Report #6591 check_circle

  • Creation Date: Feb. 18, 2020, 1:12 p.m.
  • Last Update: Feb. 18, 2020, 2:15 p.m.
  • File: GetTick.exe
  • Results:
Binary
DLL
False cancel
Size
1.15MB
trid
45.1% Win32 Executable Borland Delphi 7
30.6% Win32 Executable Borland Delphi 5
17.8% Win32 Executable Borland Delphi 6
2.9% InstallShield setup
0.9% Win32 Executable Delphi generic
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
82c3fc0ca181d881d812ae4ee8fe9a56
sha1
6e56bb711aeb1c2ab05b1c1d1bc622720c2c2e6b
crc32
0xb1a41f91
sha224
1640a98a2126195e0dd3bbf873446d421c8cdaca222aa9f3ebff9685
sha256
faa082c7d24edbe621ddc3211541c51150cbf12e01643488fe2c8e8b97d4ffe6
sha384
cba4d33bb8f408b4f39f8b1914aceead50a6abaa047c0785b65218368acf7b756857c4ead4e340fab8b8f5d3b6323d8a
sha512
7e3e7078cad1a81836ebce0a5187813923cc29d22ad537bc46fb393d8afb02aae25c81c27c94b399ce8ca69a50906ff324b48c6e1d4e12c67d2c0617172046c8
ssdeep
24576:ZiQk20J7taJEVNx7M5PXHTb3TqJxtPgVMwU:ZZeYJWO5PDT2JOM
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, Borland_Delphi_30_, CRC32_poly_Constant, Delphi_DecodeDate, borland_delphi, Delphi_FormShow, BobSoftMiniDelphiBoBBobSoft, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, BobSoft_Mini_Delphi_BoB_BobSoft_additional, win_files_operation, IsPE32, win_hook, screenshot, Borland_Delphi_v40_v50, keylogger, contentis_base64, Borland_Delphi_40_additional, Borland_Delphi_40, Borland_Delphi_v60_v70, IsWindowsGUI, inject_thread, Delphi_Copy, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, android_meterpreter, win_registry, Delphi_CompareCall, Delphi_StrToInt, Borland_Delphi_30_additional, Borland_Delphi_v30

