Report #7275 check_circle

Binary
DLL
False cancel
Size
3.00MB
trid
50.5% Inno Setup installer
19.8% InstallShield setup
19.1% Win32 EXE PECompact compressed
4.6% DOS Borland compiled Executable
2.0% Win32 Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
3d54ba8d63036eae50d853e488cc8594
sha1
2234435c9e7806754a05359c004329c454be0456
crc32
0x888aecdc
sha224
e1a6c5897064386a8311c7331095127d8aac1aa093f2e4cc85b152cb
sha256
bab790563b4aa1a7365b069a75df5f8e3e9316c42a30661c91a07923d8d48a3a
sha384
4f667930441d4326c3de3419b8a59ad2876e256a7e98c8d1ee34731f76c62d6389cb2a2d82b3ad90ab500ad7ce796a17
sha512
5bd8ed9ef08a08f80b7e2c10c3e4e9774933c20a7ec51fdca661e8830b901520e622ce78dd7971c00d74357e4ba5f2955545d0758f20f15a31554d8fa25e0bbf
ssdeep
98304:8fmhc2GxsbVf/1qsNblCwe5YWIy2Gy9VVeMMMMMMMMMMMMMMMMM:qmI+1Fy2N
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, Borland_Delphi_30_, CRC32_poly_Constant, BASE64_table, RIPEMD160_Constants, borland_delphi, Delphi_FormShow, BobSoftMiniDelphiBoBBobSoft, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, BobSoft_Mini_Delphi_BoB_BobSoft_additional, network_http, win_files_operation, OpenSSL_DSA, win_hook, RijnDael_AES_CHAR, win_mutex, screenshot, Borland_Delphi_v40_v50, keylogger, MD5_Constants, Borland_Delphi_40_additional, IsPE32, Borland_Delphi_40, network_ssl, Delphi_Random, IsWindowsGUI, HasDigitalSignature, anti_dbg, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, SHA1_Constants, contentis_base64, win_registry, HasOverlay, RijnDael_AES_LONG, Borland_Delphi_30_additional, Borland_Delphi_v30

Suspicious
True check_circle

Strings
List
http://www.borland.com/rootpart.xml
the appropriate version of this product at http://www.componentace.com
Web site: http://www.componentace.com
http://www.borland.com/namespaces/Types
http://www.borland.com/namespaces/Types
http://www.borland.com/namespaces/Types
http://www.borland.com/namespaces/Types
http://www.indyproject.org/
hampshire.edu
hampshire.edu
C:\Builds\TP\indysockets\lib\System\IdStreamVCL.pas
C:\Builds\TP\indysockets\lib\System\IdStreamVCL.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdStack.pas
C:\Builds\TP\indysockets\lib\System\IdStack.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
t.Ht
Font.Name
Font.Style
DefMenuItemFont.Name
C:\Builds\TP\indysockets\lib\Core\IdIOHandlerStack.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandlerStack.pas
C:\Builds\TP\indysockets\lib\Core\IdScheduler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdThread.pas
C:\Builds\TP\indysockets\lib\Protocols\IdCoder3to4.pas
http://schemas.xmlsoap.org/soap/encoding/
http://schemas.xmlsoap.org/soap/envelope/
http://schemas.xmlsoap.org/wsdl/http/
http://schemas.xmlsoap.org/wsdl/soap/
http://schemas.xmlsoap.org/wsdl/
http://schemas.xmlsoap.org/wsdl/
http://schemas.xmlsoap.org/wsdl/
http://schemas.xmlsoap.org/wsdl/
http://schemas.xmlsoap.org/wsdl/soap12/
http://www.w3.org/2003/05/soap-envelope
http://www.w3.org/2003/05/soap-rpc
http://www.w3.org/2003/05/soap-rpc
http://www.w3.org/2003/05/soap-encoding
http://www.w3.org/2003/05/soap-encoding
http://www.w3.org/2003/05/soap-encoding
http://www.w3.org/2003/05/soap-encoding
http://www.w3.org/2003/05/soap-encoding
http://www.w3.org/2003/05/soap-encoding
http://www.w3.org/2001/XMLSchema
http://www.w3.org/2000/10/XMLSchema
http://www.w3.org/1999/XMLSchema
http://www.w3.org/2000/10/XMLSchema
http://www.w3.org/2001/XMLSchema
http://www.w3.org/2000/10/XMLSchema
http://www.w3.org/1999/XMLSchema
http://www.w3.org/2001/XMLSchema
http://www.w3.org/2001/XMLSchema
http://www.w3.org/1999/XMLSchema
http://www.w3.org/1999/XMLSchema
http://www.w3.org/2000/10/XMLSchema
http://www.w3.org/2001/XMLSchema
http://www.w3.org/1999/XMLSchema
http://www.w3.org/2001/XMLSchema
http://www.w3.org/2001/XMLSchema
Invalid compressed size, rfs.size = %d, count = %d
http://www.w3.org/2000/10/XMLSchema-instance
http://www.w3.org/2001/XMLSchema-instance
http://www.w3.org/2001/XMLSchema-instance
http://www.w3.org/1999/XMLSchema-instance
http://www.w3.org/2001/XMLSchema-instance
DefCaptionFont.Style
DefCaptionFont.Name
http://www.w3.org/2000/xmlns/
DefMenuItemFont.Style
+http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(

