Report #8534 check_circle

  • Creation Date: March 3, 2020, 4:37 p.m.
  • Last Update: March 4, 2020, 4:16 a.m.
  • File: CopiaBoleto_3011.exe
  • Results:
Binary
DLL
False cancel
Size
589.00KB
trid
43.3% Windows screen saver
21.7% Win32 Dynamic Link Library
14.9% Win32 Executable
6.7% OS/2 Executable
6.6% Generic Win/DOS Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
afc6c732080ee96286cff252efd7773e
sha1
f31e267464cbc7194cb9321452a6186572933af3
crc32
0x893b8421
sha224
3ceb7c64b0aa30f340341676fd29c40f13063946eb7567b7d68773ae
sha256
cf0c5d113acea6009fad3740505f4a64a5d962e4e3acd93d6fb763ce93d18a4a
sha384
a670202877ffa7e231690206981bca7809d4b0116901f391e3bbec1b93672430d64545926542ebdc1aff987990a865b2
sha512
9896c75b722ac47166d176343041570d95f74eba2529e532854c4e70258e200ecb5353b176dfd74a222aee8ef2f547fd9f184c711d0733c64bdf7352bab67851
ssdeep
12288:Ug3Yh/ee7oNMCKe61FnSG1+U/mgU7rtUWfr+sr:BIhT8iCKeYFT4RH7r7T+s
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, Borland_Delphi_30_, Delphi_DecodeDate, borland_delphi, Delphi_FormShow, Microsoft_Visual_Cpp_v50v60_MFC, network_dns, win_files_operation, IsPE32, win_hook, network_tcp_socket, screenshot, Borland_Delphi_v40_v50, keylogger, contentis_base64, Borland_Delphi_40_additional, Borland_Delphi_40, Delphi_Random, IsWindowsGUI, Delphi_Copy, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, win_registry, Delphi_CompareCall, Delphi_StrToInt, Borland_Delphi_30_additional, Borland_Delphi_v30

Suspicious
True check_circle

Strings
List
http://carmela-segev.co.il/img/configuras.jpg
t.Ht
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
/Method definition for %s has over %d parameters!Too many parameters for method %s Action does not provide response+Action can't respone to unknown HTTP method"Action can't redirect to blank URL
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
wsock32.dll
P.rsrc
SOFTWARE\Borland\Delphi\RTL
Delphi%.8X
Software\Borland\Locales
Software\Borland\Delphi\Locales
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
version.dll
uxtheme.dll
vcltest3.dll
SHFolder.dll
\msconf.exe
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)
%s<input type="hidden" name="%s" value="%s">%s
7O839s:w<
Self-
ControlOfs%.8X%.8X
WndProcPtr%.8X%.8X
%s.WriteItem(%d)
JumpID("","%s")
8%9e9n9
Response.Write(%s)
Component %s not foundDGetting the Count of a TComponentsEnumerator object is not supportedWComponent was expected to implement IInterfaceComponentReference for ValuesList support<Errors object must support the interface IIterateIntfSupport+Type mismatch in parameter %d for method %s,Invalid DispID for parameter %d in method %s#Parameter %d required for method %s
- Dock zone has no control
Apartment
Sub-menu is not in menu
Invalid parent'Execution of action %s is not permitted"Data Modification is not permitted
Producer
%s,Custom variant type (%s%.4x) is out of range/Custom variant type (%s%.4x) already used by %s*Custom variant type (%s%.4x) is not usable2Too many custom variant types have been registered5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Division by zero
Count
Count
List
Count
Count
ToolWin
August September
Rebuild
Selected
bsSizeToolWin
TaskbarCreated
Too many open files
about
about
Assertion failed
include
http://
PathTranslated
%s (%s, line %d)
No help found for %s#No context-sensitive help installed$No topic-based help system installed
HTTP/1.1
Privileged instruction(Exception %s in module %s at %p.
Error reading %s%s%s: %s
OnKeyPressl-F
I/O error %d
%s on line %d
List count out of bounds (%d)
Ancestor for '%s' not found
Cannot assign a %s to a %s
Class %s not found
Property %s does not exist
Resource %s not found
%s is not a valid BCD value$Could not parse SQL TimeStamp string
?HTTPApp
Variable %s is not a container
OnDestroyH
ESafecallException
OnHide
TInterfacedPersistent\
*ShellAPI
IE(AL("%s",4),"AL(\"%0:s\",3)","JK(\"%1:s\",\"%0:s\")")
`IEDownload
<META HTTP-EQUIV="Refresh" CONTENT="0; URL=%0:s">
TClassList
HTTPProd
HTTPProd
HTTPProd
HTTPProd
$''%s'' is not a valid component name
ssShift
ssHotTrack
Error creating window class+Cannot focus a disabled or invisible window!Control '%s' has no parent window
TPersistent0
Variable not found: %s=Component does not support scripting. Class: %0:s, Name: %1:s.Object does not support scripting. Class: %0:s*File include error on line %d: expecting "*File include error on line %d: expecting =NFile include error on line %d: expecting virtual, file, or page, but found %s.
Invalid property element: %s
HiddenFields8
OLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object7Dispatch methods do not support more than 64 parameters=Error decoding URL style (%%XX) encoded string at position %d1Invalid URL encoded character (%s) at position %dLOperation not supported. %s component does not support IGetWebComponentList
ssLeft
No argument for format '%s'"Variant method calls not supported
CanExecute
OnDeactivate8/F

