2017-11-28 23:16:35
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: MSLRH V0.31 -> emadicius, UPX -> www.upx.sourceforge.net
Compiled: False cancel
Compilers

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
none: 818

nopsequence
none: 4

pushpopmath
none: 805
.rsrc: 1

ss register
none: 10

garbagebytes
none: 366

hookdetection
none: 18

software breakpoint
none: 26

fakeconditionaljumps
none: 16

programcontrolflowchange
none: 352

cpuinstructionsresultscomparison
none: 24
.rsrc: 8

AVclass
delf
1
VirusTotal
md5
f6e85492198a2da9fbb2bcbca63edd5b
sha1
090a5a34e12692895aaf413318ab096fc3b614d8
SCANS (DETECTION RATE = 63.24%)
AVG
result: Win32:Malware-gen
update: 20180918
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20180917
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=99)
update: 20180918
version: 2018.9.12.1
detected: True check_circle

Bkav
update: 20180917
version: 1.3.0.8876
detected: False cancel

K7GW
update: 20180918
version: 11.4.28419
detected: False cancel

ALYac
result: Gen:Variant.Zusy.259173
update: 20180918
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Malware-gen
update: 20180918
version: 18.4.3895.0
detected: True check_circle

Avira
result: HEUR/AGEN.1022601
update: 20180917
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180914
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/GenBl.F6E85492!Olympus
update: 20180918
version: 6.0.0.4
detected: True check_circle

DrWeb
update: 20180918
version: 7.0.33.6080
detected: False cancel

GData
result: Gen:Variant.Zusy.259173
update: 20180918
version: A:25.18552B:25.13240
detected: True check_circle

Panda
result: Trj/GdSda.A
update: 20180917
version: 4.6.4.2
detected: True check_circle

VBA32
result: suspected of Trojan.Downloader.gen.s
update: 20180917
version: 3.33.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180918
version: 69658
detected: True check_circle

Zoner
update: 20180917
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180918
version: 1.6.0.52
detected: True check_circle

ClamAV
update: 20180918
version: 0.100.1.0
detected: False cancel

Comodo
update: 20180918
detected: False cancel

F-Prot
update: 20180918
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180917
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!F6E85492198A
update: 20180918
version: 6.0.6.653
detected: True check_circle

Rising
result: Downloader.Banload!8.15B (CLOUD)
update: 20180918
version: 25.0.0.24
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20180918
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.DL.Delf!HagS6CIOCwE
update: 20180917
version: 5.5.1.3
detected: True check_circle

Zillya
update: 20180917
version: 2.0.0.3640
detected: False cancel

Arcabit
result: Trojan.Zusy.D3F465
update: 20180918
version: 1.0.0.833
detected: True check_circle

Babable
update: 20180918
version: 9107201
detected: False cancel

Cylance
result: Unsafe
update: 20180918
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (moderate confidence)
update: 20180730
version: 3.0.1
detected: True check_circle

TACHYON
update: 20180918
version: 2018-09-18.01
detected: False cancel

Tencent
result: Win32.Trojan-downloader.Delf.Efum
update: 20180918
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180918
version: 2014.3.20.0
detected: False cancel

Webroot
update: 20180918
version: 1.0.0.403
detected: False cancel

eGambit
update: 20180918
detected: False cancel

Ad-Aware
result: Gen:Variant.Zusy.259173
update: 20180917
version: 3.0.5.370
detected: True check_circle

AegisLab
update: 20180918
version: 4.2
detected: False cancel

Emsisoft
result: Gen:Variant.Zusy.259173 (B)
update: 20180918
version: 2018.4.0.1029
detected: True check_circle

F-Secure
result: Gen:Variant.Zusy.259173
update: 20180918
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Trojandldr.DEBS!tr
update: 20180918
version: 5.4.247.0
detected: True check_circle

Invincea
result: heuristic
update: 20180717
version: 6.3.5.26121
detected: True check_circle

Jiangmin
result: TrojanDownloader.Delf.askh
update: 20180918
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20180918
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180918
version: 1.0
detected: True check_circle

Symantec
result: ML.Attribute.HighConfidence
update: 20180918
version: 1.7.0.0
detected: True check_circle

AhnLab-V3
result: Trojan/Win32.BestaFera.C2177316
update: 20180917
version: 3.13.1.21616
detected: True check_circle

Antiy-AVL
result: Trojan[Downloader]/Win32.Delf
update: 20180918
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan-Downloader.Win32.Delf.kqap
update: 20180918
version: 15.0.1.13
detected: True check_circle

