Report #6517 check_circle

Binary
DLL
False cancel
Size
4.07MB
trid
34.2% DOS Borland compiled Executable
22.5% Win32 Dynamic Link Library
15.4% Win32 Executable
7.0% Win16/32 Executable Delphi generic
6.9% OS/2 Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
6554f3d069350f11aa9079d7df38f234
sha1
8b8342dd78cb734222f13babe9581268c8b9040d
crc32
0x15069c66
sha224
d77f04b43af2a64ba1356c5fca0896957c89e61c92eb50b73273d075
sha256
0f600cc6837910f5bbd3950647899886ba028b71df92e45ce204009c4a686ee5
sha384
01d1756c84b35cccd9250762e0448dbe28effb3829360ed70e31f40d6bfc5f58a8b649e86461d9a4054f7fbc71a27f5a
sha512
7ae711d05ea04adbca77360bcb0cb3d7e10b559debc2e4c9f0f4a7816f0a77ddb1c220c0e3dadeec4591e881dc3f7c817bebdce622100b134d5cffb3ce44639b
ssdeep
49152:5tdAnb6SbtDEv/n3hOlya9BdPns/q7aSWVsgsOgCMT3HiC80c/1XCmS99fp1M2Xk:fd2EMlNBdcq7aSWVs1OgCACC0u9A10k
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
CRC32_poly_Constant, network_ssl, BASE64_table, VC8_Random, Borland, RIPEMD160_Constants, borland_delphi, Delphi_FormShow, CRC32_table, win_files_operation, IsPE32, RijnDael_AES_CHAR, IP, contentis_base64, OpenSSL_DSA, Delphi_Random, IsWindowsGUI, url, SHA1_Constants, RijnDael_AES_LONG, MD5_Constants, Big_Numbers3

Suspicious
True check_circle

Strings
List
the appropriate version of this product at http://www.componentace.com
Web site: http://www.componentace.com
http://www.indyproject.org/
C:\Builds\TP\indysockets\lib\System\IdStreamVCL.pas
C:\Builds\TP\indysockets\lib\System\IdStreamVCL.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdStack.pas
C:\Builds\TP\indysockets\lib\System\IdStack.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
t.Ht
Uh.fR
nn.ge
C:\Builds\TP\indysockets\lib\Core\IdIOHandlerStack.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandlerStack.pas
C:\Builds\TP\indysockets\lib\Core\IdScheduler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdThread.pas
C:\Builds\TP\indysockets\lib\Protocols\IdCoder3to4.pas
C:\Users\Sapeca\Desktop\componentes laoder\TMS Component Pack 7.1.3.0-Tony\PlannerCal.pas
Oi.Ao
Oi.Ao
Invalid compressed size, rfs.size = %d, count = %d
C:\Users\Sapeca\Desktop\componentes laoder\TMS Component Pack 7.1.3.0-Tony\cexpvs.pas
C:\Users\Sapeca\Desktop\componentes laoder\TMS Component Pack 7.1.3.0-Tony\adveddd.pas
C:\Users\Sapeca\Desktop\componentes laoder\TMS Component Pack 7.1.3.0-Tony\PlanSimpleEdit.pas
C:\Users\Sapeca\Desktop\componentes laoder\TMS Component Pack 7.1.3.0-Tony\PlanSimpleEdit.pas
C:\Users\Sapeca\Desktop\componentes laoder\TMS Component Pack 7.1.3.0-Tony\PlanXPVS.pas
feel free to contact us at support@componentace.com
C:\Users\Sapeca\Desktop\componentes laoder\TMS Component Pack 7.1.3.0-Tony\AEBXPVS.pas
%oleacc.dll
libssl32.dll
ssleay32.dll
i.Ax
3.GH
v5.UY
127.0.0.1
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
_ossl_old_des_ecb_encrypt
0.UZ
7.Id+R
\Software\Borland\C++Builder
_ossl_old_des_set_key
windowscodecs.dll
\Software\Borland\Delphi
SSL_set_connect_state
Delphi%.8X
Software\Borland\Locales
ISO_646.irv:1991
Software\Borland\Delphi\Locales
winspool.drv
\Software\Borland\BDS
comctl32.dll
comctl32.dll
msimg32.dll
olepro32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
olepro32.dll
comctl32.dll
libeay32.dll
Wship6.dll
+msimg32.dll
version.dll
_ossl_old_des_set_odd_parity
qole32.dll