Foremost
Matches
0.exe, 589 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://, http://carmela-segev.co.il/img/configuras.jpg
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: user32.dll, kernel32.dll, uxtheme.dll, gdi32.dll, advapi32.dll, vcltest3.dll, shell32.dll, MAPI32.DLL, SHFolder.dll, version.dll, comctl32.dll, wsock32.dll, ole32.dll, imm32.dll, oleaut32.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 81408
Suspicious: False cancel
Image
Address: 138608640
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: code, data, bss, .idata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 4
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 4
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 4.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 524540
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, kernel32.dll, uxtheme.dll, gdi32.dll, advapi32.dll, shell32.dll, mapi32.dll, shfolder.dll, version.dll, comctl32.dll, wsock32.dll, ole32.dll, imm32.dll, oleaut32.dll
hasLibs: True check_circle
Suspicious: vcltest3.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: True check_circle
Valid: True check_circle
Value: 1992-06-19 19:22:17
Future: False cancel

Compilation
Packed: False cancel
Missing: False cancel
Packers
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
False cancel
Tricks
AVclass
banload
1
VirusTotal
md5
afc6c732080ee96286cff252efd7773e
sha1
f31e267464cbc7194cb9321452a6186572933af3
SCANS (DETECTION RATE = 79.10%)
AVG
result: Win32:Malware-gen
update: 20180323
version: 18.2.3827.0
detected: True check_circle

CMC
update: 20180323
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=84)
update: 20180323
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180322
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan-Downloader ( 004d7b231 )
update: 20180323
version: 10.42.26597
detected: True check_circle

ALYac
result: Trojan.AgentWDCR.FDZ
update: 20180323
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Malware-gen
update: 20180323
version: 18.2.3827.0
detected: True check_circle

Avira
result: TR/Dldr.Agent.603136.9
update: 20180323
version: 8.3.3.6
detected: True check_circle

Baidu
result: Win32.Trojan.WisdomEyes.16070401.9500.9787
update: 20180323
version: 1.0.0.2
detected: True check_circle

Cyren
result: W32/Banload.OUUX-7264
update: 20180323
version: 5.4.30.7
detected: True check_circle

DrWeb
result: Trojan.Siggen6.52987
update: 20180323
version: 7.0.28.2020
detected: True check_circle

