Report #6526 check_circle

Binary
DLL
False cancel
Size
3.08MB
trid
45.5% Win32 Executable Borland Delphi 7
30.9% Win32 Executable Borland Delphi 5
18.0% Win32 Executable Borland Delphi 6
2.9% InstallShield setup
0.9% Win32 Executable Delphi generic
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
b2260fb0a9c2b840bffe424899125b55
sha1
207a978a21dbaa1a0d7ba8420b13d23591de81ca
crc32
0x3a059eab
sha224
6316d99348d45fe843788cda5ed14764fb3e669cd97471439e110007
sha256
3753d250eb45ea26d6b3e01f96936f5344ed37aaf9192004a5d29fca4e6b5ad1
sha384
eacc5e88eac0748eafe2176d845e341164bcd66deb2b435c4d52571ee2c8815de90b60a700c6712b0f4053ea22ae8cea
sha512
ceb3bc4cb06f9475d967fc35b2991038e797064f7b323e6df2b6931d4c0459bf178005448fccd711c1c9da6d2bd47eb5ecf3462d171bdfe139cf6b2731f16e38
ssdeep
49152:HrYNVO8KkMHrPFdonXH2ubRGmniMMA9lSsMe+gxTPRmARM:HrYN08XmPFdoXWubRLniJ4lSJe9RmARM
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, win_private_profile, Borland_Delphi_30_, HasOverlay, network_dropper, CRC32_poly_Constant, BASE64_table, Delphi_DecodeDate, RIPEMD160_Constants, borland_delphi, Check_OutputDebugStringA_iat, Delphi_FormShow, network_dns, BobSoftMiniDelphiBoBBobSoft, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, BobSoft_Mini_Delphi_BoB_BobSoft_additional, win_files_operation, IsPE32, win_hook, RijnDael_AES_CHAR, contentis_base64, network_tcp_socket, screenshot, network_tcp_listen, Borland_Delphi_v40_v50, keylogger, win_mutex, Borland_Delphi_40_additional, Borland_Delphi_40, network_ssl, Delphi_Random, IsWindowsGUI, network_udp_sock, Delphi_Copy, anti_dbg, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, SHA1_Constants, win_registry, Delphi_CompareCall, RijnDael_AES_LONG, Delphi_StrToInt, Borland_Delphi_30_additional, Borland_Delphi_v30

Suspicious
True check_circle

Strings
List
the appropriate version of this product at http://www.componentace.com
http://contadordocasillas.hol.es/trofeus/notify.phpEO!#]200[SO!#]300[
Web site: http://www.componentace.com
c:\program files (x86)\borland\delphi7\Lib\bsEffects.pas
c:\program files (x86)\borland\delphi7\Lib\bsEffects.pas
c:\program files (x86)\borland\delphi7\Lib\bsEffects.pas
c:\program files (x86)\borland\delphi7\Lib\bsEffects.pas
http://158.69.137.35/lowlow/index.phpEO!#]100[SO!#]200[
t.Ht
ActiveFont.Style
Caption.Font.Style
Caption.Font.Style
ActiveFont.Name
FixedFont.Name
HeaderFont.Name
FixedFont.Style
HeaderFont.Name
Uh.SV
HeaderFont.Style
HeaderFont.Style
DefaultItem.Name
Mode.Day
DefaultFont.Name
DefaultFont.Name
DefaultFont.Name
DefaultFont.Name
DefaultFont.Name
DefaultFont.Name
DefaultFont.Name
DefaultFont.Name
DefaultFont.Name
DefaultFont.Name
DefaultFont.Name
DefaultFont.Name
DefaultFont.Name
LabelFont.Name
LabelFont.Name
LabelFont.Name
LabelFont.Name
LabelFont.Name
LabelFont.Name
LabelFont.Name
LabelFont.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Style
Font.Name
Font.Name
Font.Style
Font.Name
Font.Name
Font.Name
Font.Style
Font.Style
ScrollFont.Style
ScrollFont.Name
Caption.Font.Name
Caption.Font.Name
LabelFont.Style
LabelFont.Style
LabelFont.Style
LabelFont.Style
LabelFont.Style
LabelFont.Style
LabelFont.Style
LabelFont.Style
Footer.Font.Name
Header.Font.Name
Footer.Font.Style
Header.Font.Style
DefaultFont.Style
DefaultFont.Style
DefaultFont.Style
DefaultFont.Style
DefaultFont.Style
DefaultFont.Style
DefaultFont.Style
DefaultFont.Style
DefaultFont.Style
DefaultFont.Style
DefaultFont.Style
DefaultFont.Style
DefaultFont.Style
SelectedFont.Name
SearchFooter.Font.Name
SearchFooter.Font.Style
StatusBar.Font.Name
Footer.Completion.Font.Name
StatusBar.Font.Style
ActiveCellFont.Style
Footer.Completion.Font.Style
PrintSettings.Font.Style
PrintSettings.Font.Style
PrintSettings.Font.Style
Settings.Font.Name
DefaultButtonFont.Name
DefaultButtonFont.Name

