Report #7276 check_circle

Binary
DLL
False cancel
Size
2.63MB
trid
50.5% Inno Setup installer
19.8% InstallShield setup
19.1% Win32 EXE PECompact compressed
4.6% DOS Borland compiled Executable
2.0% Win32 Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
41163939dbb0487929b1110526f72e2c
sha1
c146a2f589f0941045c38a536b4f1bfa98ad7c2f
crc32
0xedeafb1d
sha224
03be20efbcb3819c26cfd4841b6515fa796a2a5464dca2051de3619c
sha256
722ec041bd2b5bab565fd6a1034b85f4d5194e94304e3af5c161cbd55dbacd15
sha384
c468ed60f8729dc9240e34e1e34c45777bce044415665e72665ee142ab2f78856f78cdbe8d2d71005f727d34b2c15fe7
sha512
86ebbf09fe879122dbfdc96a313a3ec73801cdf615da29e8403f18e2ce96fb507e47ece50ce553d173d9b8dd0b5198ef741ff9054adf0fb9252bae1395b1bb7f
ssdeep
49152:l+qyS1u4FKug9lbkwtoJNzD0m47stFkCtxD8jSjhI4AIPTT5tTKUDO0:dFKx9hkXX0mhtFkCtxD8jS24fZnL
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, Borland_Delphi_30_, CRC32_poly_Constant, BASE64_table, RIPEMD160_Constants, borland_delphi, Delphi_FormShow, BobSoftMiniDelphiBoBBobSoft, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, BobSoft_Mini_Delphi_BoB_BobSoft_additional, win_files_operation, OpenSSL_DSA, win_hook, RijnDael_AES_CHAR, win_mutex, screenshot, Borland_Delphi_v40_v50, keylogger, MD5_Constants, Borland_Delphi_40_additional, IsPE32, Borland_Delphi_40, network_ssl, Delphi_Random, IsWindowsGUI, HasDigitalSignature, anti_dbg, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, SHA1_Constants, contentis_base64, win_registry, HasOverlay, RijnDael_AES_LONG, Borland_Delphi_30_additional, Borland_Delphi_v30

Suspicious
True check_circle

Strings
List
the appropriate version of this product at http://www.componentace.com
Web site: http://www.componentace.com
http://www.indyproject.org/
pequeninosdosenhor.org
pequeninosdosenhor.org
C:\Builds\TP\indysockets\lib\System\IdStreamVCL.pas
C:\Builds\TP\indysockets\lib\System\IdStreamVCL.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdStack.pas
C:\Builds\TP\indysockets\lib\System\IdStack.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
t.Ht
DefaultFont.Name
Font.Style
Font.Name
DefaultFont.Style
C:\Builds\TP\indysockets\lib\Core\IdIOHandlerStack.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandlerStack.pas
C:\Builds\TP\indysockets\lib\Core\IdScheduler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdThread.pas
C:\Builds\TP\indysockets\lib\Protocols\IdCoder3to4.pas
Invalid compressed size, rfs.size = %d, count = %d
+http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
.http://crl.thawte.com/ThawteTimestampingCA.crl0
+http://ts-aia.ws.symantec.com/tss-ca-g2.cer0<
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
feel free to contact us at support@componentace.com
libssl32.dll
ssleay32.dll
127.0.0.1
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
C:\Users\RAZER\Desktop\bsf1010\bsf1010\bsEffects.pas
C:\Users\RAZER\Desktop\bsf1010\bsf1010\bsEffects.pas
C:\Users\RAZER\Desktop\bsf1010\bsf1010\bsEffects.pas
C:\Users\RAZER\Desktop\bsf1010\bsf1010\bsEffects.pas
_ossl_old_des_ecb_encrypt
Duplicate field name '%s'!Error binding data to SSL socket.+EOF was observed that violates the protocol
Reply Code already exists: %sDThis authentication method is already registered with class name %s.KUnsupported hash algorithm. This implementation supports only MD5 encoding.$Error accepting connection with SSL.
\Software\Borland\C++Builder
_ossl_old_des_set_key
SSL status: "%s"
windowscodecs.dll
\Software\Borland\Delphi
SSL_set_connect_state
B.rsrc
Delphi%.8X
Software\Borland\Locales
ISO_646.irv:1991
Software\Borland\Delphi\Locales
winspool.drv
winspool.drv
\Software\Borland\BDS
msimg32.dll
comctl32.dll
comctl32.dll
comctl32.dll
libeay32.dll
msimg32.dll
msimg32.dll
comctl32.dll
comctl32.dll
comctl32.dll
Wship6.dll
\romeu.sey
version.dll
_ossl_old_des_set_odd_parity
Setting bit transparency color is not allowed for png images containing alpha value for each pixel (COLOR_RGBALPHA and COLOR_GRAYSCALEALPHA)OThis operation is not valid because the current image contains no valid header.4The new size provided for image resizing is invalid.oThe "Portable Network Graphics" could not be created because invalid image type parameters have being provided.
uxtheme.dll
wininet.dll
Fwpuclnt.dll

