Report #686 check_circle

  • Creation Date: Oct. 19, 2019, 2:21 a.m.
  • Last Update: Oct. 19, 2019, 5:17 a.m.
  • File: 034
  • Results:
Binary
DLL
False cancel
Size
2.20MB
trid
35.3% Win32 EXE PECompact compressed
26.5% Win32 Executable MS Visual C++
23.5% Win64 Executable
5.5% Win32 Dynamic Link Library
3.8% Win32 Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
1b8f9247397c5c26037971d00e6dc468
sha1
77ab0d7cda530e6d9f59153b57cdef79c93acb9d
crc32
0x648f21c1
sha224
2e7249d96aa38ac019d4bd625148fa4efb95e4f71236121566d16c35
sha256
93449440bac849a73f7b5c9f71b326823c20ef7e6a727660471c9b1768c0f557
sha384
510f7d5782d9596ff435da6e1c7d0ad0af8bac144cde2f835265fb76df640be584ae54453f2d62b081c3261c9dff76a9
sha512
78d7ef03e335dc1c51feaa02bc0d4371dc86a8a00fbab6f2bfdad5029445ebbc57ba0c0d56a6df6e739d35f4c317d7427fa28b425af1219315de80ae046e256d
ssdeep
49152:3Ugxr/nIiYWMf9dQnPoY20k0XgBq/bPEUpPhOZy+hz7FFUj9SD+swIOTKqujA+5E:3I5jKNOj+7
Community
Google
True check_circle
HashLib
False cancel
YARA
Matches
IP, win_private_profile, Dropper_Strings, Intel_Virtualization_Wizard_exe, BASE64_table, escalate_priv, HasRichSignature, VC8_Microsoft_Corporation, DebuggerException__SetConsoleCtrl, spreading_share, create_service, antisb_threatExpert, network_dns, cred_local, network_http, win_files_operation, IsPE32, win_hook, disable_dep, contentis_base64, network_tcp_socket, SEH__vectored, screenshot, win_token, win_mutex, keylogger, DebuggerCheck__GlobalFlags, Misc_Suspicious_Strings, migrate_apc, IsWindowsGUI, Big_Numbers5, DebuggerHiding__Thread, network_udp_sock, anti_dbg, network_tcp_listen, DebuggerCheck__QueryInfo, url, android_meterpreter, Microsoft_Visual_Cpp_8, win_registry, Typical_Malware_String_Transforms, HasOverlay, network_dga, Advapi_Hash_API, Check_Dlls, System_Tools, create_com_service, powershell, Big_Numbers0

