Report #8425 check_circle

Binary
DLL
False cancel
Size
1.41MB
trid
46.3% InstallShield setup
15.2% Win32 Executable Delphi generic
14.0% Windows screen saver
10.7% DOS Borland compiled Executable
4.8% Win32 Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
92a77e4fb732ac71c077c88634c551cb
sha1
4d533207e34aa550cc57a898d502465203c0d32b
crc32
0xa9732c2c
sha224
022ad8818e2b996d0b93361fbb3adea5ebea543abb74bf48bc7d0f81
sha256
bc231a2ebd33385e1452590c00987b5c1c2a547094dfbe72a9cd1c719d88d941
sha384
2f5f8d1d8cf5f6804c182ef47756cfe229d6cff76dd31df987e5d6ffcf1692be549a10865623e117d2c5c26efdc9eb5b
sha512
bb627a506e7c3a332f9826b719c157bf64f7df21d5e5e8afbc1fcc70fedbfc2330a7d57d0089f7a620d1be8714e293dbc81fd4ae7106856ff8f9c8c078022cb0
ssdeep
24576:XBdDnPUF6MgbXVL9JREWmQ8WrtYDsRnYprntwcP55jlZuUNJnU1TnUkcNVuV9zwu:A9goWrehl/RoUiTnUkcNVuV9zwu
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, win_private_profile, Borland_Delphi_30_, BASE64_table, RIPEMD160_Constants, borland_delphi, Delphi_FormShow, network_dns, BobSoftMiniDelphiBoBBobSoft, Microsoft_Visual_Cpp_v50v60_MFC, BobSoft_Mini_Delphi_BoB_BobSoft_additional, win_files_operation, IsPE32, win_hook, network_tcp_socket, screenshot, network_tcp_listen, Borland_Delphi_v40_v50, keylogger, contentis_base64, Borland_Delphi_40_additional, Borland_Delphi_40, Delphi_Random, Borland_Delphi_v60_v70, IsWindowsGUI, network_udp_sock, Delphi_Copy, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, SHA1_Constants, android_meterpreter, win_registry, Delphi_StrToInt, Borland_Delphi_30_additional, Borland_Delphi_v30, Big_Numbers2

