Report #6876 check_circle

Binary
DLL
False cancel
Size
320.39KB
trid
61.7% Win64 Executable
14.7% Win32 Dynamic Link Library
10.0% Win32 Executable
4.5% OS/2 Executable
4.4% Generic Win/DOS Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
4af3db2f8382672f15454ffee40b04b0
sha1
eabc27e4fff3389b31d0fbca5219eb17c345db8e
crc32
0xbbfa3fa3
sha224
52e8bb11a826434ff123291c12374fa5580c1f152df2814e86dcd509
sha256
5ad50ab43e2535d3e3f9d6f8b1de64f46b0c14674725018618d48def4f23582a
sha384
673c117f6063be8e4c0f2170efadc66a68d1014dd72db4122570e0c8dad7ccf9751f95a74520ceb18bbebee4ad2b7065
sha512
aaf4c739d563eb0db7799b3747617b06b9303a42b226ce698b8a4e14c5d5fea3fd99f5323448756d63f7a04ac4a364f1efae6f1aa671e1ad16a6f9805200f552
ssdeep
6144:GaxXe9ZPBNIx/HXSblsa31l2zDrVRKkhFyt+FzhNsn6lSSi3RFB1cpMA:Gaxu9ZPBax/iRsal6NRKkFPFzhNsnFc7
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, HasDigitalSignature, HasDebugData, url, HasRichSignature, contentis_base64, IsPacked, HasOverlay, network_dropper, IsPE32, IsWindowsGUI

Suspicious
True check_circle

Strings
List
Nhttp://icp-brasil2.validcertificadora.com.br/ac-validrfb/lcr-ac-validrfbv2.crl0I
Mhttp://icp-brasil.validcertificadora.com.br/ac-validrfb/lcr-ac-validrfbv2.crl0T
Ihttp://icp-brasil.validcertificadora.com.br/ac-validrfb/ac-validrfbv2.p7b01
Khttp://icp-brasil.validcertificadora.com.br/ac-validrfb/dpc-ac-validrfb.pdf0
Chttp://repositorio.icpbrasil.gov.br/lcr/VALID/lcr-ac-validrfbv2.crl0
%http://ocsp.validcertificadora.com.br0
sales.4@hotmail.com
1http://crl.usertrust.com/UTN-USERFirst-Object.crl05
C:\Users\visual\Desktop\load amig dud rodando\load amig dus tes top\Release\Carrega.pdb
ZeNiX [forum.exetools.com]
ZeNiX [forum.exetools.com]
Zenix Yang [zenix.ccg@gmail.com]Zenix Yang [zenix.ccg@gmail.com]
Zenix Yang [zenix.ccg@gmail.com]Zenix Yang [zenix.ccg@gmail.com]
p.kI
http://www.usertrust.com1
http://www.usertrust.com1
o.Cx
Zj.Bs
<^i.Ice
http://ocsp.usertrust.com0
<m.eln$
urlmon.dll
%AW<)?3_H7
3R%E'
%doWO[
"i%e\~
lA%F-
OO%-ns
]HI%LcE
%uhNb
toJ%ECd
S 1%e
!COMODO SHA-1 Time Stamping Signer0
<requestedPrivileges>
6m/bB.Fo!
T7M.mml
ExitProcess
ShellExecuteW
LoadLibraryA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
COMODO CA Limited1*0(
&o(e
The USERTRUST Network1!0
The USERTRUST Network1!0
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
-Secretaria da Receita Federal do Brasil - RFB1
-Secretaria da Receita Federal do Brasil - RFB1
-Secretaria da Receita Federal do Brasil - RFB1
0 0&0.03090A0F0L0T0Y0_0g0l0r0z0
394A4T4_4d4t4
4!4-464;4A4K4U4e4u4
0 0&040:0H0N0\0e0t0
3 434;4A4F4S4m4
)nRq3nUo
AR PRIMUS1;09
84D4P4\4h4t4
2 282H2L2\2`2d2h2l2t2
aS<1oF}
3e|SV7,
:{T2JRoC
|NIf,'im
0 0$0(0,0004080L0P0T0X0\0`0d0h0l0p0t0x0|0
0$0,040<0D0L0T0\0d0h0p0x0
'ol,3M[
bIa^HWIf
kO_SanCW
fa5./!h
atJ-3#e
2$2,242<2D2L2T2\2d2l2t2|2
3$3,343<3D3L3T3\3d3l3t3|3
s_{aC5m
5i+wS/f
FSi-KW+w/m
ylt?=o4d
ESTANCIA1
0,080\0|0
*(2M/HR;
EngO-#-
h?-ul,O
>;iVa+s
6olRhL=
5#dUfnM
d;Ce:#w
G/C)n<o
BgiN)`.
$el\`VF
0w"DgDPy
Sil<p,ol
$:,:4:<:D:L:T:\:d:l:t:|:
:$:,:4:<:D:L:T:\:d:l:t:|:
>$>,>4><>D>L>T>\>d>l>t>|>
_ChQroO
luOFee&
eBgay/d{
uONs+a]k
fepw;-nO
_IAe=zNH
7atME5AVUu

