Report #6514 check_circle

Binary
DLL
False cancel
Size
2.33MB
trid
50.5% Inno Setup installer
19.8% InstallShield setup
19.1% Win32 EXE PECompact compressed
4.6% DOS Borland compiled Executable
2.0% Win32 Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
3277411ef9a8a1c1afd7cad1db02ddab
sha1
fd340fec22ff4adc665b7fda336d2fa62c262108
crc32
0x47be6792
sha224
25c72838ce322edfdfdf111f5fcc29e00e7aba7427ef3d2d04d68687
sha256
f18726a995c986212474a64d4736807fe072fcff8319cea0bbc644a0b4ab7fb5
sha384
8d98a9406434bd710d3686700aa1da8538bbde0f5e2bb771e5e1166fe193214f810e2ed59b62d3d4de2b58dcb094af29
sha512
9e2ff3c8d30ec3fa5d557081715264007259bfcc974b5ba0443a43d621bfab5cb962b92f4fec2c955f04f2a702a1b28a4194d9e5598908c1690177b55454a363
ssdeep
49152:kgyuUwS7lxgJkDqkz43qsTpgPEvvv1V98ol:yuYgJ9k0iA1Hl
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, Borland_Delphi_30_, CRC32_poly_Constant, BASE64_table, escalate_priv, borland_delphi, Delphi_FormShow, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, network_http, win_token, IsPE32, antivm_vmware, win_hook, win_mutex, screenshot, Borland_Delphi_v40_v50, keylogger, MD5_Constants, Borland_Delphi_40_additional, Borland_Delphi_40, Delphi_Random, IsWindowsGUI, win_files_operation, anti_dbg, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, DES_Long, contentis_base64, win_registry, Borland_Delphi_30_additional, Borland_Delphi_v30

Suspicious
True check_circle

Strings
List
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclConsole.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclRegistry.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclSecurity.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclShell.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/Snmp.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclFileUtils.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/windows/JclWin32.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclIniFiles.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclCharsets.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclMath.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclStringConversions.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclStrings.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclAnsiStrings.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclLogic.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclWideStrings.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclRTTI.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclResources.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclSysInfo.pas $
@$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclSynch.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclBase.pas $
@$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclSysUtils.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclUnicode.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclStreams.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclDateTime.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/Jcl8087.pas $
@$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclMime.pas $
$URL: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/JCL-2.4-Build4571/jcl/source/common/JclUnitVersioning.pas $
acolor="#00FFFF"><a href="http://www.torry.ru/vcl/packs/ralib.zip"><small>ralib110.zip</small></a>
color="#00FFFF"><a href="http://www.torry.ru/vcl/packs/ralib.zip"><small>ralib110.zip</small></a>
t.Ht
apply(self.tk.call,
apply(self.tk.call,
Uh.GA
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Name
Font.Style
Font.Name
Font.Name
Font.Style
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Name
Font.Style
Font.Style
Font.Style
Font.Name
Font.Style
Font.Name
Font.Name
Font.Name
Font.Style
Font.Style
Font.Style
Font.Name
Font.Name
Font.Style
Font.Style
Font.Name
Font.Name
Font.Name
Font.Style
Font.Style
Margins.Top
Colors.Comment.Style
Colors.Statement.Style
Colors.Reserved.Style
self.num = self.tk.getint(
self.num = self.tk.getint(
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
d.pN
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
E:\compo\Packager\JVCL347CompleteJCL241-Build4571\jvcl\run\JvEditorCommon.pas
E:\compo\Packager\JVCL347CompleteJCL241-Build4571\jvcl\run\JvEditorCommon.pas
<body background="zertxtr.gif" bgcolor="#000000" text="#FFFFFF" link="#FF0000"
N<body background="zertxtr.gif" bgcolor="#000000" text="#FFFFFF" link="#FF0000"
windowscodecs.dll
B.rsrc
Delphi%.8X
Software\Borland\Locales
ISO_646.irv:1991
Software\Borland\Delphi\Locales
winspool.drv
winspool.drv
msimg32.dll
comctl32.dll

