Report #8436 check_circle

Binary
DLL
False cancel
Size
1.85MB
trid
68.4% Win32 EXE PECompact compressed
10.8% Win32 Dynamic Link Library
7.4% Win32 Executable
3.4% Win16/32 Executable Delphi generic
3.3% OS/2 Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
939e7123246fa64af32652d674f051d6
sha1
07fbd650255c2466de0c2dccdf9049f8db5b273d
crc32
0xe772b6d9
sha224
e818bc610578c365095640502085de468676a5811260946a1a057734
sha256
5522ec976b077f1cef98f72499698c342241cf90294c5a089a38c43521cf964c
sha384
4e929a3d877c7ab79bcca4b0e1fbe944ef599dda3795abb36a62104e4a480214caaa84d02c4aa40a15bee6eb600ce48e
sha512
f673851d2e703e20c8acd41733d055eb001feef9c4991226f3ad57d871c45d035d8871097ac17ab965321fb2149f603fb2ea234f1651f9b974e68633a603afcb
ssdeep
24576:R/P5rKA5qwfcCHIFPO1Wz9tkvzI01b5B4S+1niEkvLHqE4rwSTd+t0TwdECD:h1/7sd015qS+WvDDST/TwdEo
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, borland_delphi, Borland, screenshot, win_hook, win_mutex, keylogger, contentis_base64, CRC32_table, win_registry, Microsoft_Visual_Cpp_v50v60_MFC, Delphi_CompareCall, CRC32_poly_Constant, win_files_operation, IsPE32, IsWindowsGUI, Delphi_FormShow

Suspicious
True check_circle

Strings
List
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
t.Ht
Winapi.Windows
Winapi.Windows
Winapi.Windows
Uh.IT
h.LI
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
System.Win.Registry
System.Win.Registry
System.Win.Registry
System.Win.Registry
System.Win.Registry
QTArrayManager<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TChildControlInfo>>g
QTArrayManager<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TChildControlInfo>><
UTMoveArrayManager<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TChildControlInfo>>g
UTMoveArrayManager<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TChildControlInfo>>
ITComparer<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>2
ITComparer<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>
IIComparer<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>
KTComparison<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>
FTArray<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>
ETList<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>&
{System.Generics.Collections}TList<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>.:{System.Generics.Collections}TList<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>.:1
NTList<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>.arrayofT
ETList<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>hVU
MTArrayManager<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>g
MTArrayManager<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>
KTEnumerator<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>
KTEnumerator<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>(
QTList<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>.TEnumerator5
VTCollectionNotifyEvent<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>
QTMoveArrayManager<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>
QTMoveArrayManager<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>g
QTList<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>.TEnumeratorhTU
ITDictionary<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>.TPairEnumerator
ITDictionary<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>.TPairEnumerator;
PTList<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>.TEmptyFunc
"TArrayManager<Winapi.Windows.HWND>tdU
&TMoveArrayManager<Winapi.Windows.HWND>g
&TMoveArrayManager<Winapi.Windows.HWND>
Item3TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>
"TArrayManager<Winapi.Windows.HWND>g
KTEnumerable<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>
KTEnumerable<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>'
KIEnumerable<Vcl.Themes.TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>>0!@
3TPair<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>
DTDictionary<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>.TItemArray
JTDictionary<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>.TValueCollectiont
JTDictionary<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>.TValueCollection;
JTDictionary<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>.TValueEnumerator;
JTDictionary<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>.TValueEnumeratort S
?TDictionary<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>.TItem
?TObjectDictionary<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>M
?TObjectDictionary<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>X
9TDictionary<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>9
9TDictionary<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>
HTDictionary<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>.TKeyEnumerator<
HTDictionary<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>.TKeyEnumerator;
Login%Cannot remove shell notification icon"%s requires Windows Vista or later
HTDictionary<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>.TKeyCollection8
HTDictionary<Winapi.Windows.HWND,Vcl.Themes.TSysStyleHook>.TKeyCollection;
System.Win.Crtl
System.Win.Crtl
System.Win.ComConst
System.Win.ComConst
B.rsrc

Foremost
Matches
0.exe, 1 MB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: False cancel
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

Files
Allowed: user32.dll, comctl32.dll, ole32.dll, imm32.dll, kernel32.dll, oleaut32.dll, uxtheme.dll, wininet.dll, msvcrt.dll, advapi32.dll, gdi32.dll, DWMAPI.DLL, wtsapi32.dll, version.dll, shell32.dll, msimg32.dll
hasFiles: True check_circle
Suspicious: Data.DB
hasAllowed: True check_circle
hasSuspicious: True check_circle