Suspicious
True check_circle

Strings
List
Support: http://www.dhtmlcentral.com/forums/forum.asp?FORUM_ID=2&CAT_ID=1&Forum_Title=CoolMenus
Tutorial: http://www.dhtmlcentral.com/tutorial.asp
if(e.pageY > this.ssLayer.top)
frame.vssLayer.top = p*(frame.vspLayer.clip.height -
if(!obj.useframes || bw.ie){ clearTimeout(obj.tim); obj.isover=0; obj.hideSubs(1,0)}
_barLayer.top;
this.top = this.oTop - i;
layer.top = top;
if(!(!bw.ie&&this.useframes&&l==0&&this.aobj1)){ this.isover=0; this.aobj1=0; this.tim=setTimeout(this.name+".hideSubs(1,0,0,0,1)",this.wait)}
if(i==0){if(bw.ns4){w="width:" +this.l[0].width+";"; this.l[i].style=""} else w=""; str+='.cl'+this.name+i+'{position:absolute; '+w+' background-color:transparent; color:'+this.l[i].tc+';'+this.l[i].style+'; cursor:pointer; cursor:hand; visibility:inherit; z-index:'+zindex+'}\n'}
t.Ht
this.top = top;
if(e.target.href) {
this.clip.top = i;
if(this.sel[i].style.visibility!="hidden"){this.sel[i].level=l; this.sel[i].style.visibility="hidden"; this.hcode+=this.name+".sel["+i+"].style.visibility='visible';"}
if(!bw.ns4&&this.checkselect) this.sel=bw.ie4?this.win.document.all.tags("SELECT"):this.win.document.getElementsByTagName("SELECT")
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
if(this.barinheritborder){str+='#div'+this.name+'Barb{z-index:85; position:absolute; background-color:'+this.barcolor+'; layer-background-color:'+this.barcolor+'}\n'}
if(coolFName.win.document.body){coolFName.win.addEventListener("unload", cm_unloaded, true); coolFName.refresh(); ok=1; coolFrameError=0}
if(!this.evnt) return debug('There seems to be an error with this layer:\nFrame: '+win+'\nLayer: '+nest + "." + obj)
}if(!bw.ns4&&this.useframes){page=new makePageCoords(this.win,this.useframes)}
if(bw.ie&&rows&&this.barwidth=="100%"&&this.useframes) bww+=parseInt(self.document.body.leftMargin)*2
if(fcolor && !bw.ns4){if(bw.ie4) this.evnt.style.color=fcolor; else if(this.evnt.childNodes[0]) this.evnt.style.color=fcolor
this.m[name]=new Object(); var obj=this.m[name]; obj.name=name; obj.subs=new Array(); obj.parent=parent; var tt
_thumbLayer.top = t;
if(this.checkscroll&&bw.ie){this.win.document.body.onscroll=new Function("cm_checkScrolled("+this.name+")"); cm_checkScrolled(this)}
w=window.open(URL, Name, Options);
obj.addEvents(this.l[0].names[j],this.name,this.m[this.l[0].names[j]].lnk,this.useclick); obj.clipTo(0,w,h,0,1)
this.bw=(this.ie6 || this.ie5 || this.ie4 || this.ns4 || this.ns6 || this.opera5 || this.dom)
this.oBar=new cm_makeObj('div'+this.name+'Bar',0,0,window,0,oNS)
(pY < (_dragObject.top-38))) {
if(this.checkscroll){if(bw.ns4 || bw.ns6){if(this.checkscroll!=2&&this.useframes!=1){setTimeout("cm_checkScrolled("+this.name+")",200)}}}
this.frame.load(e.target);
obj=this.m[name]; url=obj.lnk; target=obj.target; fc=obj.mclick
if((pY > (_dragObject.top+54)) ||
_dragObject.top = pY;
function cm_unloaded(ev){coolFName=eval(coolFName); if(!coolFName) return; if(document.layers && ev.target.name!=coolFName.frame) return; else coolFName.nsload=0; coolFName.loaded=0; if(!document.layers) setTimeout("cm_checkLoaded()",200)}
if(this.useframes) page=new makePageCoords(this.win,this.useframes); else page=toppage
this.l[0].o[j].oBorder=new cm_makeObj('div'+this.name+'0_'+j+'b',0,0,window,0,oNS)
function cm_clipTo(t,r,b,l,w){if(bw.ns4){this.css.clip.top=t;this.css.clip.right=r; this.css.clip.bottom=b;this.css.clip.left=l
percentScroll = (pY - _dragObject.spLayer.top) /