Foremost
Matches
4594.jpg, 76 KB, 0.exe, 2 MB, 4529.png, 543 B, 4530.png, 6 KB, 4545.png, 23 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: True check_circle
Suspicious: https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/windows/jclregistry.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclstrings.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclunitversioning.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclstreams.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclwidestrings.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclfileutils.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclmime.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclrtti.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/windows/jclwin32.pas, http://www.torry.ru/vcl/packs/ralib.zip, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jcl8087.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/windows/jclshell.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jcllogic.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclansistrings.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclsysutils.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclresources.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclstringconversions.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/windows/snmp.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jcldatetime.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/windows/jclconsole.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclunicode.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclbase.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclsysinfo.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclcharsets.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/windows/jclsecurity.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclsynch.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclinifiles.pas, https://jcl.svn.sourceforge.net/svnroot/jcl/tags/jcl-2.4-build4571/jcl/source/common/jclmath.pas
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: USER32.DLL, kernel32.dll, RICHED32.DLL, ntdll.dll, wave=mmdrv.dll, snxhk.dll, Psapi.dll, comctl32.dll, ole32.dll, imm32.dll, oleaut32.dll, uxtheme.dll, RICHED20.DLL, oledlg.dll, wininet.dll, gdi32.dll, DWMAPI.DLL, comdlg32.dll, advapi32.dll, windowscodecs.dll, shell32.dll, msimg32.dll, version.dll
hasFiles: True check_circle
Suspicious: Plain text (*.txt)|*.txt
hasAllowed: True check_circle
hasSuspicious: True check_circle

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 655360
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .text, .itext, .data, .bss, .idata, .didata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 1795256
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, kernel32.dll, riched32.dll, ntdll.dll, psapi.dll, comctl32.dll, ole32.dll, imm32.dll, oleaut32.dll, uxtheme.dll, riched20.dll, oledlg.dll, wininet.dll, gdi32.dll, dwmapi.dll, comdlg32.dll, advapi32.dll, windowscodecs.dll, shell32.dll, msimg32.dll, version.dll
hasLibs: True check_circle
Suspicious: wave=mmdrv.dll, snxhk.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2017-08-16 17:47:53
Future: False cancel

Compilation
Packed: False cancel
Missing: False cancel
Packers
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0

Obfuscation
XOR: False cancel
Fuzzing: True check_circle

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.data: 7
.rsrc: 60
.text: 49
.idata: 4
.itext: 6

pushpopmath
.data: 6
.rsrc: 79
.text: 27
.reloc: 121

ss register
.rsrc: 2

garbagebytes
.data: 4
.rsrc: 23
.text: 46
.itext: 6

hookdetection
.rsrc: 2
.text: 2
.reloc: 9

software breakpoint
.rsrc: 1
.text: 8
.idata: 2
.reloc: 27

fakeconditionaljumps
.rsrc: 4

programcontrolflowchange
.data: 4
.rsrc: 20
.text: 46
.itext: 6

cpuinstructionsresultscomparison
.data: 11
.rsrc: 63
.text: 41
.reloc: 3

AVclass
palibu
1
VirusTotal
md5
3277411ef9a8a1c1afd7cad1db02ddab
sha1
fd340fec22ff4adc665b7fda336d2fa62c262108
SCANS (DETECTION RATE = 59.70%)
AVG
result: Win32:Malware-gen
update: 20181030
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20181030
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=85)
update: 20181030
version: 2018.9.12.1
detected: True check_circle

Bkav
update: 20181030
version: 1.3.0.9898
detected: False cancel

K7GW
result: Trojan ( 7000000f1 )
update: 20181030
version: 11.9.28866
detected: True check_circle

