Report #6508 check_circle

Binary
DLL
False cancel
Size
1.62MB
trid
43.5% Win32 Executable Borland Delphi 7
29.5% Win32 Executable Borland Delphi 5
17.2% Win32 Executable Borland Delphi 6
7.1% Inno Setup installer
0.9% Win32 Executable Delphi generic
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
9bf38e1692db169a99d35770a307e327
sha1
e92c150064e9e8ba24b5aa254c7d3b1e56a0f86c
crc32
0xe637521b
sha224
e1cd125f2f00bfa4b0e9857c4321dff955a1fe1818d109bf56df1c8f
sha256
514d4211799ed0a7f02e7d5e150e3c8fd6b07f71551c1cbd920b1bca65fabf56
sha384
33805878b10796d2d601e47c60cdd6a4fcc158e4cc989671da3f30b57eb34c67d1fc2799c36ac987f33fd60260044200
sha512
d94702932307a465ae66d3d8f5a714e31d27d7edc3488fa7fb512dace40788f92597f56d4391529630a5635f9486b8f2e45131c5d519ba2ac2002a27de38d45f
ssdeep
24576:fKeZ++CW5ANFRzMJsY/SzTQkkCwv1bD9HPs+JWyBQOuEfTU+iPiXRrASpKG4:fT0L+sQSzT6hnBhlTPiaXZ4
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, win_private_profile, Borland_Delphi_30_, HasOverlay, network_dropper, CRC32_poly_Constant, BASE64_table, Delphi_DecodeDate, RIPEMD160_Constants, borland_delphi, Delphi_FormShow, BobSoftMiniDelphiBoBBobSoft, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, BobSoft_Mini_Delphi_BoB_BobSoft_additional, Browsers, network_http, win_files_operation, IsPE32, win_hook, RijnDael_AES_CHAR, contentis_base64, screenshot, Borland_Delphi_v40_v50, keylogger, win_mutex, Borland_Delphi_40_additional, Borland_Delphi_40, Delphi_Random, IsWindowsGUI, Delphi_Copy, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, SHA1_Constants, win_registry, Delphi_CompareCall, RijnDael_AES_LONG, Delphi_StrToInt, Borland_Delphi_30_additional, Borland_Delphi_v30

Suspicious
True check_circle

Strings
List
the appropriate version of this product at http://www.componentace.com
Web site: http://www.componentace.com
ware.com
t.Ht
I.CA
Caption.Font.Style
HeaderFont.Name
HeaderFont.Name
HeaderFont.Style
HeaderFont.Style
SectionFont.Name
LabelFont.Name
Font.Style
Font.Name
Font.Name
Font.Name
Font.Style
Font.Style
Font.Style
Font.Name
Font.Name
Font.Style
Font.Name
Font.Style
Caption.Font.Name
LabelFont.Style
SectionFont.Style
DefaultPanel.Font.Style
StatusBar.Font.Name
StatusBar.Font.Style
PrintSettings.Font.Style
PrintSettings.Font.Style
Settings.Font.Name
PrintSettings.FooterFont.Style
PrintSettings.FooterFont.Style
Settings.Font.Style
DetailView.Font.Style
DetailView.Font.Style
Settings.Caption.Font.Name
Settings.Caption.Font.Style
DetailView.Font.Name
DetailView.Font.Name
Invalid compressed size, rfs.size = %d, count = %d
DefaultPanel.StatusBar.Font.Name
DefaultPanel.Font.Name
DefaultPanel.Caption.Font.Style
Settings.StatusBar.Font.Name
Settings.StatusBar.Font.Style
DefaultPanel.Caption.Font.Name
PrintSettings.Font.Name
PrintSettings.Font.Name
PrintSettings.HeaderFont.Name
PrintSettings.FooterFont.Name
PrintSettings.FooterFont.Name
PrintSettings.HeaderFont.Name
PrintSettings.HeaderFont.Style
PrintSettings.HeaderFont.Style
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
feel free to contact us at support@componentace.com
bB.Pt
127.0.0.1
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
http://c
cabinet.dll
iexplore.exe
C:\Users\RAZER\Documents\tmssoftware\TMS Component Pack\APXPVS.pas
C:\Users\RAZER\Documents\tmssoftware\TMS Component Pack\ACXPVS.pas
1.3.0.0
1.2.0.0
Cannot connect to FTP host : %s
Http status : %s
\Software\Borland\BDS\3.0
\Software\Borland\BDS\4.0
\Software\Borland\BDS\5.0
\Software\Borland\Delphi\7.0
\Software\Borland\Delphi\6.0
\Software\Borland\Delphi\5.0
\Software\Borland\C++Builder
\Software\Borland\C++Builder\5.0
\Software\Borland\C++Builder\6.0
\Software\Borland\Delphi
P.rsrc
SOFTWARE\Borland\Delphi\RTL
Delphi%.8X
Software\Borland\Locales
Software\Borland\Delphi\Locales
winspool.drv
\Software\Borland\BDS
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
olepro32.dll