coolFName.win.document.body.insertAdjacentHTML("beforeEnd",coolFName.frstr)
}if((bw.ns4 || bw.ns6) && !obj.useframes) setTimeout("cm_checkScrolled("+obj.name+")",200)
if(this.barinheritborder&&border){oBb=new cm_makeObj('div'+this.name+'Barb',0,0,window,'div'+this.name+'Bar');
dobj=GSubmitter.elements[obj.name];
obj.addEvents(n,this.name,this.m[n].lnk,this.useclick); var w=this.m[n].width; var h=this.m[n].height
if(!name) name=this.name; var tobj=this.parent.m[name]
obj.lnk=(link==0||link=='')?"":link; obj.target=target
this.css=bw.dom||bw.ie4?this.evnt.style:bw.ns4?this.evnt:0; this.ref=bw.dom || bw.ie4?win.document:bw.ns4?this.css.document:0;
this.Item.style.left = LPoint.X;
_dragObject.oTop = _dragObject.top;
if(i==0&&!bw.ns6) str+='.cl'+this.name+'b'+i+'{'+tempstr+'}\n';
p = (_scrollLayer.clip.top+15) /
p = (_scrollLayer.clip.top-15) /
var vspLayerTop = frame.top+16;
if(!fr){num++; setTimeout(this.name+".checkFrame("+num+")",500)
y += this.layer.clip.top;
this.Item.style.top = LPoint.Y;
if(bw.ns4 || bw.ns6) obj.scrolledY=obj.win.pageYOffset
}else if(ev.target.name==coolFName.frame&&!coolFName.nsload){coolFName.refresh(); ok=1; coolFrameError=0; routeEvent(ev)}
this.l[i].o[j]=new cm_makeObj('div'+this.name+i+'_'+j,this,i,this.win,0,oNS2)
frame.layer.clip.top = 0;
pY = _dragObject.spLayer.top;
if(pY < _dragObject.spLayer.top)
this.name = AName;
var vsdLayerTop = frame.top+frame.height-16;
frame.hspLayer.top, hsdLayerLeft, 16, 16);
else obj.scrolledY=obj.win.document.body.scrollTop
if(this.useframes&&!coolFrameError) loc=this.win.location.href; else loc=location.href
if(this.useclick) coolFMouseup+=this.name+".mmout('',1);"; if(!this.useframes&&!bw.ns4) this.refresh()
this.l[i].oBorder=new cm_makeObj('div'+this.name+i+"b",0,0,this.win,0,oNS)
if(bw.ns4){oNS=new Layer(this.l[i].width,this.win); oNS.zIndex=(500+i); if(this.l[i].border) oNS.bgColor=this.l[i].bordercolor;}
frame.hspLayer.top, frame.left, 16, 16);
frame.top, frame.vspLayer.left, 16, 16);
if((e.target.href.indexOf("mailto:") == -1) &&
Copyright (c) 2001 Thomas Brattli (www.dhtmlcentral.com)
if (obj.name != null) {
function cm_moveIt(x,y){this.x=x; this.y=y; this.css.left=this.x;this.css.top=this.y}
coolFName.win.document.body.onunload=cm_unloaded; coolFName.refresh(); ok=1; coolFrameError=0
p = (_scrollLayer.clip.top+dir*_scrollLayer.clip.height)/
}else if(fcolor&&frmmouse){t=this.parent.m[name].text; t=t.replace(re,fcolor); this.writeIt(t); if(on) this.addEvents(name,this.parent.name,tobj.lnk,this.parent.useclick)}
borderLayer.top = frame.top-1;
if(this.resizecheck) setTimeout('window.onresize=new Function("'+this.name+'.resized()")',500)
this.win=window; toppage=new makePageCoords(window,parent.frames.length);
frame.layer.oTop = frame.top;
}else{this.win.location.reload(); location.reload()}
coolFName=name; this.name=name; this.lastScrolled=0;
else if(!this.useframes&&bw.ns4){l=""; if(onload){l=String(onload.toString()); l=l.replace("function onload(event)",""); l=l.slice(25,l.length-2)} l+=this.name+ ".refresh();"; onload=new Function(l)}
if(this.useclick){this.win.document.onmouseup=new Function(coolFMouseup); if(this.useframes) document.onmouseup=new Function(coolFMouseup); }
frame.layer.top = frame.top;
if (obj.name.length > 0) {
frame.top+frame.height+1, frame.left+frame.width+1, 15, 15);
}else this.oNS[j]=cm_NS6_createElement(this.ns6styleb[i],tempstr+' class="cl'+this.name+i+'">'+txt+'</div>')