Foremost
Matches
0.exe, 316 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://www.usertrust.com1, http://icp-brasil.validcertificadora.com.br/ac-validrfb/ac-validrfbv2.p7b01, http://icp-brasil.validcertificadora.com.br/ac-validrfb/dpc-ac-validrfb.pdf0, http://crl.usertrust.com/utn-userfirst-object.crl05, http://icp-brasil.validcertificadora.com.br/ac-validrfb/lcr-ac-validrfbv2.crl0t, http://icp-brasil2.validcertificadora.com.br/ac-validrfb/lcr-ac-validrfbv2.crl0i, http://repositorio.icpbrasil.gov.br/lcr/valid/lcr-ac-validrfbv2.crl0, http://ocsp.usertrust.com0, http://ocsp.validcertificadora.com.br0
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: user32.dll, SHLWAPI.dll, SHELL32.dll, urlmon.dll, KERNEL32.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 76288
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 4096
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 382956
Suspicous: False cancel

Sections
Allowed: .text, .rdata, .data, .vmp0, .vmp1, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 6
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 6
Linker
Version: 12.0
Suspicious: False cancel
Subsystem
Version: 6.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 749574
Suspicious: False cancel

Anomalies
Anomalies
hasAnomalies: False cancel

Libraries
Allowed: user32.dll, shlwapi.dll, shell32.dll, urlmon.dll, kernel32.dll
hasLibs: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2017-08-09 13:58:51
Future: False cancel

Compilation
Packed: False cancel
Missing: True check_circle
Packers
Compiled: False cancel
Compilers

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
none: 159

pushpopmath
none: 95

ss register
none: 3

garbagebytes
none: 71

hookdetection
none: 2

software breakpoint
none: 11

fakeconditionaljumps
none: 5

programcontrolflowchange
none: 67

AVclass
banload
1
VirusTotal
md5
4af3db2f8382672f15454ffee40b04b0
sha1
eabc27e4fff3389b31d0fbca5219eb17c345db8e
SCANS (DETECTION RATE = 64.29%)
AVG
result: Win32:Malware-gen
update: 20190925
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20190321
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=87)
update: 20190925
version: 2019.9.16.1
detected: True check_circle

APEX
update: 20190924
version: 5.66
detected: False cancel

Bkav
update: 20190924
version: 1.3.0.10239
detected: False cancel

K7GW
result: Unwanted-Program ( 0051238f1 )
update: 20190925
version: 11.68.32091
detected: True check_circle

ALYac
result: Trojan.GenericKD.5812582
update: 20190925
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Malware-gen
update: 20190925
version: 18.4.3895.0
detected: True check_circle

Avira
result: HEUR/AGEN.1006088
update: 20190925
version: 8.3.3.8
detected: True check_circle

Baidu
update: 20190318
version: 1.0.0.2
detected: False cancel

Cyren
update: 20190925
version: 6.2.2.2
detected: False cancel

DrWeb
result: Trojan.DownLoader17.45029
update: 20190925
version: 7.0.41.7240
detected: True check_circle

GData
result: Trojan.GenericKD.5812582
update: 20190925
version: A:25.23489B:26.16106
detected: True check_circle

Panda
result: Trj/Genetic.gen
update: 20190924
version: 4.6.4.2
detected: True check_circle

VBA32
result: TrojanDownloader.Banload
update: 20190925
version: 4.1.0
detected: True check_circle

VIPRE
update: 20190925
version: 78106
detected: False cancel

Zoner
update: 20190925
version: 1.0.0.1
detected: False cancel

ClamAV
update: 20190925
version: 0.101.4.0
detected: False cancel

Comodo
update: 20190925
version: 31525
detected: False cancel

F-Prot
update: 20190925
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20190925
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!4AF3DB2F8382
update: 20190925
version: 6.0.6.653
detected: True check_circle

Rising
result: Downloader.Banload!8.15B (TFE:5:To9MpLXyUtM)
update: 20190925
version: 25.0.0.24
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20190925
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.Agent!AaBvH6YT9D8
update: 20190923
version: 5.5.2.24
detected: True check_circle

Zillya
update: 20190924
version: 2.0.0.3907
detected: False cancel

Acronis
result: suspicious
update: 20190923
version: 1.1.1.58
detected: True check_circle

Alibaba
update: 20190527
version: 0.3.0.5
detected: False cancel

Arcabit
result: Trojan.Generic.D58B166
update: 20190925
version: 1.0.0.857
detected: True check_circle