Foremost
Matches
0.exe, 2 MB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: True check_circle
Allowed: 255.255.255.255, 1, record, 127.0.0.1, 1, localhost.
Suspicious: 0.0.0.1, 0, Unknown
hasAllowed: True check_circle
hasSuspicious: True check_circle

URLs
Allowed: http://www.w3.org/2003/05/soap-encoding, http://www.w3.org/2001/xmlschema-instance, http://www.w3.org/2000/10/xmlschema, http://www.w3.org/1999/xmlschema, http://www.w3.org/2000/xmlns/, http://www.w3.org/2003/05/soap-envelope, http://www.w3.org/2000/10/xmlschema-instance, http://www.w3.org/2001/xmlschema, http://www.w3.org/2003/05/soap-rpc, http://www.w3.org/1999/xmlschema-instance
hasURLs: True check_circle
Suspicious: http://schemas.xmlsoap.org/wsdl/soap12/, http://www.borland.com/namespaces/types, http://www.indyproject.org/, http://schemas.xmlsoap.org/wsdl/http/, http://, http://schemas.xmlsoap.org/wsdl/soap/, http://schemas.xmlsoap.org/soap/envelope/, http://schemas.xmlsoap.org/wsdl/, http://crl.thawte.com/thawtetimestampingca.crl0, http://ocsp.thawte.com0, http://www.borland.com/rootpart.xml, http://schemas.xmlsoap.org/soap/encoding/, http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(, http://www.componentace.com, https://, http://ts-aia.ws.symantec.com/tss-ca-g2.cer0<, http://ts-ocsp.ws.symantec.com07
hasAllowed: True check_circle
hasSuspicious: True check_circle

Files
Allowed: http://www.borland.com/rootpart.xml, USER32.DLL, kernel32.dll, uxtheme.dll, dwmapi.dll, MSWSOCK.DLL, libeay32.dll, Fwpuclnt.dll, comctl32.dll, Wship6.dll, ssleay32.dll, ole32.dll, msimg32.dll, libssl32.dll, imm32.dll, wininet.dll, oleaut32.dll, WS2_32.DLL, SHFolder.dll, advapi32.dll, gdi32.dll, windowscodecs.dll, version.dll, shell32.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 409600
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 3208284
Suspicous: False cancel

Sections
Allowed: .text, .itext, .data, .bss, .idata, .didata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 2738348
Suspicious: False cancel

Anomalies
Anomalies
hasAnomalies: False cancel

Libraries
Allowed: user32.dll, kernel32.dll, uxtheme.dll, dwmapi.dll, mswsock.dll, comctl32.dll, wship6.dll, ole32.dll, msimg32.dll, imm32.dll, wininet.dll, oleaut32.dll, ws2_32.dll, shfolder.dll, advapi32.dll, gdi32.dll, windowscodecs.dll, version.dll, shell32.dll
hasLibs: True check_circle
Suspicious: libeay32.dll, fwpuclnt.dll, ssleay32.dll, libssl32.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2016-11-24 12:29:09
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: BobSoft Mini Delphi -> BoB / BobSoft
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v3.0
MainPacker: BobSoft Mini Delphi -> BoB / BobSoft