Microsoft
result: Trojan:Win32/Tiggre!rfn
update: 20180918
version: 1.1.15200.1
detected: True check_circle

Qihoo-360
result: Win32/Trojan.Downloader.915
update: 20180918
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180914
version: 6.8.0.5.3695
detected: False cancel

ZoneAlarm
result: Trojan-Downloader.Win32.Delf.kqap
update: 20180918
version: 1.0
detected: True check_circle

Cybereason
result: malicious.2198a2
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/Spy.Zumanek.CV
update: 20180918
version: 18068
detected: True check_circle

TrendMicro
result: TROJ_GEN.R002C0PH418
update: 20180918
version: 10.0.0.1040
detected: True check_circle

BitDefender
result: Gen:Variant.Zusy.259173
update: 20180918
version: 7.2
detected: True check_circle

CrowdStrike
update: 20180723
version: 1.0
detected: False cancel

K7AntiVirus
update: 20180918
version: 11.4.28420
detected: False cancel

SentinelOne
update: 20180830
version: 1.0.19.234
detected: False cancel

Avast-Mobile
update: 20180917
version: 180916-04
detected: False cancel

Malwarebytes
update: 20180918
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20180918
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: TrojanDownloader.Delf
update: 20180917
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Delf.ewmisf
update: 20180918
version: 1.0.126.23745
detected: True check_circle

MicroWorld-eScan
result: Gen:Variant.Zusy.259173
update: 20180918
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180907
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.PUPXAX.dc
update: 20180918
version: v2017.3010
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R002C0PH418
update: 20180918
version: 9.950.0.1006
detected: True check_circle