ALYac
update: 20181030
version: 1.1.1.5
detected: False cancel

Avast
result: Win32:Malware-gen
update: 20181030
version: 18.4.3895.0
detected: True check_circle

Avira
result: HEUR/AGEN.1022594
update: 20181030
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20181030
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.ITDL-6036
update: 20181030
version: 6.0.0.4
detected: True check_circle

DrWeb
update: 20181030
version: 7.0.33.6080
detected: False cancel

GData
result: Gen:Trojan.Heur.vQW@tL0iAhiOD
update: 20181030
version: A:25.19150B:25.13561
detected: True check_circle

Panda
result: Trj/GdSda.A
update: 20181029
version: 4.6.4.2
detected: True check_circle

VBA32
update: 20181030
version: 3.33.0
detected: False cancel

Zoner
update: 20181030
version: 1.0
detected: False cancel

ClamAV
update: 20181030
version: 0.100.2.0
detected: False cancel

F-Prot
update: 20181030
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20181030
version: 0.1.5.2
detected: True check_circle

McAfee
result: GenericRXCD-ZT!3277411EF9A8
update: 20181030
version: 6.0.6.653
detected: True check_circle

Rising
update: 20181030
version: 25.0.0.24
detected: False cancel

Sophos
result: Mal/Generic-S
update: 20181030
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.DL.Banload!HDVTGZyM+xw
update: 20181026
version: 5.5.1.3
detected: True check_circle

Zillya
update: 20181029
version: 2.0.0.3679
detected: False cancel

Alibaba
update: 20180921
version: 0.1.0.2
detected: False cancel

Arcabit
result: Trojan.Heur.EFD1632
update: 20181030
version: 1.0.0.833
detected: True check_circle

Babable
update: 20180918
version: 9107201
detected: False cancel

Cylance
result: Unsafe
update: 20181030
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180730
version: 3.0.1
detected: True check_circle

TACHYON
update: 20181030
version: 2018-10-30.02
detected: False cancel

Tencent
result: Win32.Trojan.Dldr.Ligt
update: 20181030
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20181030
version: 2014.3.20.0
detected: False cancel

Webroot
update: 20181030
version: 1.0.0.403
detected: False cancel

eGambit
update: 20181030
detected: False cancel

Ad-Aware
result: Gen:Trojan.Heur.vQW@tL0iAhiOD
update: 20181030
version: 3.0.5.370
detected: True check_circle

AegisLab
update: 20181030
version: 4.2
detected: False cancel

Emsisoft
result: Gen:Trojan.Heur.vQW@tL0iAhiOD (B)
update: 20181030
version: 2018.4.0.1029
detected: True check_circle

F-Secure
result: Gen:Trojan.Heur.vQW@tL0iAhiOD
update: 20181030
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.YBE!tr.dldr
update: 20181030
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180717
version: 6.3.5.26121
detected: False cancel

Jiangmin
result: Trojan.Banker.Palibu.tj
update: 20181030
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20181030
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20181030
version: 1.0
detected: True check_circle

Symantec
result: ML.Attribute.HighConfidence
update: 20181029
version: 1.7.0.0
detected: True check_circle

AhnLab-V3
update: 20181030
version: 3.13.1.22397
detected: False cancel

Antiy-AVL
result: Trojan[Banker]/Win32.Palibu
update: 20181030
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: UDS:DangerousObject.Multi.Generic
update: 20181030
version: 15.0.1.13
detected: True check_circle

Microsoft
result: Trojan:Win32/Skeeyah.A!rfn
update: 20181030
version: 1.1.15400.4
detected: True check_circle

Qihoo-360
result: Win32/Trojan.ca7
update: 20181030
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20181025
version: 6.8.0.5.3789
detected: False cancel

Trustlook
update: 20181030
version: 1.0
detected: False cancel

ZoneAlarm
result: UDS:DangerousObject.Multi.Generic
update: 20181030
version: 1.0
detected: True check_circle