Suspicious
True check_circle

Strings
List
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd">
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd">
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd">
<!DOCTYPE wml PUBLIC "-//WAPFORUM//DTD WML 1.1//EN" "http://www.wapforum.org/DTD/wml_1.1.xml">
<!DOCTYPE wml PUBLIC "-//WAPFORUM//DTD WML 1.1//EN" "http://www.wapforum.org/DTD/wml_1.1.xml">
* http://www.apache.org/licenses/LICENSE-2.0
req.xmlHttpRequest.open(req.method,req.url,req.async,req.username,req.password);
<A HREF="http://www.atozed.com">VCL for the Web</A>.
<A HREF="http://www.atozed.com">VCL for the Web</A>.
* For details, see the Prototype web site: http://prototype.conio.net/
document.all.locker.style.visibility = 'hidden';
if(e.pageY > this.ssLayer.top)
frame.vssLayer.top = p*(frame.vspLayer.clip.height -
if (document.all.locker) {
/*lp.top = lPoint.top + aRoot.offsetTop;
_barLayer.top;
this.name = name;
gSenderName = aSender.name;
element.style.left = left + 'px';;
element.style.left = left + 'px';
this.top = this.oTop - i;
element.style.left = 0;
layer.top = top;
document.all.locker.style.visibility = '';
tp.show();
t.Ht
this.top = top;
if(e.target.href) {
lScroll.Height = lp.top + aRoot.children[i].offsetTop + aRoot.children[i].offsetHeight;
var p = topmost().location.protocol + "//" + topmost().location.host + "
return [element.name, element.value];
return [element.name, element.value];
if (lp.top + aRoot.children[i].offsetTop + aRoot.children[i].offsetHeight > lScroll.Height) {
element.style.top = 0;
if (obj.name != null && obj.form && obj.form.name != "HiddenSubmitForm") {
this.clip.top = i;
element.style.top =
element.style.left =
lp.top = 0;
var p = IWTop().location.protocol + "//" + IWTop().location.host + "
GlassFrame.Top
UP.LINK
Font.Name
Font.Style
document.locker.visibility = 'hidden';
IWTop().all.locker.style.visibility = 'hidden';
zlib.dll not found in %s
msgWindow=window.open("","ShowMessage","menubar=no,scrollbars=yes,status=no,width=300,height=300,toolbar=no,location=no,resizable=no,directories=no");
this.div.style.overflow = "hidden";
aURL = GURLBase + '/callback' + aSessionInfo + '?callback=' + aCallback + '&' + aSender.name + '=' + aSender.value;
_thumbLayer.top = t;
dragObjectStyle.top = (e.screenY + this._topOffset(e) - this.starty) + "px";
if(options.setTop) target.style.top = (p[1] - delta[1] + options.offsetTop) + 'px';
w=window.open(URL, Name, Options);
if (aSender != null && AItem != null && AItem.name == aSender.name) {
var top = parseFloat(element.style.top || 0) - (element._originalTop || 0);
this.style.clip = "rect(0px," + ARect.Width + "px," + ARect.Height + "px,0px)";
if (target.name) {
this.addField(el.name,el.options[el.selectedIndex].value);
xObj.style.top = aY;
(pY < (_dragObject.top-38))) {
xSubmitForm.elements.IW_Action.value=aSender.name;
this.frame.load(e.target);
xObj.style.left = aX;
if(options.setLeft) target.style.left = (p[0] - delta[0] + options.offsetLeft) + 'px';
item.style.top = IWCLForm.Item.scrollTop;
return __method.call(object, event || window.event);
if((pY > (_dragObject.top+54)) ||
var left = parseFloat(element.style.left || 0) - (element._originalLeft || 0);
_dragObject.top = pY;
element._originalTop = top - parseFloat(element.style.top || 0);
controlName = target.name;
target.style.top = offsets[1] + 'px';
target.style.left = offsets[0] + 'px';
var p = Position.page(source);
percentScroll = (pY - _dragObject.spLayer.top) /
var dobj=aSubmitForm.elements[obj.name];
item.style.left = IWCLForm.Item.scrollLeft;
this.addField(el.name,el.options[j].value);
this.e2.style.height = this.end + "px";
e.clientY > absoluteRect.top + this._topOffset(e) &&
_dragObject.oTop = _dragObject.top;
p = (_scrollLayer.clip.top+15) /
p = (_scrollLayer.clip.top-15) /
var vspLayerTop = frame.top+16;
element._originalLeft = left - parseFloat(element.style.left || 0);
this.accordionTabs.push( new Rico.Accordion.Tab(this,tabTitleBar,tabContentBox) );
y += this.layer.clip.top;
theGUI.style.top = "";
theGUI.style.top = "";
frame.layer.clip.top = 0;
pY = _dragObject.spLayer.top;
if(pY < _dragObject.spLayer.top)
this.name = AName;
(name && input.name != name))
var vsdLayerTop = frame.top+frame.height-16;
lElement.style.left = lPoint.X;
lElement.style.left = lPoint.X;
frame.hspLayer.top, hsdLayerLeft, 16, 16);
this.addField(el.name,el.value);

Foremost
Matches
2274.gif, 857 B, 2276.gif, 300 B, 2276.gif, 297 B, 2277.gif, 1 KB, 2279.gif, 1 KB, 2282.gif, 1 KB, 2284.gif, 1 KB, 2286.gif, 1 KB, 2288.gif, 1 KB, 2290.gif, 1 KB, 2293.gif, 1 KB, 2295.gif, 1 KB, 2297.gif, 1 KB, 2299.gif, 1 KB, 2302.gif, 1 KB, 2304.gif, 814 B, 2306.gif, 782 B, 2307.gif, 1 KB, 2309.gif, 1 KB, 2311.gif, 1 KB, 2314.gif, 1 KB, 2316.gif, 803 B, 2318.gif, 1 KB, 2324.gif, 426 B, 2331.gif, 2 KB, 2336.gif, 75 B, 2336.gif, 63 B, 2336.gif, 110 B, 2336.gif, 80 B, 2337.gif, 108 B, 2337.gif, 79 B, 2337.gif, 111 B, 2337.gif, 65 B, 2337.gif, 60 B, 2337.gif, 105 B, 2338.gif, 77 B, 2338.gif, 113 B, 2338.gif, 105 B, 2338.gif, 77 B, 2341.gif, 42 B, 2341.gif, 145 B, 2341.gif, 130 B, 2341.gif, 117 B, 2341.gif, 158 B, 2342.gif, 124 B, 1526.htm, 631 B, 1682.htm, 270 B, 1694.htm, 238 B, 1695.htm, 154 B, 1697.htm, 63 B, 1697.htm, 106 B, 0.exe, 1 MB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: True check_circle
Allowed: 127.0.0.1, 1, localhost.
Suspicious: 0.0.0.1, 0, Unknown
hasAllowed: True check_circle
hasSuspicious: True check_circle