Suspicious
True check_circle

Strings
List
<rdf:Description rdf:about="uuid:b58a55db-7817-11dc-b3b7-80a45141ec24" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:cf09c8e3-7814-11dc-b3b7-80a45141ec24" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:880b6202-923d-11dc-bf0f-889ae1191ecf" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:6f03c386-7819-11dc-b3b7-80a45141ec24" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:b1be9614-923d-11dc-bf0f-889ae1191ecf" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:9ec20a53-923d-11dc-bf0f-889ae1191ecf" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:0bbddd83-7818-11dc-b3b7-80a45141ec24" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:0bbddd7d-7818-11dc-b3b7-80a45141ec24" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:df90b7af-923d-11dc-bf0f-889ae1191ecf" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:0bbddd7d-7818-11dc-b3b7-80a45141ec24" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:0bbddd83-7818-11dc-b3b7-80a45141ec24" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:b58a55db-7817-11dc-b3b7-80a45141ec24" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:6f03c386-7819-11dc-b3b7-80a45141ec24" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:70e4755a-7818-11dc-b3b7-80a45141ec24" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:cf09c8e3-7814-11dc-b3b7-80a45141ec24" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:6f03c386-7819-11dc-b3b7-80a45141ec24" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:b58a55db-7817-11dc-b3b7-80a45141ec24" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:70e47554-7818-11dc-b3b7-80a45141ec24" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:70e47554-7818-11dc-b3b7-80a45141ec24" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:70e4755a-7818-11dc-b3b7-80a45141ec24" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:1acf7d56-923e-11dc-bf0f-889ae1191ecf" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:70e4755a-7818-11dc-b3b7-80a45141ec24" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:70e47554-7818-11dc-b3b7-80a45141ec24" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
</dc:rights></rdf:Description><rdf:Description rdf:about="uuid:faf5bdd5-ba3d-11da-ad31-d33d75182f1b" xmlns:tiff="http://ns.adobe.com/tiff/1.0/"/><rdf:Description rdf:about="uuid:faf5bdd5-ba3d-11da-ad31-d33d75182f1b" xmlns:exif="http://ns.adobe.com/exif/1.0/"/></rdf:RDF></x:xmpmeta>
</dc:rights></rdf:Description><rdf:Description rdf:about="uuid:faf5bdd5-ba3d-11da-ad31-d33d75182f1b" xmlns:tiff="http://ns.adobe.com/tiff/1.0/"/><rdf:Description rdf:about="uuid:faf5bdd5-ba3d-11da-ad31-d33d75182f1b" xmlns:exif="http://ns.adobe.com/exif/1.0/"/></rdf:RDF></x:xmpmeta>
<rdf:Description rdf:about="uuid:880b6202-923d-11dc-bf0f-889ae1191ecf" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:df90b7af-923d-11dc-bf0f-889ae1191ecf" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:c8e53c53-923d-11dc-bf0f-889ae1191ecf" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:b1be9614-923d-11dc-bf0f-889ae1191ecf" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:c8e53c53-923d-11dc-bf0f-889ae1191ecf" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:b1be9614-923d-11dc-bf0f-889ae1191ecf" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:9ec20a53-923d-11dc-bf0f-889ae1191ecf" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:9ec20a53-923d-11dc-bf0f-889ae1191ecf" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:1acf7d56-923e-11dc-bf0f-889ae1191ecf" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:cf09c8e3-7814-11dc-b3b7-80a45141ec24" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:880b6202-923d-11dc-bf0f-889ae1191ecf" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:df90b7af-923d-11dc-bf0f-889ae1191ecf" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:1acf7d56-923e-11dc-bf0f-889ae1191ecf" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:9ec20a53-923d-11dc-bf0f-889ae1191ecf" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:b1be9614-923d-11dc-bf0f-889ae1191ecf" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:df90b7af-923d-11dc-bf0f-889ae1191ecf" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:c8e53c53-923d-11dc-bf0f-889ae1191ecf" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:1acf7d56-923e-11dc-bf0f-889ae1191ecf" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:b58a55db-7817-11dc-b3b7-80a45141ec24" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:cf09c8e3-7814-11dc-b3b7-80a45141ec24" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:70e47554-7818-11dc-b3b7-80a45141ec24" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:6f03c386-7819-11dc-b3b7-80a45141ec24" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:70e4755a-7818-11dc-b3b7-80a45141ec24" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:880b6202-923d-11dc-bf0f-889ae1191ecf" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:c8e53c53-923d-11dc-bf0f-889ae1191ecf" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:0bbddd7d-7818-11dc-b3b7-80a45141ec24" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:0bbddd83-7818-11dc-b3b7-80a45141ec24" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:0bbddd83-7818-11dc-b3b7-80a45141ec24" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:0bbddd7d-7818-11dc-b3b7-80a45141ec24" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:c8e53c53-923d-11dc-bf0f-889ae1191ecf" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:9ec20a53-923d-11dc-bf0f-889ae1191ecf" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:b1be9614-923d-11dc-bf0f-889ae1191ecf" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:880b6202-923d-11dc-bf0f-889ae1191ecf" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:df90b7af-923d-11dc-bf0f-889ae1191ecf" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:1acf7d56-923e-11dc-bf0f-889ae1191ecf" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:c8e53c53-923d-11dc-bf0f-889ae1191ecf" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:b1be9614-923d-11dc-bf0f-889ae1191ecf" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:cf09c8e3-7814-11dc-b3b7-80a45141ec24" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:b58a55db-7817-11dc-b3b7-80a45141ec24" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:6f03c386-7819-11dc-b3b7-80a45141ec24" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:9ec20a53-923d-11dc-bf0f-889ae1191ecf" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:70e47554-7818-11dc-b3b7-80a45141ec24" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:880b6202-923d-11dc-bf0f-889ae1191ecf" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:1acf7d56-923e-11dc-bf0f-889ae1191ecf" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:df90b7af-923d-11dc-bf0f-889ae1191ecf" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:70e4755a-7818-11dc-b3b7-80a45141ec24" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:cf09c8e3-7814-11dc-b3b7-80a45141ec24" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:6f03c386-7819-11dc-b3b7-80a45141ec24" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:70e4755a-7818-11dc-b3b7-80a45141ec24" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:70e47554-7818-11dc-b3b7-80a45141ec24" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:b58a55db-7817-11dc-b3b7-80a45141ec24" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:0bbddd7d-7818-11dc-b3b7-80a45141ec24" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:0bbddd83-7818-11dc-b3b7-80a45141ec24" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:0bbddd7d-7818-11dc-b3b7-80a45141ec24" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:0bbddd83-7818-11dc-b3b7-80a45141ec24" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
qhttp://ns.adobe.com/xap/1.0/
qhttp://ns.adobe.com/xap/1.0/
http://ns.adobe.com/xap/1.0/
http://ns.adobe.com/xap/1.0/
http://ns.adobe.com/xap/1.0/
http://ns.adobe.com/xap/1.0/
http://ns.adobe.com/xap/1.0/
http://ns.adobe.com/xap/1.0/
http://ns.adobe.com/xap/1.0/
=http://ns.adobe.com/xap/1.0/
=http://ns.adobe.com/xap/1.0/
=http://ns.adobe.com/xap/1.0/
=http://ns.adobe.com/xap/1.0/
=http://ns.adobe.com/xap/1.0/
=http://ns.adobe.com/xap/1.0/
<rdf:Description rdf:about="uuid:1acf7d56-923e-11dc-bf0f-889ae1191ecf" xmlns:dc="http://purl.org/dc/elements/1.1/">
<dpiAware xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
<dpiAware xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
<dpiAware xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
<dpiAware xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>