Foremost
Matches
2930.bmp, 19 KB, 2971.bmp, 19 KB, 3013.bmp, 68 KB, 2503.avi, 10 KB, 2524.avi, 54 KB, 0.exe, 1 MB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: True check_circle
Allowed: 2.4.0.1, 1, lfbn-mon-1-513-1.w2-4.abo.wanadoo.fr., 127.0.0.1, 1, localhost.
Suspicious: 1.4.1.1, 0, Unknown, 1.9.2.4, 0, Unknown
hasAllowed: True check_circle
hasSuspicious: True check_circle

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://, http://www.componentace.com, http://c
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: Failed to Save Stream=This control requires version 4.70 or greater of COMCTL32.DLL, URLMON.DLL, User32.dll, MAPI32.DLL, inet.dll, uxtheme.dll, wininet.dll, COMCTL32.DLL, ole32.dll, imm32.dll, advapi32.dll, SHFolder.dll, gdi32.dll, LZ32.DLL, oleaut32.dll, kernel32.dll, RICHED32.DLL, cabinet.dll, MSHTML.DLL, vcltest3.dll, olepro32.dll, version.dll, shell32.dll
hasFiles: True check_circle
Suspicious: WUPDATE.LOG, >> WUPDATE.LOG
hasAllowed: True check_circle
hasSuspicious: True check_circle

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 550400
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: code, data, bss, .idata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 4
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 4
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 4.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 1155816
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: urlmon.dll, user32.dll, mapi32.dll, uxtheme.dll, wininet.dll, comctl32.dll, ole32.dll, imm32.dll, advapi32.dll, shfolder.dll, gdi32.dll, lz32.dll, oleaut32.dll, kernel32.dll, riched32.dll, cabinet.dll, mshtml.dll, olepro32.dll, version.dll, shell32.dll
hasLibs: True check_circle
Suspicious: failed to save stream=this control requires version 4.70 or greater of comctl32.dll, inet.dll, vcltest3.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: True check_circle
Valid: True check_circle
Value: 1992-06-19 19:22:17
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: BobSoft Mini Delphi -> BoB / BobSoft
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v3.0, Borland Delphi v6.0 - v7.0
MainPacker: BobSoft Mini Delphi -> BoB / BobSoft

Obfuscation
XOR: False cancel
Fuzzing: True check_circle

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
none: 153
.rsrc: 63

pushpopmath
none: 39
.rsrc: 48
.idata: 1
.reloc: 47

garbagebytes
none: 146
.rsrc: 23

hookdetection
none: 7
.rsrc: 4
.reloc: 5

software breakpoint
none: 5
.rsrc: 1
.reloc: 21

fakeconditionaljumps
.rsrc: 4

programcontrolflowchange
none: 146
.rsrc: 20

cpuinstructionsresultscomparison
none: 43
.rsrc: 96
.reloc: 3

AVclass
banload
1
VirusTotal
md5
9bf38e1692db169a99d35770a307e327
sha1
e92c150064e9e8ba24b5aa254c7d3b1e56a0f86c
SCANS (DETECTION RATE = 63.24%)
AVG
result: Win32:Banker-NAK [Trj]
update: 20180614
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20180614
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=86)
update: 20180614
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180614
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan-Downloader ( 00506ac91 )
update: 20180614
version: 10.49.27460
detected: True check_circle

ALYac
result: Gen:Variant.Zusy.223869
update: 20180614
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Banker-NAK [Trj]
update: 20180614
version: 18.4.3895.0
detected: True check_circle