Foremost
Matches
0.exe, 2 MB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: True check_circle
Allowed: 255.255.255.255, 1, record, 127.0.0.1, 1, localhost.
Suspicious: 0.0.0.1, 0, Unknown
hasAllowed: True check_circle
hasSuspicious: True check_circle

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(, http://crl.thawte.com/thawtetimestampingca.crl0, http://www.componentace.com, http://ocsp.thawte.com0, http://www.indyproject.org/, http://ts-aia.ws.symantec.com/tss-ca-g2.cer0<, http://ts-ocsp.ws.symantec.com07
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: USER32.DLL, kernel32.dll, uxtheme.dll, dwmapi.dll, MSWSOCK.DLL, libeay32.dll, Fwpuclnt.dll, gdi32.dll, comctl32.dll, Wship6.dll, ssleay32.dll, ole32.dll, msimg32.dll, libssl32.dll, imm32.dll, oleaut32.dll, WS2_32.DLL, SHFolder.dll, wininet.dll, advapi32.dll, windowscodecs.dll, shell32.dll, version.dll
hasFiles: True check_circle
Suspicious: XML files (*.xml)|*.xml, Space delimited text files (*.txt)|*.txt, Tab delimited text files (*.txt)|*.txt, Custom delimited text files (*.txt)|*.txt, Colon delimited text files (*.txt)|*.txt, PDF files (*.pdf)|*.pdf
hasAllowed: True check_circle
hasSuspicious: True check_circle

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 437248
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 2787628
Suspicous: False cancel

Sections
Allowed: .text, .itext, .data, .bss, .idata, .didata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 2325792
Suspicious: False cancel

Anomalies
Anomalies
hasAnomalies: False cancel

Libraries
Allowed: user32.dll, kernel32.dll, uxtheme.dll, dwmapi.dll, mswsock.dll, gdi32.dll, comctl32.dll, wship6.dll, ole32.dll, msimg32.dll, imm32.dll, oleaut32.dll, ws2_32.dll, shfolder.dll, wininet.dll, advapi32.dll, windowscodecs.dll, shell32.dll, version.dll
hasLibs: True check_circle
Suspicious: libeay32.dll, fwpuclnt.dll, ssleay32.dll, libssl32.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2016-11-25 15:45:58
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: BobSoft Mini Delphi -> BoB / BobSoft
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v3.0
MainPacker: BobSoft Mini Delphi -> BoB / BobSoft

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.data: 15
.rsrc: 1
.text: 67
.itext: 8

pushpopmath
.data: 16
.rsrc: 18
.text: 39
.reloc: 147

ss register
.text: 1

garbagebytes
.data: 7
.text: 51
.itext: 8

hookdetection
.text: 4
.reloc: 14

software breakpoint
.text: 5
.reloc: 52

programcontrolflowchange
.data: 7
.text: 51
.itext: 8

cpuinstructionsresultscomparison
.data: 21
.rsrc: 62
.text: 31
.reloc: 1

AVclass
delf
1
VirusTotal
md5
41163939dbb0487929b1110526f72e2c
sha1
c146a2f589f0941045c38a536b4f1bfa98ad7c2f
SCANS (DETECTION RATE = 62.69%)
AVG
result: Win32:Banker-MYH [Trj]
update: 20180323
version: 18.2.3827.0
detected: True check_circle

CMC
update: 20180323
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=85)
update: 20180323
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180322
version: 1.3.0.9466
detected: False cancel