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.data: 14
.rsrc: 1
.text: 74
.itext: 7

pushpopmath
.data: 16
.rsrc: 7
.text: 67
.reloc: 155

ss register
.text: 2

garbagebytes
.data: 7
.text: 60
.itext: 7

hookdetection
.text: 2
.reloc: 6

software breakpoint
.text: 9
.reloc: 54

programcontrolflowchange
.data: 7
.text: 60
.itext: 7

cpuinstructionsresultscomparison
.data: 20
.rsrc: 63
.text: 35
.reloc: 1

AVclass
banload
1
VirusTotal
md5
3d54ba8d63036eae50d853e488cc8594
sha1
2234435c9e7806754a05359c004329c454be0456
SCANS (DETECTION RATE = 60.94%)
AVG
result: Win32:Banker-MYH [Trj]
update: 20180323
version: 18.2.3827.0
detected: True check_circle

CMC
update: 20180323
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=100)
update: 20180324
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180322
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan-Downloader ( 005006c01 )
update: 20180323
version: 10.42.26598
detected: True check_circle

ALYac
result: Trojan.GenericKD.4956960
update: 20180323
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Banker-MYH [Trj]
update: 20180323
version: 18.2.3827.0
detected: True check_circle

Avira
result: TR/Dldr.Banload.ybakq
update: 20180323
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180323
version: 1.0.0.2
detected: False cancel

Cyren
update: 20180323
version: 5.4.30.7
detected: False cancel

DrWeb
update: 20180323
version: 7.0.28.2020
detected: False cancel

GData
result: Trojan.GenericKD.4956960
update: 20180323
version: A:25.16481B:25.11861
detected: True check_circle

Panda
result: Trj/GdSda.A
update: 20180323
version: 4.6.4.2
detected: True check_circle

VBA32
result: Trojan.Hesv
update: 20180323
version: 3.12.28.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180323
version: 65478
detected: True check_circle

AVware
result: Trojan.Win32.Generic!BT
update: 20180323
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180323
version: 0.99.2.0
detected: False cancel

Comodo
update: 20180323
version: 28733
detected: False cancel

F-Prot
update: 20180323
version: 4.7.1.166
detected: False cancel

McAfee
result: Trojan-FKEQ!3D54BA8D6303
update: 20180323
version: 6.0.6.653
detected: True check_circle

Rising
update: 20180324
version: 25.0.0.1
detected: False cancel

Sophos
result: Mal/Generic-S
update: 20180323
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.DL.Banload!WwrDOyzC1uo
update: 20180323
version: 5.5.1.3
detected: True check_circle

Zillya
result: Downloader.Banload.Win32.74512
update: 20180323
version: 2.0.0.3519
detected: True check_circle

Arcabit
result: Trojan.Generic.D4BA320
update: 20180323
version: 1.0.0.831
detected: True check_circle

Cylance
result: Unsafe
update: 20180324
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180316
version: 2.0.5
detected: True check_circle

Tencent
update: 20180324
version: 1.0.0.1
detected: False cancel

ViRobot
result: Trojan.Win32.Z.Banload.3148656
update: 20180323
version: 2014.3.20.0
detected: True check_circle

eGambit
update: 20180324
version: v4.3.5
detected: False cancel

Ad-Aware
result: Trojan.GenericKD.4956960
update: 20180323
version: 3.0.3.1010
detected: True check_circle

AegisLab
result: Troj.Generickd!c
update: 20180323
version: 4.2
detected: True check_circle

Emsisoft
result: Trojan.GenericKD.4956960 (B)
update: 20180323
version: 4.0.2.899
detected: True check_circle

