Report #6877 check_circle

Binary
DLL
False cancel
Size
344.39KB
trid
61.7% Win64 Executable
14.7% Win32 Dynamic Link Library
10.0% Win32 Executable
4.5% OS/2 Executable
4.4% Generic Win/DOS Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
219ef19109f0c001da1846b3861cd682
sha1
8b9518e87614a4e6e9f242bca419033d637fa020
crc32
0x1e683372
sha224
4da1be0f6066b6f6a2234b60f763ef2435adfe28e89191f6ebf27af0
sha256
d4b4690fd990a66064b5cd4aa5308a6405600fc4fab4a6c82621bae1268b6071
sha384
30956bd9e9c8ca7fdce38e21aced9b89ab71d2730df99ca24c6d537318decf2f70c4fcee8bb03387f70fcc1b8c67e1d6
sha512
b4e41afb37ecc414f79e80afdfd1157edadeeb1221a099af75c4e6ea438ece62e411414c6f81c98b0acff59ec3bd065180b4d0a7dbd1c73c819ac179b1b1f742
ssdeep
6144:9z9Sq3xEfDFv0RH0pCAcVJ+CtXHbgcshn9d+yR+gQ2AebOPY:9EYyfDFv0RUpCXJ5Ecshn9dXR+72B
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, HasDigitalSignature, HasDebugData, url, HasRichSignature, contentis_base64, IsPacked, HasOverlay, network_dropper, IsPE32, IsWindowsGUI

Suspicious
True check_circle

Strings
List
Nhttp://icp-brasil2.validcertificadora.com.br/ac-validrfb/lcr-ac-validrfbv2.crl0I
Mhttp://icp-brasil.validcertificadora.com.br/ac-validrfb/lcr-ac-validrfbv2.crl0T
Ihttp://icp-brasil.validcertificadora.com.br/ac-validrfb/ac-validrfbv2.p7b01
Khttp://icp-brasil.validcertificadora.com.br/ac-validrfb/dpc-ac-validrfb.pdf0
Chttp://repositorio.icpbrasil.gov.br/lcr/VALID/lcr-ac-validrfbv2.crl0
%http://ocsp.validcertificadora.com.br0
sales.4@hotmail.com
1http://crl.usertrust.com/UTN-USERFirst-Object.crl05
C:\Users\visual\Desktop\load amig dud rodando\load amig dus tes top\Release\Carrega.pdb
fM.Cn
l.AI
ZeNiX [forum.exetools.com]
R0ZeNiX [forum.exetools.com]
Zenix Yang [zenix.ccg@gmail.com]Zenix Yang [zenix.ccg@gmail.com]
Zenix Yang [zenix.ccg@gmail.com]Zenix Yang [zenix.ccg@gmail.com]
y.Co
b.bV
4.gG
http://www.usertrust.com1
http://www.usertrust.com1
http://ocsp.usertrust.com0
urlmon.dll
E0fD
;e*ci
{OA:w
[p])UOd?
1a@-!%s
e6]r%a
Uh&%A<Csi
8%iAn
6%iTU
oR%a,`
^od%i
}%eh^
#iT%G
-EA%#g
>%eXtA
)"%E>
%ei;Nf
SLMG
%amnY
!COMODO SHA-1 Time Stamping Signer0
<requestedPrivileges>
'1.AC
ExitProcess
crDp
ShellExecuteW
GetModuleFileNameW
LoadLibraryA
GetModuleHandleA
GetModuleFileNameA
CA0D
e6Ab
CDe0
COMODO CA Limited1*0(
2 as
N1st
6 6$64686<6@6H6`6p6t6
H`)&o{|c
The USERTRUST Network1!0
The USERTRUST Network1!0
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
-Secretaria da Receita Federal do Brasil - RFB1
-Secretaria da Receita Federal do Brasil - RFB1
-Secretaria da Receita Federal do Brasil - RFB1
0 0&0.03090A0F0L0T0Y0_0g0l0r0z0
394A4T4_4d4t4
4!4-464;4A4K4U4e4u4
uCi?a7e3
0 0&040:0H0N0\0e0t0
[7Ay6x{95sE
3 434;4A4F4S4m4
EY745T)
2)84oCSrV`
"1Cwe},+
>o;3OUs\kM
oND]|9Ta[o
}yx[aNfU9#
2)MDeieT
p[IUexL9
>a~t"1CM:
N&L#Ugf5i
iR0]D4[[od1
_FTeSAw&{
MNeU@44
AR PRIMUS1;09
M'1SE5/
h*&TId*0
84D4P4\4h4t4
1 181H1L1\1`1d1h1p1
iAC$~>Kr;H.
u1{s\COR
KdcW4YI_
uNfo9+a[
Al%<E0Yo
yCe<8d\U
$G[SD\[wAE
$L<tDdTph
{bh;Ce)@$\
DcE79`{

