Report #6646 check_circle

  • Creation Date: Feb. 18, 2020, 1:39 p.m.
  • Last Update: Feb. 18, 2020, 6:34 p.m.
  • File: IMG-20161224-WA0019.exe
  • Results:
Binary
DLL
False cancel
Size
2.46MB
trid
34.2% DOS Borland compiled Executable
22.5% Win32 Dynamic Link Library
15.4% Win32 Executable
7.0% Win16/32 Executable Delphi generic
6.9% OS/2 Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
75be6f9fda75aed3080751f4dbeacad0
sha1
a907ed4f6c6bc958edcc85cfed45aefda6422e71
crc32
0x3edc55d7
sha224
a3337f9881ee52f56eba687056e91a9a3a6d336822a6d3e753a26c61
sha256
8c6147807dbfe24f9d3ae4850e06b84376f098a2edb32f8f51e2b55b68a81513
sha384
05851ac6adf5bae1f7a72316fd716fb7dd1ea42ec33d3617e04c7399d4eae4ee34df3caeb7aa3766938e09ac3c997237
sha512
362c95da02069a12febf23e5fd6111db6fb17caceb699bb33c19461fd341ec8090f8681e127552f3349d9006cadae1d715b61589da20ab060ecaebfe3e292d9b
ssdeep
49152:2QKcbISEQIuES+Ct4niER8mbGzZTdE8GUjqmrXOXodtcDcXe:EuE7niU8mb23xj3qXodtv
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, CRC32_poly_Constant, OpenSSL_DSA, yodas_Protector_v1033_dllocx_Ashkbiz_Danehkar_h, network_ssl, BASE64_table, VC8_Random, Borland, RIPEMD160_Constants, borland_delphi, Delphi_FormShow, CRC32_table, win_files_operation, IsPE32, RijnDael_AES_CHAR, IP, contentis_base64, IsPacked, Delphi_Random, IsWindowsGUI, url, SHA1_Constants, RijnDael_AES_LONG, MD5_Constants

Suspicious
True check_circle

Strings
List
the appropriate version of this product at http://www.componentace.com
Web site: http://www.componentace.com
http://www.indyproject.org/
C:\Builds\TP\indysockets\lib\System\IdStreamVCL.pas
C:\Builds\TP\indysockets\lib\System\IdStreamVCL.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdStack.pas
C:\Builds\TP\indysockets\lib\System\IdStack.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
t.Ht
h.yE
C:\Builds\TP\indysockets\lib\Core\IdIOHandlerStack.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandlerStack.pas
C:\Builds\TP\indysockets\lib\Core\IdScheduler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdThread.pas
C:\Builds\TP\indysockets\lib\Protocols\IdCoder3to4.pas
0.0.0.0:0
Invalid compressed size, rfs.size = %d, count = %d
feel free to contact us at support@componentace.com
libssl32.dll
ssleay32.dll
A.lY
h.HN
A.PW
8A.tJ
127.0.0.1
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" publicKeyToken="6595b64144ccf1df" language="*" processorArchitecture="*"/>
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
_ossl_old_des_ecb_encrypt
Uh.BJ
D.pt a
\Software\Borland\C++Builder
_ossl_old_des_set_key
windowscodecs.dll
\Software\Borland\Delphi
SSL_set_connect_state
Delphi%.8X
Software\Borland\Locales
ISO_646.irv:1991
Software\Borland\Delphi\Locales
winspool.drv
\Software\Borland\BDS
comctl32.dll
comctl32.dll
olepro32.dll
comctl32.dll
libeay32.dll
comctl32.dll
msimg32.dll
comctl32.dll
Wship6.dll
hversion.dll
_ossl_old_des_set_odd_parity
)comctl32.dll
uxtheme.dll
Fwpuclnt.dll
uxtheme.dll
0.0.0.0
0.0.0.1
0.0.0.0
urlmon.dll
urlmon.dll
fSSLLayerClosed
dsPersistentCookieReceived
deactivation.php?hash=
write_hash
Open SSL Support DLL Delphi and C++Builder interface
dsCookieStateUnknown
dsSessionCookieReceived
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes

Foremost
Matches
0.exe, 2 MB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: True check_circle
Allowed: 255.255.255.255, 1, record, 127.0.0.1, 1, localhost.
Suspicious: 0.0.0.1, 0, Unknown
hasAllowed: True check_circle
hasSuspicious: True check_circle