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 243712
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .text, .itext, .data, .bss, .idata, .didata, .edata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 1692912
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, comctl32.dll, ole32.dll, imm32.dll, kernel32.dll, oleaut32.dll, uxtheme.dll, wininet.dll, msvcrt.dll, advapi32.dll, gdi32.dll, dwmapi.dll, wtsapi32.dll, version.dll, shell32.dll, msimg32.dll
hasLibs: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2015-06-25 08:25:39
Future: False cancel

Compilation
Packed: False cancel
Missing: True check_circle
Packers
Compiled: False cancel
Compilers

Obfuscation
XOR: False cancel
Fuzzing: True check_circle

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.data: 7
.rsrc: 5
.text: 97
.idata: 18
.itext: 6

pushpopmath
.data: 4
.rsrc: 1
.text: 34
.reloc: 136

garbagebytes
.data: 4
.rsrc: 1
.text: 24
.idata: 6
.itext: 6

hookdetection
.data: 2
.text: 1
.reloc: 10

software breakpoint
.text: 18
.reloc: 46

programcontrolflowchange
.data: 4
.rsrc: 1
.text: 24
.idata: 6
.itext: 6

cpuinstructionsresultscomparison
.data: 5
.rsrc: 2
.text: 14

AVclass
banload
1
VirusTotal
md5
939e7123246fa64af32652d674f051d6
sha1
07fbd650255c2466de0c2dccdf9049f8db5b273d
SCANS (DETECTION RATE = 72.73%)
AVG
result: Win32:Banker-LVQ [Trj]
update: 20180323
version: 18.2.3827.0
detected: True check_circle

CMC
update: 20180323
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=86)
update: 20180324
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180322
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan ( 7000000f1 )
update: 20180323
version: 10.42.26598
detected: True check_circle

ALYac
result: Gen:Variant.Symmi.52300
update: 20180323
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Banker-LVQ [Trj]
update: 20180323
version: 18.2.3827.0
detected: True check_circle

Avira
result: TR/Dldr.Delphi.Gen4
update: 20180323
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180323
version: 1.0.0.2
detected: False cancel

Cyren
update: 20180323
version: 5.4.30.7
detected: False cancel

DrWeb
result: Trojan.DownLoader14.1971
update: 20180323
version: 7.0.28.2020
detected: True check_circle

GData
update: 20180324
version: A:25.16488B:25.11866
detected: False cancel

Panda
result: Trj/Genetic.gen
update: 20180323
version: 4.6.4.2
detected: True check_circle

VBA32
result: TrojanDownloader.Banload
update: 20180323
version: 3.12.28.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180323
version: 65478
detected: True check_circle

Zoner
update: 20180324
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180323
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180323
version: 0.99.2.0
detected: False cancel

Comodo
result: .UnclassifiedMalware
update: 20180323
version: 28733
detected: True check_circle

F-Prot
update: 20180323
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180323
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!939E7123246F
update: 20180323
version: 6.0.6.653
detected: True check_circle

Rising
result: Trojan.DL.Win32.Bemidal.f (CLASSIC)
update: 20180323
version: 25.0.0.1
detected: True check_circle

Sophos
result: Troj/Banker-GLL
update: 20180323
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.DL.Banload!ctIZ3b8/CAA
update: 20180323
version: 5.5.1.3
detected: True check_circle

Zillya
result: Downloader.Upatre.Win32.57874
update: 20180323
version: 2.0.0.3519
detected: True check_circle

Arcabit
result: Trojan.Symmi.DCC4C
update: 20180323
version: 1.0.0.831
detected: True check_circle

Cylance
result: Unsafe
update: 20180324
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180316
version: 2.0.5
detected: True check_circle

Tencent
result: Win32.Trojan-downloader.Banload.Htcg
update: 20180324
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180323
version: 2014.3.20.0
detected: False cancel

eGambit
update: 20180324
version: v4.3.5
detected: False cancel

Ad-Aware
result: Gen:Variant.Symmi.52300
update: 20180323
version: 3.0.3.1010
detected: True check_circle

AegisLab
result: Troj.Downloader.W32.Banload.cwta!c
update: 20180323
version: 4.2
detected: True check_circle

Emsisoft
result: Gen:Variant.Symmi.52300 (B)
update: 20180323
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Gen:Variant.Symmi.52300
update: 20180323
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banker.GLL!tr
update: 20180323
version: 5.4.247.0
detected: True check_circle

Invincea
result: heuristic
update: 20180121
version: 6.3.4.26036
detected: True check_circle