F-Secure
update: 20180323
version: 11.0.19100.45
detected: False cancel

Fortinet
result: W32/Banload.XRS!tr.dldr
update: 20180323
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Jiangmin
update: 20180323
version: 16.0.100
detected: False cancel

Kingsoft
update: 20180324
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180324
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen.2
update: 20180323
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180323
version: 2018-03-23.02
detected: False cancel

AhnLab-V3
result: Trojan/Win32.Banload.C1683350
update: 20180323
version: 3.12.0.20130
detected: True check_circle

Antiy-AVL
result: Trojan/Win32.TSGeneric
update: 20180323
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan.Win32.Hesv.bkv
update: 20180323
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload
update: 20180323
version: 1.1.14600.4
detected: True check_circle

Qihoo-360
update: 20180324
version: 1.0.0.1120
detected: False cancel

TheHacker
update: 20180319
version: 6.8.0.5.2551
detected: False cancel

ZoneAlarm
result: Trojan.Win32.Hesv.bkv
update: 20180323
version: 1.0
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.XRS
update: 20180323
version: 17107
detected: True check_circle

TrendMicro
result: TROJ_GEN.R002C0DBF18
update: 20180323
version: 9.862.0.1074
detected: True check_circle

WhiteArmor
update: 20180223
detected: False cancel

BitDefender
result: Trojan.GenericKD.4956960
update: 20180323
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_100% (W)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan-Downloader ( 005006c01 )
update: 20180323
version: 10.42.26598
detected: True check_circle

SentinelOne
update: 20180225
version: 1.0.15.206
detected: False cancel

Avast-Mobile
update: 20180323
version: 180323-04
detected: False cancel

Malwarebytes
update: 20180323
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20180323
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
update: 20180323
version: 14.00
detected: False cancel

NANO-Antivirus
result: Trojan.Win32.Banload.eivupa
update: 20180323
version: 1.0.100.22043
detected: True check_circle

MicroWorld-eScan
result: Trojan.GenericKD.4956960
update: 20180323
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180323
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: Trojan-FKEQ!3D54BA8D6303
update: 20180323
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R002C0DBF18
update: 20180323
version: 9.950.0.1006
detected: True check_circle

