Report #6442 check_circle

Binary
DLL
False cancel
Size
93.00KB
trid
93.4% Win32 Executable Borland Delphi 7
1.9% Win32 Executable Delphi generic
1.8% Windows screen saver
0.9% Win32 Dynamic Link Library
0.6% Win32 Executable
type
PE
wordsize
32
Subsystem
Windows CLI
Hashes
md5
9f884d920acadee306bf3e22d3c2f987
sha1
13ced6b9df2d9c995b4d9604791d33d3650f5ffa
crc32
0xf01d52d9
sha224
8e77b0ef4c13d425f48fb79c1bb11f59b5b7a97aa834a7b6de5aa42e
sha256
37295ab742c69e3a99df1dcbccd7cc0067ca7f489ef7128ad18ba986e3671d29
sha384
1aa0306eb2946187256fce5291438cb5f956d66edfb65c1140991e0366bc1515a3f9e43ff0640a4b5f12a196907f91bd
sha512
fb18b4aabe9019596ff039a16ba5a9b43c666ac24d6954d111eec1cbac9a54de0f089cd2a8ae0805ce1d6e1c59e9633ea0c1b70348c28604479defa7e5ec9a0b
ssdeep
1536:q+qQxQrzttUsaQizfzdlQ6RiUElAZE1/HDz0arV58ycVghU:zxuzQIOrd264/7Zf0a/5xhU
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Delphi_Copy, Borland, Delphi_DecodeDate, contentis_base64, keylogger, IsConsole, win_registry, Microsoft_Visual_Cpp_v50v60_MFC, Delphi_CompareCall, borland_delphi, Delphi_StrToInt, win_files_operation, IsPE32, Big_Numbers3, Big_Numbers2, Big_Numbers1

Suspicious
True check_circle

Strings
List
t.Ht
P.rsrc
SOFTWARE\Borland\Delphi\RTL
Software\Borland\Locales
Software\Borland\Delphi\Locales
Apartment
Division by zero
August September
Too many open files
Assertion failed
%s (%s, line %d)
Privileged instruction(Exception %s in module %s at %p.
I/O error %d
ESafecallException
193441CE1164E3351D2F2E37CD1550C13EE67698AE
2726B0BF2055F42402120D14284F9A8BE94ADB62F8
No argument for format '%s'"Variant method calls not supported
43D652EA1A65C326FF31C46F97
Invalid variant operation%Invalid variant operation (%s%.8x)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Application Error1Format '%s' invalid or incompatible with argument
GetProcAddress
GetProcAddress
EPrivilege
Invalid class typecast0Access violation at address %p. %s of address %p
58F7828DD71D3C6DD566E17B81E6021351F301071F
ExitProcess
OLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object7Dispatch methods do not support more than 64 parameters
!'%s' is not a valid integer value
FPUMaskValue
D56F9D5B89C27B986C975AD0
GetDiskFreeSpaceA
This program must be run under Win32
sActiveX
48D966F3738598DC4CD86A
VirtualAlloc
CoCreateInstanceEx
CoCreateInstance
SysUtils
SysUtils
SysUtils
Variant or safe array is locked
LoadLibraryExA
GetModuleHandleA
GetModuleFileNameA
FreeLibrary
FindFirstFileA
WriteFile
RegQueryValueExA
RegOpenKeyExA
GetModuleHandleA
WriteFile
GetModuleHandleA
GetModuleFileNameA
CreateDirectoryA
OleInitialize
External exception %x
Sleep
GetCPInfo
1 1$1(1,101H1U1]1l1y1
1#1)131<1E1O1\1g1y1
0"0&0,00060=0A0[0d0m0y0
4&4.464>4F4N4V4o4{4
=!=%=)=-=1=5=9===A=E=I=M=Q=U=Y=]=a=e=i=u=
2#282M2034383<3@3D3H3L3P3T3X3\3`3d3h3l3p3t3x3|3
24383<3@3D3H3L3P3T3X3\3`3d3h3l3p3t3x3|3
t%HtIHtm
Interface not supported
101H1T1\1s1
80888<8@8D8H8L8P8T8X8l8
EInOutErrorlY@
3 3$3(3,3034383<3@3D3H3L3P3T3X3\3
4 4$4(4,4044484<4@4D4H4L4P4T4X4\4`4d4h4l4p4t4x4|4
80<0@041<1@1D1H1l1p1t1x1|1
$VarUtils
RIK59P1eC
EVariantBadVarTypeError(
2<2D2L2T2\2d2l2t2|2
ERangeError,[@
7"7-727=7
Exception\X@
EVariantBadIndexError
3Messages
Control-C hit
EVariantDispatchError
P.reloc
EVariantArrayLockedError
EVariantTypeCastError
PACKAGEINFO
;>=F=S=^=h=r=
ZTUWVSPRTj
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
Runtime error at 00000000
EVariantArrayCreateError
EVariantInvalidOpError
EConvertError
EControlC
EVariantError
TErrorRec