Jiangmin
result: TrojanDownloader.Banload.bilr
update: 20180323
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20180324
version: 2013.8.14.323
detected: False cancel

Paloalto
update: 20180324
version: 1.0
detected: False cancel

Symantec
result: Trojan.Gen.2
update: 20180323
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180323
version: 2018-03-23.02
detected: False cancel

AhnLab-V3
result: Trojan/Win32.Downloader.C907895
update: 20180323
version: 3.12.0.20130
detected: True check_circle

Antiy-AVL
result: Trojan/Win32.BTSGeneric
update: 20180323
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan-Downloader.Win32.Banload.cwta
update: 20180323
version: 15.0.1.13
detected: True check_circle

Microsoft
update: 20180323
version: 1.1.14600.4
detected: False cancel

Qihoo-360
result: HEUR/QVM05.1.Malware.Gen
update: 20180324
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180319
version: 6.8.0.5.2551
detected: False cancel

ZoneAlarm
result: Trojan-Downloader.Win32.Banload.cwta
update: 20180323
version: 1.0
detected: True check_circle

Cybereason
result: malicious.3246fa
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.VZA
update: 20180323
version: 17107
detected: True check_circle

TrendMicro
result: TROJ_GEN.R002C0OBF18
update: 20180323
version: 9.862.0.1074
detected: True check_circle

BitDefender
result: Gen:Variant.Symmi.52300
update: 20180323
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_90% (W)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan ( 7000000f1 )
update: 20180323
version: 10.42.26598
detected: True check_circle

SentinelOne
result: static engine - malicious
update: 20180225
version: 1.0.15.206
detected: True check_circle

Avast-Mobile
update: 20180323
version: 180323-04
detected: False cancel

Malwarebytes
result: Trojan.Banker.IM
update: 20180323
version: 2.1.1.1115
detected: True check_circle

TotalDefense
update: 20180323
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: TrojanDownloader.Bemidal.D11
update: 20180323
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Banload.dtjkmb
update: 20180323
version: 1.0.100.22043
detected: True check_circle

MicroWorld-eScan
result: Gen:Variant.Symmi.52300
update: 20180323
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180323
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.AdwareDealPly.th
update: 20180323
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R002C0OBF18
update: 20180323
version: 9.950.0.1006
detected: True check_circle