Foremost
Matches
6228.bmp, 246 B, 6229.bmp, 246 B, 6229.bmp, 246 B, 6230.bmp, 246 B, 6251.bmp, 374 B, 6252.bmp, 1 KB, 6259.bmp, 246 B, 6261.bmp, 1 KB, 6268.bmp, 246 B, 0.exe, 3 MB, 6179.png, 3 KB, 6186.png, 504 B, 6187.png, 410 B, 6188.png, 3 KB, 6195.png, 3 KB, 6201.png, 3 KB, 6208.png, 485 B, 6208.png, 502 B, 6209.png, 3 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: True check_circle
Allowed: 3.0.2.9, 1, ec2-3-0-2-9.ap-southeast-1.compute.amazonaws.com., 6.1.3.1, 1, enterprise.yuma.army.mil., 158.69.137.35, 1, ip35.ip-158-69-137.net.
Suspicious: 1.4.1.1, 0, Unknown
hasAllowed: True check_circle
hasSuspicious: True check_circle

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://158.69.137.35/lowlow/index.phpeo, http://contadordocasillas.hol.es/trofeus/notify.phpeo, http://www.componentace.com
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: Failed to Save StreamE%d is an invalid PageIndex value. PageIndex must be between 0 and %d=This control requires version 4.70 or greater of COMCTL32.DLL, MAPI32.DLL, URLMON.DLL, SHFolder.dll, WS2_32.DLL, user32.dll, uxtheme.dll, dwmapi.dll, wininet.dll, COMCTL32.DLL, ole32.dll, imm32.dll, advapi32.dll, gdi32.dll, oleaut32.dll, kernel32.dll, RICHED32.DLL, vcltest3.dll, olepro32.dll, comdlg32.dll, gdiplus.dll, version.dll, shell32.dll, msimg32.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 508928
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: code, data, bss, .idata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 4
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 4
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 4.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 2726172
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: mapi32.dll, urlmon.dll, shfolder.dll, ws2_32.dll, user32.dll, uxtheme.dll, dwmapi.dll, wininet.dll, comctl32.dll, ole32.dll, imm32.dll, advapi32.dll, gdi32.dll, oleaut32.dll, kernel32.dll, riched32.dll, olepro32.dll, comdlg32.dll, gdiplus.dll, version.dll, shell32.dll, msimg32.dll
hasLibs: True check_circle
Suspicious: failed to save streame%d is an invalid pageindex value. pageindex must be between 0 and %d=this control requires version 4.70 or greater of comctl32.dll, vcltest3.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: True check_circle
Valid: True check_circle
Value: 1992-06-19 19:22:17
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: BobSoft Mini Delphi -> BoB / BobSoft
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v3.0, Borland Delphi v6.0 - v7.0
MainPacker: BobSoft Mini Delphi -> BoB / BobSoft