K7GW
result: Unwanted-Program ( 004ff9991 )
update: 20180323
version: 10.42.26597
detected: True check_circle

ALYac
result: Trojan.GenericKD.3782797
update: 20180323
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Banker-MYH [Trj]
update: 20180323
version: 18.2.3827.0
detected: True check_circle

Avira
result: TR/Dldr.Banload.vvdtd
update: 20180323
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180323
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.VPHP-1050
update: 20180323
version: 5.4.30.7
detected: True check_circle

DrWeb
update: 20180323
version: 7.0.28.2020
detected: False cancel

GData
result: Trojan.GenericKD.3782797
update: 20180323
version: A:25.16481B:25.11861
detected: True check_circle

Panda
result: Trj/GdSda.A
update: 20180323
version: 4.6.4.2
detected: True check_circle

VBA32
update: 20180323
version: 3.12.28.0
detected: False cancel

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180323
version: 65478
detected: True check_circle

Zoner
update: 20180323
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180323
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180323
version: 0.99.2.0
detected: False cancel

Comodo
update: 20180323
detected: False cancel

F-Prot
update: 20180323
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180323
version: 0.1.5.2
detected: True check_circle

McAfee
result: Trojan-FKEQ!41163939DBB0
update: 20180323
version: 6.0.6.653
detected: True check_circle

Rising
result: Downloader.Banload!8.15B (TFE:4:VlL84LEYnWP)
update: 20180323
version: 25.0.0.1
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20180323
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.DL.Delf!rXlNlqDconk
update: 20180323
version: 5.5.1.3
detected: True check_circle

Zillya
update: 20180323
version: 2.0.0.3519
detected: False cancel

Arcabit
result: Trojan.Generic.D39B88D
update: 20180323
version: 1.0.0.831
detected: True check_circle

Cylance
result: Unsafe
update: 20180323
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180316
version: 2.0.5
detected: True check_circle

Tencent
result: Win32.Trojan-downloader.Delf.Oyok
update: 20180323
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180323
version: 2014.3.20.0
detected: False cancel

eGambit
update: 20180323
version: v4.3.5
detected: False cancel

Ad-Aware
result: Trojan.GenericKD.3782797
update: 20180323
version: 3.0.3.1010
detected: True check_circle

AegisLab
result: Troj.Downloader.W32.Delf!c
update: 20180323
version: 4.2
detected: True check_circle

Emsisoft
result: Trojan.GenericKD.3782797 (B)
update: 20180323
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Trojan.GenericKD.3782797
update: 20180323
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.XRS!tr.dldr
update: 20180323
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Jiangmin
update: 20180323
version: 16.0.100
detected: False cancel

Kingsoft
update: 20180323
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180323
version: 1.0
detected: True check_circle

Symantec
result: Downloader
update: 20180323
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180323
version: 2018-03-23.02
detected: False cancel

AhnLab-V3
update: 20180323
version: 3.12.0.20130
detected: False cancel

Antiy-AVL
result: Trojan[Downloader]/Win32.Delf
update: 20180323
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan-Downloader.Win32.Delf.klau
update: 20180323
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload
update: 20180323
version: 1.1.14600.4
detected: True check_circle

Qihoo-360
result: Win32/Trojan.Downloader.a2c
update: 20180323
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180319
version: 6.8.0.5.2551
detected: False cancel

ZoneAlarm
result: Trojan-Downloader.Win32.Delf.klau
update: 20180323
version: 1.0
detected: True check_circle

Cybereason
result: malicious.9dbb04
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.XRS
update: 20180323
version: 17107
detected: True check_circle

TrendMicro
result: TROJ_GEN.R007C0DJ117
update: 20180323
version: 9.862.0.1074
detected: True check_circle

WhiteArmor
update: 20180223
detected: False cancel

BitDefender
result: Trojan.GenericKD.3782797
update: 20180323
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_100% (W)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Unwanted-Program ( 004ff9991 )
update: 20180323
version: 10.42.26598
detected: True check_circle

SentinelOne
update: 20180225
version: 1.0.15.206
detected: False cancel

Avast-Mobile
update: 20180323
version: 180323-04
detected: False cancel

Malwarebytes
update: 20180323
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20180323
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
update: 20180323
version: 14.00
detected: False cancel