Foremost
Matches
2121.gif, 260 B, 2122.gif, 267 B, 2122.gif, 237 B, 2123.gif, 228 B, 2123.gif, 254 B, 2124.gif, 150 B, 2124.gif, 268 B, 2124.gif, 261 B, 2125.gif, 258 B, 2126.gif, 251 B, 2126.gif, 270 B, 2127.gif, 261 B, 2127.gif, 256 B, 2128.gif, 252 B, 2128.gif, 275 B, 2129.gif, 270 B, 2129.gif, 262 B, 2130.gif, 253 B, 2130.gif, 277 B, 2131.gif, 275 B, 2132.gif, 63 B, 2132.gif, 110 B, 2133.gif, 80 B, 2133.gif, 108 B, 2133.gif, 79 B, 2133.gif, 111 B, 2133.gif, 65 B, 2134.gif, 60 B, 2134.gif, 105 B, 2134.gif, 77 B, 2134.gif, 113 B, 2134.gif, 105 B, 2134.gif, 77 B, 2135.gif, 300 B, 2135.gif, 297 B, 2136.gif, 145 B, 2136.gif, 130 B, 2136.gif, 117 B, 2137.gif, 158 B, 2137.gif, 124 B, 2137.gif, 42 B, 2303.bmp, 1 KB, 2306.bmp, 1 KB, 2308.bmp, 1 KB, 2311.bmp, 1 KB, 2313.bmp, 1 KB, 2316.bmp, 1 KB, 2318.bmp, 1 KB, 2321.bmp, 1 KB, 2323.bmp, 1 KB, 2326.bmp, 1 KB, 2328.bmp, 1 KB, 2331.bmp, 1 KB, 2333.bmp, 2 KB, 2337.bmp, 2 KB, 2342.bmp, 2 KB, 0.exe, 1 MB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://www.dhtmlcentral.com/tutorial.asp, http://, http://www.dhtmlcentral.com/forums/forum.asp?forum_id=2&cat_id=1&forum_title=coolmenus
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: MAPI32.DLL, Applicatios.dll, user32.dll, uxtheme.dll, ole32.dll, imm32.dll, advapi32.dll, comctl32.dll, gdi32.dll, oleaut32.dll, kernel32.dll, vcltest3.dll, version.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 600576
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: code, data, bss, .idata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 4
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 4
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 4.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 608752
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: mapi32.dll, user32.dll, uxtheme.dll, ole32.dll, imm32.dll, advapi32.dll, comctl32.dll, gdi32.dll, oleaut32.dll, kernel32.dll, version.dll
hasLibs: True check_circle
Suspicious: applicatios.dll, vcltest3.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: True check_circle
Valid: True check_circle
Value: 1992-06-19 19:22:17
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: BobSoft Mini Delphi -> BoB / BobSoft
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v3.0, Borland Delphi v6.0 - v7.0
MainPacker: BobSoft Mini Delphi -> BoB / BobSoft

