Report #7279 check_circle

  • Creation Date: Feb. 21, 2020, 3:53 p.m.
  • Last Update: Feb. 21, 2020, 7:01 p.m.
  • File: CV30112016OV.exe
  • Results:
Binary
DLL
False cancel
Size
1.97MB
trid
50.5% Inno Setup installer
19.8% InstallShield setup
19.1% Win32 EXE PECompact compressed
4.6% DOS Borland compiled Executable
2.0% Win32 Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
a5ec564422d1d60dcb4e50f049fe29f0
sha1
504e1eced9ee9cdcb6c96f1be57e73dae4db4727
crc32
0x8a1fe353
sha224
6b40dd90e656edf5a85cd5ac2aa36783a59b0eae54bd2b9d4b791c06
sha256
d2e4bc8b9b1fec739996010a188efd5c6c78570383b0e32f9d924ed5b4644483
sha384
4c1d087842df639328d1abec665d17a5749d72304693ebdd828439736638b6ec992cc080ee433dd9b4afb371a40d2e7c
sha512
9b8202943c9d514a36bdbe4a94a26356ce2e0e2d93997df122259c8b51bf1ed99d1449b42fe975e75c446f675f59bbe1dd813716dc0c950081295fc29b551e43
ssdeep
49152:z4t+cNsISEq6pHqbEmjQpOUUH2pADnZrLB/qd4G/0jmhST14Ttw6iyv:z4YcNlpHqbHQpOUUH2pADntB/g4Row6F
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, Borland_Delphi_30_, CRC32_poly_Constant, BASE64_table, RIPEMD160_Constants, borland_delphi, Delphi_FormShow, BobSoftMiniDelphiBoBBobSoft, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, BobSoft_Mini_Delphi_BoB_BobSoft_additional, win_files_operation, OpenSSL_DSA, win_hook, RijnDael_AES_CHAR, win_mutex, screenshot, Borland_Delphi_v40_v50, keylogger, MD5_Constants, Borland_Delphi_40_additional, IsPE32, Borland_Delphi_40, network_ssl, Delphi_Random, IsWindowsGUI, anti_dbg, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, SHA1_Constants, contentis_base64, win_registry, HasOverlay, RijnDael_AES_LONG, Borland_Delphi_30_additional, Borland_Delphi_v30

Suspicious
True check_circle

Strings
List
the appropriate version of this product at http://www.componentace.com
Web site: http://www.componentace.com
http://www.indyproject.org/
C:\Builds\TP\indysockets\lib\System\IdStreamVCL.pas
C:\Builds\TP\indysockets\lib\System\IdStreamVCL.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdGlobal.pas
C:\Builds\TP\indysockets\lib\System\IdStack.pas
C:\Builds\TP\indysockets\lib\System\IdStack.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSLHeaders.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
C:\Builds\TP\indysockets\lib\Protocols\IdSSLOpenSSL.pas
t.Ht
DefaultFont.Name
DefaultFont.Name
Font.Style
Font.Name
DefaultFont.Style
DefaultFont.Style
C:\Builds\TP\indysockets\lib\Core\IdIOHandlerStack.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandlerStack.pas
C:\Builds\TP\indysockets\lib\Core\IdScheduler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdIOHandler.pas
C:\Builds\TP\indysockets\lib\Core\IdThread.pas
C:\Builds\TP\indysockets\lib\Protocols\IdCoder3to4.pas
Invalid compressed size, rfs.size = %d, count = %d
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
feel free to contact us at support@componentace.com
libssl32.dll
ssleay32.dll
Uh.UG
Uh.vC
127.0.0.1
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
C:\Users\RAZER\Desktop\bsf1010\bsf1010\bsEffects.pas
C:\Users\RAZER\Desktop\bsf1010\bsf1010\bsEffects.pas
C:\Users\RAZER\Desktop\bsf1010\bsf1010\bsEffects.pas
C:\Users\RAZER\Desktop\bsf1010\bsf1010\bsEffects.pas
_ossl_old_des_ecb_encrypt
h.SX
Reply Code already exists: %sDThis authentication method is already registered with class name %s.KUnsupported hash algorithm. This implementation supports only MD5 encoding.$Error accepting connection with SSL.
\Software\Borland\C++Builder
_ossl_old_des_set_key
SSL status: "%s"
windowscodecs.dll
\Software\Borland\Delphi
SSL_set_connect_state
B.rsrc
\lineu.sey
H3A14534l23o23.acq
Delphi%.8X
Software\Borland\Locales
ISO_646.irv:1991
lineu.sey
Software\Borland\Delphi\Locales
winspool.drv
winspool.drv
\Software\Borland\BDS
msimg32.dll
libeay32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
msimg32.dll
comctl32.dll
comctl32.dll
Wship6.dll
version.dll
_ossl_old_des_set_odd_parity
wininet.dll
uxtheme.dll
Fwpuclnt.dll
uxtheme.dll