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
none: 279
.rsrc: 35
.idata: 3

pushpopmath
none: 64
.rsrc: 51
.reloc: 118

ss register
.reloc: 1

garbagebytes
none: 263
.rsrc: 13
.idata: 1

hookdetection
none: 8
.reloc: 16

software breakpoint
none: 15
.reloc: 40

fakeconditionaljumps
none: 1

programcontrolflowchange
none: 262
.rsrc: 13
.idata: 1

cpuinstructionsresultscomparison
none: 85
.rsrc: 72

AVclass
banload
1
VirusTotal
md5
b2260fb0a9c2b840bffe424899125b55
sha1
207a978a21dbaa1a0d7ba8420b13d23591de81ca
SCANS (DETECTION RATE = 64.71%)
AVG
result: Win32:Banker-NAD [Trj]
update: 20180610
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20180610
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=100)
update: 20180610
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180609
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan-Downloader ( 00504e1e1 )
update: 20180610
version: 10.48.27414
detected: True check_circle

ALYac
result: Gen:Variant.Zusy.221292
update: 20180610
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Banker-NAD [Trj]
update: 20180610
version: 18.4.3895.0
detected: True check_circle

Avira
result: TR/Dldr.Banload.hcwul
update: 20180610
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180608
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.FKIM-8002
update: 20180610
version: 6.0.0.4
detected: True check_circle

DrWeb
result: Trojan.DownLoader23.54930
update: 20180610
version: 7.0.28.2020
detected: True check_circle

GData
result: Gen:Variant.Zusy.221292
update: 20180610
version: A:25.17388B:25.12461
detected: True check_circle

Panda
result: Trj/GdSda.A
update: 20180610
version: 4.6.4.2
detected: True check_circle

VBA32
result: TrojanDownloader.Banload
update: 20180608
version: 3.12.32.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180610
version: 67028
detected: True check_circle

Zoner
update: 20180609
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180610
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180610
version: 0.99.2.0
detected: False cancel

Comodo
update: 20180610
detected: False cancel

F-Prot
update: 20180610
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180610
version: 0.1.5.2
detected: True check_circle

McAfee
result: Downloader-FBKF!B2260FB0A9C2
update: 20180610
version: 6.0.6.653
detected: True check_circle

Rising
update: 20180610
version: 25.0.0.1
detected: False cancel

Sophos
result: Mal/Generic-S
update: 20180610
version: 4.98.0
detected: True check_circle

Yandex
update: 20180609
version: 5.5.1.3
detected: False cancel

Zillya
result: Downloader.Banload.Win32.75144
update: 20180608
version: 2.0.0.3570
detected: True check_circle

Arcabit
result: Trojan.Zusy.D3606C
update: 20180610
version: 1.0.0.831
detected: True check_circle

Babable
update: 20180406
version: 9107201
detected: False cancel

Cylance
result: Unsafe
update: 20180610
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180507
version: 2.1.2
detected: True check_circle

TACHYON
update: 20180608
version: 2018-06-08.02
detected: False cancel

Tencent
result: Win32.Trojan-downloader.Banload.Pbyk
update: 20180610
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180610
version: 2014.3.20.0
detected: False cancel

Webroot
result: W32.Trojan.GenKD
update: 20180610
version: 1.0.0.403
detected: True check_circle

eGambit
update: 20180610
detected: False cancel

Ad-Aware
result: Gen:Variant.Zusy.221292
update: 20180610
version: 3.0.5.370
detected: True check_circle

AegisLab
result: Troj.Generickd!c
update: 20180610
version: 4.2
detected: True check_circle

Emsisoft
result: Gen:Variant.Zusy.221292 (B)
update: 20180610
version: 4.0.2.899
detected: True check_circle

F-Secure
update: 20180610
version: 11.0.19100.45
detected: False cancel

Fortinet
result: W32/Banload.XUQ!tr.dldr
update: 20180610
version: 5.4.247.0
detected: True check_circle