total
68
sha256
44e7400fd24fa9bb73add9ce78f16f18bd4c5196171d2e27b5540ccd5faa3979
scan_id
44e7400fd24fa9bb73add9ce78f16f18bd4c5196171d2e27b5540ccd5faa3979-1537253122
resource
f6e85492198a2da9fbb2bcbca63edd5b
positives
43
scan_date
2018-09-18 06:45:22
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
14/2/2020 - 13:46:33.825Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll.Config
14/2/2020 - 13:46:33.825Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
14/2/2020 - 13:46:33.825Open1480C:\malware.exeC:\malware.exe.Local
14/2/2020 - 13:46:33.825Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
14/2/2020 - 13:46:33.825Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
14/2/2020 - 13:46:33.825Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
14/2/2020 - 13:46:33.825Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
14/2/2020 - 13:46:33.825Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
14/2/2020 - 13:46:33.825Open1480C:\malware.exeC:\Windows\WindowsShell.Manifest
14/2/2020 - 13:46:33.825Unknown1480C:\malware.exeC:\Windows\WindowsShell.ManifestWindowsShell.Manifest
14/2/2020 - 13:46:33.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\ssl.ini
14/2/2020 - 13:46:33.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\ssl.ini
14/2/2020 - 13:46:33.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\zAVjCGGJDsshdPVWTKB
14/2/2020 - 13:46:33.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\zAVjCGGJDsshdPVWTKB
14/2/2020 - 13:46:33.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
14/2/2020 - 13:46:33.918Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
14/2/2020 - 13:46:33.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\zAVjCGGJDsshdPVWTKB
14/2/2020 - 13:46:33.918Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\zAVjCGGJDsshdPVWTKB
14/2/2020 - 13:46:33.918Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
14/2/2020 - 13:46:33.918Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
14/2/2020 - 13:46:33.918Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
14/2/2020 - 13:46:33.918Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
14/2/2020 - 13:46:33.918Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
14/2/2020 - 13:46:33.918Open1480C:\malware.exeC:\Secur32.dll
14/2/2020 - 13:46:33.918Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
14/2/2020 - 13:46:33.918Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
14/2/2020 - 13:46:33.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
14/2/2020 - 13:46:33.918Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
14/2/2020 - 13:46:33.918Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
14/2/2020 - 13:46:33.918Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
14/2/2020 - 13:46:33.918Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
14/2/2020 - 13:46:33.918Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
14/2/2020 - 13:46:33.918Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
14/2/2020 - 13:46:33.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
14/2/2020 - 13:46:33.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
14/2/2020 - 13:46:33.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\IPHLPAPI.DLL
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\WINNSI.DLL
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\DNSAPI.dll
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
14/2/2020 - 13:46:33.965Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot
14/2/2020 - 13:46:34.28Unknown1480C:\malware.exeC:\Users\Behemot
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
14/2/2020 - 13:46:34.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
14/2/2020 - 13:46:34.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
14/2/2020 - 13:46:34.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot
14/2/2020 - 13:46:34.28Unknown1480C:\malware.exeC:\Users\Behemot
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
14/2/2020 - 13:46:34.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
14/2/2020 - 13:46:34.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
14/2/2020 - 13:46:34.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot
14/2/2020 - 13:46:34.28Unknown1480C:\malware.exeC:\Users\Behemot
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
14/2/2020 - 13:46:34.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
14/2/2020 - 13:46:34.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
14/2/2020 - 13:46:34.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
14/2/2020 - 13:46:34.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
14/2/2020 - 13:46:34.122Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
14/2/2020 - 13:46:34.122Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
14/2/2020 - 13:46:34.122Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
14/2/2020 - 13:46:34.122Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
14/2/2020 - 13:46:34.168Open1480C:\malware.exeC:\dhcpcsvc6.DLL
14/2/2020 - 13:46:34.168Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
14/2/2020 - 13:46:34.168Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
14/2/2020 - 13:46:34.168Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
14/2/2020 - 13:46:34.168Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\dhcpcsvc.DLL
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\CRYPTSP.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
14/2/2020 - 13:46:34.215Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
14/2/2020 - 13:46:34.231Open1480C:\malware.exeC:\RpcRtRemote.dll
14/2/2020 - 13:46:34.231Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
14/2/2020 - 13:46:34.231Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
14/2/2020 - 13:46:34.231Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
14/2/2020 - 13:46:34.231Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
14/2/2020 - 13:46:34.278Open1480C:\malware.exeC:\rasadhlp.dll
14/2/2020 - 13:46:34.278Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
14/2/2020 - 13:46:34.278Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
14/2/2020 - 13:46:34.325Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
14/2/2020 - 13:46:34.325Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
14/2/2020 - 13:46:34.575Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
14/2/2020 - 13:46:34.590Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\malware.exe.Local
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
14/2/2020 - 13:46:34.653Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
14/2/2020 - 13:46:34.653Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
14/2/2020 - 13:46:34.840Open1480C:\malware.exeC:\credssp.dll
14/2/2020 - 13:46:34.840Open1480C:\malware.exeC:\Windows\SysWOW64\credssp.dll
14/2/2020 - 13:46:34.840Open1480C:\malware.exeC:\Windows\SysWOW64\credssp.dll
14/2/2020 - 13:46:34.840Open1480C:\malware.exeC:\Windows\SysWOW64\schannel.dll
14/2/2020 - 13:46:34.840Open1480C:\malware.exeC:\Windows\SysWOW64\schannel.dll
14/2/2020 - 13:46:34.840Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My
14/2/2020 - 13:46:34.840Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
14/2/2020 - 13:46:34.840Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
14/2/2020 - 13:46:34.840Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
14/2/2020 - 13:46:34.840Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
14/2/2020 - 13:46:34.840Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
14/2/2020 - 13:46:34.840Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
14/2/2020 - 13:46:35.153Open1480C:\malware.exeC:\ncrypt.dll
14/2/2020 - 13:46:35.153Open1480C:\malware.exeC:\Windows\SysWOW64\ncrypt.dll
14/2/2020 - 13:46:35.153Open1480C:\malware.exeC:\Windows\SysWOW64\ncrypt.dll
14/2/2020 - 13:46:35.153Open1480C:\malware.exeC:\bcrypt.dll
14/2/2020 - 13:46:35.153Open1480C:\malware.exeC:\Windows\SysWOW64\bcrypt.dll
14/2/2020 - 13:46:35.153Open1480C:\malware.exeC:\Windows\SysWOW64\bcrypt.dll
14/2/2020 - 13:46:35.153Open1480C:\malware.exeC:\Windows\SysWOW64\bcryptprimitives.dll
14/2/2020 - 13:46:35.153Unknown1480C:\malware.exeC:\Windows\SysWOW64\bcryptprimitives.dllbcryptprimitives.dll