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://www.indyproject.org/, http://www.componentace.com
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: user32.dll, KERNEL32.DLL, uxtheme.dll, MSWSOCK.DLL, libeay32.dll, MAPI32.DLL, mscoree.dll, Fwpuclnt.dll, urlmon.dll, comctl32.dll, Wship6.dll, ssleay32.dll, ole32.dll, libssl32.dll, imm32.dll, oleaut32.dll, WS2_32.DLL, olepro32.dll, windowscodecs.dll, DWMAPI.DLL, msimg32.dll, hversion.dll, advapi32.dll, gdi32.dll, )comctl32.dll, shell32.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 258048
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .text, .itext, .data, .bss, .idata, .didata, .tls, .rdata, .vmp0, .vmp1, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 2425696
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, kernel32.dll, uxtheme.dll, mswsock.dll, mapi32.dll, mscoree.dll, urlmon.dll, comctl32.dll, wship6.dll, ole32.dll, imm32.dll, oleaut32.dll, ws2_32.dll, olepro32.dll, windowscodecs.dll, dwmapi.dll, msimg32.dll, advapi32.dll, gdi32.dll, shell32.dll
hasLibs: True check_circle
Suspicious: libeay32.dll, fwpuclnt.dll, ssleay32.dll, libssl32.dll, hversion.dll, )comctl32.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2017-11-13 13:43:07
Future: False cancel

Compilation
Packed: False cancel
Missing: True check_circle
Packers
Compiled: False cancel
Compilers

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.data: 8
.text: 46
.idata: 9
.itext: 4
.rdata: 2122

pushpopmath
.data: 9
.rsrc: 1
.text: 34
.idata: 3
.rdata: 194
.reloc: 89

ss register
.rdata: 19

garbagebytes
.data: 4
.text: 38
.itext: 4
.rdata: 1828

hookdetection
.text: 3
.rdata: 3
.reloc: 7

software breakpoint
.text: 4
.rdata: 17
.reloc: 37

fakeconditionaljumps
.rdata: 17

programcontrolflowchange
.data: 4
.text: 38
.itext: 4
.rdata: 1811

cpuinstructionsresultscomparison
.data: 7
.text: 29
.rdata: 3
.reloc: 3

AVclass
delf
1
VirusTotal
md5
75be6f9fda75aed3080751f4dbeacad0
sha1
a907ed4f6c6bc958edcc85cfed45aefda6422e71
SCANS (DETECTION RATE = 59.42%)
AVG
result: Win32:Malware-gen
update: 20180929
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20180928
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=100)
update: 20180929
version: 2018.9.12.1
detected: True check_circle

Bkav
result: W32.eHeur.Malware09
update: 20180928
version: 1.3.0.9898
detected: True check_circle

K7GW
result: Trojan-Downloader ( 0051bb921 )
update: 20180928
version: 11.5.28544
detected: True check_circle

ALYac
result: Trojan.GenericKD.12568343
update: 20180929
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Malware-gen
update: 20180929
version: 18.4.3895.0
detected: True check_circle

Avira
result: TR/Downloader.Gen7
update: 20180928
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180928
version: 1.0.0.2
detected: False cancel

Cyren
update: 20180928
version: 6.0.0.4
detected: False cancel

DrWeb
update: 20180928
version: 7.0.33.6080
detected: False cancel

GData
result: Trojan.GenericKD.12568343
update: 20180928
version: A:25.18692B:25.13326
detected: True check_circle

Panda
result: Generic Suspicious
update: 20180928
version: 4.6.4.2
detected: True check_circle

VBA32
result: BScope.Trojan.Cloxer
update: 20180928
version: 3.33.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180929
version: 69922
detected: True check_circle

Zoner
update: 20180927
version: 1.0
detected: False cancel

AVware
update: 20180925
version: 1.6.0.52
detected: False cancel

ClamAV
update: 20180929
version: 0.100.1.0
detected: False cancel

Comodo
update: 20180929
detected: False cancel

F-Prot
update: 20180928
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Delf
update: 20180928
version: 0.1.5.2
detected: True check_circle

McAfee
result: GenericRXDK-GC!75BE6F9FDA75
update: 20180929
version: 6.0.6.653
detected: True check_circle