Foremost
Matches
0.exe, 1 MB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: True check_circle
Allowed: 255.255.255.255, 1, record, 127.0.0.1, 1, localhost.
Suspicious: 0.0.0.1, 0, Unknown
hasAllowed: True check_circle
hasSuspicious: True check_circle

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://www.indyproject.org/, http://www.componentace.com
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: user32.dll, libeay32.dll, kernel32.dll, uxtheme.dll, dwmapi.dll, MSWSOCK.DLL, Fwpuclnt.dll, comctl32.dll, Wship6.dll, ssleay32.dll, ole32.dll, msimg32.dll, libssl32.dll, imm32.dll, oleaut32.dll, WS2_32.DLL, gdi32.dll, SHFolder.dll, wininet.dll, advapi32.dll, windowscodecs.dll, version.dll, shell32.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 329728
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .text, .itext, .data, .bss, .idata, .didata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 1742544
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, kernel32.dll, uxtheme.dll, dwmapi.dll, mswsock.dll, comctl32.dll, wship6.dll, ole32.dll, msimg32.dll, imm32.dll, oleaut32.dll, ws2_32.dll, gdi32.dll, shfolder.dll, wininet.dll, advapi32.dll, windowscodecs.dll, version.dll, shell32.dll
hasLibs: True check_circle
Suspicious: libeay32.dll, fwpuclnt.dll, ssleay32.dll, libssl32.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2016-12-01 00:25:29
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: BobSoft Mini Delphi -> BoB / BobSoft
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v3.0
MainPacker: BobSoft Mini Delphi -> BoB / BobSoft

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.data: 14
.rsrc: 1
.text: 44
.itext: 5
.reloc: 1

pushpopmath
.data: 15
.rsrc: 9
.text: 35
.idata: 2
.reloc: 115

garbagebytes
.data: 7
.text: 38
.itext: 5

hookdetection
.text: 2
.reloc: 6

software breakpoint
.text: 125
.reloc: 38

programcontrolflowchange
.data: 7
.text: 38
.itext: 5

cpuinstructionsresultscomparison
.data: 20
.rsrc: 65
.text: 26
.reloc: 3

AVclass
banload
1
VirusTotal
md5
a5ec564422d1d60dcb4e50f049fe29f0
sha1
504e1eced9ee9cdcb6c96f1be57e73dae4db4727
SCANS (DETECTION RATE = 69.23%)
AVG
result: Win32:Banker-MYK [Trj]
update: 20180529
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20180529
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=88)
update: 20180530
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180529
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan-Downloader ( 004fc4ec1 )
update: 20180529
version: 10.48.27293
detected: True check_circle

ALYac
result: Gen:Variant.Strictor.118123
update: 20180530
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Banker-MYK [Trj]
update: 20180529
version: 18.4.3895.0
detected: True check_circle

Avira
result: TR/Dldr.Banload.qiilr
update: 20180530
version: 8.3.3.6
detected: True check_circle

Baidu
result: Win32.Trojan.WisdomEyes.16070401.9500.9997
update: 20180529
version: 1.0.0.2
detected: True check_circle

Cyren
result: W32/Downloader.10!Generic
update: 20180530
version: 6.0.0.4
detected: True check_circle

DrWeb
update: 20180529
version: 7.0.28.2020
detected: False cancel

GData
result: Gen:Variant.Strictor.118123
update: 20180529
version: A:25.17225B:25.12368
detected: True check_circle

Panda
result: Trj/GdSda.A
update: 20180529
version: 4.6.4.2
detected: True check_circle

VBA32
result: BScope.TrojanDownloader.Delf
update: 20180529
version: 3.12.32.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180530
version: 67028
detected: True check_circle

Zoner
update: 20180530
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180530
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180530
version: 0.99.2.0
detected: False cancel