Foremost
Matches
0.exe, 204 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: False cancel
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

Files
Allowed: kernel32.dll, mscoree.dll, levusubonaxiwiyovizice.dll, USER32.DLL
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 67584
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 4096
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 214775
Suspicous: False cancel

Sections
Allowed: .text, .rdata, .data, .rsrc, .reloc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 9.0
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 8504
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: kernel32.dll, mscoree.dll, user32.dll
hasLibs: True check_circle
Suspicious: levusubonaxiwiyovizice.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2017-05-09 04:59:59
Future: False cancel

Compilation
Packed: False cancel
Missing: False cancel
Packers
Compiled: True check_circle
Compilers: Microsoft Visual C++ 8, VC8 -> Microsoft Corporation

Obfuscation
XOR: True check_circle
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.data: 1
.text: 2
.rdata: 3

pushpopmath
.text: 54
.rdata: 7
.reloc: 3

garbagebytes
.data: 1
.text: 2
.rdata: 2

stealthimport
.text: 1

software breakpoint
.rsrc: 4

programcontrolflowchange
.data: 1
.text: 2
.rdata: 2

cpuinstructionsresultscomparison
.text: 1

AVclass
azorult
1
VirusTotal
md5
1b8f9247397c5c26037971d00e6dc468
sha1
77ab0d7cda530e6d9f59153b57cdef79c93acb9d
SCANS
AVG
result: Win32:Malware-gen
update: 20190906
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20190321
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=83)
update: 20190906
version: 2018.9.12.1
detected: True check_circle

APEX
result: Malicious
update: 20190906
version: 5.60
detected: True check_circle

Bkav
update: 20190903
version: 1.3.0.10239
detected: False cancel

K7GW
update: 20190906
version: 11.65.31928
detected: False cancel

ALYac
result: Gen:Heur.BrResMon.2
update: 20190906
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Malware-gen
update: 20190906
version: 18.4.3895.0
detected: True check_circle

Avira
result: HEUR/AGEN.1037171
update: 20190906
version: 8.3.3.8
detected: True check_circle

Baidu
update: 20190318
version: 1.0.0.2
detected: False cancel

Cyren
update: 20190906
version: 6.2.0.1
detected: False cancel

DrWeb
result: Trojan.PWS.Stealer.24403
update: 20190906
version: 7.0.41.7240
detected: True check_circle