Invincea
result: heuristic
update: 20180601
version: 6.3.5.26121
detected: True check_circle

Jiangmin
update: 20180610
version: 16.0.100
detected: False cancel

Kingsoft
update: 20180610
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180610
version: 1.0
detected: True check_circle

Symantec
result: ML.Attribute.HighConfidence
update: 20180610
version: 1.6.0.0
detected: True check_circle

AhnLab-V3
result: Trojan/Win32.Banload.C1781470
update: 20180610
version: 3.12.1.20996
detected: True check_circle

Antiy-AVL
result: Trojan/Win32.TSGeneric
update: 20180610
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan-Downloader.Win32.Banload.aarmk
update: 20180610
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload
update: 20180610
version: 1.1.14901.4
detected: True check_circle

Qihoo-360
update: 20180610
version: 1.0.0.1120
detected: False cancel

TheHacker
result: Trojan/Downloader.Banload.xuu
update: 20180608
version: 6.8.0.5.3091
detected: True check_circle

ZoneAlarm
result: Trojan-Downloader.Win32.Banload.aarmk
update: 20180610
version: 1.0
detected: True check_circle

Cybereason
result: malicious.0a9c2b
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.XUU
update: 20180610
version: 17529
detected: True check_circle

TrendMicro
update: 20180610
version: 10.0.0.1040
detected: False cancel

BitDefender
result: Gen:Variant.Zusy.221292
update: 20180610
version: 7.2
detected: True check_circle

CrowdStrike
update: 20180530
version: 1.0
detected: False cancel

K7AntiVirus
result: Trojan-Downloader ( 00504e1e1 )
update: 20180610
version: 10.48.27414
detected: True check_circle

SentinelOne
update: 20180225
version: 1.0.15.206
detected: False cancel

Avast-Mobile
update: 20180610
version: 180610-02
detected: False cancel

Malwarebytes
result: Trojan.Banload
update: 20180610
version: 2.1.1.1115
detected: True check_circle

TotalDefense
update: 20180610
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: Trojan.Dynamer
update: 20180610
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Banload.elvdfw
update: 20180610
version: 1.0.106.22618
detected: True check_circle

MicroWorld-eScan
result: Gen:Variant.Zusy.221292
update: 20180610
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180610
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Dropper.wh
update: 20180610
version: v2017.2786
detected: True check_circle

TrendMicro-HouseCall
update: 20180610
version: 9.950.0.1006
detected: False cancel