Comodo
update: 20180530
version: 29099
detected: False cancel

F-Prot
result: W32/Downloader.10!Generic
update: 20180530
version: 4.7.1.166
detected: True check_circle

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180529
version: 0.1.5.2
detected: True check_circle

McAfee
result: Trojan-FKEQ!A5EC564422D1
update: 20180530
version: 6.0.6.653
detected: True check_circle

Rising
update: 20180530
version: 25.0.0.1
detected: False cancel

Sophos
result: Mal/Generic-S
update: 20180529
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.DL.Delf!jAgKgX/wpQs
update: 20180529
version: 5.5.1.3
detected: True check_circle

Zillya
update: 20180528
version: 2.0.0.3562
detected: False cancel

Arcabit
result: Trojan.Strictor.D1CD6B
update: 20180530
version: 1.0.0.831
detected: True check_circle

Babable
update: 20180406
version: 9107201
detected: False cancel

Cylance
result: Unsafe
update: 20180530
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180507
version: 2.1.2
detected: True check_circle

Tencent
result: Win32.Trojan-downloader.Delf.Lors
update: 20180530
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180529
version: 2014.3.20.0
detected: False cancel

Webroot
result: W32.Trojan.Gen
update: 20180530
version: 1.0.0.403
detected: True check_circle

eGambit
update: 20180530
detected: False cancel

Ad-Aware
result: Gen:Variant.Strictor.118123
update: 20180529
version: 3.0.5.370
detected: True check_circle

AegisLab
result: Troj.W32.Generic!c
update: 20180530
version: 4.2
detected: True check_circle

Emsisoft
result: Gen:Variant.Strictor.118123 (B)
update: 20180529
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Gen:Variant.Strictor.118123
update: 20180530
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.XRS!tr.dldr
update: 20180530
version: 5.4.247.0
detected: True check_circle

Invincea
result: heuristic
update: 20180503
version: 6.3.4.26036
detected: True check_circle

Jiangmin
update: 20180529
version: 16.0.100
detected: False cancel

Kingsoft
update: 20180530
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180530
version: 1.0
detected: True check_circle

Symantec
result: ML.Attribute.HighConfidence
update: 20180530
version: 1.6.0.0
detected: True check_circle

nProtect
update: 20180530
version: 2018-05-30.01
detected: False cancel

AhnLab-V3
result: Trojan/Win32.Banload.C1695215
update: 20180529
version: 3.12.1.20996
detected: True check_circle

Antiy-AVL
result: Trojan/Win32.AGeneric
update: 20180530
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan-Downloader.Win32.Delf.klbt
update: 20180529
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload
update: 20180530
version: 1.1.14901.4
detected: True check_circle

Qihoo-360
result: HEUR/QVM05.1.8B8F.Malware.Gen
update: 20180530
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180524
version: 6.8.0.5.2911
detected: False cancel

ZoneAlarm
result: Trojan-Downloader.Win32.Delf.klbt
update: 20180529
version: 1.0
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.XRU
update: 20180530
version: 17467
detected: True check_circle

TrendMicro
update: 20180530
version: 10.0.0.1040
detected: False cancel

BitDefender
result: Gen:Variant.Strictor.118123
update: 20180530
version: 7.2
detected: True check_circle

K7AntiVirus
result: Trojan-Downloader ( 004fc4ec1 )
update: 20180529
version: 10.48.27289
detected: True check_circle

SentinelOne
result: static engine - malicious
update: 20180225
version: 1.0.15.206
detected: True check_circle

Avast-Mobile
update: 20180530
version: 180529-04
detected: False cancel

Malwarebytes
update: 20180530
version: 2.1.1.1115
detected: False cancel

CAT-QuickHeal
result: Trojan.Dynamer
update: 20180529
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Delf.ejcpso
update: 20180529
version: 1.0.106.22618
detected: True check_circle

MicroWorld-eScan
result: Gen:Variant.Strictor.118123
update: 20180529
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180529
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Dropper.th
update: 20180530
version: v2017.2786
detected: True check_circle