Obfuscation
XOR: False cancel
Fuzzing: True check_circle

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
none: 151
.rsrc: 15
.reloc: 1

nopsequence
.rsrc: 16

pushpopmath
none: 10
.rsrc: 69
.reloc: 29

garbagebytes
none: 151
.rsrc: 13
.reloc: 1

hookdetection
none: 2
.reloc: 2

software breakpoint
none: 9
.rsrc: 4
.reloc: 11

programcontrolflowchange
none: 151
.rsrc: 13
.reloc: 1

cpuinstructionsresultscomparison
none: 17
.rsrc: 25

AVclass
invader
1
VirusTotal
md5
82c3fc0ca181d881d812ae4ee8fe9a56
sha1
6e56bb711aeb1c2ab05b1c1d1bc622720c2c2e6b
SCANS (DETECTION RATE = 63.24%)
AVG
result: Win32:Malware-gen
update: 20180218
version: 18.1.3800.0
detected: True check_circle

CMC
update: 20180218
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=89)
update: 20180218
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180212
version: 1.3.0.9466
detected: False cancel

K7GW
result: Unwanted-Program ( 005120c21 )
update: 20180218
version: 10.40.26234
detected: True check_circle

ALYac
update: 20180217
version: 1.1.1.5
detected: False cancel

Avast
result: Win32:Malware-gen
update: 20180218
version: 18.1.3800.0
detected: True check_circle

Avira
result: TR/Special.eipdm
update: 20180218
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180208
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.OHLC-2712
update: 20180218
version: 5.4.30.7
detected: True check_circle

DrWeb
result: Trojan.Inject2.62602
update: 20180218
version: 7.0.28.2020
detected: True check_circle

GData
result: Gen:Trojan.Heur.jHW@tXnwQLbHF
update: 20180218
version: A:25.16070B:25.11613
detected: True check_circle

Panda
result: Trj/GdSda.A
update: 20180218
version: 4.6.4.2
detected: True check_circle

VBA32
update: 20180216
version: 3.12.28.0
detected: False cancel

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180218
version: 64686
detected: True check_circle

Zoner
update: 20180218
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180218
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180218
version: 0.99.2.0
detected: False cancel

Comodo
update: 20180218
detected: False cancel

F-Prot
update: 20180218
version: 4.7.1.166
detected: False cancel

Ikarus
update: 20180218
version: 0.1.5.2
detected: False cancel

McAfee
result: Artemis!82C3FC0CA181
update: 20180218
version: 6.0.6.653
detected: True check_circle