Foremost
Matches
None
Suspicious
False cancel
Heuristics
IPs
hasIPs: True check_circle
Allowed: 255.255.255.255, 1, record, 127.0.0.1, 1, localhost.
Suspicious: 0.0.0.1, 0, Unknown
hasAllowed: True check_circle
hasSuspicious: True check_circle

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://www.indyproject.org/, http://www.componentace.com
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: user32.dll, KERNEL32.DLL, UXTHEME.DLL, urlmon.dll, MSWSOCK.DLL, libeay32.dll, COMCTL32.DLL, MAPI32.DLL, mscoree.dll, Fwpuclnt.dll, Wship6.dll, ssleay32.dll, ole32.dll, msimg32.dll, libssl32.dll, imm32.dll, oleaut32.dll, WS2_32.DLL, olepro32.dll, RICHED20.DLL, user32.dll, windowscodecs.dll, wininet.dll, +msimg32.dll, DWMAPI.DLL, comdlg32.dll, %oleacc.dll, qole32.dll, J8{kernel32.dll, advapi32.dll, gdi32.dll, gdiplus.dll, version.dll, winmm.dll, shell32.dll
hasFiles: True check_circle
Suspicious: 2>.So
hasAllowed: True check_circle
hasSuspicious: True check_circle

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 445440
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .text, .itext, .data, .bss, .idata, .didata, .tls, .rdata, .vmp0, .vmp1, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 3834713
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, kernel32.dll, uxtheme.dll, urlmon.dll, mswsock.dll, comctl32.dll, mapi32.dll, mscoree.dll, wship6.dll, ole32.dll, msimg32.dll, imm32.dll, oleaut32.dll, ws2_32.dll, olepro32.dll, riched20.dll, windowscodecs.dll, wininet.dll, dwmapi.dll, comdlg32.dll, advapi32.dll, gdi32.dll, gdiplus.dll, version.dll, winmm.dll, shell32.dll
hasLibs: True check_circle
Suspicious: libeay32.dll, fwpuclnt.dll, ssleay32.dll, libssl32.dll, user32.dll, +msimg32.dll, %oleacc.dll, qole32.dll, j8{kernel32.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2017-12-07 11:16:03
Future: False cancel

Compilation
Packed: False cancel
Missing: True check_circle
Packers
Compiled: False cancel
Compilers

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.data: 8
.rsrc: 1
.text: 75
.idata: 10
.itext: 6
.rdata: 2696
.reloc: 1

nopsequence
.itext: 1

pushpopmath
.data: 8
.text: 64
.idata: 9
.rdata: 243
.reloc: 168

ss register
.rdata: 10
.reloc: 1

garbagebytes
.data: 4
.text: 60
.idata: 4
.itext: 6
.rdata: 2414

hookdetection
.text: 5
.rdata: 17
.reloc: 16

stealthimport
.rdata: 1

software breakpoint
.text: 7
.idata: 1
.rdata: 18
.reloc: 60

fakeconditionaljumps
.rdata: 16

programcontrolflowchange
.data: 4
.text: 60
.idata: 4
.itext: 6
.rdata: 2398

cpuinstructionsresultscomparison
.data: 10
.text: 84
.idata: 1
.rdata: 4
.reloc: 1

AVclass
banload
1
VirusTotal
md5
6554f3d069350f11aa9079d7df38f234
sha1
8b8342dd78cb734222f13babe9581268c8b9040d
SCANS (DETECTION RATE = 62.69%)
AVG
result: Win32:Malware-gen
update: 20180215
version: 18.1.3800.0
detected: True check_circle

CMC
update: 20180215
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=86)
update: 20180215
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180212
version: 1.3.0.9466
detected: False cancel

K7GW
result: Riskware ( 0040eff71 )
update: 20180215
version: 10.40.26215
detected: True check_circle

ALYac
result: Trojan.GenericKD.6288054
update: 20180215
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Malware-gen
update: 20180215
version: 18.1.3800.0
detected: True check_circle

Avira
result: TR/Dldr.Banload.olrue
update: 20180214
version: 8.3.3.6
detected: True check_circle

Baidu
result: Win32.Trojan.WisdomEyes.16070401.9500.9724
update: 20180208
version: 1.0.0.2
detected: True check_circle