total
64
sha256
bab790563b4aa1a7365b069a75df5f8e3e9316c42a30661c91a07923d8d48a3a
scan_id
bab790563b4aa1a7365b069a75df5f8e3e9316c42a30661c91a07923d8d48a3a-1521847531
resource
3d54ba8d63036eae50d853e488cc8594
positives
39
scan_date
2018-03-23 23:25:31
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
21/2/2020 - 17:46:4.75Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll.Config
21/2/2020 - 17:46:4.75Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
21/2/2020 - 17:46:4.75Open1480C:\malware.exeC:\malware.exe.Local
21/2/2020 - 17:46:4.75Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 17:46:4.75Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 17:46:4.75Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 17:46:4.75Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
21/2/2020 - 17:46:4.75Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
21/2/2020 - 17:46:4.75Open1480C:\malware.exeC:\Windows\WindowsShell.Manifest
21/2/2020 - 17:46:4.75Unknown1480C:\malware.exeC:\Windows\WindowsShell.ManifestWindowsShell.Manifest
21/2/2020 - 17:46:4.75Read1480C:\malware.exeC:\malware.exe
21/2/2020 - 17:46:4.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.75Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.75Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\romeu.sey
21/2/2020 - 17:46:4.75Open1480C:\malware.exeC:\malware.exe
21/2/2020 - 17:46:4.75Read1480C:\malware.exeC:\malware.exe
21/2/2020 - 17:46:4.75Unknown1480C:\malware.exeC:\malware.exe
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg
21/2/2020 - 17:46:4.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Secur32.dll
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
21/2/2020 - 17:46:4.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
21/2/2020 - 17:46:4.90Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
21/2/2020 - 17:46:4.90Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\IPHLPAPI.DLL
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\WINNSI.DLL
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
21/2/2020 - 17:46:4.137Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
21/2/2020 - 17:46:4.137Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\DNSAPI.dll
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
21/2/2020 - 17:46:4.137Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
21/2/2020 - 17:46:4.184Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
21/2/2020 - 17:46:4.184Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
21/2/2020 - 17:46:4.184Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
21/2/2020 - 17:46:4.184Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
21/2/2020 - 17:46:4.278Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
21/2/2020 - 17:46:4.278Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
21/2/2020 - 17:46:4.278Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
21/2/2020 - 17:46:4.278Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
21/2/2020 - 17:46:4.325Open1480C:\malware.exeC:\dhcpcsvc6.DLL
21/2/2020 - 17:46:4.325Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
21/2/2020 - 17:46:4.325Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
21/2/2020 - 17:46:4.325Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
21/2/2020 - 17:46:4.325Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
21/2/2020 - 17:46:4.372Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
21/2/2020 - 17:46:4.372Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
21/2/2020 - 17:46:4.372Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.372Unknown1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.372Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
21/2/2020 - 17:46:4.372Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
21/2/2020 - 17:46:4.372Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.372Unknown1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
21/2/2020 - 17:46:4.372Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 17:46:4.372Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 17:46:4.372Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.372Unknown1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.372Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
21/2/2020 - 17:46:4.372Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
21/2/2020 - 17:46:4.372Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\dhcpcsvc.DLL
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\CRYPTSP.dll
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.372Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\RpcRtRemote.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
21/2/2020 - 17:46:4.387Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
21/2/2020 - 17:46:4.387Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
21/2/2020 - 17:46:4.434Open1480C:\malware.exeC:\rasadhlp.dll
21/2/2020 - 17:46:4.434Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
21/2/2020 - 17:46:4.434Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
21/2/2020 - 17:46:4.481Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
21/2/2020 - 17:46:4.481Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
21/2/2020 - 17:46:4.856Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
21/2/2020 - 17:46:4.856Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\malware.exe.Local
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 17:46:4.965Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 17:46:4.965Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 17:46:5.137Open1480C:\malware.exeC:\credssp.dll
21/2/2020 - 17:46:5.137Open1480C:\malware.exeC:\Windows\SysWOW64\credssp.dll
21/2/2020 - 17:46:5.137Open1480C:\malware.exeC:\Windows\SysWOW64\credssp.dll
21/2/2020 - 17:46:5.137Open1480C:\malware.exeC:\Windows\SysWOW64\schannel.dll
21/2/2020 - 17:46:5.137Open1480C:\malware.exeC:\Windows\SysWOW64\schannel.dll
21/2/2020 - 17:46:5.137Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My
21/2/2020 - 17:46:5.137Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
21/2/2020 - 17:46:5.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
21/2/2020 - 17:46:5.137Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
21/2/2020 - 17:46:5.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
21/2/2020 - 17:46:5.137Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
21/2/2020 - 17:46:5.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
21/2/2020 - 17:46:5.465Open1480C:\malware.exeC:\ncrypt.dll
21/2/2020 - 17:46:5.465Open1480C:\malware.exeC:\Windows\SysWOW64\ncrypt.dll
21/2/2020 - 17:46:5.465Open1480C:\malware.exeC:\Windows\SysWOW64\ncrypt.dll
21/2/2020 - 17:46:5.465Open1480C:\malware.exeC:\bcrypt.dll
21/2/2020 - 17:46:5.465Open1480C:\malware.exeC:\Windows\SysWOW64\bcrypt.dll
21/2/2020 - 17:46:5.465Open1480C:\malware.exeC:\Windows\SysWOW64\bcrypt.dll
21/2/2020 - 17:46:5.465Open1480C:\malware.exeC:\Windows\SysWOW64\bcryptprimitives.dll
21/2/2020 - 17:46:5.465Unknown1480C:\malware.exeC:\Windows\SysWOW64\bcryptprimitives.dllbcryptprimitives.dll
21/2/2020 - 17:46:5.465Open1480C:\malware.exeC:\Windows\SysWOW64\bcryptprimitives.dll
21/2/2020 - 17:46:5.465Unknown1480C:\malware.exeC:\Windows\SysWOW64\bcryptprimitives.dllbcryptprimitives.dll
21/2/2020 - 17:46:5.481Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
21/2/2020 - 17:46:5.481Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
21/2/2020 - 17:46:5.481Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
21/2/2020 - 17:46:5.481Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
21/2/2020 - 17:46:5.481Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
21/2/2020 - 17:46:5.481Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
21/2/2020 - 17:46:5.481Open1480C:\malware.exeC:\GPAPI.dll
21/2/2020 - 17:46:5.481Open1480C:\malware.exeC:\Windows\SysWOW64\gpapi.dll
21/2/2020 - 17:46:5.481Open1480C:\malware.exeC:\Windows\SysWOW64\gpapi.dll
21/2/2020 - 17:46:5.528Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My
21/2/2020 - 17:46:5.528Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
21/2/2020 - 17:46:5.528Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
21/2/2020 - 17:46:5.528Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
21/2/2020 - 17:46:5.528Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs
21/2/2020 - 17:46:5.528Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
21/2/2020 - 17:46:5.528Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
21/2/2020 - 17:46:5.528Open1480C:\malware.exeC:\Windows\SysWOW64\p2pcollab.dll
21/2/2020 - 17:46:5.528Unknown1480C:\malware.exeC:\Windows\SysWOW64\p2pcollab.dllp2pcollab.dll
21/2/2020 - 17:46:5.528Open1480C:\malware.exeC:\Windows\SysWOW64\p2pcollab.dll
21/2/2020 - 17:46:5.528Unknown1480C:\malware.exeC:\Windows\SysWOW64\p2pcollab.dllp2pcollab.dll
21/2/2020 - 17:46:5.528Open1480C:\malware.exeC:\Windows\SysWOW64\qagentrt.dll
21/2/2020 - 17:46:5.528Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
21/2/2020 - 17:46:5.528Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\cryptnet.dll
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\Windows\SysWOW64\cryptnet.dll
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\Windows\SysWOW64\cryptnet.dll
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:5.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_AD876BD6070522D4EE8560FE72EBB41A
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5FD5BF0CE6372B1CAFE381FD0BC969C
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\SensApi.dll
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\Windows\SysWOW64\SensApi.dll
21/2/2020 - 17:46:5.543Open1480C:\malware.exeC:\Windows\SysWOW64\SensApi.dll
21/2/2020 - 17:46:5.606Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.606Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.606Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.606Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.606Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:5.606Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:5.653Open1480C:\malware.exeC:\WINHTTP.dll
21/2/2020 - 17:46:5.653Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
21/2/2020 - 17:46:5.653Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
21/2/2020 - 17:46:5.653Open1480C:\malware.exeC:\webio.dll
21/2/2020 - 17:46:5.653Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
21/2/2020 - 17:46:5.653Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