Cylance
result: Unsafe
update: 20190925
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20190918
version: 3.0.15
detected: True check_circle

FireEye
result: Generic.mg.4af3db2f8382672f
update: 20190925
version: 29.7.0.0
detected: True check_circle

TACHYON
update: 20190925
version: 2019-09-25.01
detected: False cancel

Tencent
result: Win32.Trojan.Falsesign.Phgt
update: 20190925
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20190925
version: 2014.3.20.0
detected: False cancel

Webroot
update: 20190925
version: 1.0.0.403
detected: False cancel

Ad-Aware
result: Trojan.GenericKD.5812582
update: 20190925
version: 3.0.5.370
detected: True check_circle

AegisLab
update: 20190925
version: 4.2
detected: False cancel

Emsisoft
result: Trojan-Downloader.Banload (A)
update: 20190925
version: 2018.12.0.1641
detected: True check_circle

F-Secure
result: Heuristic.HEUR/AGEN.1006088
update: 20190925
version: 12.0.86.52
detected: True check_circle

Fortinet
result: W32/Generic.AP.1270BE!tr
update: 20190925
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20190904
version: 6.3.6.26157
detected: False cancel

Jiangmin
result: Trojan.Generic.bnkpv
update: 20190925
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20190925
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20190925
version: 1.0
detected: True check_circle

Symantec
result: ML.Attribute.HighConfidence
update: 20190925
version: 1.10.0.0
detected: True check_circle

Trapmine
result: malicious.high.ml.score
update: 20190826
version: 3.1.81.800
detected: True check_circle

AhnLab-V3
result: Dropper/Win32.Dapato.R209214
update: 20190925
version: 3.16.2.25355
detected: True check_circle

Antiy-AVL
update: 20190925
version: 3.0.0.1
detected: False cancel

Kaspersky
result: HEUR:Trojan.Win32.Generic
update: 20190925
version: 15.0.1.13
detected: True check_circle

MaxSecure
result: Trojan.Malware.7164915.susgen
update: 20190924
version: 1.0.0.1
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload.ZFQ!bit
update: 20190925
version: 1.1.16400.2
detected: True check_circle

Qihoo-360
result: HEUR/QVM16.0.E23B.Malware.Gen
update: 20190925
version: 1.0.0.1120
detected: True check_circle

ZoneAlarm
result: HEUR:Trojan.Win32.Generic
update: 20190925
version: 1.0
detected: True check_circle

Cybereason
result: malicious.f83826
update: 20190616
version: 1.2.449
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.YAA
update: 20190925
version: 20076
detected: True check_circle

TrendMicro
update: 20190925
version: 11.0.0.1006
detected: False cancel

BitDefender
result: Trojan.GenericKD.5812582
update: 20190925
version: 7.2
detected: True check_circle

CrowdStrike
result: win/malicious_confidence_80% (D)
update: 20190702
version: 1.0
detected: True check_circle

K7AntiVirus
result: Unwanted-Program ( 0051238f1 )
update: 20190925
version: 11.68.32091
detected: True check_circle

SentinelOne
result: DFI - Malicious PE
update: 20190807
version: 1.0.31.22
detected: True check_circle

Avast-Mobile
update: 20190925
version: 190925-00
detected: False cancel

Malwarebytes
update: 20190925
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20190925
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: Trojan.Zenshirsh.SL7
update: 20190924
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Banload.erubji
update: 20190925
version: 1.0.134.24859
detected: True check_circle

MicroWorld-eScan
result: Trojan.GenericKD.5812582
update: 20190925
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20190920
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: Artemis!Trojan
update: 20190925
version: v2017.3010
detected: True check_circle

TrendMicro-HouseCall
update: 20190925
version: 10.0.0.1040
detected: False cancel