NANO-Antivirus
result: Trojan.Win32.Delf.ejeopu
update: 20180323
version: 1.0.100.22043
detected: True check_circle

MicroWorld-eScan
result: Trojan.GenericKD.3782797
update: 20180323
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180323
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: Trojan-FKEQ!41163939DBB0
update: 20180323
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R007C0DJ117
update: 20180323
version: 9.950.0.1006
detected: True check_circle

total
67
sha256
722ec041bd2b5bab565fd6a1034b85f4d5194e94304e3af5c161cbd55dbacd15
scan_id
722ec041bd2b5bab565fd6a1034b85f4d5194e94304e3af5c161cbd55dbacd15-1521843340
resource
41163939dbb0487929b1110526f72e2c
positives
42
scan_date
2018-03-23 22:15:40
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
21/2/2020 - 17:45:43.856Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
21/2/2020 - 17:45:43.856Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
21/2/2020 - 17:45:43.856Open1480C:\malware.exeC:\dwmapi.dll
21/2/2020 - 17:45:43.856Open1480C:\malware.exeC:\Windows\SysWOW64\dwmapi.dll
21/2/2020 - 17:45:43.856Open1480C:\malware.exeC:\Windows\SysWOW64\dwmapi.dll
21/2/2020 - 17:45:43.856Open1480C:\malware.exeC:\Windows\Fonts\StaticCache.dat
21/2/2020 - 17:45:43.856Read1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
21/2/2020 - 17:45:43.856Open1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nls
21/2/2020 - 17:45:43.856Unknown1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nlsSortDefault.nls
21/2/2020 - 17:45:43.872Open1480C:\malware.exeC:\malware.exe.Local
21/2/2020 - 17:45:43.872Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
21/2/2020 - 17:45:43.872Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
21/2/2020 - 17:45:43.872Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
21/2/2020 - 17:45:43.872Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61\comctl32.dll.mui
21/2/2020 - 17:45:43.872Read1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61\comctl32.dll.muicomctl32.dll.mui
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll.Config
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\malware.exe.Local
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 17:46:4.90Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Windows\WindowsShell.Manifest
21/2/2020 - 17:46:4.90Unknown1480C:\malware.exeC:\Windows\WindowsShell.ManifestWindowsShell.Manifest
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.90Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\romeu.sey
21/2/2020 - 17:46:4.90Open1480C:\malware.exeC:\malware.exe
21/2/2020 - 17:46:4.90Read1480C:\malware.exeC:\malware.exe
21/2/2020 - 17:46:4.90Unknown1480C:\malware.exeC:\malware.exe
21/2/2020 - 17:46:4.106Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg
21/2/2020 - 17:46:4.106Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.106Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.106Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg
21/2/2020 - 17:46:4.106Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg
21/2/2020 - 17:46:4.106Open1480C:\malware.exeC:\Secur32.dll
21/2/2020 - 17:46:4.106Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
21/2/2020 - 17:46:4.106Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
21/2/2020 - 17:46:4.106Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
21/2/2020 - 17:46:4.106Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
21/2/2020 - 17:46:4.106Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
21/2/2020 - 17:46:4.106Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
21/2/2020 - 17:46:4.106Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
21/2/2020 - 17:46:4.106Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
21/2/2020 - 17:46:4.106Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\IPHLPAPI.DLL
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\WINNSI.DLL
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
21/2/2020 - 17:46:4.153Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
21/2/2020 - 17:46:4.153Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\DNSAPI.dll
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
21/2/2020 - 17:46:4.153Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
21/2/2020 - 17:46:4.200Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
21/2/2020 - 17:46:4.200Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
21/2/2020 - 17:46:4.200Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
21/2/2020 - 17:46:4.200Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
21/2/2020 - 17:46:4.293Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
21/2/2020 - 17:46:4.293Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
21/2/2020 - 17:46:4.293Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
21/2/2020 - 17:46:4.293Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
21/2/2020 - 17:46:4.340Open1480C:\malware.exeC:\dhcpcsvc6.DLL
21/2/2020 - 17:46:4.340Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
21/2/2020 - 17:46:4.340Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
21/2/2020 - 17:46:4.340Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
21/2/2020 - 17:46:4.340Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.387Unknown1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.387Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
21/2/2020 - 17:46:4.387Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
21/2/2020 - 17:46:4.387Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.387Unknown1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
21/2/2020 - 17:46:4.387Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 17:46:4.387Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 17:46:4.387Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.387Unknown1480C:\malware.exeC:\Users\Behemot
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.387Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
21/2/2020 - 17:46:4.387Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
21/2/2020 - 17:46:4.387Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\dhcpcsvc.DLL
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\CRYPTSP.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.387Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.403Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.403Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 17:46:4.403Open1480C:\malware.exeC:\RpcRtRemote.dll
21/2/2020 - 17:46:4.403Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
21/2/2020 - 17:46:4.403Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