URLs
Allowed: http://www.w3.org/1999/xhtml
hasURLs: True check_circle
Suspicious: http://, http://www.wapforum.org/dtd/wml_1.1.xml, http://www.wapforum.org/dtd/xhtml-mobile10.dtd, http://www.apache.org/licenses/license-2.0, http://www.atozed.com, http://prototype.conio.net/, https://
hasAllowed: True check_circle
hasSuspicious: True check_circle

Files
Allowed: wininet.dll, user32.dll, uxtheme.dll, WS2_32.DLL, comctl32.dll, ole32.dll, imm32.dll, advapi32.dll, gdi32.dll, Wship6.dll, DWMAPI.DLL, MAPI32.DLL, kernel32.dll, oleaut32.dll, zLib.DLL, msimg32.dll, version.dll
hasFiles: True check_circle
Suspicious: XML files (*.xml)|*.xml, Space delimited text files (*.txt)|*.txt, Custom delimited text files (*.txt)|*.txt, Colon delimited text files (*.txt)|*.txt, Tab delimited text files (*.txt)|*.txt, wapdb.dat, PDF files (*.pdf)|*.pdf
hasAllowed: True check_circle
hasSuspicious: True check_circle

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 483328
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 4096
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .text, .itext, .data, .bss, .idata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 4
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 4
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 4.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 999428
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: wininet.dll, user32.dll, uxtheme.dll, ws2_32.dll, comctl32.dll, ole32.dll, imm32.dll, advapi32.dll, gdi32.dll, wship6.dll, dwmapi.dll, mapi32.dll, kernel32.dll, oleaut32.dll, msimg32.dll, version.dll
hasLibs: True check_circle
Suspicious: zlib.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2015-08-20 23:11:18
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: BobSoft Mini Delphi -> BoB / BobSoft
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v3.0, Borland Delphi v6.0 - v7.0
MainPacker: BobSoft Mini Delphi -> BoB / BobSoft

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.rsrc: 4
.text: 95
.itext: 8

pushpopmath
.data: 1
.rsrc: 74
.text: 39

garbagebytes
.rsrc: 2
.text: 88
.itext: 8

hookdetection
.rsrc: 2
.text: 2

software breakpoint
.rsrc: 3
.text: 9

programcontrolflowchange
.rsrc: 2
.text: 88
.itext: 8

cpuinstructionsresultscomparison
.rsrc: 17
.text: 11

AVclass
delf
1
VirusTotal
md5
92a77e4fb732ac71c077c88634c551cb
sha1
4d533207e34aa550cc57a898d502465203c0d32b
SCANS (DETECTION RATE = 72.73%)
AVG
result: Win32:Banker-MMT [Trj]
update: 20180325
version: 18.2.3827.0
detected: True check_circle

CMC
update: 20180324
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=82)
update: 20180325
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180325
version: 1.3.0.9466
detected: False cancel

K7GW
result: Riskware ( 0040eff71 )
update: 20180325
version: 10.42.26600
detected: True check_circle

ALYac
result: Gen:Variant.Banker.20
update: 20180325
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Banker-MMT [Trj]
update: 20180325
version: 18.2.3827.0
detected: True check_circle

Avira
result: TR/Agent.1479680.7
update: 20180324
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180323
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.HHUV-9031
update: 20180325
version: 5.4.30.7
detected: True check_circle

DrWeb
result: Trojan.DownLoader15.55872
update: 20180325
version: 7.0.28.2020
detected: True check_circle

GData
result: Gen:Variant.Banker.20
update: 20180325
version: A:25.16493B:25.11870
detected: True check_circle

Panda
result: Trj/CI.A
update: 20180324
version: 4.6.4.2
detected: True check_circle

VBA32
result: Trojan.Disabler
update: 20180323
version: 3.12.28.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180325
version: 65504
detected: True check_circle

Zoner
update: 20180325
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180325
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180324
version: 0.99.2.0
detected: False cancel

Comodo
result: UnclassifiedMalware
update: 20180325
version: 28740
detected: True check_circle

F-Prot
update: 20180325
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-PSW.Win32.Delf
update: 20180324
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!92A77E4FB732
update: 20180325
version: 6.0.6.653
detected: True check_circle

Rising
result: Downloader.Banload!8.15B (TFE:5:lGAh9v3LdtT)
update: 20180325
version: 25.0.0.1
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20180325
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.PWS.Delf!ooRIuur4k6U
update: 20180324
version: 5.5.1.3
detected: True check_circle