GData
result: Gen:Heur.BrResMon.2
update: 20190906
version: A:25.23285B:26.15960
detected: True check_circle

Panda
result: Trj/Genetic.gen
update: 20190905
version: 4.6.4.2
detected: True check_circle

VBA32
result: TrojanPSW.Azorult
update: 20190905
version: 4.0.0
detected: True check_circle

VIPRE
update: 20190906
version: 77674
detected: False cancel

Zoner
update: 20190906
version: 1.0.0.1
detected: False cancel

ClamAV
result: Win.Ransomware.Gandcrab-7071361-0
update: 20190905
version: 0.101.4.0
detected: True check_circle

Comodo
update: 20190906
version: 31432
detected: False cancel

F-Prot
update: 20190906
version: 4.7.1.166
detected: False cancel

Ikarus
update: 20190905
version: 0.1.5.2
detected: False cancel

McAfee
result: Trojan-FPST!1B8F9247397C
update: 20190906
version: 6.0.6.653
detected: True check_circle

Rising
result: Trojan.Kryptik!1.B426 (CLASSIC)
update: 20190906
version: 25.0.0.24
detected: True check_circle

Sophos
result: Mal/Kryptik-CQ
update: 20190906
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.PWS.Azorult!
update: 20190822
version: 5.5.2.24
detected: True check_circle

Zillya
result: Trojan.Azorult.Win32.9
update: 20190905
version: 2.0.0.3894
detected: True check_circle

Acronis
result: suspicious
update: 20190904
version: 1.1.1.56
detected: True check_circle

Alibaba
result: VirTool:Win32/Obfuscator.8cb89b1b
update: 20190527
version: 0.3.0.5
detected: True check_circle

Arcabit
result: Trojan.BrResMon.2
update: 20190906
version: 1.0.0.856
detected: True check_circle

Cylance
result: Unsafe
update: 20190906
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20190819
version: 3.0.14
detected: True check_circle

FireEye
result: Generic.mg.1b8f9247397c5c26
update: 20190906
version: 29.7.0.0
detected: True check_circle

TACHYON
update: 20190906
version: 2019-09-06.01
detected: False cancel

Tencent
update: 20190906
version: 1.0.0.1
detected: False cancel

ViRobot
update: 20190905
version: 2014.3.20.0
detected: False cancel

Webroot
result: W32.Adware.Installcore
update: 20190906
version: 1.0.0.403
detected: True check_circle

eGambit
result: Trojan.Generic
update: 20190906
version: v5.0.5
detected: True check_circle

Ad-Aware
result: Gen:Heur.BrResMon.2
update: 20190906
version: 3.0.5.370
detected: True check_circle

AegisLab
result: Trojan.Win32.BrResMon.4!c
update: 20190906
version: 4.2
detected: True check_circle

Emsisoft
result: Gen:Heur.BrResMon.2 (B)
update: 20190906
version: 2018.12.0.1641
detected: True check_circle

F-Secure
result: Heuristic.HEUR/AGEN.1037171
update: 20190905
version: 12.0.86.52
detected: True check_circle

Fortinet
result: W32/Kryptik.GLKY!tr
update: 20190906
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20190904
version: 6.3.6.26157
detected: False cancel

Jiangmin
result: Trojan.PSW.Azorult.p
update: 20190906
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20190906
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20190906
version: 1.0
detected: True check_circle

Symantec
result: Packed.Generic.525
update: 20190906
version: 1.10.0.0
detected: True check_circle

Trapmine
result: malicious.high.ml.score
update: 20190826
version: 3.1.81.800
detected: True check_circle

AhnLab-V3
result: Trojan/Win32.Gandcrab.R238452
update: 20190906
version: 3.16.1.25089
detected: True check_circle

Antiy-AVL
result: Trojan[PSW]/Win32.Azorult
update: 20190906
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: UDS:DangerousObject.Multi.Generic
update: 20190906
version: 15.0.1.13
detected: True check_circle

Microsoft
result: VirTool:Win32/Obfuscator.CAQ
update: 20190906
version: 1.1.16300.1
detected: True check_circle