Rising
result: Downloader.Delf!8.16F (CLOUD)
update: 20180928
version: 25.0.0.24
detected: True check_circle

Sophos
result: Mal/VMProtBad-A
update: 20180928
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.DL.Banload!+jX/ehWvvxo
update: 20180927
version: 5.5.1.3
detected: True check_circle

Zillya
result: Downloader.Delf.Win32.55885
update: 20180928
version: 2.0.0.3658
detected: True check_circle

Alibaba
update: 20180921
version: 0.1.0.2
detected: False cancel

Arcabit
result: Trojan.Generic.DBFC717
update: 20180929
version: 1.0.0.833
detected: True check_circle

Babable
update: 20180918
version: 9107201
detected: False cancel

Cylance
result: Unsafe
update: 20180929
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180730
version: 3.0.1
detected: True check_circle

TACHYON
update: 20180929
version: 2018-09-29.01
detected: False cancel

Tencent
result: Win32.Trojan-downloader.Banload.Aisk
update: 20180929
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180928
version: 2014.3.20.0
detected: False cancel

Webroot
update: 20180929
version: 1.0.0.403
detected: False cancel

eGambit
update: 20180929
detected: False cancel

Ad-Aware
result: Trojan.GenericKD.12568343
update: 20180929
version: 3.0.5.370
detected: True check_circle

AegisLab
result: Troj.Generickd!c
update: 20180929
version: 4.2
detected: True check_circle

Emsisoft
result: Trojan.GenericKD.12568343 (B)
update: 20180929
version: 2018.4.0.1029
detected: True check_circle

F-Secure
result: Trojan.GenericKD.12568343
update: 20180929
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Delf.CGE!tr.dldr
update: 20180929
version: 5.4.247.0
detected: True check_circle

Invincea
result: heuristic
update: 20180717
version: 6.3.5.26121
detected: True check_circle

Jiangmin
update: 20180928
version: 16.0.100
detected: False cancel

Kingsoft
update: 20180929
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180929
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen.2
update: 20180928
version: 1.7.0.0
detected: True check_circle

AhnLab-V3
update: 20180928
version: 3.13.1.21616
detected: False cancel

Antiy-AVL
update: 20180929
version: 3.0.0.1
detected: False cancel

Kaspersky
result: HEUR:Trojan.Win32.Generic
update: 20180928
version: 15.0.1.13
detected: True check_circle

Microsoft
result: Trojan:Win32/Skeeyah.A!bit
update: 20180929
version: 1.1.15300.6
detected: True check_circle

Qihoo-360
result: Win32/Trojan.Downloader.8ec
update: 20180929
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180927
version: 6.8.0.5.3713
detected: False cancel

ZoneAlarm
result: HEUR:Trojan.Win32.Generic
update: 20180925
version: 1.0
detected: True check_circle

Cybereason
result: malicious.fda75a
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Delf.CGE
update: 20180928
version: 18129
detected: True check_circle

TrendMicro
update: 20180928
version: 10.0.0.1040
detected: False cancel

BitDefender
result: Trojan.GenericKD.12568343
update: 20180929
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_100% (D)
update: 20180723
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan-Downloader ( 0051bb921 )
update: 20180928
version: 11.5.28546
detected: True check_circle

SentinelOne
update: 20180926
version: 1.0.19.242
detected: False cancel

Avast-Mobile
update: 20180928
version: 180928-00
detected: False cancel

Malwarebytes
update: 20180928
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20180928
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
update: 20180928
version: 14.00
detected: False cancel

NANO-Antivirus
result: Trojan.Win32.Delf.euynth
update: 20180928
version: 1.0.134.24036
detected: True check_circle

MicroWorld-eScan
result: Trojan.GenericKD.12568343
update: 20180929
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180907
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Generic.vc
update: 20180928
version: v2017.3010
detected: True check_circle