Avira
result: TR/Dldr.Banload.rnhtr
update: 20180614
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180614
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.LXWI-8424
update: 20180614
version: 6.0.0.4
detected: True check_circle

DrWeb
update: 20180614
version: 7.0.28.2020
detected: False cancel

GData
result: Gen:Variant.Zusy.223869
update: 20180614
version: A:25.17437B:25.12491
detected: True check_circle

Panda
result: Trj/CI.A
update: 20180614
version: 4.6.4.2
detected: True check_circle

VBA32
update: 20180614
version: 3.12.32.0
detected: False cancel

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180614
version: 67028
detected: True check_circle

Zoner
update: 20180613
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180614
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180614
version: 0.99.2.0
detected: False cancel

Comodo
result: UnclassifiedMalware
update: 20180613
version: 29176
detected: True check_circle

F-Prot
update: 20180614
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180614
version: 0.1.5.2
detected: True check_circle

McAfee
result: Downloader-FBKF!9BF38E1692DB
update: 20180614
version: 6.0.6.653
detected: True check_circle

Rising
update: 20180614
version: 25.0.0.1
detected: False cancel

Sophos
result: Mal/Generic-S
update: 20180614
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.DL.Banload!NF7rhS+ARCE
update: 20180614
version: 5.5.1.3
detected: True check_circle

Zillya
update: 20180614
version: 2.0.0.3574
detected: False cancel

Arcabit
result: Trojan.Zusy.D36A7D
update: 20180614
version: 1.0.0.831
detected: True check_circle

Babable
update: 20180406
version: 9107201
detected: False cancel

Cylance
result: Unsafe
update: 20180614
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180612
version: 2.1.3
detected: True check_circle

TACHYON
update: 20180614
version: 2018-06-14.02
detected: False cancel

Tencent
result: Win32.Trojan-banker.Banbra.Hyjr
update: 20180614
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180614
version: 2014.3.20.0
detected: False cancel

Webroot
update: 20180614
version: 1.0.0.403
detected: False cancel

eGambit
update: 20180614
detected: False cancel

Ad-Aware
result: Gen:Variant.Zusy.223869
update: 20180614
version: 3.0.5.370
detected: True check_circle

AegisLab
result: Uds.Dangerousobject.Multi!c
update: 20180614
version: 4.2
detected: True check_circle

Emsisoft
result: Gen:Variant.Zusy.223869 (B)
update: 20180614
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Gen:Variant.Zusy.223869
update: 20180614
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.XVC!tr.dldr
update: 20180614
version: 5.4.247.0
detected: True check_circle

Invincea
result: heuristic
update: 20180601
version: 6.3.5.26121
detected: True check_circle

Jiangmin
update: 20180614
version: 16.0.100
detected: False cancel

Kingsoft
update: 20180614
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180614
version: 1.0
detected: True check_circle

Symantec
result: ML.Attribute.HighConfidence
update: 20180614
version: 1.6.0.0
detected: True check_circle

AhnLab-V3
result: Malware/Win32.Generic.C2072590
update: 20180614
version: 3.12.1.20996
detected: True check_circle

Antiy-AVL
result: Trojan/Win32.BTSGeneric
update: 20180614
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan-Banker.Win32.Banbra.wbci
update: 20180614
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload
update: 20180614
version: 1.1.14901.4
detected: True check_circle

Qihoo-360
update: 20180614
version: 1.0.0.1120
detected: False cancel

TheHacker
update: 20180613
version: 6.8.0.5.3112
detected: False cancel

ZoneAlarm
result: Trojan-Banker.Win32.Banbra.wbci
update: 20180614
version: 1.0
detected: True check_circle

Cybereason
result: malicious.692db1
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.XVC
update: 20180614
version: 17550
detected: True check_circle

TrendMicro
result: TROJ_GEN.R002C0PBG18
update: 20180614
version: 10.0.0.1040
detected: True check_circle

BitDefender
result: Gen:Variant.Zusy.223869
update: 20180614
version: 7.2
detected: True check_circle

CrowdStrike
update: 20180530
version: 1.0
detected: False cancel

K7AntiVirus
result: Trojan-Downloader ( 00506ac91 )
update: 20180614
version: 10.49.27462
detected: True check_circle