Qihoo-360
update: 20190906
version: 1.0.0.1120
detected: False cancel

ZoneAlarm
update: 20190906
version: 1.0
detected: False cancel

Cybereason
result: malicious.7397c5
update: 20190616
version: 1.2.449
detected: True check_circle

ESET-NOD32
result: a variant of Win32/Kryptik.GLFZ
update: 20190906
version: 19974
detected: True check_circle

TrendMicro
update: 20190906
version: 11.0.0.1006
detected: False cancel

BitDefender
result: Gen:Heur.BrResMon.2
update: 20190906
version: 7.2
detected: True check_circle

CrowdStrike
result: win/malicious_confidence_90% (W)
update: 20190702
version: 1.0
detected: True check_circle

K7AntiVirus
update: 20190906
version: 11.65.31928
detected: False cancel

SentinelOne
result: DFI - Malicious PE
update: 20190807
version: 1.0.31.22
detected: True check_circle

Avast-Mobile
update: 20190905
version: 190905-02
detected: False cancel

Malwarebytes
result: Trojan.MalPack.GS
update: 20190906
version: 2.1.1.1115
detected: True check_circle

TotalDefense
update: 20190905
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: Trojan.ObfuscatorPMF.S3990684
update: 20190905
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Azorult.finwxn
update: 20190906
version: 1.0.134.24859
detected: True check_circle

MicroWorld-eScan
result: Gen:Heur.BrResMon.2
update: 20190906
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20190830
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.PUPXAB.vh
update: 20190906
version: v2017.3010
detected: True check_circle

TrendMicro-HouseCall
update: 20190906
version: 10.0.0.1040
detected: False cancel