TrendMicro-HouseCall
update: 20180530
version: 9.950.0.1006
detected: False cancel

total
65
sha256
d2e4bc8b9b1fec739996010a188efd5c6c78570383b0e32f9d924ed5b4644483
scan_id
d2e4bc8b9b1fec739996010a188efd5c6c78570383b0e32f9d924ed5b4644483-1527647357
resource
a5ec564422d1d60dcb4e50f049fe29f0
positives
45
scan_date
2018-05-30 02:29:17
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
21/2/2020 - 18:45:44.481Unknown2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
21/2/2020 - 18:45:44.481Open2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61
21/2/2020 - 18:45:44.481Open2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61\comctl32.dll.mui
21/2/2020 - 18:45:44.528Read2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.7600.16385_pt-br_039faf2d05cfba61\comctl32.dll.muicomctl32.dll.mui
21/2/2020 - 18:46:4.731Open2308C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll.Config
21/2/2020 - 18:46:4.731Open2308C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
21/2/2020 - 18:46:4.731Open2308C:\malware.exeC:\malware.exe.Local
21/2/2020 - 18:46:4.731Open2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 18:46:4.731Unknown2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 18:46:4.731Open2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 18:46:4.731Open2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
21/2/2020 - 18:46:4.731Open2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
21/2/2020 - 18:46:4.731Open2308C:\malware.exeC:\Windows\WindowsShell.Manifest
21/2/2020 - 18:46:4.731Unknown2308C:\malware.exeC:\Windows\WindowsShell.ManifestWindowsShell.Manifest
21/2/2020 - 18:46:4.731Open2308C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 18:46:4.731Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 18:46:4.731Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\lineu.sey
21/2/2020 - 18:46:4.731Open2308C:\malware.exeC:\malware.exe
21/2/2020 - 18:46:4.731Read2308C:\malware.exeC:\malware.exe
21/2/2020 - 18:46:4.731Unknown2308C:\malware.exeC:\malware.exe
21/2/2020 - 18:46:4.747Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\ovt
21/2/2020 - 18:46:4.747Open2308C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 18:46:4.747Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 18:46:4.747Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\ovt
21/2/2020 - 18:46:4.747Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\ovt
21/2/2020 - 18:46:4.747Open2308C:\malware.exeC:\Secur32.dll
21/2/2020 - 18:46:4.747Open2308C:\malware.exeC:\Windows\SysWOW64\secur32.dll
21/2/2020 - 18:46:4.747Open2308C:\malware.exeC:\Windows\SysWOW64\secur32.dll
21/2/2020 - 18:46:4.747Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
21/2/2020 - 18:46:4.747Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
21/2/2020 - 18:46:4.747Open2308C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
21/2/2020 - 18:46:4.747Open2308C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
21/2/2020 - 18:46:4.747Unknown2308C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
21/2/2020 - 18:46:4.747Open2308C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
21/2/2020 - 18:46:4.747Unknown2308C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\Windows\SysWOW64\webio.dll
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\Windows\SysWOW64\webio.dll
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\IPHLPAPI.DLL
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\WINNSI.DLL
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
21/2/2020 - 18:46:4.793Unknown2308C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
21/2/2020 - 18:46:4.793Unknown2308C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\DNSAPI.dll
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
21/2/2020 - 18:46:4.793Open2308C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
21/2/2020 - 18:46:4.840Open2308C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
21/2/2020 - 18:46:4.840Open2308C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
21/2/2020 - 18:46:4.840Open2308C:\malware.exeC:\Windows\SysWOW64\wship6.dll
21/2/2020 - 18:46:4.840Open2308C:\malware.exeC:\Windows\SysWOW64\wship6.dll
21/2/2020 - 18:46:4.965Open2308C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
21/2/2020 - 18:46:4.965Open2308C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
21/2/2020 - 18:46:4.965Open2308C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
21/2/2020 - 18:46:4.965Open2308C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
21/2/2020 - 18:46:5.12Open2308C:\malware.exeC:\dhcpcsvc6.DLL
21/2/2020 - 18:46:5.12Open2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
21/2/2020 - 18:46:5.12Unknown2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
21/2/2020 - 18:46:5.12Open2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
21/2/2020 - 18:46:5.12Unknown2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot
21/2/2020 - 18:46:5.59Unknown2308C:\malware.exeC:\Users\Behemot
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 18:46:5.59Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
21/2/2020 - 18:46:5.59Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
21/2/2020 - 18:46:5.59Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot
21/2/2020 - 18:46:5.59Unknown2308C:\malware.exeC:\Users\Behemot
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
21/2/2020 - 18:46:5.59Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 18:46:5.59Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 18:46:5.59Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot
21/2/2020 - 18:46:5.59Unknown2308C:\malware.exeC:\Users\Behemot
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 18:46:5.59Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
21/2/2020 - 18:46:5.59Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
21/2/2020 - 18:46:5.59Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\dhcpcsvc.DLL
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\CRYPTSP.dll
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 18:46:5.59Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 18:46:5.75Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 18:46:5.75Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
21/2/2020 - 18:46:5.75Open2308C:\malware.exeC:\RpcRtRemote.dll
21/2/2020 - 18:46:5.75Open2308C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
21/2/2020 - 18:46:5.75Unknown2308C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
21/2/2020 - 18:46:5.75Open2308C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
21/2/2020 - 18:46:5.75Unknown2308C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
21/2/2020 - 18:46:5.122Open2308C:\malware.exeC:\rasadhlp.dll
21/2/2020 - 18:46:5.122Open2308C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
21/2/2020 - 18:46:5.122Open2308C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
21/2/2020 - 18:46:5.168Open2308C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
21/2/2020 - 18:46:5.168Open2308C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
21/2/2020 - 18:46:5.215Open2308C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
21/2/2020 - 18:46:5.215Open2308C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\wininet.dll
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\malware.exe.Local
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 18:46:5.372Unknown2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\wship6.dll
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\wship6.dll
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\wship6.dll
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 18:46:5.372Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
21/2/2020 - 18:46:6.278Open2308C:\malware.exeC:\Windows\SysWOW64\wininet.dll
21/2/2020 - 18:46:6.278Open2308C:\malware.exeC:\Windows\SysWOW64\wininet.dll
21/2/2020 - 18:46:47.450Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\ovt\H3A14534l23o23.acq
21/2/2020 - 18:46:47.450Write2308C:\malware.exeC:\Users\Behemot\AppData\Local\ovt\H3A14534l23o23.acqH3A14534l23o23.acq
21/2/2020 - 18:46:47.450Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\ovt\H3A14534l23o23.acq
21/2/2020 - 18:46:47.450Open2308C:\malware.exeC:\Windows\SysWOW64\pt-BR\KernelBase.dll.mui
21/2/2020 - 18:46:47.450Open2308C:\malware.exeC:\Windows\SysWOW64\ole32.dll
21/2/2020 - 18:46:47.450Open2308C:\malware.exeC:\Windows\SysWOW64\ole32.dll