total
68
sha256
3753d250eb45ea26d6b3e01f96936f5344ed37aaf9192004a5d29fca4e6b5ad1
scan_id
3753d250eb45ea26d6b3e01f96936f5344ed37aaf9192004a5d29fca4e6b5ad1-1528667208
resource
b2260fb0a9c2b840bffe424899125b55
positives
44
scan_date
2018-06-10 21:46:48
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
18/2/2020 - 1:45:43.934Open1480C:\malware.exeC:\dwmapi.dll
18/2/2020 - 1:45:43.934Open1480C:\malware.exeC:\Windows\SysWOW64\dwmapi.dll
18/2/2020 - 1:45:43.934Open1480C:\malware.exeC:\Windows\SysWOW64\dwmapi.dll
18/2/2020 - 1:45:43.934Open1480C:\malware.exeC:\Windows\Fonts\StaticCache.dat
18/2/2020 - 1:45:43.934Read1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
18/2/2020 - 1:45:43.934Open1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nls
18/2/2020 - 1:45:43.934Unknown1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nlsSortDefault.nls
18/2/2020 - 1:45:43.950Open1480C:\malware.exeC:\msimg32.dll
18/2/2020 - 1:45:43.950Open1480C:\malware.exeC:\Windows\SysWOW64\msimg32.dll
18/2/2020 - 1:45:43.950Open1480C:\malware.exeC:\Windows\SysWOW64\msimg32.dll
18/2/2020 - 1:45:43.950Open1480C:\malware.exeC:\malware.exe.Local
18/2/2020 - 1:45:43.950Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
18/2/2020 - 1:45:43.950Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
18/2/2020 - 1:45:43.950Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
18/2/2020 - 1:45:43.950Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61\comctl32.dll.mui
18/2/2020 - 1:45:43.965Read1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61\comctl32.dll.muicomctl32.dll.mui
18/2/2020 - 1:45:43.965Open1480C:\malware.exeC:\Users\Behemot\Desktop
18/2/2020 - 1:45:43.965Unknown1480C:\malware.exeC:\Users\Behemot\Desktop
18/2/2020 - 1:45:43.965Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
18/2/2020 - 1:45:43.965Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
18/2/2020 - 1:45:43.965Open1480C:\malware.exeC:\Windows\SysWOW64\shell32.dll
18/2/2020 - 1:45:43.965Open1480C:\malware.exeC:\malware.exe.Local
18/2/2020 - 1:45:43.965Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:45:43.965Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:45:43.965Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:45:43.965Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
18/2/2020 - 1:45:43.965Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
18/2/2020 - 1:45:43.965Open1480C:\malware.exeC:\Windows\WindowsShell.Manifest
18/2/2020 - 1:45:43.965Unknown1480C:\malware.exeC:\Windows\WindowsShell.ManifestWindowsShell.Manifest
18/2/2020 - 1:46:16.137Open1480C:\malware.exeC:\Windows\Fonts\sserife.fon
18/2/2020 - 1:46:16.137Open1480C:\malware.exeC:\Windows\Fonts\arial.ttf
18/2/2020 - 1:46:16.137Open1480C:\malware.exeC:\Windows\Fonts\arial.ttf
18/2/2020 - 1:46:16.278Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll.Config
18/2/2020 - 1:46:16.278Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
18/2/2020 - 1:46:16.278Open1480C:\malware.exeC:\malware.exe.Local
18/2/2020 - 1:46:16.278Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:46:16.278Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:46:16.278Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:46:16.278Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:46:16.325Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:46:16.325Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:46:16.325Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:46:16.325Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:46:16.325Open1480C:\malware.exeC:\malware.exe
18/2/2020 - 1:46:16.325Read1480C:\malware.exeC:\malware.exe
18/2/2020 - 1:46:16.325Unknown1480C:\malware.exeC:\malware.exe
18/2/2020 - 1:46:16.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\HostWins
18/2/2020 - 1:46:16.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:46:16.418Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:46:16.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\HostWins
18/2/2020 - 1:46:16.418Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\HostWins
18/2/2020 - 1:46:26.450Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 1:46:26.450Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 1:46:26.450Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 1:46:26.450Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 1:46:26.450Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 1:46:26.450Open1480C:\malware.exeC:\Secur32.dll
18/2/2020 - 1:46:26.450Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
18/2/2020 - 1:46:26.450Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
18/2/2020 - 1:46:26.450Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 1:46:26.450Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 1:46:26.450Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 1:46:26.450Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 1:46:26.450Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 1:46:26.450Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 1:46:26.450Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 1:46:26.497Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
18/2/2020 - 1:46:26.497Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
18/2/2020 - 1:46:26.497Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
18/2/2020 - 1:46:26.497Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
18/2/2020 - 1:46:26.497Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
18/2/2020 - 1:46:26.497Open1480C:\malware.exeC:\IPHLPAPI.DLL
18/2/2020 - 1:46:26.497Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
18/2/2020 - 1:46:26.497Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
18/2/2020 - 1:46:26.497Open1480C:\malware.exeC:\WINNSI.DLL
18/2/2020 - 1:46:26.497Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
18/2/2020 - 1:46:26.497Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
18/2/2020 - 1:46:26.497Open1480C:\malware.exeC:\DNSAPI.dll
18/2/2020 - 1:46:26.497Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
18/2/2020 - 1:46:26.497Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:46:26.543Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:46:26.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 1:46:26.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