21/2/2020 - 17:46:5.653Open1480C:\malware.exeC:\Windows\SysWOW64\pt-BR\KernelBase.dll.mui
21/2/2020 - 17:46:5.747Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
21/2/2020 - 17:46:5.747Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
21/2/2020 - 17:46:5.762Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.762Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.762Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.762Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:5.762Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.122Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.122Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.122Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.122Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.122Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.122Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.122Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.122Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.122Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.122Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:6.122Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:6.122Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:6.122Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:6.122Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.122Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.122Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.122Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.122Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.122Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.122Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.122Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.122Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.122Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.122Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.137Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.137Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.137Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.137Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.137Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.137Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.137Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.137Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.137Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.137Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DEB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
21/2/2020 - 17:46:6.137Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.137Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.137Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.137Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.137Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.137Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.137Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.153Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.153Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.153Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.153Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.153Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_5F4A6047A3FBCAF69FE9965B6C68B6B7
21/2/2020 - 17:46:6.153Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.153Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.153Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.153Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.153Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:6.184Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.184Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.184Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.325Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.325Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.325Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.325Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.325Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.450Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.450Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.450Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.450Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.450Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.450Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.450Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.450Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.450Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.481Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:6.481Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:6.481Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:6.481Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:6.481Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.481Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.481Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.481Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.497Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.497Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.497Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.497Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.497Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.497Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.497Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.497Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.497Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.497Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.590Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.590Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.590Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.747Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.747Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.747Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.747Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.747Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.747Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.747Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.747Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:6.747Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.747Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:6.747Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:6.747Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:6.747Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:6.747Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.747Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.747Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.747Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.747Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.747Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.747Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.747Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.747Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.747Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.747Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.747Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
21/2/2020 - 17:46:6.981Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.981Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.981Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.981Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:6.981Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.575Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.575Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.575Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.575Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.575Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:7.575Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:7.575Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:7.575Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:7.575Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.575Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:7.575Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:7.575Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\67F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\67F6625BC22310D5C99DDE12020DBD9067F6625BC22310D5C99DDE12020DBD90
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_07A78BC2A3DE35E004D2101436E07F9F
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.590Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:7.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:7.840Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.840Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.840Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.840Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.840Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:7.950Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.950Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.950Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.950Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:7.950Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:7.950Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:7.950Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:7.950Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:7.950Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:7.950Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:7.950Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:7.950Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:7.950Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:7.950Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:7.965Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:7.965Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:7.965Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:7.965Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:7.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:7.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:7.965Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:7.965Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:7.965Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:7.965Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:7.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:7.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:7.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.75Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.75Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.75Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.75Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.75Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.75Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.75Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.75Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.75Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:8.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:8.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:8.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:8.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:8.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:8.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:8.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:8.200Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.200Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.200Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.200Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.200Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.200Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.200Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE93AB13FAED800E24D8412FA53D96B653_E7D87CE2F59E3F375072B03551325EEE