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
21/2/2020 - 18:46:4.793Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
21/2/2020 - 18:46:4.793Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
21/2/2020 - 18:46:4.793Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
21/2/2020 - 18:46:4.793Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
21/2/2020 - 18:46:4.793Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
21/2/2020 - 18:46:4.793Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
21/2/2020 - 18:46:5.59Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
21/2/2020 - 18:46:5.59Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
21/2/2020 - 18:46:5.59Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
21/2/2020 - 18:46:5.215Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
21/2/2020 - 18:46:5.215Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
21/2/2020 - 18:46:5.215Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
21/2/2020 - 18:46:5.215Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
21/2/2020 - 18:46:5.215Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
21/2/2020 - 18:46:5.215Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
21/2/2020 - 18:46:5.215Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
21/2/2020 - 18:46:5.215Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
21/2/2020 - 18:46:5.215Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
21/2/2020 - 18:46:5.215Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
21/2/2020 - 18:46:5.215Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
21/2/2020 - 18:46:5.215Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
21/2/2020 - 18:46:6.512Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
21/2/2020 - 18:46:6.512Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
21/2/2020 - 18:46:6.512Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
21/2/2020 - 18:46:6.512Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
21/2/2020 - 18:46:6.512Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
21/2/2020 - 18:46:6.512Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
21/2/2020 - 18:46:6.512Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
21/2/2020 - 18:46:6.512Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
21/2/2020 - 18:46:6.512Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
21/2/2020 - 18:46:6.512Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
21/2/2020 - 18:46:6.512Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
21/2/2020 - 18:46:6.512Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
21/2/2020 - 18:46:6.512Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: True check_circle

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query

Response

TCP
Info
computer localhost:65191 arrow_forward 92.243.28.102:80
computer localhost:65192 arrow_forward 92.243.28.102:80

UDP
Info
computer localhost:68 arrow_forward help_outline 255.255.255.255:67
computer localhost:67 arrow_forward computer localhost:68

HTTP
Info

Summary
DNS
False cancel

TCP
True check_circle

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 85.78%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 77.52%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 62.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 89.95%
suspicious: False cancel

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 81.48%
suspicious: False cancel

Add to Collection
Download