SentinelOne
update: 20180225
version: 1.0.15.206
detected: False cancel

Avast-Mobile
update: 20180613
version: 180613-02
detected: False cancel

Malwarebytes
update: 20180614
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20180614
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: Trojan.Banbra
update: 20180614
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Banbra.evmbzm
update: 20180614
version: 1.0.106.22618
detected: True check_circle

MicroWorld-eScan
result: Gen:Variant.Zusy.223869
update: 20180614
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180614
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Dropper.th
update: 20180613
version: v2017.2786
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R002C0PBG18
update: 20180614
version: 9.950.0.1006
detected: True check_circle

total
68
sha256
514d4211799ed0a7f02e7d5e150e3c8fd6b07f71551c1cbd920b1bca65fabf56
scan_id
514d4211799ed0a7f02e7d5e150e3c8fd6b07f71551c1cbd920b1bca65fabf56-1528983059
resource
9bf38e1692db169a99d35770a307e327
positives
43
scan_date
2018-06-14 13:30:59
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
18/2/2020 - 0:46:2.793Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
18/2/2020 - 0:46:2.793Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
18/2/2020 - 0:46:2.840Open1480C:\malware.exeC:\malware.exe.Local
18/2/2020 - 0:46:2.840Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
18/2/2020 - 0:46:2.934Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
18/2/2020 - 0:46:2.934Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
18/2/2020 - 0:46:2.934Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61\comctl32.dll.mui
18/2/2020 - 0:46:2.981Read1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61\comctl32.dll.muicomctl32.dll.mui
18/2/2020 - 0:46:3.28Open1480C:\malware.exeC:\Windows\Fonts\sserife.fon
18/2/2020 - 0:46:3.200Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll.Config
18/2/2020 - 0:46:3.200Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
18/2/2020 - 0:46:3.200Open1480C:\malware.exeC:\malware.exe.Local
18/2/2020 - 0:46:3.200Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 0:46:3.200Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 0:46:3.200Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 0:46:3.200Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
18/2/2020 - 0:46:3.200Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
18/2/2020 - 0:46:3.200Open1480C:\malware.exeC:\Windows\WindowsShell.Manifest
18/2/2020 - 0:46:3.200Unknown1480C:\malware.exeC:\Windows\WindowsShell.ManifestWindowsShell.Manifest
18/2/2020 - 0:46:3.200Read1480C:\malware.exeC:\malware.exe
18/2/2020 - 0:46:3.278Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 0:46:3.278Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 0:46:3.278Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 0:46:3.278Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 0:46:3.278Open1480C:\malware.exeC:\malware.exe
18/2/2020 - 0:46:3.278Read1480C:\malware.exeC:\malware.exe
18/2/2020 - 0:46:3.278Unknown1480C:\malware.exeC:\malware.exe
18/2/2020 - 0:46:3.293Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Windows Serv
18/2/2020 - 0:46:3.293Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 0:46:3.293Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 0:46:3.293Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Windows Serv
18/2/2020 - 0:46:3.293Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Windows Serv
18/2/2020 - 0:46:5.325Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 0:46:5.325Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 0:46:5.325Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 0:46:5.325Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 0:46:5.325Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 0:46:5.325Open1480C:\malware.exeC:\Secur32.dll
18/2/2020 - 0:46:5.325Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
18/2/2020 - 0:46:5.325Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
18/2/2020 - 0:46:5.325Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 0:46:5.325Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 0:46:5.325Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 0:46:5.325Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 0:46:5.325Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 0:46:5.325Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 0:46:5.325Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 0:46:5.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
18/2/2020 - 0:46:5.372Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
18/2/2020 - 0:46:5.372Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
18/2/2020 - 0:46:5.372Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
18/2/2020 - 0:46:5.372Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
18/2/2020 - 0:46:5.372Open1480C:\malware.exeC:\IPHLPAPI.DLL
18/2/2020 - 0:46:5.372Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
18/2/2020 - 0:46:5.372Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
18/2/2020 - 0:46:5.372Open1480C:\malware.exeC:\WINNSI.DLL
18/2/2020 - 0:46:5.372Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
18/2/2020 - 0:46:5.372Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
18/2/2020 - 0:46:5.372Open1480C:\malware.exeC:\DNSAPI.dll
18/2/2020 - 0:46:5.372Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
18/2/2020 - 0:46:5.372Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 0:46:5.418Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 0:46:5.418Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 0:46:5.418Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
18/2/2020 - 0:46:5.418Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 0:46:5.418Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 0:46:5.418Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 0:46:5.418Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 0:46:5.418Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 0:46:5.418Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 0:46:5.418Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 0:46:5.418Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 0:46:5.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