21/2/2020 - 17:46:8.293Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.293Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.293Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.293Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.293Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.637Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.637Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.637Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:8.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:8.637Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:8.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:8.637Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.637Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:8.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:8.637Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:8.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content
21/2/2020 - 17:46:8.637Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.637Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.637Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.637Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.637Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.637Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.637Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.653Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.653Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow
21/2/2020 - 17:46:8.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:8.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:8.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:8.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData
21/2/2020 - 17:46:8.653Open1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.653Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.653Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.653Read1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.653Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.653Write1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.653Unknown1480C:\malware.exeC:\Users\Behemot\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D1B4F39A29C29228077F9FC46DBC8FE7D1B4F39A29C29228077F9FC46DBC8FE
21/2/2020 - 17:46:8.950Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 17:46:8.950Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 17:46:8.950Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies\YGEUGVDL.txt
21/2/2020 - 17:46:8.950Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies\YGEUGVDL.txt
21/2/2020 - 17:46:8.950Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies\YGEUGVDL.txt
21/2/2020 - 17:46:8.950Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies\YGEUGVDL.txt
21/2/2020 - 17:46:8.950Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies\YGEUGVDL.txt
21/2/2020 - 17:46:8.950Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies\YGEUGVDL.txt
21/2/2020 - 17:46:8.950Write1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies\YGEUGVDL.txt
21/2/2020 - 17:46:8.997Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:8.997Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:8.997Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:8.997Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:8.997Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:8.997Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:8.997Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:8.997Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:8.997Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:8.997Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:8.997Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.75Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.75Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.75Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.75Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.75Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.75Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.75Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.75Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.75Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.75Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.75Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.75Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.90Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.215Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.215Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.215Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.215Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.215Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.215Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.215Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Read1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:9.247Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:16.247Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:16.247Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:16.247Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:16.247Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:16.247Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:16.247Read1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:16.247Read1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:16.247Read1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:16.247Read1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:16.247Read1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:16.247Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg\R4Nsad92.fas
21/2/2020 - 17:46:25.262Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg
21/2/2020 - 17:46:25.262Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\cdefrg
21/2/2020 - 17:46:27.575Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll
21/2/2020 - 17:46:27.575Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
21/2/2020 - 17:46:4.137Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
21/2/2020 - 17:46:4.137Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
21/2/2020 - 17:46:4.137Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
21/2/2020 - 17:46:4.137Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
21/2/2020 - 17:46:4.137Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
21/2/2020 - 17:46:4.137Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
21/2/2020 - 17:46:4.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
21/2/2020 - 17:46:4.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
21/2/2020 - 17:46:4.372Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
21/2/2020 - 17:46:4.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
21/2/2020 - 17:46:4.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
21/2/2020 - 17:46:4.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
21/2/2020 - 17:46:4.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
21/2/2020 - 17:46:4.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
21/2/2020 - 17:46:4.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
21/2/2020 - 17:46:4.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
21/2/2020 - 17:46:4.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
21/2/2020 - 17:46:4.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
21/2/2020 - 17:46:4.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
21/2/2020 - 17:46:4.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
21/2/2020 - 17:46:4.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
21/2/2020 - 17:46:5.528Write1480C:\malware.exeHKCU\Local Settings\MuiCache\5\96383CDBLanguageList
21/2/2020 - 17:46:5.528Write1480C:\malware.exeHKCU\Local Settings\MuiCache\5\96383CDBLanguageList
21/2/2020 - 17:46:5.528Write1480C:\malware.exeHKCU\Local Settings\MuiCache\5\96383CDBLanguageList
21/2/2020 - 17:46:5.528Write1480C:\malware.exeHKCU\Local Settings\MuiCache\5\96383CDBLanguageList
21/2/2020 - 17:46:5.528Write1480C:\malware.exeHKCU\Local Settings\MuiCache\5\96383CDBLanguageList
21/2/2020 - 17:46:5.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
21/2/2020 - 17:46:5.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
21/2/2020 - 17:46:5.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
21/2/2020 - 17:46:5.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
21/2/2020 - 17:46:5.965Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
21/2/2020 - 17:46:5.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
21/2/2020 - 17:46:5.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
21/2/2020 - 17:46:5.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
21/2/2020 - 17:46:5.965Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
21/2/2020 - 17:46:5.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
21/2/2020 - 17:46:5.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
21/2/2020 - 17:46:5.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
21/2/2020 - 17:46:5.965Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: True check_circle