Cyren
update: 20180215
version: 5.4.30.7
detected: False cancel

DrWeb
result: Trojan.DownLoad3.49209
update: 20180215
version: 7.0.28.2020
detected: True check_circle

GData
result: Trojan.GenericKD.6288054
update: 20180215
version: A:25.16035B:25.11587
detected: True check_circle

Panda
result: Generic Suspicious
update: 20180214
version: 4.6.4.2
detected: True check_circle

VBA32
result: TrojanDownloader.Banload
update: 20180214
version: 3.12.28.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180215
version: 64608
detected: True check_circle

Zoner
update: 20180215
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180215
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180215
version: 0.99.2.0
detected: False cancel

Comodo
update: 20180215
detected: False cancel

F-Prot
update: 20180215
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180214
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!6554F3D06935
update: 20180215
version: 6.0.6.653
detected: True check_circle

Rising
update: 20180215
version: 25.0.0.1
detected: False cancel

Sophos
result: Mal/Generic-S
update: 20180215
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.DL.Banload!Vrp4KJf4KqE
update: 20180214
version: 5.5.1.3
detected: True check_circle

Zillya
result: Downloader.Banload.Win32.84436
update: 20180214
version: 2.0.0.3491
detected: True check_circle

Arcabit
result: Trojan.Generic.D5FF2B6
update: 20180215
version: 1.0.0.830
detected: True check_circle

Cylance
result: Unsafe
update: 20180215
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180214
version: 1.2.0
detected: True check_circle

Tencent
result: Win32.Trojan.Generic.Wnmi
update: 20180215
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180215
version: 2014.3.20.0
detected: False cancel

Webroot
update: 20180215
version: 1.0.0.207
detected: False cancel

eGambit
result: Unsafe.AI_Score_96%
update: 20180215
version: v4.3.4
detected: True check_circle

Ad-Aware
result: Trojan.GenericKD.6288054
update: 20180215
version: 3.0.3.1010
detected: True check_circle

AegisLab
update: 20180215
version: 4.2
detected: False cancel

Emsisoft
result: Trojan.GenericKD.6288054 (B)
update: 20180215
version: 4.0.2.899
detected: True check_circle

F-Secure
update: 20180208
version: 11.0.19100.45
detected: False cancel

Fortinet
result: W32/Banload.YBL!tr.dldr
update: 20180215
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Jiangmin
update: 20180214
version: 16.0.100
detected: False cancel

Kingsoft
update: 20180215
version: 2013.8.14.323
detected: False cancel

Paloalto
update: 20180215
version: 1.0
detected: False cancel

Symantec
result: Trojan.Gen
update: 20180214
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180215
version: 2018-02-15.02
detected: False cancel

AhnLab-V3
update: 20180214
version: 3.11.3.19504
detected: False cancel

Kaspersky
result: HEUR:Trojan.Win32.Generic
update: 20180215
version: 15.0.1.13
detected: True check_circle

Microsoft
result: Trojan:Win32/Tiggre!rfn
update: 20180215
version: 1.1.14500.5
detected: True check_circle

Qihoo-360
update: 20180215
version: 1.0.0.1120
detected: False cancel

TheHacker
update: 20180213
version: 6.8.0.5.2403
detected: False cancel

ZoneAlarm
result: HEUR:Trojan.Win32.Generic
update: 20180215
version: 1.0
detected: True check_circle

Cybereason
result: malicious.069350
update: 20180205
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.YBL
update: 20180215
version: 16907
detected: True check_circle

TrendMicro
result: TROJ_GEN.R011C0WL917
update: 20180215
version: 9.862.0.1074
detected: True check_circle

WhiteArmor
result: Malware.HighConfidence
update: 20180205
detected: True check_circle

BitDefender
result: Trojan.GenericKD.6288054
update: 20180215
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_90% (W)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Riskware ( 0040eff71 )
update: 20180215
version: 10.40.26216
detected: True check_circle

SentinelOne
update: 20180115
version: 1.0.12.202
detected: False cancel

Avast-Mobile
update: 20180214
version: 180214-10
detected: False cancel

Malwarebytes
update: 20180215
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20180215
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: TrojanDownloader.Banload
update: 20180214
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Banload.evwjtg
update: 20180215
version: 1.0.100.21498
detected: True check_circle