GData
result: Win32.Trojan.Agent.JAMQP2
update: 20180323
version: A:25.16481B:25.11861
detected: True check_circle

Panda
result: Trj/WLT.B
update: 20180323
version: 4.6.4.2
detected: True check_circle

VBA32
result: suspected of Trojan.Downloader.gen.h
update: 20180323
version: 3.12.28.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180323
version: 65478
detected: True check_circle

Zoner
result: Trojan.Symmi
update: 20180323
version: 1.0
detected: True check_circle

AVware
result: Trojan.Win32.Generic!BT
update: 20180323
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180323
version: 0.99.2.0
detected: False cancel

Comodo
update: 20180323
detected: False cancel

F-Prot
result: W32/Banload.AXI
update: 20180323
version: 4.7.1.166
detected: True check_circle

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180323
version: 0.1.5.2
detected: True check_circle

McAfee
result: Generic.xt
update: 20180323
version: 6.0.6.653
detected: True check_circle

Rising
result: Trojan.DL.Win32.Banloaden.vt (CLASSIC)
update: 20180323
version: 25.0.0.1
detected: True check_circle

Sophos
result: Mal/Generic-L
update: 20180323
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.DL.Banload!TwM7A/W/uTo
update: 20180323
version: 5.5.1.3
detected: True check_circle

Zillya
result: Trojan.Agent.Win32.624462
update: 20180323
version: 2.0.0.3519
detected: True check_circle

Arcabit
result: Trojan.AgentWDCR.FDZ
update: 20180323
version: 1.0.0.831
detected: True check_circle

Cylance
result: Unsafe
update: 20180323
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180316
version: 2.0.5
detected: True check_circle

Tencent
result: Win32.Trojan.Agent.Lrsg
update: 20180323
version: 1.0.0.1
detected: True check_circle

ViRobot
result: Trojan.Win32.Downloader.603136.G
update: 20180323
version: 2014.3.20.0
detected: True check_circle

eGambit
update: 20180323
version: v4.3.5
detected: False cancel

Ad-Aware
result: Trojan.AgentWDCR.FDZ
update: 20180323
version: 3.0.3.1010
detected: True check_circle

AegisLab
result: Troj.Downloader.W32!c
update: 20180323
version: 4.2
detected: True check_circle

Emsisoft
result: Trojan.AgentWDCR.FDZ (B)
update: 20180323
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Trojan.AgentWDCR.FDZ
update: 20180323
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Dloader.X!tr
update: 20180323
version: 5.4.247.0
detected: True check_circle

Invincea
result: heuristic
update: 20180121
version: 6.3.4.26036
detected: True check_circle

Jiangmin
update: 20180323
version: 16.0.100
detected: False cancel

Kingsoft
update: 20180323
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180323
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen.2
update: 20180323
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180323
version: 2018-03-23.02
detected: False cancel

AhnLab-V3
result: Trojan/Win32.Gen.C596975
update: 20180323
version: 3.12.0.20130
detected: True check_circle

Antiy-AVL
result: Trojan[Downloader]/Win32.AGeneric
update: 20180323
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan.Win32.Agent.ihtc
update: 20180323
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload!rfn
update: 20180323
version: 1.1.14600.4
detected: True check_circle

Qihoo-360
result: HEUR/QVM05.1.Malware.Gen
update: 20180323
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180319
version: 6.8.0.5.2551
detected: False cancel

ZoneAlarm
result: Trojan.Win32.Agent.ihtc
update: 20180323
version: 1.0
detected: True check_circle

Cybereason
result: malicious.2080ee
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: Win32/TrojanDownloader.Banload.WTE
update: 20180323
version: 17107
detected: True check_circle

TrendMicro
result: TROJ_GEN.R038C0DIE17
update: 20180323
version: 9.862.0.1074
detected: True check_circle