Cybereason
result: malicious.ef9a8a
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.XDX
update: 20181030
version: 18298
detected: True check_circle

TrendMicro
result: TROJ_GEN.R002C0PJE18
update: 20181030
version: 10.0.0.1040
detected: True check_circle

BitDefender
result: Gen:Trojan.Heur.vQW@tL0iAhiOD
update: 20181030
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_80% (W)
update: 20181022
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan ( 7000000f1 )
update: 20181030
version: 11.9.28867
detected: True check_circle

SentinelOne
update: 20181011
version: 1.0.19.245
detected: False cancel

Avast-Mobile
update: 20181030
version: 181030-02
detected: False cancel

Malwarebytes
result: Spyware.Banker
update: 20181030
version: 2.1.1.1115
detected: True check_circle

TotalDefense
update: 20181030
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: TrojanBanker.Palibu
update: 20181028
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Palibu.eryvhq
update: 20181030
version: 1.0.134.24036
detected: True check_circle

MicroWorld-eScan
result: Gen:Trojan.Heur.vQW@tL0iAhiOD
update: 20181030
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20181029
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: GenericRXCD-ZT!3277411EF9A8
update: 20181030
version: v2017.3010
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R002C0PJE18
update: 20181030
version: 10.0.0.1040
detected: True check_circle

total
67
sha256
f18726a995c986212474a64d4736807fe072fcff8319cea0bbc644a0b4ab7fb5
scan_id
f18726a995c986212474a64d4736807fe072fcff8319cea0bbc644a0b4ab7fb5-1540905047
resource
3277411ef9a8a1c1afd7cad1db02ddab
positives
40
scan_date
2018-10-30 13:10:47
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
18/2/2020 - 1:45:43.887Read1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
18/2/2020 - 1:45:43.934Read1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
18/2/2020 - 1:45:43.981Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll.Config
18/2/2020 - 1:45:43.981Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
18/2/2020 - 1:45:43.981Open1480C:\malware.exeC:\malware.exe.Local
18/2/2020 - 1:45:43.981Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:45:43.981Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:45:43.981Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:45:43.981Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:45:45.215Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Temp\JavaSetup8u144.fit
18/2/2020 - 1:45:45.215Open1480C:\malware.exeC:\Secur32.dll
18/2/2020 - 1:45:45.215Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
18/2/2020 - 1:45:45.215Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
18/2/2020 - 1:45:45.215Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 1:45:45.215Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 1:45:45.215Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 1:45:45.215Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 1:45:45.215Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 1:45:45.215Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 1:45:45.215Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 1:45:45.215Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
18/2/2020 - 1:45:45.215Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
18/2/2020 - 1:45:45.231Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
18/2/2020 - 1:45:45.231Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
18/2/2020 - 1:45:45.231Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
18/2/2020 - 1:45:45.293Open1480C:\malware.exeC:\IPHLPAPI.DLL
18/2/2020 - 1:45:45.293Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
18/2/2020 - 1:45:45.293Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
18/2/2020 - 1:45:45.293Open1480C:\malware.exeC:\WINNSI.DLL
18/2/2020 - 1:45:45.293Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
18/2/2020 - 1:45:45.293Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
18/2/2020 - 1:45:45.293Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 1:45:45.293Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 1:45:45.293Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 1:45:45.293Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 1:45:45.293Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 1:45:45.293Open1480C:\malware.exeC:\DNSAPI.dll
18/2/2020 - 1:45:45.293Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
18/2/2020 - 1:45:45.293Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
18/2/2020 - 1:45:45.356Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
18/2/2020 - 1:45:45.356Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
18/2/2020 - 1:45:45.356Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 1:45:45.356Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 1:45:45.450Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
18/2/2020 - 1:45:45.450Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
18/2/2020 - 1:45:45.450Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
18/2/2020 - 1:45:45.450Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
18/2/2020 - 1:45:45.497Open1480C:\malware.exeC:\dhcpcsvc6.DLL
18/2/2020 - 1:45:45.497Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
18/2/2020 - 1:45:45.497Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
18/2/2020 - 1:45:45.497Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
18/2/2020 - 1:45:45.497Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:45.543Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:45:45.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 1:45:45.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
18/2/2020 - 1:45:45.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:45.543Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 1:45:45.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 1:45:45.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 1:45:45.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:45.543Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:45:45.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 1:45:45.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
18/2/2020 - 1:45:45.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\dhcpcsvc.DLL
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\CRYPTSP.dll
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:45.543Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:45.559Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:45.559Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:45.559Open1480C:\malware.exeC:\RpcRtRemote.dll
18/2/2020 - 1:45:45.559Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
18/2/2020 - 1:45:45.559Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
18/2/2020 - 1:45:45.559Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
18/2/2020 - 1:45:45.559Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
18/2/2020 - 1:45:45.622Open1480C:\malware.exeC:\rasadhlp.dll
18/2/2020 - 1:45:45.622Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
18/2/2020 - 1:45:45.622Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
18/2/2020 - 1:45:45.668Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
18/2/2020 - 1:45:45.668Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
18/2/2020 - 1:45:45.715Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
18/2/2020 - 1:45:45.715Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\malware.exe.Local
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:45:45.918Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 1:45:45.918Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 1:45:46.700Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 1:45:46.700Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 1:46:27.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Temp
18/2/2020 - 1:46:27.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Temp
18/2/2020 - 1:46:27.965Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll
18/2/2020 - 1:46:27.965Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll
18/2/2020 - 1:46:27.981Open1480C:\malware.exeC:\Windows\Fonts\verdanab.ttf
18/2/2020 - 1:46:27.981Open1480C:\malware.exeC:\Windows\Fonts\verdanab.ttf