MicroWorld-eScan
result: Trojan.GenericKD.6288054
update: 20180215
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180215
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Dropper.rh
update: 20180215
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R011C0WL917
update: 20180215
version: 9.950.0.1006
detected: True check_circle

total
67
sha256
0f600cc6837910f5bbd3950647899886ba028b71df92e45ce204009c4a686ee5
scan_id
0f600cc6837910f5bbd3950647899886ba028b71df92e45ce204009c4a686ee5-1518676818
resource
6554f3d069350f11aa9079d7df38f234
positives
42
scan_date
2018-02-15 06:40:18
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
18/2/2020 - 1:45:43.497Open1480C:\malware.exeC:\Monitor\Malware
18/2/2020 - 1:45:43.497Unknown1480C:\malware.exeC:\Monitor\Malware
18/2/2020 - 1:45:43.497Open1480C:\malware.exeC:\Monitor\Malware
18/2/2020 - 1:45:43.497Unknown1480C:\malware.exeC:\Monitor\Malware
18/2/2020 - 1:45:43.497Open1480C:\malware.exeC:\Monitor\Malware
18/2/2020 - 1:45:43.497Unknown1480C:\malware.exeC:\Monitor\Malware
18/2/2020 - 1:45:43.497Open1480C:\malware.exeC:\Monitor\Malware
18/2/2020 - 1:45:43.497Unknown1480C:\malware.exeC:\Monitor\Malware
18/2/2020 - 1:45:43.497Open1480C:\malware.exeC:\Monitor\Malware
18/2/2020 - 1:45:43.497Unknown1480C:\malware.exeC:\Monitor\Malware
18/2/2020 - 1:45:43.497Open1480C:\malware.exeC:\Monitor\Malware
18/2/2020 - 1:45:43.497Unknown1480C:\malware.exeC:\Monitor\Malware
18/2/2020 - 1:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
18/2/2020 - 1:45:43.512Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
18/2/2020 - 1:45:43.606Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
18/2/2020 - 1:45:43.606Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
18/2/2020 - 1:45:43.606Open1480C:\malware.exeC:\dwmapi.dll
18/2/2020 - 1:45:43.606Open1480C:\malware.exeC:\Windows\SysWOW64\dwmapi.dll
18/2/2020 - 1:45:43.606Open1480C:\malware.exeC:\Windows\SysWOW64\dwmapi.dll
18/2/2020 - 1:45:43.606Open1480C:\malware.exeC:\Windows\Fonts\StaticCache.dat
18/2/2020 - 1:45:43.606Read1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
18/2/2020 - 1:45:43.606Open1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nls
18/2/2020 - 1:45:43.606Unknown1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nlsSortDefault.nls
18/2/2020 - 1:45:43.606Read1480C:\malware.exeC:\malware.exe
18/2/2020 - 1:45:43.653Open1480C:\malware.exeC:\malware.exe.Local
18/2/2020 - 1:45:43.653Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
18/2/2020 - 1:45:43.653Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
18/2/2020 - 1:45:43.653Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
18/2/2020 - 1:45:43.653Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61\comctl32.dll.mui
18/2/2020 - 1:45:43.653Read1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61\comctl32.dll.muicomctl32.dll.mui
18/2/2020 - 1:45:43.653Open1480C:\malware.exeC:\Windows\Fonts\roman.fon
18/2/2020 - 1:45:46.262Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\TrigMMum
18/2/2020 - 1:45:47.653Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\TrigMMum
18/2/2020 - 1:45:47.653Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 1:45:47.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 1:45:47.653Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\TrigMMum
18/2/2020 - 1:45:47.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\TrigMMum
18/2/2020 - 1:45:48.918Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 1:45:48.918Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 1:45:48.918Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 1:45:48.918Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 1:45:48.918Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 1:45:48.918Open1480C:\malware.exeC:\Secur32.dll
18/2/2020 - 1:45:48.918Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
18/2/2020 - 1:45:48.918Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
18/2/2020 - 1:45:48.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 1:45:48.918Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 1:45:48.918Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 1:45:48.918Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 1:45:48.918Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 1:45:48.918Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 1:45:48.918Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 1:45:48.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
18/2/2020 - 1:45:48.981Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
18/2/2020 - 1:45:48.981Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
18/2/2020 - 1:45:48.981Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
18/2/2020 - 1:45:48.981Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
18/2/2020 - 1:45:48.981Open1480C:\malware.exeC:\IPHLPAPI.DLL
18/2/2020 - 1:45:48.981Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
18/2/2020 - 1:45:48.981Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
18/2/2020 - 1:45:48.981Open1480C:\malware.exeC:\WINNSI.DLL
18/2/2020 - 1:45:48.981Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
18/2/2020 - 1:45:48.981Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
18/2/2020 - 1:45:48.997Open1480C:\malware.exeC:\DNSAPI.dll
18/2/2020 - 1:45:48.997Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
18/2/2020 - 1:45:48.997Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:49.75Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:45:49.75Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 1:45:49.75Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
18/2/2020 - 1:45:49.75Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:49.75Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 1:45:49.75Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 1:45:49.75Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 1:45:49.75Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:49.75Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:45:49.75Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 1:45:49.75Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 1:45:49.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