WhiteArmor
update: 20180223
detected: False cancel

BitDefender
result: Trojan.AgentWDCR.FDZ
update: 20180323
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_90% (W)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan-Downloader ( 004d7b231 )
update: 20180323
version: 10.42.26598
detected: True check_circle

SentinelOne
result: static engine - malicious
update: 20180225
version: 1.0.15.206
detected: True check_circle

Avast-Mobile
update: 20180323
version: 180323-04
detected: False cancel

Malwarebytes
update: 20180323
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20180323
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: TrojanDownloader.Banload
update: 20180323
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.TrjGen.dyxayy
update: 20180323
version: 1.0.100.22043
detected: True check_circle

MicroWorld-eScan
result: Trojan.AgentWDCR.FDZ
update: 20180323
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180323
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Generic.hh
update: 20180323
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R038C0DIE17
update: 20180323
version: 9.950.0.1006
detected: True check_circle

total
67
sha256
cf0c5d113acea6009fad3740505f4a64a5d962e4e3acd93d6fb763ce93d18a4a
scan_id
cf0c5d113acea6009fad3740505f4a64a5d962e4e3acd93d6fb763ce93d18a4a-1521843424
resource
afc6c732080ee96286cff252efd7773e
positives
53
scan_date
2018-03-23 22:17:04
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
4/3/2020 - 3:45:42.653Open1480C:\malware.exeC:\DNSAPI.dll
4/3/2020 - 3:45:42.653Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
4/3/2020 - 3:45:42.653Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
4/3/2020 - 3:45:42.653Open1480C:\malware.exeC:\Windows\SysWOW64\winrnr.dll
4/3/2020 - 3:45:42.653Open1480C:\malware.exeC:\Windows\SysWOW64\winrnr.dll
4/3/2020 - 3:45:42.653Open1480C:\malware.exeC:\IPHLPAPI.DLL
4/3/2020 - 3:45:42.653Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
4/3/2020 - 3:45:42.653Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
4/3/2020 - 3:45:42.653Open1480C:\malware.exeC:\WINNSI.DLL
4/3/2020 - 3:45:42.653Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
4/3/2020 - 3:45:42.653Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
4/3/2020 - 3:45:44.434Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
4/3/2020 - 3:45:44.434Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
4/3/2020 - 3:45:44.543Open1480C:\malware.exeC:\rasadhlp.dll
4/3/2020 - 3:45:44.543Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
4/3/2020 - 3:45:44.543Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
4/3/2020 - 3:45:44.825Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\configuras.jpg
4/3/2020 - 3:45:45.278Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\configuras.jpgconfiguras.jpg
4/3/2020 - 3:45:45.278Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\configuras.jpgconfiguras.jpg
4/3/2020 - 3:45:45.278Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\configuras.jpgconfiguras.jpg
4/3/2020 - 3:45:45.575Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\configuras.jpgconfiguras.jpg
4/3/2020 - 3:45:45.575Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\configuras.jpg
4/3/2020 - 3:45:45.575Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 3:45:45.575Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\configuras.jpgconfiguras.jpg
4/3/2020 - 3:45:45.575Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 3:45:45.575Open1480C:\malware.exeC:\Monitor
4/3/2020 - 3:45:45.575Unknown1480C:\malware.exeC:\Monitor
4/3/2020 - 3:45:45.575Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\msconf.exe
4/3/2020 - 3:45:45.575Open1480C:\malware.exeC:\PROPSYS.dll
4/3/2020 - 3:45:45.575Open1480C:\malware.exeC:\Windows\SysWOW64\propsys.dll
4/3/2020 - 3:45:45.575Open1480C:\malware.exeC:\Windows\SysWOW64\propsys.dll
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\Windows\SysWOW64\shell32.dll