total
66
sha256
5522ec976b077f1cef98f72499698c342241cf90294c5a089a38c43521cf964c
scan_id
5522ec976b077f1cef98f72499698c342241cf90294c5a089a38c43521cf964c-1521846382
resource
939e7123246fa64af32652d674f051d6
positives
48
scan_date
2018-03-23 23:06:22
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
3/3/2020 - 19:46:18.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\bpostpaz.zlib
3/3/2020 - 19:46:18.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\dreamx.exe
3/3/2020 - 19:46:18.637Open1480C:\malware.exeC:\Secur32.dll
3/3/2020 - 19:46:18.637Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
3/3/2020 - 19:46:18.637Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
3/3/2020 - 19:46:18.637Open1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nls
3/3/2020 - 19:46:18.637Unknown1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nlsSortDefault.nls
3/3/2020 - 19:46:18.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
3/3/2020 - 19:46:18.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
3/3/2020 - 19:46:18.637Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
3/3/2020 - 19:46:18.637Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
3/3/2020 - 19:46:18.637Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
3/3/2020 - 19:46:18.637Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
3/3/2020 - 19:46:18.637Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
3/3/2020 - 19:46:18.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
3/3/2020 - 19:46:18.637Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
3/3/2020 - 19:46:18.637Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
3/3/2020 - 19:46:18.637Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
3/3/2020 - 19:46:18.637Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
3/3/2020 - 19:46:18.684Open1480C:\malware.exeC:\IPHLPAPI.DLL
3/3/2020 - 19:46:18.684Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
3/3/2020 - 19:46:18.684Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
3/3/2020 - 19:46:18.684Open1480C:\malware.exeC:\WINNSI.DLL
3/3/2020 - 19:46:18.684Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
3/3/2020 - 19:46:18.684Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
3/3/2020 - 19:46:18.684Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
3/3/2020 - 19:46:18.684Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
3/3/2020 - 19:46:18.684Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
3/3/2020 - 19:46:18.684Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
3/3/2020 - 19:46:18.684Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
3/3/2020 - 19:46:18.684Open1480C:\malware.exeC:\DNSAPI.dll
3/3/2020 - 19:46:18.684Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
3/3/2020 - 19:46:18.684Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
3/3/2020 - 19:46:18.731Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
3/3/2020 - 19:46:18.731Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
3/3/2020 - 19:46:18.731Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
3/3/2020 - 19:46:18.731Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
3/3/2020 - 19:46:18.825Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
3/3/2020 - 19:46:18.825Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
3/3/2020 - 19:46:18.825Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
3/3/2020 - 19:46:18.825Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
3/3/2020 - 19:46:18.872Open1480C:\malware.exeC:\dhcpcsvc6.DLL
3/3/2020 - 19:46:18.872Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
3/3/2020 - 19:46:18.872Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
3/3/2020 - 19:46:18.872Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
3/3/2020 - 19:46:18.872Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
3/3/2020 - 19:46:18.918Open1480C:\malware.exeC:\CRYPTSP.dll
3/3/2020 - 19:46:18.918Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
3/3/2020 - 19:46:18.918Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
3/3/2020 - 19:46:18.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:18.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:18.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:18.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:18.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:18.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:18.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:18.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:18.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:18.918Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\RpcRtRemote.dll
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
3/3/2020 - 19:46:18.934Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
3/3/2020 - 19:46:18.934Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:18.934Unknown1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
3/3/2020 - 19:46:18.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
3/3/2020 - 19:46:18.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
3/3/2020 - 19:46:18.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:18.934Unknown1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
3/3/2020 - 19:46:18.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
3/3/2020 - 19:46:18.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
3/3/2020 - 19:46:18.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:18.934Unknown1480C:\malware.exeC:\Users\Behemot
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
3/3/2020 - 19:46:18.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
3/3/2020 - 19:46:18.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
3/3/2020 - 19:46:18.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\dhcpcsvc.DLL
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
3/3/2020 - 19:46:18.934Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
3/3/2020 - 19:46:18.997Open1480C:\malware.exeC:\rasadhlp.dll
3/3/2020 - 19:46:18.997Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
3/3/2020 - 19:46:18.997Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
3/3/2020 - 19:46:19.90Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
3/3/2020 - 19:46:19.90Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
3/3/2020 - 19:46:20.153Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
3/3/2020 - 19:46:20.153Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
3/3/2020 - 19:46:21.418Unknown1480C:\malware.exeC:\Windows
3/3/2020 - 19:46:21.418Unknown1480C:\malware.exeC:\Monitor
3/3/2020 - 19:46:21.418Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc
3/3/2020 - 19:46:21.418Unknown1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
3/3/2020 - 19:46:21.418Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat

Process
Trace

Analysis
Reason
Finished

Status
Sucessfully Executed

Results
1

Registry
Trace
3/3/2020 - 19:46:18.684Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
3/3/2020 - 19:46:18.684Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
3/3/2020 - 19:46:18.684Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
3/3/2020 - 19:46:18.684Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
3/3/2020 - 19:46:18.684Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
3/3/2020 - 19:46:18.684Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
3/3/2020 - 19:46:18.934Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
3/3/2020 - 19:46:18.934Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
3/3/2020 - 19:46:18.934Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
3/3/2020 - 19:46:18.934Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
3/3/2020 - 19:46:18.934Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
3/3/2020 - 19:46:18.934Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
3/3/2020 - 19:46:18.934Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
3/3/2020 - 19:46:18.934Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
3/3/2020 - 19:46:18.934Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
3/3/2020 - 19:46:18.934Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
3/3/2020 - 19:46:18.934Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
3/3/2020 - 19:46:19.90Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
3/3/2020 - 19:46:19.90Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
3/3/2020 - 19:46:19.90Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
3/3/2020 - 19:46:19.90Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
3/3/2020 - 19:46:20.387Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
3/3/2020 - 19:46:20.387Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
3/3/2020 - 19:46:20.387Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
3/3/2020 - 19:46:20.387Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
3/3/2020 - 19:46:20.387Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
3/3/2020 - 19:46:20.387Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
3/3/2020 - 19:46:20.387Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
3/3/2020 - 19:46:20.387Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
3/3/2020 - 19:46:20.387Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
3/3/2020 - 19:46:20.387Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
3/3/2020 - 19:46:20.387Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
3/3/2020 - 19:46:20.387Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
3/3/2020 - 19:46:20.387Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code aaguero.com.br.
computer localhost arrow_forward computer gateway:DNS code aaguero.com.br.

Response

TCP
Info

UDP
Info
computer localhost:67 arrow_forward computer localhost:68
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:68 arrow_forward help_outline 255.255.255.255:67
computer localhost:53 arrow_forward computer localhost:50273

HTTP
Info

Summary
DNS
True check_circle

TCP
False cancel

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 75.50%
suspicious: True check_circle

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 85.00%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 64.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 86.15%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 94.88%
suspicious: True check_circle

Add to Collection
Download