Foremost
Matches
0.exe, 340 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://www.usertrust.com1, http://icp-brasil.validcertificadora.com.br/ac-validrfb/ac-validrfbv2.p7b01, http://icp-brasil.validcertificadora.com.br/ac-validrfb/dpc-ac-validrfb.pdf0, http://crl.usertrust.com/utn-userfirst-object.crl05, http://icp-brasil.validcertificadora.com.br/ac-validrfb/lcr-ac-validrfbv2.crl0t, http://icp-brasil2.validcertificadora.com.br/ac-validrfb/lcr-ac-validrfbv2.crl0i, http://repositorio.icpbrasil.gov.br/lcr/valid/lcr-ac-validrfbv2.crl0, http://ocsp.usertrust.com0, http://ocsp.validcertificadora.com.br0
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: SHLWAPI.dll, SHELL32.dll, KERNEL32.dll, user32.dll, urlmon.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 79360
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 4096
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 385647
Suspicous: False cancel

Sections
Allowed: .text, .rdata, .data, .vmp0, .vmp1, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 6
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 6
Linker
Version: 12.0
Suspicious: False cancel
Subsystem
Version: 6.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 775648
Suspicious: False cancel

Anomalies
Anomalies
hasAnomalies: False cancel

Libraries
Allowed: shlwapi.dll, shell32.dll, kernel32.dll, user32.dll, urlmon.dll
hasLibs: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2017-08-01 14:02:14
Future: False cancel

Compilation
Packed: False cancel
Missing: True check_circle
Packers
Compiled: False cancel
Compilers

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
none: 237

pushpopmath
none: 119

ss register
none: 3

garbagebytes
none: 72

hookdetection
none: 3

software breakpoint
none: 7

fakeconditionaljumps
none: 1

programcontrolflowchange
none: 71

cpuinstructionsresultscomparison
none: 1
.rsrc: 1

AVclass
banload
1
VirusTotal
md5
219ef19109f0c001da1846b3861cd682
sha1
8b9518e87614a4e6e9f242bca419033d637fa020
SCANS (DETECTION RATE = 68.12%)
AVG
result: Win32:Malware-gen
update: 20190924
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20190321
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=100)
update: 20190924
version: 2019.9.16.1
detected: True check_circle

APEX
update: 20190924
version: 5.66
detected: False cancel

Bkav
update: 20190924
version: 1.3.0.10239
detected: False cancel

K7GW
result: Unwanted-Program ( 0051238f1 )
update: 20190924
version: 11.67.32085
detected: True check_circle

ALYac
result: Gen:Variant.Strictor.143446
update: 20190924
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Malware-gen
update: 20190924
version: 18.4.3895.0
detected: True check_circle

Avira
result: HEUR/AGEN.1006088
update: 20190924
version: 8.3.3.8
detected: True check_circle

Baidu
update: 20190318
version: 1.0.0.2
detected: False cancel

Cyren
update: 20190924
version: 6.2.2.2
detected: False cancel

DrWeb
result: Trojan.DownLoader17.45029
update: 20190924
version: 7.0.41.7240
detected: True check_circle

GData
result: Gen:Variant.Strictor.143446
update: 20190924
version: A:25.23479B:26.16100
detected: True check_circle

Panda
result: Trj/Genetic.gen
update: 20190924
version: 4.6.4.2
detected: True check_circle

VBA32
result: TrojanDownloader.Banload
update: 20190924
version: 4.1.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20190923
version: 78082
detected: True check_circle

Zoner
update: 20190924
version: 1.0.0.1
detected: False cancel

ClamAV
update: 20190924
version: 0.101.4.0
detected: False cancel

Comodo
update: 20190924
version: 31523
detected: False cancel

F-Prot
update: 20190924
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20190924
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!219EF19109F0
update: 20190924
version: 6.0.6.653
detected: True check_circle

Rising
update: 20190924
version: 25.0.0.24
detected: False cancel

Sophos
result: Mal/Generic-S
update: 20190924
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.Agent!l4fF3yTBfWo
update: 20190923
version: 5.5.2.24
detected: True check_circle

Zillya
result: Trojan.Generic.Win32.196691
update: 20190924
version: 2.0.0.3907
detected: True check_circle

Acronis
result: suspicious
update: 20190923
version: 1.1.1.58
detected: True check_circle

Alibaba
result: TrojanDownloader:Win32/Banload.6cb54352
update: 20190527
version: 0.3.0.5
detected: True check_circle