TrendMicro-HouseCall
update: 20180929
version: 10.0.0.1040
detected: False cancel

total
69
sha256
8c6147807dbfe24f9d3ae4850e06b84376f098a2edb32f8f51e2b55b68a81513
scan_id
8c6147807dbfe24f9d3ae4850e06b84376f098a2edb32f8f51e2b55b68a81513-1538185890
resource
75be6f9fda75aed3080751f4dbeacad0
positives
41
scan_date
2018-09-29 01:51:30
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
18/2/2020 - 17:45:43.934Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
18/2/2020 - 17:45:43.934Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
18/2/2020 - 17:45:43.934Open1480C:\malware.exeC:\dwmapi.dll
18/2/2020 - 17:45:43.934Open1480C:\malware.exeC:\Windows\SysWOW64\dwmapi.dll
18/2/2020 - 17:45:43.934Open1480C:\malware.exeC:\Windows\SysWOW64\dwmapi.dll
18/2/2020 - 17:45:43.934Open1480C:\malware.exeC:\Windows\Fonts\StaticCache.dat
18/2/2020 - 17:45:43.934Read1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
18/2/2020 - 17:45:43.934Open1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nls
18/2/2020 - 17:45:43.934Unknown1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nlsSortDefault.nls
18/2/2020 - 17:45:43.965Open1480C:\malware.exeC:\olepro32.dll
18/2/2020 - 17:45:43.965Open1480C:\malware.exeC:\Windows\SysWOW64\olepro32.dll
18/2/2020 - 17:45:43.981Open1480C:\malware.exeC:\Windows\SysWOW64\olepro32.dll
18/2/2020 - 17:45:43.981Open1480C:\malware.exeC:\malware.exe.Local
18/2/2020 - 17:45:43.981Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.7600.16385_pt-br_59b90943c4d9db88
18/2/2020 - 17:45:43.981Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.7600.16385_pt-br_59b90943c4d9db88
18/2/2020 - 17:45:43.981Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.7600.16385_pt-br_59b90943c4d9db88
18/2/2020 - 17:45:43.981Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.7600.16385_pt-br_59b90943c4d9db88\comctl32.dll.mui
18/2/2020 - 17:45:43.981Open1480C:\malware.exeC:\Windows\Fonts\roman.fon
18/2/2020 - 17:45:46.481Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\PAGdrwow8
18/2/2020 - 17:45:47.700Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\PAGdrwow8
18/2/2020 - 17:45:47.700Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 17:45:47.700Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 17:45:47.700Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\PAGdrwow8
18/2/2020 - 17:45:47.700Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\PAGdrwow8
18/2/2020 - 17:45:49.528Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 17:45:49.528Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 17:45:49.528Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 17:45:49.528Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 17:45:49.528Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 17:45:49.528Open1480C:\malware.exeC:\Secur32.dll
18/2/2020 - 17:45:49.528Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
18/2/2020 - 17:45:49.528Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
18/2/2020 - 17:45:49.528Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 17:45:49.528Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 17:45:49.528Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 17:45:49.528Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 17:45:49.528Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 17:45:49.528Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 17:45:49.528Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
18/2/2020 - 17:45:49.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
18/2/2020 - 17:45:49.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
18/2/2020 - 17:45:49.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\IPHLPAPI.DLL
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\WINNSI.DLL
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\DNSAPI.dll
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
18/2/2020 - 17:45:49.590Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 17:45:49.668Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 17:45:49.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 17:45:49.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
18/2/2020 - 17:45:49.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 17:45:49.668Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 17:45:49.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 17:45:49.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 17:45:49.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 17:45:49.668Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 17:45:49.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 17:45:49.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 17:45:49.668Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
18/2/2020 - 17:45:49.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
18/2/2020 - 17:45:49.778Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
18/2/2020 - 17:45:49.778Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
18/2/2020 - 17:45:49.778Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
18/2/2020 - 17:45:49.778Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
18/2/2020 - 17:45:49.825Open1480C:\malware.exeC:\dhcpcsvc6.DLL
18/2/2020 - 17:45:49.825Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
18/2/2020 - 17:45:49.825Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
18/2/2020 - 17:45:49.825Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
18/2/2020 - 17:45:49.825Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\CRYPTSP.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\RpcRtRemote.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
18/2/2020 - 17:45:49.872Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
18/2/2020 - 17:45:49.872Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\dhcpcsvc.DLL
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
18/2/2020 - 17:45:49.872Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
18/2/2020 - 17:45:49.934Open1480C:\malware.exeC:\rasadhlp.dll
18/2/2020 - 17:45:49.934Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
18/2/2020 - 17:45:49.934Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
18/2/2020 - 17:45:49.981Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
18/2/2020 - 17:45:49.981Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
18/2/2020 - 17:45:50.75Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
18/2/2020 - 17:45:50.75Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\malware.exe.Local
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 17:45:50.122Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 17:45:50.122Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 17:45:50.168Open1480C:\malware.exeC:\credssp.dll
18/2/2020 - 17:45:50.168Open1480C:\malware.exeC:\Windows\SysWOW64\credssp.dll
18/2/2020 - 17:45:50.168Open1480C:\malware.exeC:\Windows\SysWOW64\credssp.dll
18/2/2020 - 17:45:50.168Open1480C:\malware.exeC:\Windows\SysWOW64\schannel.dll
18/2/2020 - 17:45:50.168Open1480C:\malware.exeC:\Windows\SysWOW64\schannel.dll
18/2/2020 - 17:45:50.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My
18/2/2020 - 17:45:50.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
18/2/2020 - 17:45:50.168Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
18/2/2020 - 17:45:50.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
18/2/2020 - 17:45:50.168Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
18/2/2020 - 17:45:50.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
18/2/2020 - 17:45:50.168Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
18/2/2020 - 17:45:50.231Open1480C:\malware.exeC:\ncrypt.dll
18/2/2020 - 17:45:50.231Open1480C:\malware.exeC:\Windows\SysWOW64\ncrypt.dll
18/2/2020 - 17:45:50.231Open1480C:\malware.exeC:\Windows\SysWOW64\ncrypt.dll
18/2/2020 - 17:45:50.231Open1480C:\malware.exeC:\bcrypt.dll
18/2/2020 - 17:45:50.231Open1480C:\malware.exeC:\Windows\SysWOW64\bcrypt.dll
18/2/2020 - 17:45:50.231Open1480C:\malware.exeC:\Windows\SysWOW64\bcrypt.dll