Foremost
Matches
0.exe, 93 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: False cancel
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

Files
Allowed: user32.dll, ole32.dll, advapi32.dll, kernel32.dll, oleaut32.dll, shell32.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 16384
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: code, data, bss, .idata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 4
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 4
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 4.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 77316
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, ole32.dll, advapi32.dll, kernel32.dll, oleaut32.dll, shell32.dll
hasLibs: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Timestamp
Past: True check_circle
Valid: True check_circle
Value: 1992-06-19 19:22:17
Future: False cancel

Compilation
Packed: False cancel
Missing: True check_circle
Packers
Compiled: False cancel
Compilers

Obfuscation
XOR: False cancel
Fuzzing: True check_circle

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
none: 16

pushpopmath
none: 2
.reloc: 7

garbagebytes
none: 16

hookdetection
none: 2
.reloc: 1

software breakpoint
none: 4
.reloc: 2

programcontrolflowchange
none: 16

cpuinstructionsresultscomparison
none: 2
.rsrc: 1

AVclass
banload
1
VirusTotal
md5
9f884d920acadee306bf3e22d3c2f987
sha1
13ced6b9df2d9c995b4d9604791d33d3650f5ffa
SCANS (DETECTION RATE = 66.18%)
AVG
result: FileRepMetagen [Malware]
update: 20180610
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20180610
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=100)
update: 20180610
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180609
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan-Downloader ( 00509ea81 )
update: 20180610
version: 10.48.27414
detected: True check_circle

ALYac
result: Trojan.Generic.20571752
update: 20180610
version: 1.1.1.5
detected: True check_circle

Avast
result: FileRepMetagen [Malware]
update: 20180610
version: 18.4.3895.0
detected: True check_circle

Avira
result: TR/Dldr.Banload.fcrax
update: 20180610
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180608
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.MXCE-7313
update: 20180610
version: 6.0.0.4
detected: True check_circle

DrWeb
update: 20180610
version: 7.0.28.2020
detected: False cancel

GData
result: Trojan.Generic.20571752
update: 20180610
version: A:25.17388B:25.12461
detected: True check_circle

Panda
result: Trj/GdSda.A
update: 20180610
version: 4.6.4.2
detected: True check_circle

VBA32
result: Trojan.Inject
update: 20180608
version: 3.12.32.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180610
version: 67028
detected: True check_circle

Zoner
update: 20180609
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180610
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180610
version: 0.99.2.0
detected: False cancel

Comodo
result: TrojWare.Win32.Delf.TQW
update: 20180610
version: 29157
detected: True check_circle

F-Prot
update: 20180610
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180610
version: 0.1.5.2
detected: True check_circle

McAfee
result: Trojan-FLDW!9F884D920ACA
update: 20180610
version: 6.0.6.653
detected: True check_circle

Rising
update: 20180610
version: 25.0.0.1
detected: False cancel

Sophos
result: Mal/Generic-S
update: 20180610
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.Agent!sjqpadQcQRU
update: 20180609
version: 5.5.1.3
detected: True check_circle

Zillya
result: Downloader.Banload.Win32.78562
update: 20180608
version: 2.0.0.3570
detected: True check_circle

Arcabit
result: Trojan.Generic.D139E668
update: 20180610
version: 1.0.0.831
detected: True check_circle

Babable
update: 20180406
version: 9107201
detected: False cancel

Cylance
update: 20180610
version: 2.3.1.101
detected: False cancel

Endgame
result: malicious (high confidence)
update: 20180507
version: 2.1.2
detected: True check_circle

TACHYON
update: 20180608
version: 2018-06-08.02
detected: False cancel

Tencent
result: Win32.Trojan.Generic.Hxgi
update: 20180610
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180610
version: 2014.3.20.0
detected: False cancel

Webroot
update: 20180610
version: 1.0.0.403
detected: False cancel

eGambit
update: 20180610
detected: False cancel

Ad-Aware
result: Trojan.Generic.20571752
update: 20180610
version: 3.0.5.370
detected: True check_circle