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\malware.exe.Local
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 3:45:45.590Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\Windows\WindowsShell.Manifest
4/3/2020 - 3:45:45.590Unknown1480C:\malware.exeC:\Windows\WindowsShell.ManifestWindowsShell.Manifest
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\apphelp.dll
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\Windows\SysWOW64\apphelp.dll
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\Windows\SysWOW64\apphelp.dll
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\Windows\SysWOW64\wpdshext.dll
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\Windows\AppPatch\sysmain.sdb
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.590Unknown1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\Windows\SysWOW64\wpdshext.dll
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.590Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\Windows
4/3/2020 - 3:45:45.590Unknown1480C:\malware.exeC:\Windows
4/3/2020 - 3:45:45.590Open1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.590Unknown1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.606Open1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.606Unknown1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.606Open1480C:\malware.exeC:\Windows\SysWOW64\wpdshext.dll
4/3/2020 - 3:45:45.606Open1480C:\malware.exeC:\Windows\SysWOW64\wpdshext.dll
4/3/2020 - 3:45:45.606Open1480C:\malware.exeC:\Windows\SysWOW64\wpdshext.dll
4/3/2020 - 3:45:45.606Open1480C:\malware.exeC:\Windows\SysWOW64\wpdshext.dll
4/3/2020 - 3:45:45.606Open1480C:\malware.exeC:\Windows\SysWOW64\wpdshext.dll
4/3/2020 - 3:45:45.606Open1480C:\malware.exeC:\Windows\SysWOW64\wpdshext.dll
4/3/2020 - 3:45:45.606Read1480C:\malware.exeC:\Windows\SysWOW64\wpdshext.dll
4/3/2020 - 3:45:45.606Read1480C:\malware.exeC:\Windows\SysWOW64\wpdshext.dll
4/3/2020 - 3:45:45.622Open1480C:\malware.exeC:\Windows\SysWOW64\wpdshext.dll
4/3/2020 - 3:45:45.622Open1480C:\malware.exeC:\Windows\SysWOW64\wpdshext.dll
4/3/2020 - 3:45:45.622Open1480C:\malware.exeC:\Windows\SysWOW64\wpdshext.dll
4/3/2020 - 3:45:45.622Open1480C:\malware.exeC:\Windows\SysWOW64\wpdshext.dll
4/3/2020 - 3:45:45.668Open1480C:\malware.exeC:\Windows\SysWOW64\winmm.dll
4/3/2020 - 3:45:45.668Open1480C:\malware.exeC:\Windows\SysWOW64\winmm.dll
4/3/2020 - 3:45:45.668Open1480C:\malware.exeC:\malware.exe.Local
4/3/2020 - 3:45:45.668Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23407_none_5c02a2f5a011f9be
4/3/2020 - 3:45:45.668Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23407_none_5c02a2f5a011f9be
4/3/2020 - 3:45:45.668Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23407_none_5c02a2f5a011f9be
4/3/2020 - 3:45:45.668Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23407_none_5c02a2f5a011f9be\GdiPlus.dll
4/3/2020 - 3:45:45.668Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23407_none_5c02a2f5a011f9be\GdiPlus.dll
4/3/2020 - 3:45:45.668Open1480C:\malware.exeC:\Windows\SysWOW64\shdocvw.dll
4/3/2020 - 3:45:45.668Open1480C:\malware.exeC:\Windows\AppPatch\sysmain.sdb
4/3/2020 - 3:45:45.668Open1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.668Unknown1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.668Open1480C:\malware.exeC:\Windows\SysWOW64\shdocvw.dll
4/3/2020 - 3:45:45.668Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.668Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.668Open1480C:\malware.exeC:\Windows
4/3/2020 - 3:45:45.668Unknown1480C:\malware.exeC:\Windows
4/3/2020 - 3:45:45.668Open1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.668Unknown1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.668Open1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.684Unknown1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.684Open1480C:\malware.exeC:\Windows\SysWOW64\shdocvw.dll
4/3/2020 - 3:45:45.684Open1480C:\malware.exeC:\Windows\SysWOW64\shdocvw.dll
4/3/2020 - 3:45:45.684Open1480C:\malware.exeC:\Windows\SysWOW64\shdocvw.dll