Zillya
result: Trojan.Delf.Win32.70319
update: 20180323
version: 2.0.0.3519
detected: True check_circle

Arcabit
result: Trojan.Banker.20
update: 20180325
version: 1.0.0.831
detected: True check_circle

Cylance
result: Unsafe
update: 20180325
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180316
version: 2.0.5
detected: True check_circle

Tencent
result: Win32.Trojan-qqpass.Qqrob.Htbz
update: 20180325
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180324
version: 2014.3.20.0
detected: False cancel

eGambit
update: 20180325
version: v4.3.5
detected: False cancel

Ad-Aware
result: Gen:Variant.Banker.20
update: 20180325
version: 3.0.3.1010
detected: True check_circle

AegisLab
result: Troj.Psw.W32.Delf!c
update: 20180325
version: 4.2
detected: True check_circle

Emsisoft
result: Gen:Variant.Banker.20 (B)
update: 20180325
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Gen:Variant.Banker.20
update: 20180325
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.WFL!tr
update: 20180325
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Jiangmin
result: Trojan/Disabler.bv
update: 20180324
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20180325
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180325
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen.2
update: 20180324
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180325
version: 2018-03-25.01
detected: False cancel

AhnLab-V3
result: Malware/Win32.Generic.C1152313
update: 20180324
version: 3.12.0.20130
detected: True check_circle

Antiy-AVL
result: Trojan[PSW]/Win32.Delf
update: 20180325
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan-PSW.Win32.Delf.igy
update: 20180325
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload
update: 20180325
version: 1.1.14600.4
detected: True check_circle

Qihoo-360
result: HEUR/QVM05.1.Malware.Gen
update: 20180325
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180319
version: 6.8.0.5.2551
detected: False cancel

ZoneAlarm
result: Trojan-PSW.Win32.Delf.igy
update: 20180325
version: 1.0
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.WKA
update: 20180324
version: 17111
detected: True check_circle

TrendMicro
result: TROJ_GEN.R002C0DBG18
update: 20180325
version: 9.862.0.1074
detected: True check_circle

WhiteArmor
update: 20180324
detected: False cancel

BitDefender
result: Gen:Variant.Banker.20
update: 20180325
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_100% (W)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Riskware ( 0040eff71 )
update: 20180324
version: 10.42.26600
detected: True check_circle

SentinelOne
update: 20180225
version: 1.0.15.206
detected: False cancel

Avast-Mobile
update: 20180324
version: 180324-00
detected: False cancel

Malwarebytes
update: 20180324
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20180324
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: TrojanPWS.Delf
update: 20180324
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Disabler.dvnibn
update: 20180325
version: 1.0.100.22043
detected: True check_circle

MicroWorld-eScan
result: Gen:Variant.Banker.20
update: 20180324
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180324
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Downloader.th
update: 20180324
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R002C0DBG18
update: 20180324
version: 9.950.0.1006
detected: True check_circle