AegisLab
result: Uds.Dangerousobject.Multi!c
update: 20180610
version: 4.2
detected: True check_circle

Emsisoft
result: Trojan.Generic.20571752 (B)
update: 20180610
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Trojan.Generic.20571752
update: 20180610
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.XWN!tr
update: 20180610
version: 5.4.247.0
detected: True check_circle

Invincea
result: heuristic
update: 20180601
version: 6.3.5.26121
detected: True check_circle

Jiangmin
update: 20180610
version: 16.0.100
detected: False cancel

Kingsoft
update: 20180610
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180610
version: 1.0
detected: True check_circle

Symantec
result: ML.Attribute.HighConfidence
update: 20180610
version: 1.6.0.0
detected: True check_circle

AhnLab-V3
result: Malware/Win32.Generic.C1882991
update: 20180610
version: 3.12.1.20996
detected: True check_circle

Antiy-AVL
result: Trojan/Win32.TSGeneric
update: 20180610
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: HEUR:Trojan.Win32.Generic
update: 20180610
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload
update: 20180610
version: 1.1.14901.4
detected: True check_circle

Qihoo-360
update: 20180610
version: 1.0.0.1120
detected: False cancel

TheHacker
update: 20180608
version: 6.8.0.5.3091
detected: False cancel

ZoneAlarm
result: HEUR:Trojan.Win32.Generic
update: 20180610
version: 1.0
detected: True check_circle

Cybereason
result: malicious.20acad
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.XWP
update: 20180610
version: 17529
detected: True check_circle

TrendMicro
result: TROJ_BANLOAD_GD04005A.UVPM
update: 20180610
version: 10.0.0.1040
detected: True check_circle

BitDefender
result: Trojan.Generic.20571752
update: 20180610
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_60% (D)
update: 20180530
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan-Downloader ( 00509ea81 )
update: 20180610
version: 10.48.27414
detected: True check_circle

SentinelOne
update: 20180225
version: 1.0.15.206
detected: False cancel

Avast-Mobile
update: 20180610
version: 180610-02
detected: False cancel

Malwarebytes
update: 20180610
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20180610
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: TrojanDownloader.Banload
update: 20180610
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Banload.emwkjd
update: 20180610
version: 1.0.106.22618
detected: True check_circle

MicroWorld-eScan
result: Trojan.Generic.20571752
update: 20180610
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180610
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: Trojan-FLDW!9F884D920ACA
update: 20180610
version: v2017.2786
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_BANLOAD_GD04005A.UVPM
update: 20180610
version: 9.950.0.1006
detected: True check_circle