4/3/2020 - 3:45:45.684Open1480C:\malware.exeC:\Windows\SysWOW64\shdocvw.dll
4/3/2020 - 3:45:45.684Open1480C:\malware.exeC:\Windows\SysWOW64\shdocvw.dll
4/3/2020 - 3:45:45.684Open1480C:\malware.exeC:\Windows\SysWOW64\shdocvw.dll
4/3/2020 - 3:45:45.684Read1480C:\malware.exeC:\Windows\SysWOW64\shdocvw.dll
4/3/2020 - 3:45:45.684Read1480C:\malware.exeC:\Windows\SysWOW64\shdocvw.dll
4/3/2020 - 3:45:45.700Open1480C:\malware.exeC:\Windows\SysWOW64\shdocvw.dll
4/3/2020 - 3:45:45.700Open1480C:\malware.exeC:\Windows\SysWOW64\shdocvw.dll
4/3/2020 - 3:45:45.700Open1480C:\malware.exeC:\Windows\SysWOW64\shdocvw.dll
4/3/2020 - 3:45:45.700Open1480C:\malware.exeC:\Windows\SysWOW64\shell32.dll
4/3/2020 - 3:45:45.700Open1480C:\malware.exeC:\Windows\SysWOW64\shell32.dll
4/3/2020 - 3:45:45.700Open1480C:\malware.exeC:\Windows\SysWOW64\ieframe.dll
4/3/2020 - 3:45:45.700Open1480C:\malware.exeC:\Windows\AppPatch\sysmain.sdb
4/3/2020 - 3:45:45.700Open1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.700Unknown1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.700Open1480C:\malware.exeC:\Windows\SysWOW64\ieframe.dll
4/3/2020 - 3:45:45.700Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.700Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.700Open1480C:\malware.exeC:\Windows
4/3/2020 - 3:45:45.700Unknown1480C:\malware.exeC:\Windows
4/3/2020 - 3:45:45.700Open1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.700Unknown1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.700Open1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.715Unknown1480C:\malware.exeC:\Windows\SysWOW64
4/3/2020 - 3:45:45.715Open1480C:\malware.exeC:\Windows\SysWOW64\ieframe.dll
4/3/2020 - 3:45:45.715Open1480C:\malware.exeC:\Windows\SysWOW64\ieframe.dll
4/3/2020 - 3:45:45.715Open1480C:\malware.exeC:\Windows\SysWOW64\ieframe.dll
4/3/2020 - 3:45:45.715Open1480C:\malware.exeC:\Windows\SysWOW64\ieframe.dll
4/3/2020 - 3:45:45.715Open1480C:\malware.exeC:\Windows\SysWOW64\ieframe.dll
4/3/2020 - 3:45:45.715Open1480C:\malware.exeC:\Windows\SysWOW64\ieframe.dll
4/3/2020 - 3:45:45.715Read1480C:\malware.exeC:\Windows\SysWOW64\ieframe.dll
4/3/2020 - 3:45:45.731Open1480C:\malware.exeC:\Windows\SysWOW64\ieframe.dll
4/3/2020 - 3:45:45.731Open1480C:\malware.exeC:\Windows\SysWOW64\ieframe.dll
4/3/2020 - 3:45:45.731Open1480C:\malware.exeC:\Windows\SysWOW64\ieframe.dll
4/3/2020 - 3:45:45.731Unknown1480C:\malware.exeC:\Windows\SysWOW64\ieframe.dll
4/3/2020 - 3:45:45.731Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shell32-l1-1-0.dll
4/3/2020 - 3:45:45.731Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shell32-l1-1-0.dllapi-ms-win-downlevel-shell32-l1-1-0.dll
4/3/2020 - 3:45:45.731Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shell32-l1-1-0.dll
4/3/2020 - 3:45:45.731Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shell32-l1-1-0.dllapi-ms-win-downlevel-shell32-l1-1-0.dll
4/3/2020 - 3:45:45.731Open1480C:\malware.exeC:\Windows\SysWOW64\ieframe.dll
4/3/2020 - 3:45:45.887Open1480C:\malware.exeC:\malware.exe.Local
4/3/2020 - 3:45:45.887Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 3:45:45.887Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 3:45:45.887Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 3:45:45.887Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.887Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.887Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\msconf.exe
4/3/2020 - 3:45:45.887Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.887Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.887Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Caches
4/3/2020 - 3:45:45.887Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Caches\cversions.1.db
4/3/2020 - 3:45:45.887Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Caches
4/3/2020 - 3:45:45.887Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Caches\cversions.1.db