21/2/2020 - 17:46:4.403Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
21/2/2020 - 17:46:4.403Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
21/2/2020 - 17:46:4.450Open1480C:\malware.exeC:\rasadhlp.dll
21/2/2020 - 17:46:4.450Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
21/2/2020 - 17:46:4.450Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
21/2/2020 - 17:46:4.497Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
21/2/2020 - 17:46:4.497Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
21/2/2020 - 17:46:4.731Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
21/2/2020 - 17:46:4.731Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\malware.exe.Local
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 17:46:4.825Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 17:46:4.825Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 17:46:4.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:4.934Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:4.934Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:4.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:4.934Read1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:4.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:4.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:4.934Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:4.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:4.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:5.559Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
21/2/2020 - 17:46:5.559Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
21/2/2020 - 17:46:11.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:11.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:11.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:11.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:11.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:11.965Read1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:11.965Read1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:11.965Read1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:11.965Read1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:11.965Read1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:11.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg\R4N05ign.TIK
21/2/2020 - 17:46:20.981Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg
21/2/2020 - 17:46:20.981Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\defrtg
21/2/2020 - 17:46:23.278Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll
21/2/2020 - 17:46:23.278Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
21/2/2020 - 17:46:4.153Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
21/2/2020 - 17:46:4.153Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
21/2/2020 - 17:46:4.153Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
21/2/2020 - 17:46:4.153Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
21/2/2020 - 17:46:4.153Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
21/2/2020 - 17:46:4.153Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
21/2/2020 - 17:46:4.387Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
21/2/2020 - 17:46:4.387Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
21/2/2020 - 17:46:4.387Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
21/2/2020 - 17:46:4.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
21/2/2020 - 17:46:4.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
21/2/2020 - 17:46:4.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
21/2/2020 - 17:46:4.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
21/2/2020 - 17:46:4.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
21/2/2020 - 17:46:4.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
21/2/2020 - 17:46:4.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
21/2/2020 - 17:46:4.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
21/2/2020 - 17:46:4.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
21/2/2020 - 17:46:4.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
21/2/2020 - 17:46:4.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
21/2/2020 - 17:46:4.543Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
21/2/2020 - 17:46:5.793Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
21/2/2020 - 17:46:5.793Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
21/2/2020 - 17:46:5.793Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
21/2/2020 - 17:46:5.793Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
21/2/2020 - 17:46:5.793Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
21/2/2020 - 17:46:5.793Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
21/2/2020 - 17:46:5.793Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
21/2/2020 - 17:46:5.793Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
21/2/2020 - 17:46:5.793Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
21/2/2020 - 17:46:5.793Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
21/2/2020 - 17:46:5.793Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
21/2/2020 - 17:46:5.793Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
21/2/2020 - 17:46:5.793Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: True check_circle

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:DNS code ibrasile.web1607.kinghost.net.
computer localhost arrow_forward computer gateway:50273 code ibrasile.web1607.kinghost.net.
computer localhost arrow_forward computer gateway:DNS code laostj.xyz.

Response
computer gateway:DNS arrow_forward computer localhost code ibrasile.web1607.kinghost.net. reply_all 191.6.202.83


TCP
Info
191.6.202.83:80 arrow_forward computer localhost:65191
computer localhost:65191 arrow_forward 191.6.202.83:80

UDP
Info
computer localhost:55394 arrow_forward computer localhost:53
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:53 arrow_forward computer localhost:55394
computer localhost:67 arrow_forward computer localhost:68
computer localhost:68 arrow_forward help_outline 255.255.255.255:67

HTTP
Info
computer localhost send GET ibrasile.web1607.kinghost.net attach_file /urv/2/DNLORDTOOLZ2.zip

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
True check_circle

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 67.69%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 97.75%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 61.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 98.86%
suspicious: False cancel

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 85.00%
suspicious: False cancel

Add to Collection
Download