Rising
update: 20180218
version: 25.0.0.1
detected: False cancel

Sophos
result: Generic PUA GO (PUA)
update: 20180218
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.Invader!
update: 20180216
version: 5.5.1.3
detected: True check_circle

Zillya
result: Trojan.Invader.Win32.1302
update: 20180216
version: 2.0.0.3493
detected: True check_circle

Arcabit
result: Trojan.Heur.E6EA96
update: 20180218
version: 1.0.0.830
detected: True check_circle

Cylance
result: Unsafe
update: 20180218
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180216
version: 1.2.1
detected: True check_circle

Tencent
result: Win32.Trojan.Invader.Eawx
update: 20180218
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180218
version: 2014.3.20.0
detected: False cancel

Webroot
update: 20180218
version: 1.0.0.207
detected: False cancel

eGambit
update: 20180218
version: v4.3.4
detected: False cancel

Ad-Aware
result: Gen:Trojan.Heur.jHW@tXnwQLbHF
update: 20180218
version: 3.0.3.1010
detected: True check_circle

AegisLab
result: Troj.W32.Invader!c
update: 20180218
version: 4.2
detected: True check_circle

Emsisoft
result: Gen:Trojan.Heur.jHW@tXnwQLbHF (B)
update: 20180218
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Gen:Trojan.Heur.jHW@tXnwQLbHF
update: 20180218
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Injector.DMPF!tr
update: 20180218
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Jiangmin
result: Trojan.Invader.axf
update: 20180218
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20180218
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180218
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen.2
update: 20180217
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180218
version: 2018-02-18.02
detected: False cancel

AhnLab-V3
result: Malware/Win32.Generic.C2069700
update: 20180218
version: 3.11.3.19504
detected: True check_circle

Antiy-AVL
result: Trojan/Win32.Invader
update: 20180218
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: HEUR:Trojan.Win32.Invader
update: 20180218
version: 15.0.1.13
detected: True check_circle

Microsoft
update: 20180218
version: 1.1.14500.5
detected: False cancel

Qihoo-360
result: Win32/Trojan.bca
update: 20180218
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180216
version: 6.8.0.5.2415
detected: False cancel

ZoneAlarm
result: HEUR:Trojan.Win32.Invader
update: 20180218
version: 1.0
detected: True check_circle

Cybereason
result: malicious.ca181d
update: 20180205
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/Spy.Delf.QNU
update: 20180218
version: 16924
detected: True check_circle

TrendMicro
result: TROJ_GEN.R023C0OH117
update: 20180218
version: 9.862.0.1074
detected: True check_circle

WhiteArmor
update: 20180205
detected: False cancel

BitDefender
result: Gen:Trojan.Heur.jHW@tXnwQLbHF
update: 20180218
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_60% (D)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Unwanted-Program ( 005120c21 )
update: 20180218
version: 10.40.26242
detected: True check_circle

SentinelOne
update: 20180115
version: 1.0.12.202
detected: False cancel

Avast-Mobile
update: 20180217
version: 180217-02
detected: False cancel

Malwarebytes
update: 20180218
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20180218
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: Trojan.Skeeyah
update: 20180218
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Invader.erhwua
update: 20180218
version: 1.0.100.21498
detected: True check_circle

MicroWorld-eScan
result: Gen:Trojan.Heur.jHW@tXnwQLbHF
update: 20180218
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180218
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Injector.th
update: 20180218
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R023C0OH117
update: 20180218
version: 9.950.0.1006
detected: True check_circle