4/3/2020 - 3:45:45.887Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000000.db
4/3/2020 - 3:45:45.887Open1480C:\malware.exeC:\Users\desktop.ini
4/3/2020 - 3:45:45.887Read1480C:\malware.exeC:\Users\desktop.ini
4/3/2020 - 3:45:45.887Open1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.887Unknown1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.887Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.887Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.887Open1480C:\malware.exeC:\Users\Behemot\AppData
4/3/2020 - 3:45:45.887Unknown1480C:\malware.exeC:\Users\Behemot\AppData
4/3/2020 - 3:45:45.887Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 3:45:45.887Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 3:45:45.903Open1480C:\malware.exeC:\Users\Behemot\Desktop\desktop.ini
4/3/2020 - 3:45:45.903Read1480C:\malware.exeC:\Users\Behemot\Desktop\desktop.ini
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users\Behemot\Searches\desktop.ini
4/3/2020 - 3:45:45.981Read1480C:\malware.exeC:\Users\Behemot\Searches\desktop.ini
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users\Behemot\Videos\desktop.ini
4/3/2020 - 3:45:45.981Read1480C:\malware.exeC:\Users\Behemot\Videos\desktop.ini
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users\Behemot\Pictures\desktop.ini
4/3/2020 - 3:45:45.981Read1480C:\malware.exeC:\Users\Behemot\Pictures\desktop.ini
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users\Behemot\Contacts\desktop.ini
4/3/2020 - 3:45:45.981Read1480C:\malware.exeC:\Users\Behemot\Contacts\desktop.ini
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.981Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.981Open1480C:\malware.exeC:\Users\Behemot\Favorites\desktop.ini
4/3/2020 - 3:45:45.981Read1480C:\malware.exeC:\Users\Behemot\Favorites\desktop.ini
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users\Behemot\Music\desktop.ini
4/3/2020 - 3:45:45.997Read1480C:\malware.exeC:\Users\Behemot\Music\desktop.ini
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users\Behemot\Downloads\desktop.ini
4/3/2020 - 3:45:45.997Read1480C:\malware.exeC:\Users\Behemot\Downloads\desktop.ini
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users\Behemot\Documents\desktop.ini
4/3/2020 - 3:45:45.997Read1480C:\malware.exeC:\Users\Behemot\Documents\desktop.ini
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users\Behemot\Links\desktop.ini
4/3/2020 - 3:45:45.997Read1480C:\malware.exeC:\Users\Behemot\Links\desktop.ini
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users\Behemot\Saved Games\desktop.ini
4/3/2020 - 3:45:45.997Read1480C:\malware.exeC:\Users\Behemot\Saved Games\desktop.ini
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.997Unknown1480C:\malware.exeC:\Users
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Windows\SysWOW64\propsys.dll
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Windows\SysWOW64\propsys.dll
4/3/2020 - 3:45:45.997Open1480C:\malware.exeC:\Windows\System32\propsys.dll
4/3/2020 - 3:45:46.12Open1480C:\malware.exeC:\Windows\SysWOW64\propsys.dll
4/3/2020 - 3:45:46.12Open1480C:\malware.exeC:\Windows\SysWOW64\propsys.dll
4/3/2020 - 3:45:46.12Open1480C:\malware.exeC:\Windows\System32\propsys.dll
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Windows\SysWOW64\urlmon.dll
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Windows\SysWOW64\urlmon.dll
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Secur32.dll
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
4/3/2020 - 3:45:46.122Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
4/3/2020 - 3:45:46.122Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\msconf.exe
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\
4/3/2020 - 3:45:46.122Unknown1480C:\malware.exeC:\
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Users
4/3/2020 - 3:45:46.122Unknown1480C:\malware.exeC:\Users
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:46.122Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Users\Behemot\AppData