18/2/2020 - 1:45:49.75Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
18/2/2020 - 1:45:49.184Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
18/2/2020 - 1:45:49.184Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
18/2/2020 - 1:45:49.184Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
18/2/2020 - 1:45:49.184Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
18/2/2020 - 1:45:49.231Open1480C:\malware.exeC:\dhcpcsvc6.DLL
18/2/2020 - 1:45:49.231Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
18/2/2020 - 1:45:49.231Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
18/2/2020 - 1:45:49.231Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
18/2/2020 - 1:45:49.231Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\dhcpcsvc.DLL
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\CRYPTSP.dll
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:49.278Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:49.293Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:49.293Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:45:49.293Open1480C:\malware.exeC:\RpcRtRemote.dll
18/2/2020 - 1:45:49.293Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
18/2/2020 - 1:45:49.293Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
18/2/2020 - 1:45:49.293Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
18/2/2020 - 1:45:49.293Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
18/2/2020 - 1:45:49.356Open1480C:\malware.exeC:\rasadhlp.dll
18/2/2020 - 1:45:49.356Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
18/2/2020 - 1:45:49.356Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
18/2/2020 - 1:45:49.403Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
18/2/2020 - 1:45:49.403Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
18/2/2020 - 1:45:50.528Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 1:45:50.528Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 1:45:51.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\TrigMMum\4300634
18/2/2020 - 1:45:51.934Open1480C:\malware.exeC:\Windows\SysWOW64\pt-BR\KernelBase.dll.mui
18/2/2020 - 1:45:55.262Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\TrigMMum\4300634
18/2/2020 - 1:45:55.262Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll
18/2/2020 - 1:45:55.262Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
18/2/2020 - 1:45:48.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
18/2/2020 - 1:45:48.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
18/2/2020 - 1:45:48.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
18/2/2020 - 1:45:48.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
18/2/2020 - 1:45:48.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
18/2/2020 - 1:45:48.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
18/2/2020 - 1:45:48.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
18/2/2020 - 1:45:48.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
18/2/2020 - 1:45:48.997Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
18/2/2020 - 1:45:48.997Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
18/2/2020 - 1:45:48.997Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
18/2/2020 - 1:45:48.997Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
18/2/2020 - 1:45:48.997Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
18/2/2020 - 1:45:48.997Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
18/2/2020 - 1:45:49.75Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
18/2/2020 - 1:45:49.75Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
18/2/2020 - 1:45:49.75Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
18/2/2020 - 1:45:49.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 1:45:49.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 1:45:49.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 1:45:49.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
18/2/2020 - 1:45:50.731Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
18/2/2020 - 1:45:50.731Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
18/2/2020 - 1:45:50.731Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
18/2/2020 - 1:45:50.731Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
18/2/2020 - 1:45:50.731Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
18/2/2020 - 1:45:50.731Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 1:45:50.731Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 1:45:50.731Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 1:45:50.731Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
18/2/2020 - 1:45:50.731Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 1:45:50.731Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 1:45:50.731Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 1:45:50.731Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code vqvslect.com.
computer localhost arrow_forward computer gateway:DNS code vqvslect.com.

Response

TCP
Info

UDP
Info
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:68 arrow_forward help_outline 255.255.255.255:67
computer localhost:67 arrow_forward computer localhost:68
computer localhost:50273 arrow_forward computer localhost:53

HTTP
Info

Summary
DNS
True check_circle

TCP
False cancel

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 66.67%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 80.89%
suspicious: True check_circle

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 60.49%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 72.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 47.16%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 99.55%
suspicious: True check_circle

Add to Collection
Download