total
66
sha256
bc231a2ebd33385e1452590c00987b5c1c2a547094dfbe72a9cd1c719d88d941
scan_id
bc231a2ebd33385e1452590c00987b5c1c2a547094dfbe72a9cd1c719d88d941-1521945555
resource
92a77e4fb732ac71c077c88634c551cb
positives
48
scan_date
2018-03-25 02:39:15
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
3/3/2020 - 19:46:13.606Open1480C:\malware.exeC:\Secur32.dll
3/3/2020 - 19:46:13.606Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
3/3/2020 - 19:46:13.606Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
3/3/2020 - 19:46:13.606Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
3/3/2020 - 19:46:13.606Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
3/3/2020 - 19:46:13.606Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
3/3/2020 - 19:46:13.606Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
3/3/2020 - 19:46:13.606Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
3/3/2020 - 19:46:13.606Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
3/3/2020 - 19:46:13.606Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\IPHLPAPI.DLL
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\WINNSI.DLL
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
3/3/2020 - 19:46:13.637Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
3/3/2020 - 19:46:13.637Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\DNSAPI.dll
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
3/3/2020 - 19:46:13.637Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
3/3/2020 - 19:46:13.684Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
3/3/2020 - 19:46:13.684Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
3/3/2020 - 19:46:13.684Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
3/3/2020 - 19:46:13.684Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
3/3/2020 - 19:46:13.778Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
3/3/2020 - 19:46:13.778Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
3/3/2020 - 19:46:13.778Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
3/3/2020 - 19:46:13.778Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
3/3/2020 - 19:46:13.825Open1480C:\malware.exeC:\dhcpcsvc6.DLL
3/3/2020 - 19:46:13.825Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
3/3/2020 - 19:46:13.825Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
3/3/2020 - 19:46:13.825Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
3/3/2020 - 19:46:13.825Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:13.918Unknown1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
3/3/2020 - 19:46:13.918Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
3/3/2020 - 19:46:13.918Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
3/3/2020 - 19:46:13.918Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:13.918Unknown1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
3/3/2020 - 19:46:13.918Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
3/3/2020 - 19:46:13.918Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
3/3/2020 - 19:46:13.918Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:13.918Unknown1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
3/3/2020 - 19:46:13.918Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
3/3/2020 - 19:46:13.918Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
3/3/2020 - 19:46:13.918Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\dhcpcsvc.DLL
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\CRYPTSP.dll
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:13.934Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:13.934Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:13.934Open1480C:\malware.exeC:\RpcRtRemote.dll
3/3/2020 - 19:46:13.934Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
3/3/2020 - 19:46:13.934Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
3/3/2020 - 19:46:13.934Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
3/3/2020 - 19:46:13.934Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
3/3/2020 - 19:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
3/3/2020 - 19:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
3/3/2020 - 19:46:13.981Open1480C:\malware.exeC:\rasadhlp.dll
3/3/2020 - 19:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
3/3/2020 - 19:46:13.981Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
3/3/2020 - 19:46:14.28Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
3/3/2020 - 19:46:14.28Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\malware.exe.Local
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
3/3/2020 - 19:46:14.184Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
3/3/2020 - 19:46:14.184Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
3/3/2020 - 19:46:15.122Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
3/3/2020 - 19:46:15.122Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
3/3/2020 - 19:46:56.403Unknown1480C:\malware.exeC:\Windows
3/3/2020 - 19:46:56.403Unknown1480C:\malware.exeC:\Monitor
3/3/2020 - 19:46:56.403Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
3/3/2020 - 19:46:56.403Unknown1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
3/3/2020 - 19:46:56.403Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
3/3/2020 - 19:46:56.403Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d

Process
Trace

Analysis
Reason
Finished

Status
Sucessfully Executed

Results
1

Registry
Trace
3/3/2020 - 19:46:13.637Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
3/3/2020 - 19:46:13.637Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
3/3/2020 - 19:46:13.637Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
3/3/2020 - 19:46:13.637Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
3/3/2020 - 19:46:13.637Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
3/3/2020 - 19:46:13.637Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
3/3/2020 - 19:46:13.918Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
3/3/2020 - 19:46:13.918Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
3/3/2020 - 19:46:13.918Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
3/3/2020 - 19:46:13.918Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
3/3/2020 - 19:46:13.918Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
3/3/2020 - 19:46:13.918Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
3/3/2020 - 19:46:13.918Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
3/3/2020 - 19:46:13.918Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
3/3/2020 - 19:46:13.918Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
3/3/2020 - 19:46:13.918Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
3/3/2020 - 19:46:13.918Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
3/3/2020 - 19:46:14.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
3/3/2020 - 19:46:14.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
3/3/2020 - 19:46:14.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
3/3/2020 - 19:46:14.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
3/3/2020 - 19:46:15.356Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
3/3/2020 - 19:46:15.356Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
3/3/2020 - 19:46:15.356Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
3/3/2020 - 19:46:15.356Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
3/3/2020 - 19:46:15.356Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
3/3/2020 - 19:46:15.356Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
3/3/2020 - 19:46:15.356Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
3/3/2020 - 19:46:15.356Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
3/3/2020 - 19:46:15.356Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
3/3/2020 - 19:46:15.356Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
3/3/2020 - 19:46:15.356Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
3/3/2020 - 19:46:15.356Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
3/3/2020 - 19:46:15.356Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code dns.msftncsi.com.
computer localhost arrow_forward computer gateway:DNS code dns.msftncsi.com.

Response
computer gateway:DNS arrow_forward computer localhost code dns.msftncsi.com. reply_all 131.107.255.255


TCP
Info
computer localhost:65192 arrow_forward 200.98.69.186:80
computer localhost:65191 arrow_forward 200.98.69.186:80

UDP
Info
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:68 arrow_forward help_outline 255.255.255.255:67
computer localhost:67 arrow_forward computer localhost:68
computer localhost:50273 arrow_forward computer localhost:53

HTTP
Info

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 84.96%
suspicious: True check_circle

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 65.96%
suspicious: False cancel

Random Forest (100 estimators, NFS-BRMalware)
confidence: 66.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 38.28%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 93.27%
suspicious: True check_circle

Add to Collection
Download