total
68
sha256
37295ab742c69e3a99df1dcbccd7cc0067ca7f489ef7128ad18ba986e3671d29
scan_id
37295ab742c69e3a99df1dcbccd7cc0067ca7f489ef7128ad18ba986e3671d29-1528667117
resource
9f884d920acadee306bf3e22d3c2f987
positives
45
scan_date
2018-06-10 21:45:17
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
17/2/2020 - 19:45:43.747Open1480C:\malware.exeC:\malware.exe
17/2/2020 - 19:45:43.747Unknown1480C:\malware.exeC:\malware.exe
17/2/2020 - 19:45:43.747Open1480C:\malware.exeC:\
17/2/2020 - 19:45:43.747Unknown1480C:\malware.exeC:\
17/2/2020 - 19:45:43.747Open1480C:\malware.exeC:\Monitor
17/2/2020 - 19:45:43.747Unknown1480C:\malware.exeC:\Monitor
17/2/2020 - 19:45:43.747Open1480C:\malware.exeC:\Monitor\Malware
17/2/2020 - 19:45:43.747Unknown1480C:\malware.exeC:\Monitor\Malware
17/2/2020 - 19:45:43.747Open1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nls
17/2/2020 - 19:45:43.747Unknown1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nlsSortDefault.nls
17/2/2020 - 19:45:43.793Open1480C:\malware.exeC:\ProgramData\AVAST Software
17/2/2020 - 19:45:43.793Open1480C:\malware.exeC:\ProgramData\Inteltecnolocis
17/2/2020 - 19:45:43.793Open1480C:\malware.exeC:\ProgramData\Inteltecnolocis
17/2/2020 - 19:45:43.793Open1480C:\malware.exeC:\ProgramData
17/2/2020 - 19:45:43.793Unknown1480C:\malware.exeC:\ProgramData
17/2/2020 - 19:45:43.793Open1480C:\malware.exeC:\ProgramData\Inteltecnolocis
17/2/2020 - 19:45:43.793Unknown1480C:\malware.exeC:\ProgramData\Inteltecnolocis
17/2/2020 - 19:45:43.793Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
17/2/2020 - 19:45:43.793Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
17/2/2020 - 19:45:43.809Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
17/2/2020 - 19:45:43.809Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
17/2/2020 - 19:45:43.825Open1480C:\malware.exeC:\Windows\SysWOW64\pt-BR\KernelBase.dll.mui
17/2/2020 - 19:45:43.825Open1480C:\malware.exeC:\cryptsp.dll
17/2/2020 - 19:45:43.825Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
17/2/2020 - 19:45:43.825Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
17/2/2020 - 19:45:43.825Open1480C:\malware.exeC:\credssp.dll
17/2/2020 - 19:45:43.825Open1480C:\malware.exeC:\Windows\SysWOW64\credssp.dll
17/2/2020 - 19:45:43.825Open1480C:\malware.exeC:\Windows\SysWOW64\credssp.dll
17/2/2020 - 19:45:43.825Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
17/2/2020 - 19:45:43.825Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
17/2/2020 - 19:45:43.825Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
17/2/2020 - 19:45:43.825Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
17/2/2020 - 19:45:43.825Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
17/2/2020 - 19:45:43.825Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
17/2/2020 - 19:45:43.825Open1480C:\malware.exeC:\DNSAPI.dll
17/2/2020 - 19:45:43.825Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
17/2/2020 - 19:45:43.825Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
17/2/2020 - 19:45:43.934Open1480C:\malware.exeC:\IPHLPAPI.DLL
17/2/2020 - 19:45:43.934Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
17/2/2020 - 19:45:43.934Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
17/2/2020 - 19:45:43.934Open1480C:\malware.exeC:\WINNSI.DLL
17/2/2020 - 19:45:43.934Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
17/2/2020 - 19:45:43.934Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
17/2/2020 - 19:45:43.981Open1480C:\malware.exeC:\rasadhlp.dll
17/2/2020 - 19:45:43.981Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
17/2/2020 - 19:45:43.981Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
17/2/2020 - 19:45:44.184Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
17/2/2020 - 19:45:44.184Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: False cancel

Deleted
Identified: False cancel

Browsers
Identified: False cancel

Internet
Identified: False cancel

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:49551 code www9.lordstark.dynamic-dns.net.
computer localhost arrow_forward computer gateway:50273 code www9.lordstark.dynamic-dns.net.
computer localhost arrow_forward computer gateway:54285 code www9.lordstark.dynamic-dns.net.
computer localhost arrow_forward computer gateway:50043 code www9.lordstark.dynamic-dns.net.
computer localhost arrow_forward computer gateway:51595 code www9.lordstark.dynamic-dns.net.
computer localhost arrow_forward computer gateway:49222 code www9.lordstark.dynamic-dns.net.
computer localhost arrow_forward computer gateway:59829 code www9.lordstark.dynamic-dns.net.
computer localhost arrow_forward computer gateway:DNS code www9.lordstark.dynamic-dns.net.

Response
computer gateway:DNS arrow_forward computer localhost code www9.lordstark.dynamic-dns.net. reply_all 10.1.1.1


TCP
Info
computer localhost:65198 arrow_forward help_outline 10.1.1.1:80
computer localhost:65192 arrow_forward help_outline 10.1.1.1:80
computer localhost:65193 arrow_forward help_outline 10.1.1.1:443
computer localhost:65191 arrow_forward help_outline 10.1.1.1:443
computer localhost:65196 arrow_forward help_outline 10.1.1.1:80
computer localhost:65197 arrow_forward help_outline 10.1.1.1:443
computer localhost:65195 arrow_forward help_outline 10.1.1.1:443
computer localhost:65194 arrow_forward help_outline 10.1.1.1:80

UDP
Info
computer localhost:51595 arrow_forward computer localhost:53
computer localhost:49551 arrow_forward computer localhost:53
computer localhost:55394 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:59829
computer localhost:54285 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:51595
computer localhost:53 arrow_forward computer localhost:49551
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:49222 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:50043
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:50043 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:54285
computer localhost:53 arrow_forward computer localhost:55394
computer localhost:59829 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:49222

HTTP
Info

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 86.70%
suspicious: True check_circle

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 98.05%
suspicious: False cancel

Random Forest (100 estimators, NFS-BRMalware)
confidence: 64.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 36.20%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 91.97%
suspicious: False cancel

Add to Collection
Download