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
18/2/2020 - 1:45:45.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
18/2/2020 - 1:45:45.293Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
18/2/2020 - 1:45:45.293Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
18/2/2020 - 1:45:45.293Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
18/2/2020 - 1:45:45.293Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
18/2/2020 - 1:45:45.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
18/2/2020 - 1:45:45.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
18/2/2020 - 1:45:45.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
18/2/2020 - 1:45:45.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
18/2/2020 - 1:45:45.668Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 1:45:45.668Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 1:45:45.668Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 1:45:45.668Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
18/2/2020 - 1:45:45.715Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
18/2/2020 - 1:45:45.715Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
18/2/2020 - 1:45:45.715Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
18/2/2020 - 1:45:45.715Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
18/2/2020 - 1:45:45.715Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
18/2/2020 - 1:45:45.715Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
18/2/2020 - 1:45:45.715Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
18/2/2020 - 1:45:45.715Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
18/2/2020 - 1:45:46.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
18/2/2020 - 1:45:46.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
18/2/2020 - 1:45:46.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
18/2/2020 - 1:45:46.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
18/2/2020 - 1:45:46.950Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
18/2/2020 - 1:45:46.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 1:45:46.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 1:45:46.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 1:45:46.950Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
18/2/2020 - 1:45:46.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 1:45:46.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 1:45:46.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 1:45:46.950Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code dns.msftncsi.com.
computer localhost arrow_forward computer gateway:DNS code dns.msftncsi.com.

Response
computer gateway:DNS arrow_forward computer localhost code dns.msftncsi.com. reply_all 131.107.255.255


TCP
Info
computer localhost:65191 arrow_forward help_outline 185.174.63.197:80
computer localhost:65192 arrow_forward help_outline 185.174.63.197:80

UDP
Info
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:68 arrow_forward help_outline 255.255.255.255:67
computer localhost:67 arrow_forward computer localhost:68
computer localhost:50273 arrow_forward computer localhost:53

HTTP
Info

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 58.37%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 56.25%
suspicious: False cancel

Random Forest (100 estimators, NFS-BRMalware)
confidence: 60.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 42.83%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 99.51%
suspicious: False cancel

Add to Collection
Download