4/3/2020 - 3:45:46.122Unknown1480C:\malware.exeC:\Users\Behemot\AppData
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 3:45:46.122Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\msconf.exe
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 3:45:46.122Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Users\Behemot\AppData
4/3/2020 - 3:45:46.122Unknown1480C:\malware.exeC:\Users\Behemot\AppData
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:46.122Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Users
4/3/2020 - 3:45:46.122Unknown1480C:\malware.exeC:\Users
4/3/2020 - 3:45:46.122Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\msconf.exe
4/3/2020 - 3:45:46.137Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
4/3/2020 - 3:45:46.137Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
4/3/2020 - 3:45:46.137Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
4/3/2020 - 3:45:46.137Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
4/3/2020 - 3:45:46.137Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
4/3/2020 - 3:45:46.137Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\msconf.exe
4/3/2020 - 3:45:46.137Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\msconf.exe
4/3/2020 - 3:45:46.137Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\msconf.exe:Zone.Identifier
4/3/2020 - 3:45:46.184Open1480C:\malware.exeC:\malware.exe
4/3/2020 - 3:45:46.184Unknown1480C:\malware.exeC:\malware.exe
4/3/2020 - 3:45:46.184Open1480C:\malware.exeC:\Monitor
4/3/2020 - 3:45:46.184Unknown1480C:\malware.exeC:\Monitor
4/3/2020 - 3:45:46.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\msconf.exe
4/3/2020 - 3:45:46.184Open1480C:\malware.exeC:\ntvdm64.dll
4/3/2020 - 3:45:46.184Open1480C:\malware.exeC:\Windows\SysWOW64\ntvdm64.dll
4/3/2020 - 3:45:46.231Open1480C:\malware.exeC:\Windows\SysWOW64\ntvdm64.dll
4/3/2020 - 3:45:46.465Open1480C:\malware.exeC:\Windows\SysWOW64\pt-BR\ntvdm64.dll.mui
4/3/2020 - 3:45:46.465Read1480C:\malware.exeC:\Windows\SysWOW64\pt-BR\ntvdm64.dll.muintvdm64.dll.mui
4/3/2020 - 3:45:46.559Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll
4/3/2020 - 3:45:46.559Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
4/3/2020 - 3:45:46.122Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
4/3/2020 - 3:45:46.122Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
4/3/2020 - 3:45:46.122Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
4/3/2020 - 3:45:46.122Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
4/3/2020 - 3:45:46.122Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
4/3/2020 - 3:45:46.122Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
4/3/2020 - 3:45:46.122Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
4/3/2020 - 3:45:46.122Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect

File Summary
Created
Identified: True check_circle

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: False cancel

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code carmela-segev.co.il.
computer localhost arrow_forward computer gateway:DNS code carmela-segev.co.il.

Response
computer gateway:DNS arrow_forward computer localhost code carmela-segev.co.il. reply_all 194.213.4.7


TCP
Info
194.213.4.7:80 arrow_forward computer localhost:65191
computer localhost:65191 arrow_forward 194.213.4.7:80

UDP
Info
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:50273

HTTP
Info
computer localhost send GET carmela-segev.co.il attach_file /img/configuras.jpg

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
True check_circle

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 71.93%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 69.66%
suspicious: False cancel

Random Forest (100 estimators, NFS-BRMalware)
confidence: 64.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 74.61%
suspicious: False cancel

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 41.14%
suspicious: False cancel

Add to Collection
Download