total
68
sha256
faa082c7d24edbe621ddc3211541c51150cbf12e01643488fe2c8e8b97d4ffe6
scan_id
faa082c7d24edbe621ddc3211541c51150cbf12e01643488fe2c8e8b97d4ffe6-1518959632
resource
82c3fc0ca181d881d812ae4ee8fe9a56
positives
43
scan_date
2018-02-18 13:13:52
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
18/2/2020 - 13:45:52.543Open1480C:\malware.exeC:\notepad.exe
18/2/2020 - 13:45:52.543Open1480C:\malware.exeC:\Monitor\notepad.exe
18/2/2020 - 13:45:52.543Open1480C:\malware.exeC:\Windows\SysWOW64\notepad.exe
18/2/2020 - 13:45:52.543Open1480C:\malware.exeC:\Windows\SysWOW64\notepad.exe
18/2/2020 - 13:45:52.543Open1480C:\malware.exeC:\Windows\SysWOW64\notepad.exe
18/2/2020 - 13:45:52.543Open1480C:\malware.exeC:\Windows\SysWOW64\apphelp.dll
18/2/2020 - 13:45:52.543Open1480C:\malware.exeC:\Windows\SysWOW64\apphelp.dll
18/2/2020 - 13:45:52.543Open1480C:\malware.exeC:\Windows\AppPatch\sysmain.sdb
18/2/2020 - 13:45:52.543Open1480C:\malware.exeC:\Windows\SysWOW64
18/2/2020 - 13:45:52.543Unknown1480C:\malware.exeC:\Windows\SysWOW64
18/2/2020 - 13:45:52.543Open1480C:\malware.exeC:\Windows\SysWOW64\notepad.exe
18/2/2020 - 13:45:52.543Open1480C:\malware.exeC:\
18/2/2020 - 13:45:52.543Unknown1480C:\malware.exeC:\
18/2/2020 - 13:45:52.543Open1480C:\malware.exeC:\Windows
18/2/2020 - 13:45:52.543Unknown1480C:\malware.exeC:\Windows
18/2/2020 - 13:45:52.543Open1480C:\malware.exeC:\Windows\SysWOW64
18/2/2020 - 13:45:52.543Unknown1480C:\malware.exeC:\Windows\SysWOW64
18/2/2020 - 13:45:52.543Open1480C:\malware.exeC:\Windows\SysWOW64
18/2/2020 - 13:45:52.559Unknown1480C:\malware.exeC:\Windows\SysWOW64
18/2/2020 - 13:45:52.559Open1480C:\malware.exeC:\Windows\SysWOW64\notepad.exe
18/2/2020 - 13:45:52.559Read1480C:\malware.exeC:\Windows\SysWOW64\notepad.exe
18/2/2020 - 13:45:52.559Read1480C:\malware.exeC:\Windows\SysWOW64\notepad.exe
18/2/2020 - 13:45:52.559Read1480C:\malware.exeC:\Windows\SysWOW64\notepad.exe
18/2/2020 - 13:45:52.559Open1480C:\malware.exeC:\Windows\SysWOW64\ui\SwDRM.dll
18/2/2020 - 13:45:52.559Open1480C:\malware.exeC:\Windows\System32\DriverStore\FileRepository\tkbtnpn.inf_061cd165\lencins.dll
18/2/2020 - 13:45:52.559Open1480C:\malware.exeC:\Program Files (x86)\Common Files\microsoft shared\ink\mshwusa.dll
18/2/2020 - 13:45:52.653Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\Prefetch\NOTEPAD.EXE-1605FA5B.pf
18/2/2020 - 13:45:52.653Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows
18/2/2020 - 13:45:52.653Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\System32\wow64.dll
18/2/2020 - 13:45:52.653Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\System32\wow64.dll
18/2/2020 - 13:45:52.653Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\System32\wow64win.dll
18/2/2020 - 13:45:52.653Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\System32\wow64win.dll
18/2/2020 - 13:45:52.653Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\System32\wow64cpu.dll
18/2/2020 - 13:45:52.653Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\System32\wow64cpu.dll
18/2/2020 - 13:45:52.653Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\System32\wow64log.dll
18/2/2020 - 13:45:52.653Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows
18/2/2020 - 13:45:52.653Unknown2136C:\Windows\SysWOW64\notepad.exeC:\Windows
18/2/2020 - 13:45:52.653Open2136C:\Windows\SysWOW64\notepad.exeC:\Monitor
18/2/2020 - 13:45:52.653Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\sechost.dll
18/2/2020 - 13:45:52.653Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\sechost.dll
18/2/2020 - 13:45:52.653Read2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe
18/2/2020 - 13:45:52.668Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe.Local
18/2/2020 - 13:45:52.668Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 13:45:52.668Unknown2136C:\Windows\SysWOW64\notepad.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 13:45:52.668Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 13:45:52.668Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
18/2/2020 - 13:45:52.668Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
18/2/2020 - 13:45:52.668Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\winspool.drv
18/2/2020 - 13:45:52.668Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\winspool.drv
18/2/2020 - 13:45:52.668Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\version.dll
18/2/2020 - 13:45:52.668Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\version.dll
18/2/2020 - 13:45:52.668Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\imm32.dll
18/2/2020 - 13:45:52.668Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\imm32.dll
18/2/2020 - 13:45:52.684Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\imm32.dll
18/2/2020 - 13:45:52.684Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\imm32.dll
18/2/2020 - 13:45:52.684Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\imm32.dll
18/2/2020 - 13:45:52.684Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\imm32.dll
18/2/2020 - 13:45:52.684Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\WindowsShell.Manifest
18/2/2020 - 13:45:52.684Unknown2136C:\Windows\SysWOW64\notepad.exeC:\Windows\WindowsShell.ManifestWindowsShell.Manifest
18/2/2020 - 13:45:52.684Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\rpcss.dll
18/2/2020 - 13:45:52.684Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\rpcss.dll
18/2/2020 - 13:45:52.684Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\uxtheme.dll
18/2/2020 - 13:45:52.684Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\uxtheme.dll
18/2/2020 - 13:45:52.731Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\dwmapi.dll
18/2/2020 - 13:45:52.731Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\dwmapi.dll
18/2/2020 - 13:45:52.731Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\Fonts\StaticCache.dat
18/2/2020 - 13:45:52.731Read2136C:\Windows\SysWOW64\notepad.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
18/2/2020 - 13:45:52.731Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\Globalization\Sorting\SortDefault.nls
18/2/2020 - 13:45:52.731Unknown2136C:\Windows\SysWOW64\notepad.exeC:\Windows\Globalization\Sorting\SortDefault.nlsSortDefault.nls
18/2/2020 - 13:45:52.731Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\uxtheme.dll.Config
18/2/2020 - 13:45:52.731Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\uxtheme.dll
18/2/2020 - 13:45:52.731Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe.Local
18/2/2020 - 13:45:52.731Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 13:45:52.731Unknown2136C:\Windows\SysWOW64\notepad.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 13:45:52.731Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 13:45:52.731Unknown2136C:\Windows\SysWOW64\notepad.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 13:45:52.731Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe.Local
18/2/2020 - 13:45:52.731Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 13:45:52.731Unknown2136C:\Windows\SysWOW64\notepad.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 13:45:52.731Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 13:45:52.731Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\Fonts\lucon.ttf
18/2/2020 - 13:45:52.731Open2136C:\Windows\SysWOW64\notepad.exeC:\Windows\Fonts\lucon.ttf
18/2/2020 - 13:45:52.778Open2136C:\Windows\SysWOW64\notepad.exeC:\Applicatios.dll
18/2/2020 - 13:45:52.965Unknown1480C:\malware.exeC:\Windows
18/2/2020 - 13:45:52.965Unknown1480C:\malware.exeC:\Monitor
18/2/2020 - 13:45:52.965Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 13:45:52.965Unknown1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
18/2/2020 - 13:45:52.965Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.7600.16385_pt-br_59b90943c4d9db88
18/2/2020 - 13:45:52.965Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.7600.16385_pt-br_59b90943c4d9db88\comctl32.dll.muicomctl32.dll.mui

Process
Trace
18/2/2020 - 13:45:52.543Create1480C:\malware.exe2136C:\Windows\SysWOW64\notepad.exe

Analysis
Reason
Finished

Status
Sucessfully Executed

Results
1

Registry
Trace

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: True check_circle

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: False cancel

Deleted
Identified: False cancel

Browsers
Identified: False cancel

Internet
Identified: False cancel

Loading...

DNS
Query

Response

TCP
Info

UDP
Info

HTTP
Info

Summary
DNS
False cancel

TCP
False cancel

UDP
False cancel

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 55.92%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 96.70%
suspicious: False cancel

Random Forest (100 estimators, NFS-BRMalware)
confidence: 61.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 43.57%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 99.50%
suspicious: False cancel

Add to Collection
Download