Arcabit
result: Trojan.Strictor.D23056
update: 20190924
version: 1.0.0.857
detected: True check_circle

Cylance
result: Unsafe
update: 20190924
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20190918
version: 3.0.15
detected: True check_circle

FireEye
result: Generic.mg.219ef19109f0c001
update: 20190924
version: 29.7.0.0
detected: True check_circle

TACHYON
update: 20190924
version: 2019-09-24.02
detected: False cancel

Tencent
result: Win32.Trojan.Falsesign.Hpsg
update: 20190924
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20190924
version: 2014.3.20.0
detected: False cancel

Webroot
update: 20190924
version: 1.0.0.403
detected: False cancel

Ad-Aware
result: Gen:Variant.Strictor.143446
update: 20190924
version: 3.0.5.370
detected: True check_circle

AegisLab
update: 20190924
version: 4.2
detected: False cancel

Emsisoft
result: Trojan-Downloader.Banload (A)
update: 20190924
version: 2018.12.0.1641
detected: True check_circle

F-Secure
result: Heuristic.HEUR/AGEN.1006088
update: 20190924
version: 12.0.86.52
detected: True check_circle

Fortinet
result: W32/Generic.AP.1270BE!tr
update: 20190924
version: 5.4.247.0
detected: True check_circle

Invincea
result: heuristic
update: 20190904
version: 6.3.6.26157
detected: True check_circle

Jiangmin
result: Trojan.Generic.dqezt
update: 20190924
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20190924
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20190924
version: 1.0
detected: True check_circle

Symantec
result: ML.Attribute.HighConfidence
update: 20190924
version: 1.10.0.0
detected: True check_circle

Trapmine
result: malicious.high.ml.score
update: 20190826
version: 3.1.81.800
detected: True check_circle

AhnLab-V3
result: Dropper/Win32.Dapato.R209214
update: 20190924
version: 3.16.2.25355
detected: True check_circle

Antiy-AVL
result: Trojan/Win32.AGeneric
update: 20190924
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan-Downloader.Win32.Banload.abhpa
update: 20190924
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload.ZFQ!bit
update: 20190924
version: 1.1.16400.2
detected: True check_circle

Qihoo-360
update: 20190924
version: 1.0.0.1120
detected: False cancel

ZoneAlarm
result: Trojan-Downloader.Win32.Banload.abhpa
update: 20190924
version: 1.0
detected: True check_circle

Cybereason
result: malicious.109f0c
update: 20190616
version: 1.2.449
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.YAA
update: 20190924
version: 20071
detected: True check_circle

TrendMicro
update: 20190924
version: 11.0.0.1006
detected: False cancel

BitDefender
result: Gen:Variant.Strictor.143446
update: 20190924
version: 7.2
detected: True check_circle

CrowdStrike
result: win/malicious_confidence_90% (D)
update: 20190702
version: 1.0
detected: True check_circle

K7AntiVirus
result: Unwanted-Program ( 0051238f1 )
update: 20190924
version: 11.67.32086
detected: True check_circle

SentinelOne
result: DFI - Suspicious PE
update: 20190807
version: 1.0.31.22
detected: True check_circle

Avast-Mobile
update: 20190923
version: 190923-00
detected: False cancel

Malwarebytes
update: 20190924
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20190924
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: Trojan.Zenshirsh.SL7
update: 20190923
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Banload.ertiao
update: 20190924
version: 1.0.134.24859
detected: True check_circle

MicroWorld-eScan
result: Gen:Variant.Strictor.143446
update: 20190924
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20190920
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: Artemis!Trojan
update: 20190924
version: v2017.3010
detected: True check_circle

TrendMicro-HouseCall
update: 20190924
version: 10.0.0.1040
detected: False cancel