14/2/2020 - 13:46:35.153Open1480C:\malware.exeC:\Windows\SysWOW64\bcryptprimitives.dll
14/2/2020 - 13:46:35.153Unknown1480C:\malware.exeC:\Windows\SysWOW64\bcryptprimitives.dllbcryptprimitives.dll
14/2/2020 - 13:46:35.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
14/2/2020 - 13:46:35.168Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
14/2/2020 - 13:46:35.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
14/2/2020 - 13:46:35.168Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
14/2/2020 - 13:46:35.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
14/2/2020 - 13:46:35.168Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
14/2/2020 - 13:46:35.168Open1480C:\malware.exeC:\GPAPI.dll
14/2/2020 - 13:46:35.168Open1480C:\malware.exeC:\Windows\SysWOW64\gpapi.dll
14/2/2020 - 13:46:35.168Open1480C:\malware.exeC:\Windows\SysWOW64\gpapi.dll
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
14/2/2020 - 13:46:35.262Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
14/2/2020 - 13:46:35.262Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
14/2/2020 - 13:46:35.262Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Windows\SysWOW64\p2pcollab.dll
14/2/2020 - 13:46:35.262Unknown1480C:\malware.exeC:\Windows\SysWOW64\p2pcollab.dllp2pcollab.dll
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Windows\SysWOW64\p2pcollab.dll
14/2/2020 - 13:46:35.262Unknown1480C:\malware.exeC:\Windows\SysWOW64\p2pcollab.dllp2pcollab.dll
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Windows\SysWOW64\qagentrt.dll
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\cryptnet.dll
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Windows\SysWOW64\cryptnet.dll
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Windows\SysWOW64\cryptnet.dll
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.262Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.262Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.262Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.262Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.262Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.262Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.262Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_1BD32FB2B601FA8AA5F1C1562CE54FA7
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.262Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.262Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\SensApi.dll
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Windows\SysWOW64\SensApi.dll
14/2/2020 - 13:46:35.262Open1480C:\malware.exeC:\Windows\SysWOW64\SensApi.dll
14/2/2020 - 13:46:35.325Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.325Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.325Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.325Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.325Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.325Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.372Open1480C:\malware.exeC:\WINHTTP.dll
14/2/2020 - 13:46:35.372Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
14/2/2020 - 13:46:35.372Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
14/2/2020 - 13:46:35.372Open1480C:\malware.exeC:\webio.dll
14/2/2020 - 13:46:35.372Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
14/2/2020 - 13:46:35.372Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
14/2/2020 - 13:46:35.372Open1480C:\malware.exeC:\Windows\SysWOW64\pt-BR\KernelBase.dll.mui
14/2/2020 - 13:46:35.512Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
14/2/2020 - 13:46:35.512Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
14/2/2020 - 13:46:35.575Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.575Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.575Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.575Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.575Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CB398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27C
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_AE3BACA02F5FC7421E0DAEF481BA6514
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\537EC5B641ED5E0F8A4396270680F35B
14/2/2020 - 13:46:35.700Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.700Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.700Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.700Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.700Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.700Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.934Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.934Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.934Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:35.997Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.997Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.997Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.997Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:35.997Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.997Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.997Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.997Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:35.997Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
14/2/2020 - 13:46:36.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
14/2/2020 - 13:46:36.28Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
14/2/2020 - 13:46:36.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
14/2/2020 - 13:46:36.28Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:36.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:36.28Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:36.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
14/2/2020 - 13:46:36.28Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:36.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:36.28Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:36.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
14/2/2020 - 13:46:36.28Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF4344B8AF97AF3A423D9EE52899963CDE_9C5715ABAF29A33C5FACA08736C9ABBF
14/2/2020 - 13:46:36.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\zAVjCGGJDsshdPVWTKB\kmCyuwkeVLLHDzakl.zip
14/2/2020 - 13:46:36.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\zAVjCGGJDsshdPVWTKB\drive0
14/2/2020 - 13:46:36.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\zAVjCGGJDsshdPVWTKB\drive1
14/2/2020 - 13:46:36.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\zAVjCGGJDsshdPVWTKB\drive2
14/2/2020 - 13:46:36.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\zAVjCGGJDsshdPVWTKB\qsHaTTbbQLvwnOhYyTZr.exe
14/2/2020 - 13:46:36.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\zAVjCGGJDsshdPVWTKB\lnHZmZWMGxAjqFDI.exe
14/2/2020 - 13:46:36.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\zAVjCGGJDsshdPVWTKB\fltLib.dll
14/2/2020 - 13:46:36.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\zAVjCGGJDsshdPVWTKB\qsHaTTbbQLvwnOhYyTZr.exe
14/2/2020 - 13:46:36.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\zAVjCGGJDsshdPVWTKB\lnHZmZWMGxAjqFDI.exe
14/2/2020 - 13:46:36.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\zAVjCGGJDsshdPVWTKB
14/2/2020 - 13:46:36.75Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\zAVjCGGJDsshdPVWTKB
14/2/2020 - 13:46:36.75Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\zAVjCGGJDsshdPVWTKB
14/2/2020 - 13:46:36.90Unknown1480C:\malware.exeC:\Windows
14/2/2020 - 13:46:36.90Unknown1480C:\malware.exeC:\Monitor
14/2/2020 - 13:46:36.90Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc
14/2/2020 - 13:46:36.90Unknown1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
14/2/2020 - 13:46:36.90Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
14/2/2020 - 13:46:36.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
14/2/2020 - 13:46:36.90Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
14/2/2020 - 13:46:36.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My
14/2/2020 - 13:46:36.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My
14/2/2020 - 13:46:36.90Unknown1480C:\malware.exeC:\Windows\SysWOW64\pt-BR\KernelBase.dll.muiKernelBase.dll.mui