18/2/2020 - 17:45:50.231Open1480C:\malware.exeC:\Windows\SysWOW64\bcryptprimitives.dll
18/2/2020 - 17:45:50.231Unknown1480C:\malware.exeC:\Windows\SysWOW64\bcryptprimitives.dllbcryptprimitives.dll
18/2/2020 - 17:45:50.231Open1480C:\malware.exeC:\Windows\SysWOW64\bcryptprimitives.dll
18/2/2020 - 17:45:50.231Unknown1480C:\malware.exeC:\Windows\SysWOW64\bcryptprimitives.dllbcryptprimitives.dll
18/2/2020 - 17:45:50.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
18/2/2020 - 17:45:50.231Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
18/2/2020 - 17:45:50.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
18/2/2020 - 17:45:50.231Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
18/2/2020 - 17:45:50.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
18/2/2020 - 17:45:50.231Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
18/2/2020 - 17:45:50.231Open1480C:\malware.exeC:\GPAPI.dll
18/2/2020 - 17:45:50.247Open1480C:\malware.exeC:\Windows\SysWOW64\gpapi.dll
18/2/2020 - 17:45:50.247Open1480C:\malware.exeC:\Windows\SysWOW64\gpapi.dll
18/2/2020 - 17:45:50.325Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My
18/2/2020 - 17:45:50.325Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
18/2/2020 - 17:45:50.325Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
18/2/2020 - 17:45:50.325Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
18/2/2020 - 17:45:50.325Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
18/2/2020 - 17:45:50.325Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
18/2/2020 - 17:45:50.325Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
18/2/2020 - 17:45:50.325Open1480C:\malware.exeC:\Windows\SysWOW64\p2pcollab.dll
18/2/2020 - 17:45:50.325Unknown1480C:\malware.exeC:\Windows\SysWOW64\p2pcollab.dllp2pcollab.dll
18/2/2020 - 17:45:50.325Open1480C:\malware.exeC:\Windows\SysWOW64\p2pcollab.dll
18/2/2020 - 17:45:50.325Unknown1480C:\malware.exeC:\Windows\SysWOW64\p2pcollab.dllp2pcollab.dll
18/2/2020 - 17:45:50.325Open1480C:\malware.exeC:\Windows\SysWOW64\qagentrt.dll
18/2/2020 - 17:45:50.325Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
18/2/2020 - 17:45:50.325Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
18/2/2020 - 17:45:50.325Open1480C:\malware.exeC:\cryptnet.dll
18/2/2020 - 17:45:50.325Open1480C:\malware.exeC:\Windows\SysWOW64\cryptnet.dll
18/2/2020 - 17:45:50.325Open1480C:\malware.exeC:\Windows\SysWOW64\cryptnet.dll
18/2/2020 - 17:45:50.325Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.325Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.325Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.325Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.325Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:50.325Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:50.340Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.340Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.340Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.340Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.340Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.340Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.340Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.340Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.340Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.340Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_E8BA778045934C3C7879AC75FF5434B4
18/2/2020 - 17:45:50.340Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.340Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.340Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.340Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.340Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:50.340Open1480C:\malware.exeC:\SensApi.dll
18/2/2020 - 17:45:50.340Open1480C:\malware.exeC:\Windows\SysWOW64\SensApi.dll
18/2/2020 - 17:45:50.340Open1480C:\malware.exeC:\Windows\SysWOW64\SensApi.dll
18/2/2020 - 17:45:50.387Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.387Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.387Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.387Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.387Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:50.387Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:50.434Open1480C:\malware.exeC:\WINHTTP.dll
18/2/2020 - 17:45:50.434Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
18/2/2020 - 17:45:50.434Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
18/2/2020 - 17:45:50.434Open1480C:\malware.exeC:\webio.dll
18/2/2020 - 17:45:50.434Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
18/2/2020 - 17:45:50.434Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
18/2/2020 - 17:45:50.434Open1480C:\malware.exeC:\Windows\SysWOW64\pt-BR\KernelBase.dll.mui
18/2/2020 - 17:45:50.606Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.606Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.606Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.606Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.606Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.668Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.668Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.668Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:50.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:50.668Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:50.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:50.668Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.668Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
18/2/2020 - 17:45:50.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
18/2/2020 - 17:45:50.668Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
18/2/2020 - 17:45:50.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
18/2/2020 - 17:45:50.668Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.668Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.668Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.668Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.668Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.668Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.668Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.668Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.668Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.668Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.809Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.809Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.809Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.809Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.809Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.809Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.809Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.809Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.809Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.856Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.856Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.856Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.856Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:50.856Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:50.856Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:50.856Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:50.856Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:50.856Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.856Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
18/2/2020 - 17:45:50.856Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
18/2/2020 - 17:45:50.856Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
18/2/2020 - 17:45:50.856Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