18/2/2020 - 1:46:26.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:46:26.543Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 1:46:26.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 1:46:26.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 1:46:26.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:46:26.543Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:46:26.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 1:46:26.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 1:46:26.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
18/2/2020 - 1:46:26.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
18/2/2020 - 1:46:26.653Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
18/2/2020 - 1:46:26.653Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
18/2/2020 - 1:46:26.653Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
18/2/2020 - 1:46:26.653Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
18/2/2020 - 1:46:26.700Open1480C:\malware.exeC:\dhcpcsvc6.DLL
18/2/2020 - 1:46:26.700Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
18/2/2020 - 1:46:26.700Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
18/2/2020 - 1:46:26.700Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
18/2/2020 - 1:46:26.700Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\dhcpcsvc.DLL
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\CRYPTSP.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\RpcRtRemote.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
18/2/2020 - 1:46:26.747Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
18/2/2020 - 1:46:26.747Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\rasadhlp.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
18/2/2020 - 1:46:26.747Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
18/2/2020 - 1:46:26.809Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
18/2/2020 - 1:46:26.809Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
18/2/2020 - 1:46:26.856Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
18/2/2020 - 1:46:26.856Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\malware.exe.Local
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:46:27.12Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 1:46:27.12Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 1:46:28.90Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 1:46:28.90Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 1:47:14.12Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\HostWins
18/2/2020 - 1:47:14.12Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\HostWins
18/2/2020 - 1:47:21.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\HostWins
18/2/2020 - 1:47:21.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\HostWins
18/2/2020 - 1:47:21.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\HostWins\9MJ50CY08MCM
18/2/2020 - 1:47:30.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\HostWins
18/2/2020 - 1:47:30.59Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\HostWins
18/2/2020 - 1:47:30.200Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll
18/2/2020 - 1:47:30.200Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
18/2/2020 - 1:46:26.497Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
18/2/2020 - 1:46:26.497Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
18/2/2020 - 1:46:26.497Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
18/2/2020 - 1:46:26.497Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
18/2/2020 - 1:46:26.497Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
18/2/2020 - 1:46:26.497Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
18/2/2020 - 1:46:26.497Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
18/2/2020 - 1:46:26.497Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
18/2/2020 - 1:46:26.497Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
18/2/2020 - 1:46:26.497Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
18/2/2020 - 1:46:26.497Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
18/2/2020 - 1:46:26.497Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
18/2/2020 - 1:46:26.497Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
18/2/2020 - 1:46:26.497Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
18/2/2020 - 1:46:26.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
18/2/2020 - 1:46:26.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
18/2/2020 - 1:46:26.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
18/2/2020 - 1:46:26.856Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 1:46:26.856Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 1:46:26.856Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 1:46:26.856Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
18/2/2020 - 1:46:28.278Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
18/2/2020 - 1:46:28.278Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
18/2/2020 - 1:46:28.278Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
18/2/2020 - 1:46:28.278Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
18/2/2020 - 1:46:28.278Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
18/2/2020 - 1:46:28.278Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 1:46:28.278Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 1:46:28.278Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 1:46:28.278Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
18/2/2020 - 1:46:28.278Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 1:46:28.278Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 1:46:28.278Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 1:46:28.278Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code dns.msftncsi.com.
computer localhost arrow_forward computer gateway:DNS code contadordocasillas.hol.es.
computer localhost arrow_forward computer gateway:DNS code dns.msftncsi.com.

Response
computer gateway:DNS arrow_forward computer localhost code dns.msftncsi.com. reply_all 131.107.255.255


TCP
Info
computer localhost:65192 arrow_forward 158.69.137.35:80
computer localhost:65191 arrow_forward 158.69.137.35:80

UDP
Info
computer localhost:55394 arrow_forward computer localhost:53
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:53 arrow_forward computer localhost:55394
computer localhost:67 arrow_forward computer localhost:68
computer localhost:68 arrow_forward help_outline 255.255.255.255:67

HTTP
Info

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 65.32%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 92.51%
suspicious: False cancel

Random Forest (100 estimators, NFS-BRMalware)
confidence: 59.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 69.34%
suspicious: False cancel

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 54.44%
suspicious: False cancel

Add to Collection
Download