Process
Trace

Analysis
Reason
Finished

Status
Sucessfully Executed

Results
1

Registry
Trace
14/2/2020 - 13:46:33.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
14/2/2020 - 13:46:33.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
14/2/2020 - 13:46:33.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
14/2/2020 - 13:46:33.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
14/2/2020 - 13:46:33.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
14/2/2020 - 13:46:33.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
14/2/2020 - 13:46:33.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
14/2/2020 - 13:46:33.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
14/2/2020 - 13:46:33.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
14/2/2020 - 13:46:33.965Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
14/2/2020 - 13:46:33.965Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
14/2/2020 - 13:46:33.965Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
14/2/2020 - 13:46:33.965Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
14/2/2020 - 13:46:33.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
14/2/2020 - 13:46:34.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
14/2/2020 - 13:46:34.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
14/2/2020 - 13:46:34.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
14/2/2020 - 13:46:34.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
14/2/2020 - 13:46:34.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
14/2/2020 - 13:46:34.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
14/2/2020 - 13:46:34.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
14/2/2020 - 13:46:35.262Write1480C:\malware.exeHKCU\Local Settings\MuiCache\5\96383CDBLanguageList
14/2/2020 - 13:46:35.262Write1480C:\malware.exeHKCU\Local Settings\MuiCache\5\96383CDBLanguageList
14/2/2020 - 13:46:35.262Write1480C:\malware.exeHKCU\Local Settings\MuiCache\5\96383CDBLanguageList
14/2/2020 - 13:46:35.262Write1480C:\malware.exeHKCU\Local Settings\MuiCache\5\96383CDBLanguageList
14/2/2020 - 13:46:35.262Write1480C:\malware.exeHKCU\Local Settings\MuiCache\5\96383CDBLanguageList
14/2/2020 - 13:46:35.747Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
14/2/2020 - 13:46:35.747Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
14/2/2020 - 13:46:35.747Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
14/2/2020 - 13:46:35.747Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
14/2/2020 - 13:46:35.747Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
14/2/2020 - 13:46:35.747Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
14/2/2020 - 13:46:35.747Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
14/2/2020 - 13:46:35.747Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
14/2/2020 - 13:46:35.747Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
14/2/2020 - 13:46:35.747Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
14/2/2020 - 13:46:35.747Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
14/2/2020 - 13:46:35.747Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
14/2/2020 - 13:46:35.747Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: True check_circle

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:DNS code status.geotrust.com.
computer localhost arrow_forward computer gateway:50273 code app.box.com.
computer localhost arrow_forward computer gateway:DNS code app.box.com.

Response
computer gateway:DNS arrow_forward computer localhost code status.geotrust.com. reply_all 192.16.58.8

computer gateway:DNS arrow_forward computer localhost code app.box.com. reply_all 107.152.26.198


TCP
Info
107.152.27.198:443 arrow_forward computer localhost:65191
192.16.58.8:80 arrow_forward computer localhost:65192
computer localhost:65191 arrow_forward 107.152.27.198:443
computer localhost:65192 arrow_forward 192.16.58.8:80
192.16.58.8:80 arrow_forward computer localhost:65193
computer localhost:65193 arrow_forward 192.16.58.8:80

UDP
Info
computer localhost:55394 arrow_forward computer localhost:53
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:53 arrow_forward computer localhost:55394
computer localhost:67 arrow_forward computer localhost:68
computer localhost:68 arrow_forward help_outline 255.255.255.255:67

HTTP
Info
computer localhost send GET ocsp.digicert.com attach_file /MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAVG%2Fhgj9%2BGUHaOfzhTEYXM%3D
computer localhost send GET status.geotrust.com attach_file /MFEwTzBNMEswSTAJBgUrDgMCGgUABBR3enuod9bxDxzpICGW%2B2sabjf17QQUkFj%2FsJx1qFFUd7Ht8qNDFjiebMUCEA5rnX9O7Jp9O70iiblwoJw%3D

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
True check_circle

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 66.67%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 85.27%
suspicious: True check_circle

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 64.36%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 78.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 67.31%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 99.97%
suspicious: False cancel

Add to Collection
Download