18/2/2020 - 0:46:5.418Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
18/2/2020 - 0:46:5.512Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
18/2/2020 - 0:46:5.512Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
18/2/2020 - 0:46:5.512Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
18/2/2020 - 0:46:5.512Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
18/2/2020 - 0:46:5.559Open1480C:\malware.exeC:\dhcpcsvc6.DLL
18/2/2020 - 0:46:5.559Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
18/2/2020 - 0:46:5.559Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
18/2/2020 - 0:46:5.559Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
18/2/2020 - 0:46:5.559Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\dhcpcsvc.DLL
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\CRYPTSP.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\RpcRtRemote.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
18/2/2020 - 0:46:5.606Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
18/2/2020 - 0:46:5.606Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
18/2/2020 - 0:46:5.606Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
18/2/2020 - 0:46:5.668Open1480C:\malware.exeC:\rasadhlp.dll
18/2/2020 - 0:46:5.668Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
18/2/2020 - 0:46:5.668Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
18/2/2020 - 0:46:5.715Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
18/2/2020 - 0:46:5.715Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
18/2/2020 - 0:46:5.715Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
18/2/2020 - 0:46:5.715Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\malware.exe.Local
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 0:46:5.918Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 0:46:5.918Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 0:46:6.778Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 0:46:6.778Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 0:46:8.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Windows Serv
18/2/2020 - 0:46:8.372Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Windows Serv
18/2/2020 - 0:46:15.387Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Windows Serv
18/2/2020 - 0:46:15.387Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Windows Serv
18/2/2020 - 0:46:17.434Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Windows Serv
18/2/2020 - 0:46:17.434Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Windows Serv
18/2/2020 - 0:46:20.700Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll
18/2/2020 - 0:46:20.700Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
18/2/2020 - 0:46:5.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
18/2/2020 - 0:46:5.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
18/2/2020 - 0:46:5.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
18/2/2020 - 0:46:5.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
18/2/2020 - 0:46:5.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
18/2/2020 - 0:46:5.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
18/2/2020 - 0:46:5.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
18/2/2020 - 0:46:5.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
18/2/2020 - 0:46:5.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
18/2/2020 - 0:46:5.372Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
18/2/2020 - 0:46:5.372Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
18/2/2020 - 0:46:5.372Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
18/2/2020 - 0:46:5.372Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
18/2/2020 - 0:46:5.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
18/2/2020 - 0:46:5.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
18/2/2020 - 0:46:5.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
18/2/2020 - 0:46:5.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
18/2/2020 - 0:46:5.762Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 0:46:5.762Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 0:46:5.762Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 0:46:5.762Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
18/2/2020 - 0:46:7.12Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
18/2/2020 - 0:46:7.12Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
18/2/2020 - 0:46:7.12Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
18/2/2020 - 0:46:7.12Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
18/2/2020 - 0:46:7.12Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
18/2/2020 - 0:46:7.12Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 0:46:7.12Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 0:46:7.12Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 0:46:7.12Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
18/2/2020 - 0:46:7.12Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 0:46:7.12Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 0:46:7.12Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 0:46:7.12Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code casillasavisos.pe.hu.
computer localhost arrow_forward computer gateway:DNS code casillasavisos.pe.hu.

Response

TCP
Info
198.50.173.30:80 arrow_forward computer localhost:65191
computer localhost:65191 arrow_forward 198.50.173.30:80

UDP
Info
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:68 arrow_forward help_outline 255.255.255.255:67
computer localhost:67 arrow_forward computer localhost:68
computer localhost:50273 arrow_forward computer localhost:53

HTTP
Info
computer localhost send GET 198.50.173.30 help_outline attach_file /trembala/index.php

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
True check_circle

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 62.21%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 95.15%
suspicious: False cancel

Random Forest (100 estimators, NFS-BRMalware)
confidence: 61.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 92.77%
suspicious: False cancel

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 96.13%
suspicious: True check_circle

Add to Collection
Download