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:DNS code www.4shared.com.
computer localhost arrow_forward computer gateway:DNS code ocsp.godaddy.com.
computer localhost arrow_forward computer gateway:59829 code crl.godaddy.com.
computer localhost arrow_forward computer gateway:DNS code laostj.xyz.
computer localhost arrow_forward computer gateway:50043 code laostj.xyz.
computer localhost arrow_forward computer gateway:DNS code crl.godaddy.com.
computer localhost arrow_forward computer gateway:50273 code www.4shared.com.

Response
computer gateway:DNS arrow_forward computer localhost code crl.godaddy.com. reply_all 192.124.249.36

computer gateway:DNS arrow_forward computer localhost code ocsp.godaddy.com. reply_all 192.124.249.23

computer gateway:DNS arrow_forward computer localhost code www.4shared.com. reply_all 199.101.134.235


TCP
Info
help_outline 192.124.249.36:80 arrow_forward computer localhost:65192
computer localhost:65191 arrow_forward 199.101.134.236:443
help_outline 192.124.249.41:80 arrow_forward computer localhost:65193
199.101.134.236:443 arrow_forward computer localhost:65191
computer localhost:65192 arrow_forward help_outline 192.124.249.36:80
computer localhost:65193 arrow_forward help_outline 192.124.249.41:80

UDP
Info
computer localhost:55394 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:59829
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:50043
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:50043 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:55394
computer localhost:59829 arrow_forward computer localhost:53
computer localhost:67 arrow_forward computer localhost:68
computer localhost:68 arrow_forward help_outline 255.255.255.255:67

HTTP
Info
computer localhost send GET ocsp.godaddy.com help_outline attach_file //MEowSDBGMEQwQjAJBgUrDgMCGgUABBS2CA1fbGt26xPkOKX4ZguoUjM0TgQUQMK9J47MNIMwojPX%2B2yz8LQsgM4CCQDKNAdFbOtllg%3D%3D
computer localhost send GET ocsp.godaddy.com help_outline attach_file //MEIwQDA%2BMDwwOjAJBgUrDgMCGgUABBQdI2%2BOBkuXH93foRUj4a7lAr4rGwQUOpqFBxBnKLbv9r0FQW4gwZTaD94CAQc%3D
computer localhost send GET crl.godaddy.com help_outline attach_file /gdroot-g2.crl
computer localhost send GET ocsp.godaddy.com help_outline attach_file //MEQwQjBAMD4wPDAJBgUrDgMCGgUABBTkIInKBAzXkF0Qh0pel3lfHJ9GPAQU0sSw0pHUTBFxs2HLPaH%2B3ahq1OMCAxvnFQ%3D%3D
computer localhost send GET crl.godaddy.com help_outline attach_file /gdig2s1-583.crl

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
True check_circle

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 63.60%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 64.25%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 59.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 83.26%
suspicious: False cancel

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 98.16%
suspicious: False cancel

Add to Collection
Download