total
70
sha256
5ad50ab43e2535d3e3f9d6f8b1de64f46b0c14674725018618d48def4f23582a
scan_id
5ad50ab43e2535d3e3f9d6f8b1de64f46b0c14674725018618d48def4f23582a-1569403840
resource
4af3db2f8382672f15454ffee40b04b0
positives
45
scan_date
2019-09-25 09:30:40
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
19/2/2020 - 19:45:42.825Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
19/2/2020 - 19:45:42.825Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
19/2/2020 - 19:45:42.872Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
19/2/2020 - 19:45:42.872Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
19/2/2020 - 19:45:42.872Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
19/2/2020 - 19:45:42.872Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
19/2/2020 - 19:45:42.872Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
19/2/2020 - 19:45:42.872Open1480C:\malware.exeC:\Secur32.dll
19/2/2020 - 19:45:42.872Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
19/2/2020 - 19:45:42.872Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
19/2/2020 - 19:45:42.872Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
19/2/2020 - 19:45:42.872Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
19/2/2020 - 19:45:42.872Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
19/2/2020 - 19:45:42.872Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
19/2/2020 - 19:45:42.872Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
19/2/2020 - 19:45:42.872Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
19/2/2020 - 19:45:42.872Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
19/2/2020 - 19:45:42.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
19/2/2020 - 19:45:42.934Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
19/2/2020 - 19:45:42.934Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
19/2/2020 - 19:45:42.934Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
19/2/2020 - 19:45:42.934Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
19/2/2020 - 19:45:42.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
19/2/2020 - 19:45:42.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
19/2/2020 - 19:45:42.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
19/2/2020 - 19:45:42.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
19/2/2020 - 19:45:42.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
19/2/2020 - 19:45:42.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
19/2/2020 - 19:45:42.950Open1480C:\malware.exeC:\IPHLPAPI.DLL
19/2/2020 - 19:45:42.950Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
19/2/2020 - 19:45:42.950Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
19/2/2020 - 19:45:42.950Open1480C:\malware.exeC:\WINNSI.DLL
19/2/2020 - 19:45:42.950Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
19/2/2020 - 19:45:42.950Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
19/2/2020 - 19:45:42.950Open1480C:\malware.exeC:\DNSAPI.dll
19/2/2020 - 19:45:42.950Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
19/2/2020 - 19:45:42.950Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.28Unknown1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/2/2020 - 19:45:43.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
19/2/2020 - 19:45:43.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
19/2/2020 - 19:45:43.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.28Unknown1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
19/2/2020 - 19:45:43.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
19/2/2020 - 19:45:43.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
19/2/2020 - 19:45:43.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.28Unknown1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/2/2020 - 19:45:43.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
19/2/2020 - 19:45:43.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
19/2/2020 - 19:45:43.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
19/2/2020 - 19:45:43.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
19/2/2020 - 19:45:43.122Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
19/2/2020 - 19:45:43.122Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
19/2/2020 - 19:45:43.200Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
19/2/2020 - 19:45:43.200Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
19/2/2020 - 19:45:43.200Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
19/2/2020 - 19:45:43.200Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
19/2/2020 - 19:45:43.247Open1480C:\malware.exeC:\dhcpcsvc6.DLL
19/2/2020 - 19:45:43.247Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
19/2/2020 - 19:45:43.247Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
19/2/2020 - 19:45:43.247Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
19/2/2020 - 19:45:43.247Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\dhcpcsvc.DLL
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\CRYPTSP.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\RpcRtRemote.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
19/2/2020 - 19:45:43.293Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
19/2/2020 - 19:45:43.293Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
19/2/2020 - 19:45:43.293Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
19/2/2020 - 19:45:43.356Open1480C:\malware.exeC:\rasadhlp.dll
19/2/2020 - 19:45:43.356Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
19/2/2020 - 19:45:43.356Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
19/2/2020 - 19:45:43.403Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
19/2/2020 - 19:45:43.403Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
19/2/2020 - 19:45:43.450Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\3FNePyl3lURev5D.zip
19/2/2020 - 19:45:43.497Unknown1480C:\malware.exeC:\Windows
19/2/2020 - 19:45:43.497Unknown1480C:\malware.exeC:\Monitor

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
19/2/2020 - 19:45:42.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
19/2/2020 - 19:45:42.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
19/2/2020 - 19:45:42.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
19/2/2020 - 19:45:42.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
19/2/2020 - 19:45:42.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
19/2/2020 - 19:45:42.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
19/2/2020 - 19:45:42.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
19/2/2020 - 19:45:42.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
19/2/2020 - 19:45:42.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
19/2/2020 - 19:45:42.950Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
19/2/2020 - 19:45:42.950Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
19/2/2020 - 19:45:42.950Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
19/2/2020 - 19:45:42.950Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
19/2/2020 - 19:45:42.950Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
19/2/2020 - 19:45:43.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
19/2/2020 - 19:45:43.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
19/2/2020 - 19:45:43.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
19/2/2020 - 19:45:43.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
19/2/2020 - 19:45:43.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
19/2/2020 - 19:45:43.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
19/2/2020 - 19:45:43.450Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code empresa.atualuploader.com.br.
computer localhost arrow_forward computer gateway:DNS code empresa.atualuploader.com.br.

Response

TCP
Info

UDP
Info
computer localhost:67 arrow_forward computer localhost:68
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:68 arrow_forward help_outline 255.255.255.255:67
computer localhost:53 arrow_forward computer localhost:50273

HTTP
Info

Summary
DNS
True check_circle

TCP
False cancel

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 66.67%
suspicious: False cancel

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 48.55%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 88.47%
suspicious: False cancel

Random Forest (100 estimators, NFS-BRMalware)
confidence: 60.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 70.41%
suspicious: False cancel

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 99.90%
suspicious: True check_circle

Add to Collection
Download