18/2/2020 - 17:45:50.856Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.856Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.856Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.856Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.856Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.856Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.856Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.856Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.856Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.856Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.856Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:50.856Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C778746BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
18/2/2020 - 17:45:51.90Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.90Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.90Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.90Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 17:45:51.90Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 17:45:51.184Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.184Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.184Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.184Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.184Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.184Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
18/2/2020 - 17:45:51.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
18/2/2020 - 17:45:51.184Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
18/2/2020 - 17:45:51.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
18/2/2020 - 17:45:51.184Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.184Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.184Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.184Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.184Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.184Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.184Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.184Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.184Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.184Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.184Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.184Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.200Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.200Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.200Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.200Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.200Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F82CB34DD3343FE727DF8890D352E0D8F
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_D54712FCCE1C1D4D70CFB3C5FDA65711
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D57B3BFF6E0B79FBD8CB6482C7775D35
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C07822D66105396A1B8E01486E66C5F3
18/2/2020 - 17:45:51.262Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.262Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.262Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.262Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.262Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.262Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.497Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.497Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.497Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.497Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.497Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
18/2/2020 - 17:45:51.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
18/2/2020 - 17:45:51.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
18/2/2020 - 17:45:51.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
18/2/2020 - 17:45:51.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
18/2/2020 - 17:45:51.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
18/2/2020 - 17:45:51.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.606Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A8221E698CCB2C296D265AC1A253974E09FD_DE5327EB7625C496EC3F8B0F60A8A822
18/2/2020 - 17:45:51.653Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\PAGdrwow8\8078w063466464
18/2/2020 - 17:45:55.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\PAGdrwow8\8078w063466464
18/2/2020 - 17:45:55.372Open1480C:\malware.exeC:\imageres.dll
18/2/2020 - 17:45:55.372Open1480C:\malware.exeC:\Windows\SysWOW64\imageres.dll
18/2/2020 - 17:45:55.372Open1480C:\malware.exeC:\Windows\SysWOW64\imageres.dll
18/2/2020 - 17:45:55.372Open1480C:\malware.exeC:\Windows\SysWOW64\pt-BR\imageres.dll.mui
18/2/2020 - 17:45:55.372Open1480C:\malware.exeC:\Windows\System32\pt-BR\imageres.dll.mui
18/2/2020 - 17:45:55.372Open1480C:\malware.exeC:\Windows\SysWOW64\pt\imageres.dll.mui
18/2/2020 - 17:45:55.372Open1480C:\malware.exeC:\Windows\SysWOW64\en-US\imageres.dll.mui
18/2/2020 - 17:45:55.372Read1480C:\malware.exeC:\Windows\SysWOW64\en-US\imageres.dll.muiimageres.dll.mui
18/2/2020 - 17:45:55.387Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll
18/2/2020 - 17:45:55.387Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
18/2/2020 - 17:45:49.590Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
18/2/2020 - 17:45:49.590Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
18/2/2020 - 17:45:49.590Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
18/2/2020 - 17:45:49.590Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
18/2/2020 - 17:45:49.590Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
18/2/2020 - 17:45:49.590Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
18/2/2020 - 17:45:49.590Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
18/2/2020 - 17:45:49.590Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
18/2/2020 - 17:45:49.590Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
18/2/2020 - 17:45:49.590Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
18/2/2020 - 17:45:49.590Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
18/2/2020 - 17:45:49.590Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
18/2/2020 - 17:45:49.590Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
18/2/2020 - 17:45:49.590Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
18/2/2020 - 17:45:49.668Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
18/2/2020 - 17:45:49.668Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
18/2/2020 - 17:45:49.668Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
18/2/2020 - 17:45:50.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 17:45:50.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 17:45:50.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 17:45:50.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
18/2/2020 - 17:45:50.325Write1480C:\malware.exeHKCU\Local Settings\MuiCache\5\96383CDBLanguageList
18/2/2020 - 17:45:50.325Write1480C:\malware.exeHKCU\Local Settings\MuiCache\5\96383CDBLanguageList
18/2/2020 - 17:45:50.325Write1480C:\malware.exeHKCU\Local Settings\MuiCache\5\96383CDBLanguageList
18/2/2020 - 17:45:50.325Write1480C:\malware.exeHKCU\Local Settings\MuiCache\5\96383CDBLanguageList
18/2/2020 - 17:45:50.325Write1480C:\malware.exeHKCU\Local Settings\MuiCache\5\96383CDBLanguageList
18/2/2020 - 17:45:51.309Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
18/2/2020 - 17:45:51.309Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
18/2/2020 - 17:45:51.309Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
18/2/2020 - 17:45:51.309Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
18/2/2020 - 17:45:51.309Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
18/2/2020 - 17:45:51.309Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 17:45:51.309Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 17:45:51.309Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 17:45:51.309Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
18/2/2020 - 17:45:51.309Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 17:45:51.309Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 17:45:51.309Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 17:45:51.309Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: True check_circle