total
70
sha256
93449440bac849a73f7b5c9f71b326823c20ef7e6a727660471c9b1768c0f557
scan_id
93449440bac849a73f7b5c9f71b326823c20ef7e6a727660471c9b1768c0f557-1567748857
resource
1b8f9247397c5c26037971d00e6dc468
positives
47
scan_date
2019-09-06 05:47:37
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
19/10/2019 - 4:45:44.481Open1480C:\malware.exeC:\msvcr100.dll
19/10/2019 - 4:45:44.481Open1480C:\malware.exeC:\Windows\SysWOW64\msvcr100.dll
19/10/2019 - 4:45:44.481Open1480C:\malware.exeC:\Windows\system\msvcr100.dll
19/10/2019 - 4:45:44.481Open1480C:\malware.exeC:\Windows\msvcr100.dll
19/10/2019 - 4:45:44.481Open1480C:\malware.exeC:\Monitor\msvcr100.dll
19/10/2019 - 4:45:44.481Open1480C:\malware.exeC:\Windows\SysWOW64\msvcr100.dll
19/10/2019 - 4:45:44.481Open1480C:\malware.exeC:\Windows\msvcr100.dll
19/10/2019 - 4:45:44.481Open1480C:\malware.exeC:\Windows\SysWOW64\wbem\msvcr100.dll
19/10/2019 - 4:45:44.528Open1480C:\malware.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\msvcr100.dll
19/10/2019 - 4:45:44.528Open1480C:\malware.exeC:\crtdll.dll
19/10/2019 - 4:45:44.528Open1480C:\malware.exeC:\Windows\SysWOW64\crtdll.dll
19/10/2019 - 4:45:44.575Open1480C:\malware.exeC:\Windows\SysWOW64\crtdll.dll
19/10/2019 - 4:45:44.950Open1480C:\malware.exeC:\Windows\SysWOW64\tzres.dll
19/10/2019 - 4:45:44.950Open1480C:\malware.exeC:\Windows\SysWOW64\tzres.dll
19/10/2019 - 4:45:44.950Open1480C:\malware.exeC:\Windows\SysWOW64\tzres.dll
19/10/2019 - 4:45:44.950Open1480C:\malware.exeC:\Windows\SysWOW64\tzres.dll
19/10/2019 - 4:45:44.950Open1480C:\malware.exeC:\malware.exe.Local
19/10/2019 - 4:45:44.950Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23407_none_5c02a2f5a011f9be
19/10/2019 - 4:45:44.997Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23407_none_5c02a2f5a011f9be
19/10/2019 - 4:45:44.997Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23407_none_5c02a2f5a011f9be
19/10/2019 - 4:45:44.997Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23407_none_5c02a2f5a011f9be\GdiPlus.dll
19/10/2019 - 4:45:45.43Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23407_none_5c02a2f5a011f9be\GdiPlus.dll
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\version.DLL
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Windows\SysWOW64\version.dll
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Windows\SysWOW64\version.dll
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Secur32.dll
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nls
19/10/2019 - 4:45:45.90Unknown1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nlsSortDefault.nls
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
19/10/2019 - 4:45:45.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
19/10/2019 - 4:45:45.90Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
19/10/2019 - 4:45:45.90Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot
19/10/2019 - 4:45:45.90Unknown1480C:\malware.exeC:\Users\Behemot
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/10/2019 - 4:45:45.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
19/10/2019 - 4:45:45.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
19/10/2019 - 4:45:45.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot
19/10/2019 - 4:45:45.90Unknown1480C:\malware.exeC:\Users\Behemot
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
19/10/2019 - 4:45:45.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
19/10/2019 - 4:45:45.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
19/10/2019 - 4:45:45.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot
19/10/2019 - 4:45:45.90Unknown1480C:\malware.exeC:\Users\Behemot
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/10/2019 - 4:45:45.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
19/10/2019 - 4:45:45.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
19/10/2019 - 4:45:45.106Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
19/10/2019 - 4:45:45.106Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
19/10/2019 - 4:45:45.106Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
19/10/2019 - 4:45:45.168Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
19/10/2019 - 4:45:45.168Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
19/10/2019 - 4:45:45.168Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
19/10/2019 - 4:45:45.168Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
19/10/2019 - 4:45:45.168Open1480C:\malware.exeC:\IPHLPAPI.DLL
19/10/2019 - 4:45:45.168Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
19/10/2019 - 4:45:45.168Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
19/10/2019 - 4:45:45.168Open1480C:\malware.exeC:\WINNSI.DLL
19/10/2019 - 4:45:45.168Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
19/10/2019 - 4:45:45.168Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
19/10/2019 - 4:45:45.168Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
19/10/2019 - 4:45:45.168Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
19/10/2019 - 4:45:45.168Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
19/10/2019 - 4:45:45.168Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
19/10/2019 - 4:45:45.168Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
19/10/2019 - 4:45:45.168Open1480C:\malware.exeC:\DNSAPI.dll
19/10/2019 - 4:45:45.168Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
19/10/2019 - 4:45:45.168Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
19/10/2019 - 4:45:45.278Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
19/10/2019 - 4:45:45.278Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
19/10/2019 - 4:45:45.325Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
19/10/2019 - 4:45:45.325Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
19/10/2019 - 4:45:45.325Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
19/10/2019 - 4:45:45.325Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
19/10/2019 - 4:45:45.372Open1480C:\malware.exeC:\dhcpcsvc6.DLL
19/10/2019 - 4:45:45.372Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
19/10/2019 - 4:45:45.372Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
19/10/2019 - 4:45:45.372Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
19/10/2019 - 4:45:45.372Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\CRYPTSP.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\RpcRtRemote.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
19/10/2019 - 4:45:45.418Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
19/10/2019 - 4:45:45.418Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\dhcpcsvc.DLL
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
19/10/2019 - 4:45:45.418Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
19/10/2019 - 4:45:45.481Open1480C:\malware.exeC:\rasadhlp.dll
19/10/2019 - 4:45:45.481Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
19/10/2019 - 4:45:45.481Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
19/10/2019 - 4:45:45.528Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
19/10/2019 - 4:45:45.528Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
19/10/2019 - 4:45:46.590Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
19/10/2019 - 4:45:46.590Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
19/10/2019 - 4:45:47.122Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
19/10/2019 - 4:45:47.122Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\malware.exe.Local
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
19/10/2019 - 4:45:47.200Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\WindowsShell.Manifest
19/10/2019 - 4:45:47.200Unknown1480C:\malware.exeC:\Windows\WindowsShell.ManifestWindowsShell.Manifest
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
19/10/2019 - 4:45:47.200Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
19/10/2019 - 4:45:48.28Open1480C:\malware.exeC:\wsock32.dll
19/10/2019 - 4:45:48.43Open1480C:\malware.exeC:\Windows\SysWOW64\wsock32.dll
19/10/2019 - 4:45:48.43Open1480C:\malware.exeC:\Windows\SysWOW64\wsock32.dll
19/10/2019 - 4:45:48.43Open1480C:\malware.exeC:\Windows\SysWOW64\NapiNSP.dll
19/10/2019 - 4:45:48.43Open1480C:\malware.exeC:\Windows\SysWOW64\NapiNSP.dll
19/10/2019 - 4:45:48.43Open1480C:\malware.exeC:\Windows\SysWOW64\pnrpnsp.dll
19/10/2019 - 4:45:48.43Open1480C:\malware.exeC:\Windows\SysWOW64\pnrpnsp.dll
19/10/2019 - 4:45:48.75Open1480C:\malware.exeC:\Windows\SysWOW64\winrnr.dll
19/10/2019 - 4:45:48.75Open1480C:\malware.exeC:\Windows\SysWOW64\winrnr.dll
19/10/2019 - 4:45:50.12Unknown1480C:\malware.exeC:\Windows
19/10/2019 - 4:45:50.12Unknown1480C:\malware.exeC:\Monitor
19/10/2019 - 4:45:50.12Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23407_none_5c02a2f5a011f9be
19/10/2019 - 4:45:50.12Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
19/10/2019 - 4:45:50.12Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d