total
69
sha256
d4b4690fd990a66064b5cd4aa5308a6405600fc4fab4a6c82621bae1268b6071
scan_id
d4b4690fd990a66064b5cd4aa5308a6405600fc4fab4a6c82621bae1268b6071-1569325114
resource
219ef19109f0c001da1846b3861cd682
positives
47
scan_date
2019-09-24 11:38:34
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
19/2/2020 - 19:45:42.825Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
19/2/2020 - 19:45:42.825Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
19/2/2020 - 19:45:42.918Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
19/2/2020 - 19:45:42.918Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
19/2/2020 - 19:45:42.918Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
19/2/2020 - 19:45:42.918Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
19/2/2020 - 19:45:42.918Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
19/2/2020 - 19:45:42.918Open1480C:\malware.exeC:\Secur32.dll
19/2/2020 - 19:45:42.918Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
19/2/2020 - 19:45:42.918Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
19/2/2020 - 19:45:42.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
19/2/2020 - 19:45:42.918Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
19/2/2020 - 19:45:42.918Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
19/2/2020 - 19:45:42.918Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
19/2/2020 - 19:45:42.918Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
19/2/2020 - 19:45:42.918Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
19/2/2020 - 19:45:42.918Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
19/2/2020 - 19:45:42.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
19/2/2020 - 19:45:42.981Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
19/2/2020 - 19:45:42.981Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
19/2/2020 - 19:45:42.981Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
19/2/2020 - 19:45:42.981Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
19/2/2020 - 19:45:42.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
19/2/2020 - 19:45:42.981Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
19/2/2020 - 19:45:42.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
19/2/2020 - 19:45:42.981Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
19/2/2020 - 19:45:42.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
19/2/2020 - 19:45:42.981Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
19/2/2020 - 19:45:42.981Open1480C:\malware.exeC:\IPHLPAPI.DLL
19/2/2020 - 19:45:42.981Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
19/2/2020 - 19:45:42.981Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
19/2/2020 - 19:45:42.981Open1480C:\malware.exeC:\WINNSI.DLL
19/2/2020 - 19:45:42.981Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
19/2/2020 - 19:45:42.981Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
19/2/2020 - 19:45:42.997Open1480C:\malware.exeC:\DNSAPI.dll
19/2/2020 - 19:45:42.997Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
19/2/2020 - 19:45:42.997Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.59Unknown1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/2/2020 - 19:45:43.59Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
19/2/2020 - 19:45:43.59Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
19/2/2020 - 19:45:43.59Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.59Unknown1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
19/2/2020 - 19:45:43.59Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
19/2/2020 - 19:45:43.59Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
19/2/2020 - 19:45:43.59Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.59Unknown1480C:\malware.exeC:\Users\Behemot
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/2/2020 - 19:45:43.59Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
19/2/2020 - 19:45:43.59Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
19/2/2020 - 19:45:43.59Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
19/2/2020 - 19:45:43.59Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
19/2/2020 - 19:45:43.122Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
19/2/2020 - 19:45:43.122Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
19/2/2020 - 19:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
19/2/2020 - 19:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
19/2/2020 - 19:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
19/2/2020 - 19:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
19/2/2020 - 19:45:43.215Open1480C:\malware.exeC:\dhcpcsvc6.DLL
19/2/2020 - 19:45:43.215Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
19/2/2020 - 19:45:43.215Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
19/2/2020 - 19:45:43.215Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
19/2/2020 - 19:45:43.215Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\dhcpcsvc.DLL
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\CRYPTSP.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\RpcRtRemote.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
19/2/2020 - 19:45:43.262Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
19/2/2020 - 19:45:43.262Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
19/2/2020 - 19:45:43.262Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
19/2/2020 - 19:45:43.325Open1480C:\malware.exeC:\rasadhlp.dll
19/2/2020 - 19:45:43.325Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
19/2/2020 - 19:45:43.325Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
19/2/2020 - 19:45:43.372Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
19/2/2020 - 19:45:43.372Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
19/2/2020 - 19:45:43.418Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\oxtHm7lblc3.zip
19/2/2020 - 19:45:43.465Unknown1480C:\malware.exeC:\Windows
19/2/2020 - 19:45:43.465Unknown1480C:\malware.exeC:\Monitor

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
19/2/2020 - 19:45:42.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
19/2/2020 - 19:45:42.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
19/2/2020 - 19:45:42.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
19/2/2020 - 19:45:42.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
19/2/2020 - 19:45:42.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
19/2/2020 - 19:45:42.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
19/2/2020 - 19:45:42.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
19/2/2020 - 19:45:42.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
19/2/2020 - 19:45:42.981Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
19/2/2020 - 19:45:42.997Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
19/2/2020 - 19:45:42.997Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
19/2/2020 - 19:45:42.997Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
19/2/2020 - 19:45:42.997Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
19/2/2020 - 19:45:42.997Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
19/2/2020 - 19:45:43.59Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
19/2/2020 - 19:45:43.59Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
19/2/2020 - 19:45:43.59Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code empresa.atualuploader.com.br.
computer localhost arrow_forward computer gateway:DNS code empresa.atualuploader.com.br.

Response

TCP
Info

UDP
Info
computer localhost:67 arrow_forward computer localhost:68
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:68 arrow_forward help_outline 255.255.255.255:67
computer localhost:53 arrow_forward computer localhost:50273

HTTP
Info

Summary
DNS
True check_circle

TCP
False cancel

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 66.67%
suspicious: False cancel

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 70.98%
suspicious: True check_circle

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 62.05%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 61.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 75.78%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 99.70%
suspicious: True check_circle

Add to Collection
Download