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:DNS code crl3.digicert.com.
computer localhost arrow_forward computer gateway:DNS code s3-sa-east-1.amazonaws.com.
computer localhost arrow_forward computer gateway:50273 code s3-sa-east-1.amazonaws.com.

Response
computer gateway:DNS arrow_forward computer localhost code s3-sa-east-1.amazonaws.com. reply_all 52.95.163.54

computer gateway:DNS arrow_forward computer localhost code crl3.digicert.com. reply_all 192.16.58.8


TCP
Info
192.16.58.8:80 arrow_forward computer localhost:65192
computer localhost:65192 arrow_forward 192.16.58.8:80
192.16.58.8:80 arrow_forward computer localhost:65193
computer localhost:65193 arrow_forward 192.16.58.8:80
computer localhost:65191 arrow_forward 52.95.163.54:443
52.95.163.54:443 arrow_forward computer localhost:65191

UDP
Info
computer localhost:55394 arrow_forward computer localhost:53
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:68 arrow_forward help_outline 255.255.255.255:67
computer localhost:53 arrow_forward computer localhost:55394
computer localhost:67 arrow_forward computer localhost:68
computer localhost:53 arrow_forward computer localhost:50273

HTTP
Info
computer localhost send GET crl3.digicert.com attach_file /Omniroot2025.crl
computer localhost send GET ocsp.digicert.com attach_file /MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAGC%2BAmOouYmuRo7J4Qfua8%3D
computer localhost send GET ocsp.digicert.com attach_file /MFEwTzBNMEswSTAJBgUrDgMCGgUABBTuqL92L3tjkN67RNFF%2FEdvT6NEzAQUwBKyKHRoRmfpcCV0GgBFWwZ9XEQCEAledsvjjYwOvmtwTP8GEtM%3D

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
True check_circle

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 66.67%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 85.04%
suspicious: True check_circle

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 59.83%
suspicious: False cancel

Random Forest (100 estimators, NFS-BRMalware)
confidence: 74.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 61.80%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 99.92%
suspicious: True check_circle

Add to Collection
Download