Process
Trace

Analysis
Reason
Finished

Status
Sucessfully Executed

Results
1

Registry
Trace
19/10/2019 - 4:45:45.90Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
19/10/2019 - 4:45:45.90Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
19/10/2019 - 4:45:45.90Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
19/10/2019 - 4:45:45.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
19/10/2019 - 4:45:45.168Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
19/10/2019 - 4:45:45.168Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
19/10/2019 - 4:45:45.168Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
19/10/2019 - 4:45:45.168Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
19/10/2019 - 4:45:45.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
19/10/2019 - 4:45:45.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
19/10/2019 - 4:45:45.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
19/10/2019 - 4:45:45.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
19/10/2019 - 4:45:45.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
19/10/2019 - 4:45:45.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
19/10/2019 - 4:45:45.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
19/10/2019 - 4:45:45.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
19/10/2019 - 4:45:45.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
19/10/2019 - 4:45:45.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
19/10/2019 - 4:45:45.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
19/10/2019 - 4:45:45.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
19/10/2019 - 4:45:45.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
19/10/2019 - 4:45:46.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
19/10/2019 - 4:45:46.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
19/10/2019 - 4:45:46.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
19/10/2019 - 4:45:46.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
19/10/2019 - 4:45:46.825Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
19/10/2019 - 4:45:46.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
19/10/2019 - 4:45:46.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
19/10/2019 - 4:45:46.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
19/10/2019 - 4:45:46.825Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
19/10/2019 - 4:45:46.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
19/10/2019 - 4:45:46.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
19/10/2019 - 4:45:46.825Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
19/10/2019 - 4:45:46.825Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:DNS code nagoyashi.chimkent.su.
computer localhost arrow_forward computer gateway:50273 code nagoyashi.chimkent.su.

Response
computer gateway:DNS arrow_forward computer localhost code nagoyashi.chimkent.su. reply_all 178.210.89.119


TCP
Info
computer localhost:65191 arrow_forward 178.210.89.119:80
computer localhost:65192 arrow_forward 178.210.89.119:80
178.210.89.119:80 arrow_forward computer localhost:65191
178.210.89.119:80 arrow_forward computer localhost:65192

UDP
Info
computer localhost:55394 arrow_forward computer localhost:53
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:53 arrow_forward computer localhost:55394
computer localhost:67 arrow_forward computer localhost:68
computer localhost:68 arrow_forward help_outline 255.255.255.255:67

HTTP
Info
computer localhost send POST nagoyashi.chimkent.su attach_file /index.php

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
True check_circle

Results
KNN (K=3, NFS-BRMalware)
confidence: 66.67%
suspicious: True check_circle
Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: False cancel
SVC (Kernel=Linear, NFS-BRMalware)
confidence: 97.05%
suspicious: False cancel
Random Forest (100 estimators, NFS-BRMalware)
confidence: 53.00%
suspicious: True check_circle
Add to Collection
Download